SlideShare a Scribd company logo
1 of 18
Download to read offline
LEACH
Cluster-based Routing Protocol
for
Wireless Sensor Networks
By
AKANKSHA UPADHYAY
Research Student, SATI, Vidisha
Need
• Cheap and energy-efficient as possible and rely on their large
numbers to obtain high quality results.
• Fault tolerance while minimizing energy consumption.
• Since the limited wireless channel bandwidth must be shared
among all the sensors in the network, routing protocols for
these networks should be able to perform local collaboration to
reduce bandwidth requirements.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Network routing protocols for WSNs
(Energy Analysis)
• Direct communication with BS
• Minimum energy multi-hop routing using sensor networks and
radio models
• Clustering
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Direct communication with BS
• Each sensor sends its data directly to the base station.
• Possibly optimal if either the base station is close to the nodes,
or the energy required to receive data is large.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Minimum energy multi-hop routing
• Nodes route data destined ultimately for the base station
through intermediate nodes.
• The intermediate nodes are chosen such that the transmit
amplifier energy is minimized.
• Rather than just one (high-energy) transmit of the data, each
data message must go through n (low-energy) transmits and n
receives
• Shorten system lifetime as the nodes closest to the base station
are the ones to die out first since they are the ones most used
as “routers” for other sensors’ data.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Clustering
• Nodes are organized into clusters that communicate with a
local base station, and these local base stations transmit the
data to the global base station, where it is accessed by the end-
user.
• If the base station is an energy-constrained node, it would die
quickly, as it is being heavily utilized.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
LEACH
• Low-Energy Adaptive Clustering Hierarchy
• Clustering-based protocol
• Select sensor nodes as CHs by rotation, so the high energy
dissipation in communicating with the BS is distributed evenly
to all sensor nodes in the network.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Assumption
• The base station is fixed and located far from the sensors.
• All nodes in the network are homogeneous and energy
constrained.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Key Features
• Localized coordination and control for cluster set-up and
operation.
• Randomized rotation of the cluster “base stations” or “cluster-
heads” and the corresponding clusters.
• Local compression to reduce global communication.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
LEACH
• The nodes organize themselves into local clusters, with one
node acting as the local base station or cluster-head.
• Cluster-head nodes broadcast their status to the other sensors
in the network.
• Each sensor node determines to which cluster it wants to
belong by choosing the cluster-head.
• Each cluster-head creates a schedule for the nodes in its
cluster.
• Once the cluster-head has all the data from the nodes in its
cluster, the cluster-head node aggregates the data and then
transmits the compressed data to the base station.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Comparative Analysis
System lifetime using direct transmission,
MTE routing, static clustering, and
LEACH with 0.5 J/node
Total system energy dissipated using
direct communication, MTE routing
and LEACH for the 100node random
network,
Eelec=50nJ/bit, εamp=100pJ/bit/m2 and
the messages are 2000 bits
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Algorithm
• The operation of LEACH is broken up into rounds.
• Each round comprises 2 phases
1. Set-up phase: when the clusters are organized,
2. Steady-state phase: when data transfers to the base
station.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Set-up Phase
• Decision of nodes to become cluster head
• Node n selects random number between 0 and 1
• If number is less than threshold T(n), node become cluster head for
current round. [T(n)]
• Cluster head nodes uses CSMA MAC protocol to broadcast
advertisement message to the rest of the nodes with same transmit
energy.
• According to the received signal strength nodes decides the cluster to
which it will belong in the round.
• Each node transmit information of its cluster head selection to
the cluster head again using CSMA MAC protocol.
• Cluster head creates a TDMA schedule telling the nodes when
to transmit.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Set-up Phase
Threshold Computation
[BACK]
)
1
mod(*1
P
rP
P

