SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
DOI:10.5121/ijsc.2015.6401 1
COMPARE AND ANALYSES OF OPTIMIZED
R-LEACH WITH LEACH ALGORITHM IN
WSN
Tarun Sharma1
, Harsukhpreet singh2
and Anurag sharma3
Dept” of Computer Science & Engineering, CT Institute of Technology & Research1
Dept” of Electronics & Communication Engineering, CT Institute of Technology &
Research 2,3
Jalandhar, Punjab, India 1 ,2, 3
ABSTRACT
Wireless sensor networks are composed of numerous small charge, little power devices with sensing, local
processing and wireless communication capabilities. Minimizing energy consumption and maximizing
network lifespan are significant issues in the design of routing protocols for sensor networks. In this paper,
we analyses the efficiency of LEACH protocol in extending the existence for energy-constrained wireless
sensor networks. Based on LEACH protocol, an enhanced protocol termed as R- LEACH is proposed
which aims to diminish energy consumption within the wireless sensor networks. The simulation results
suggest R-LEACH protocol could equilibrium network energy consumption and extend the network
lifecycle more successfully as compared to LEACH.
KEYWORDS
Wireless sensor networks, energy efficiency, LEACH protocol, Algorithm for LEACH protocol.
I. INTRODUCTION
A wireless sensor network is prepared up of a huge number of sensor nodes and a sink [2]. The
WSN is composed of sensor nodes from hundreds or thousands and each node is connected to
one sensor nodes. A wireless sensor network made up of a huge number of nodes extends over
a exact ssregion. A sensor node self-confident of a sensor, actuators, memory, a mainframe
and they do have communication ability. All the sensor nodes are permitted to communicate in
the course of a wireless intermediate. The wireless medium is of infrared, radio frequency that
having no wired connection attached. So the sensor nodes are deployed in a random manner
and it make ad-hoc network because they can communicate themselves [1]. If the node is not
capable of communicating with other nodes of the network through straight connection, it
means node is not in range. In such kind of networks data transmission from one node to
another is performed via in the middle of nodes. This concept is referred as multi-hoping. All
sensors nodes work cooperatively to serve the requests [4].
Energy acting a important site in wireless sensor networks because nodes are battery operated.
As a result, many protocols have been planned in order to diminish the energy consumption of
these nodes such as LEACH [6], PAMAS [5].LEACH is measured as the most designer routing
protocol that use cluster based routing in order to reduce the energy expenditure, in this paper
we propose an enhancement on the LEACH protocol that further improve the power utilization,
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
2
simulation result transport out that our protocol outperforms LEACH protocol in term of energy
expenditure and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [6].
LEACH form clusters and selects arbitrarily cluster Heads for each cluster. Non- cluster heads
sense the data and transmit this data to cluster head, and then cluster head combined the data and
send to sink. The principle of this protocol is that it assigns overall energy consumption of the
network uniformly to each node by selecting periodically different nodes as a cluster head. There
are two phases of LEACH that are Setup phase and Steady state phase. In setting up phase,
clusters are created and cluster heads are chosen. In steady state phase, data from non-cluster
heads is broadcast to sink. The sensor nodes converse with cluster heads with allotted time using
TDMA. Cluster heads are randomly selected in all rounds. LEACH process is divided into
numerous rounds. Each round starts with set-up phase. In this clusters are planned LEACH set a
threshold value T (n) and then sensor node I generate a random digit between 0 and 1. If the
random number is < T(n) , the node will develop into cluster head for the current round and
common nodes join the cluster and turn into cluster members [6].
 = 