T(n) =
if n ϵ G
0 otherwise
n = node
P = the desired percentage of cluster
heads
r = the current round
G = set of nodes that have not been
cluster-heads in the last 1/P
rounds
During round 0, each node has a
probability P of becoming a
cluster-head. The nodes that are
cluster-heads in round 0 cannot
be cluster-heads for the next 1/P
rounds.
After 1/P-1 rounds, T=1for any
nodes that have not yet been
cluster-heads.
And after 1/P rounds, all nodes
are once again eligible to become
cluster-heads.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Steady-state Phase
• The radio of each non-cluster-head node can be turned off
until the node’s allocated transmission time ( according to
TDMA schedule).
• The cluster-head node must keep its receiver on to receive all
the data from the nodes in the cluster.
• When all the data has been received, then cluster head node
performs signal processing functions to compress the data into
a single signal.
• This composite signal is sent to the base station.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Conclusion
• LEACH distributes the energy among the nodes in the network
and is effective in reducing energy dissipation from a global
perspective.
• LEACH effectively enhances the system lifetime.
• LEACH is completely distributed, requiring no control
information from the base station, and the nodes do not require
knowledge of the global network in order for LEACH to
operate.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Reference
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, “Energy-Efficient
Communication Protocol for Wireless Microsensor Networks”, Proceedings of the
33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA,
pp. 10–19, 4–7 January 2000.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
THANK YOU

More Related Content

What's hot

LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks Urvashi Khandelwal
 
T mac protocol
T mac protocolT mac protocol
T mac protocolR Islam
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networksAcad
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSNADEEBANADEEM
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Ali Habeeb
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksAbhijeet Awade
 

What's hot (20)

LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
Applications of WSN
Applications of WSNApplications of WSN
Applications of WSN
 
TinyOS
TinyOSTinyOS
TinyOS
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Routing
RoutingRouting
Routing
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 

Viewers also liked

Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL9914814928
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeIAEME Publication
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNIOSR Journals
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
 
stable election protocol
stable election protocolstable election protocol
stable election protocolapuu34
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
Etat  De L\'art Algo RéSeaux De Capteurs sans-filEtat  De L\'art Algo RéSeaux De Capteurs sans-fil
Etat De L\'art Algo RéSeaux De Capteurs sans-filmabrouk
 
Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Nader Abdallah
 

Viewers also liked (20)

Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetime
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 
stable election protocol
stable election protocolstable election protocol
stable election protocol
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
Etat  De L\'art Algo RéSeaux De Capteurs sans-filEtat  De L\'art Algo RéSeaux De Capteurs sans-fil
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil
 
Wsn
WsnWsn
Wsn
 
Dsdv
DsdvDsdv
Dsdv
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 

Similar to Leach

Energy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor NetworkEnergy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor NetworkShivang Rana
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptAjayTiwari301041
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsnAyman Adel
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 

Similar to Leach (20)

Energy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor NetworkEnergy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor Network
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
 
A04560105
A04560105A04560105
A04560105
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
H0421043049
H0421043049H0421043049
H0421043049
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
Wireless Sensor
Wireless SensorWireless Sensor
Wireless Sensor
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
eeca
eecaeeca
eeca
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Leach