	∗
∈ 
0																				ℎ
………………. (1)
P is a possibility of the node to be chosen as a cluster head, r is a number of rounds passed, G is
the collection of ordinary nodes. One time a node become cluster head never become cluster head
yet again, only the node which have not become the cluster head and have high energy can turn
into cluster head at r+1.When cluster head assigns time slots to the members using TDMA then it
shifted to the steady state phase. After the shifting in steady- state phase, members sent data to
cluster heads; cluster head process the data and then send data information to the base station.
After these circles, it turns to next round and begins rebuilding new round. Advantages of
LEACH are that LEACH is completely circulated. LEACH does not need the control information
from the base station and the nodes do not need information of the global network in order for
LEACH to function. Disadvantages of LEACH are that the cluster heads are chosen randomly. So
the distribution of cluster heads cannot be ensured. In this protocol, the nodes with low energy
have similar precedence as the nodes having high energy and nodes having little energy can
become cluster heads, but that can’t be used in huge level communication networks [9].
Figure1: LEACH protocol Architecture
Sink
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
3
In section ii presents the related work, in section iii introduced proposed algorithm for LEACH
enhancement, in section iv simulation setup and section v , results and discussion, at last we
conclude the paper.
II LITERATURE REVIEW
An optimal energy-saving spare organization, counting spare collection and named it LEACH-
SM protocol (modified form of prominent LEACH protocol) was planned by Baker B. et al.;
(2014).In this paper, author presented a quantitative contrast of energy consumption and WSN
life span for both mentioned protocols [12].
Genetic algorithm and optimization of LEACH protocol that are used on LEACH protocol and
compare both results on the basis of rounds that was discussed by Yadav S. et al.; (2014) . The
contrast was based on optimal thresholding possibility for cluster arrangement .Finally, after
evaluation finds LEACH-GA method outperforms MTE, DT and LEACH in conditions of
network lifetime, use for optimal energy-efficient clustering [10].
The two major clustering protocols, namely LEACH and LEACH-C (centralized), via NS2 tool
for frequent selected scenarios, and study of simulation results against chosen presentation
metrics with latency and network lifetime was considered by Nayak P.et al.; (2014). As a
termination of observation from results, it can be mentioned that LEACH can be favored if
localized coordination of nodes in clustering without involving BS is of high priority than other
factors like assurance over desired number of clusters etc.; and LEACH-C can be chosen when
centralized and deterministic approach covering entire network is expected still bringing in
increased network lifetime and desired number of clusters [7, 13].
The Enhance version of LEACH protocol called V-LEACH protocol and the comparison of
LEACH protocol with V-LEACH protocol was planned by Ahlawat A. et al.; from the
simulation results were, first the number of alive nodes is more than the original LEACH. Second
the number of dead nodes is less than the original LEACH protocol. Network life time is
increased by 49.37% then original LEACH [11].
Energy-LEACH protocol improves the CH collection procedure. It makes residual energy of
nodes as the main thing which decides whether the nodes twist into CH or not after the initial
round. It same as LEACH protocol, was proposed by Yassein M. et al.; (2009) E-LEACH is
separated into rounds, in the first round, every node has the same opportunity to spin into CH,
that mean nodes are arbitrarily chosen as CHs, In the next rounds, the residual energy of each
node is dissimilar after one round communication and taken into account for the collection of the
CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer
energy [6].
A new edition of LEACH called two-level LEACH was proposed by Kaur A. et al.; (2015). In
this protocol, CH collects data from further cluster members as original LEACH, but somewhat
transport data to the BS , it uses one of the CHs that lies between the CH and the BS as a relay
station [8].
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
4
In LEACH, each CH openly communicates with BS no issue what the distances between CH and
BS It will consume a lot of its energy if the distance is far. So overcome this drawback multihop-
LEACH protocol was proposed by Zhou H. It selects best path between the CH and the BS
through other CHs and use these CHs as a relay station to transmit data over through them [6].
The modification of R-LEACH protocol in LEACH protocol enables an alternative node to get
replaced in place of a node was proposed by Ramesh R. et al.; (2014) which loses its energy
such that it extends the life span of the whole network and avoids data loss. The alteration R-
LEACH protocol has been implemented with 40 nodes in the network simulator-2 and its packet
delivery ratio and energy level has been experimental which is superior than that of existing
LEACH [3].
III PROPOSED ALGORITHM FOR LEACH ENHANCEMENT
In LEACH protocol, the chosen of cluster head randomly due to this the energy of cluster head is
very low. Cluster heads are in charge not only for sending data to the base station but also for
collecting and fusing the data from ordinary nodes in their own clusters. In the process of data
collection and broadcast, the energy consumed by data transmission is superior to that of data
fusion. If the present energy of a cluster head is fewer or the distance to the base station is much
far, then the cluster head will be died rapidly because of a heavy energy burden. To add ress these
issues, this article proposes a new improved algorithm R-LEACH (RFID protocol). To overcome
the limitation modifies LEACH protocol by embedding communications modes like Active,
Ready and Sleep modes in the network. In Active, mode only sensed data, in ready mode sensed
as well as transmitting data to the BS as shown in the figure 2. In this scenario , the nodes in
orange are CH and is in a ready state used for transmitting data, the node in blue is the base
station and a rest of the nodes is in active and sleep state. The node in sleep mode used for saving
the energy consumption and also balance the energy loads of the CHs.
Figure 2: cluster based mechanism use in proposed methodology (R-LEACH protocol)
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
5
IV. SIMULATION SET UP
In this section, we evaluate the performance of R-LEACH protocol using NS2 tool and compare
its performance with LEACH protocol, using the same initial values and following the same
scenario. The algorithm is tested in network simulator version 2. The experiments are performed
with a diverse number of nodes placed in an 800m * 800m field. Each sensor nodes is assumed to
have an initial energy of 100 joules. The general simulation parameters are
Table 1: NS-2 simulation parameters
V RESULTS AND DISCUSSION
To evaluate the performance comparison of LEACH and R-LEACH protocol using parameters
such as, Energy consumption, Packet loss, End to End delay, Throughput and control overhead.
Calculating the average energy consumption is the measure of rate at which energy is used by
sensor nodes in an exacting time. From the graph It is observed that standard the energy
consumption for R-LEACH is less as compared to LEACH as shown in Figure 3. every cluster
heads directly communication with sink no issue the distance between Cluster head and sink; it
will use a more energy if the distance is far [3]. RFID protocols works on modes like active sleep
and ready .In RFID some nodes are in sleep modes so energy consumption is to be reduced. In
table 2, energy is improved in comparison to the old one. Figure 4 calculates packet loss is the
total number of lost of packets during the transmission from source to destination. From the graph
it is observed that average of packet loss for R-LEACH is less as compared to LEACH. In
parameter settings
Simulation Area 800*800 meters
No of nodes 41
Channel Type Channel/wireless
Antennae model Antenna/omniantenna
Energy model battery
Interface queue Type Queue/Droptail/Priqueue
Link layer type LL
Simulation time 10s
Initial Energy Model 100 J
Routing protocol AODV
Traffic Source CBR
Type of MAC MAC/ 802-11
Packet size 1000 bytes
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
6
LEACH packet loss is more because the node having short energy is chosen as CH then node will
die soon due to which data does not reach to the BS, packet loss is occurred [16]. In Figure 5,
calculates the End to End delay as the time taken for a packet to be transmitted across a network
form source to destination. The average end to end for R-LEACH is fewer as compared to
LEACH protocol because in LEACH protocol energy consumption is high due to this it causes
delay for data transmission [14]. In Figure 6, calculates Throughput is the average data packets
received at the destination. From the graph, it is observed that the R-LEACH has better
throughput as compared to LEACH protocol. In LEACH protocol throughput will be decrease
due to high energy consumption, packet loss and overhead [15 ].In figure 7, calculates control
overhead is the ratio between a total number of control packets and total number of packets
delivered successfully. From the graph it is observed that LEACH has high overhead due to delay
increase [18]. In table 2, calculates the Average of all parameters and R-LEACH is improved in
comparison to the old that mean the latest edition of LEACH outperforms the original version of
LEACH protocol.
Figure 3: Compared Rfid energy graph with Leach Energy graph.
Figure 4: Figure 3: Compared Rfid Packetloss graph with Leach packet loss graph.
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
7
Figure 5: Compared Rfid delay graph with leach delay graph.
Figure 7: compared Rfid throughput with Leach throughput.
Figure 7: compared Rfid overhead with leach overhead.
International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015
8
VI CONCLUSION
In this paper considered a well- known protocol for wireless sensor networks called LEACH
protocol which is the first and the most svery important protocol in wireless sensor networks
which uses clusters based distribution techniques followed by an outline of LEACH protocol
implementations, then we proposed a new edition of LEACH protocol called R-LEACH protocol.
From the simulation results, R-LEACH protocol could balance the energy consumption and
enlarge the network life cycle more successfully as compared to original LEACH protocol.
ACKNOWLEDGEMENT
I hereby acknowledge that the above- referred work is my own research work and I am
entirely responsible for any kind of misuse of material. I thank my mentor Mr Harsukh
Singh to guide and encourage me and for putting all her valuable time for me to get the
desired output.
REFERENCES
[1] S. Pant, N. Chauhan, and P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks: A
Survey,” Int. J. Comput. Appl., vol. 11, no. 10, pp. 17–21, 2010.
[2] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,”
Comput. Networks, vol. 38, pp. 393– 422, 2002.
[3] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in
Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in
Engineering and technology,London(U.K)ends in Eng pp. 80–84, 2014.
[4] L. Jian-qi, C. Bin-fang, W. Li, and W. Wen-Hu, “Energy optimized approach based on clustering
routing protocol for wireless sensor networks,” 2013 25th Chinese Control Decis. Conf., pp. 3710–
3715, 2013.
[5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with signalling for
ad hoc networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 28, pp. 5–26, 1998.
[6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” Int. J. Digit.
Content Technol. its Appl., vol. 3, pp. 132–136, 2009.
[7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH
Vs LEACH-C,” Int. J. Comput. Appl., vol. 106, no. 11, pp. 1–6, 2014.
[8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor Network-A
Survey,” Int. J. Comput. Appl.,vol. 116, no. 10, pp. 1–5, 2015.
[9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor
Networks,” Procedia Environ. Sci., vol. 10, pp. 595–600, 2011.
[10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” vol. 2, no. 6, pp. 69–71, 2014.
[11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol
in WSN,” Int. Conf. Adv. Comput. Commun. Technol. ACCT, pp. 236–240, 2013.
[12] B. A. Bakr and L. T. Lilien, “Comparison by Simulation of Energy Consumption and WSN Lifetime
for LEACH and LEACH-SM,” Procedia Comput. Sci., vol. 34, pp. 180–187, 2014.
[13] V. Geetha, P. V. Kallapur, and S. Tellajeera, “Clustering in Wireless Sensor Networks: Performance
Comparison of LEACH  LEACH-C Protocols Using NS2,” Procedia Technol., vol. 4, pp. 163–170,
2012.
[14] M. A. G. R, “A Delay-Aware Network Structure for Wireless Sensor Networks With Consecutive
Data Collection Processes.pdf,”IEEE, vol. 7, no. 4, pp. 198–201, 2014.

More Related Content

What's hot

MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
 
Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...TELKOMNIKA JOURNAL
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...rahulmonikasharma
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicastAravindM170274
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...ijcsa
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
 

What's hot (19)

MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...Implementation of optimal solution for network lifetime and energy consumptio...
Implementation of optimal solution for network lifetime and energy consumptio...
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
 
40120130406013
4012013040601340120130406013
40120130406013
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