  • 1. LEACH Cluster-based Routing Protocol for Wireless Sensor Networks By AKANKSHA UPADHYAY Research Student, SATI, Vidisha
  • 2. Need • Cheap and energy-efficient as possible and rely on their large numbers to obtain high quality results. • Fault tolerance while minimizing energy consumption. • Since the limited wireless channel bandwidth must be shared among all the sensors in the network, routing protocols for these networks should be able to perform local collaboration to reduce bandwidth requirements. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 3. Network routing protocols for WSNs (Energy Analysis) • Direct communication with BS • Minimum energy multi-hop routing using sensor networks and radio models • Clustering AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 4. Direct communication with BS • Each sensor sends its data directly to the base station. • Possibly optimal if either the base station is close to the nodes, or the energy required to receive data is large. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 5. Minimum energy multi-hop routing • Nodes route data destined ultimately for the base station through intermediate nodes. • The intermediate nodes are chosen such that the transmit amplifier energy is minimized. • Rather than just one (high-energy) transmit of the data, each data message must go through n (low-energy) transmits and n receives • Shorten system lifetime as the nodes closest to the base station are the ones to die out first since they are the ones most used as “routers” for other sensors’ data. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 6. Clustering • Nodes are organized into clusters that communicate with a local base station, and these local base stations transmit the data to the global base station, where it is accessed by the end- user. • If the base station is an energy-constrained node, it would die quickly, as it is being heavily utilized. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 7. LEACH • Low-Energy Adaptive Clustering Hierarchy • Clustering-based protocol • Select sensor nodes as CHs by rotation, so the high energy dissipation in communicating with the BS is distributed evenly to all sensor nodes in the network. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 8. Assumption • The base station is fixed and located far from the sensors. • All nodes in the network are homogeneous and energy constrained. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 9. Key Features • Localized coordination and control for cluster set-up and operation. • Randomized rotation of the cluster “base stations” or “cluster- heads” and the corresponding clusters. • Local compression to reduce global communication. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 10. LEACH • The nodes organize themselves into local clusters, with one node acting as the local base station or cluster-head. • Cluster-head nodes broadcast their status to the other sensors in the network. • Each sensor node determines to which cluster it wants to belong by choosing the cluster-head. • Each cluster-head creates a schedule for the nodes in its cluster. • Once the cluster-head has all the data from the nodes in its cluster, the cluster-head node aggregates the data and then transmits the compressed data to the base station. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 11. Comparative Analysis System lifetime using direct transmission, MTE routing, static clustering, and LEACH with 0.5 J/node Total system energy dissipated using direct communication, MTE routing and LEACH for the 100node random network, Eelec=50nJ/bit, εamp=100pJ/bit/m2 and the messages are 2000 bits AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 12. Algorithm • The operation of LEACH is broken up into rounds. • Each round comprises 2 phases 1. Set-up phase: when the clusters are organized, 2. Steady-state phase: when data transfers to the base station. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 13. Set-up Phase • Decision of nodes to become cluster head • Node n selects random number between 0 and 1 • If number is less than threshold T(n), node become cluster head for current round. [T(n)] • Cluster head nodes uses CSMA MAC protocol to broadcast advertisement message to the rest of the nodes with same transmit energy. • According to the received signal strength nodes decides the cluster to which it will belong in the round. • Each node transmit information of its cluster head selection to the cluster head again using CSMA MAC protocol. • Cluster head creates a TDMA schedule telling the nodes when to transmit. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 14. Set-up Phase Threshold Computation [BACK] ) 1 mod(*1 P rP P  T(n) = if n ϵ G 0 otherwise n = node P = the desired percentage of cluster heads r = the current round G = set of nodes that have not been cluster-heads in the last 1/P rounds During round 0, each node has a probability P of becoming a cluster-head. The nodes that are cluster-heads in round 0 cannot be cluster-heads for the next 1/P rounds. After 1/P-1 rounds, T=1for any nodes that have not yet been cluster-heads. And after 1/P rounds, all nodes are once again eligible to become cluster-heads. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 15. Steady-state Phase • The radio of each non-cluster-head node can be turned off until the node’s allocated transmission time ( according to TDMA schedule). • The cluster-head node must keep its receiver on to receive all the data from the nodes in the cluster. • When all the data has been received, then cluster head node performs signal processing functions to compress the data into a single signal. • This composite signal is sent to the base station. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 16. Conclusion • LEACH distributes the energy among the nodes in the network and is effective in reducing energy dissipation from a global perspective. • LEACH effectively enhances the system lifetime. • LEACH is completely distributed, requiring no control information from the base station, and the nodes do not require knowledge of the global network in order for LEACH to operate. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 17. Reference W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, pp. 10–19, 4–7 January 2000. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha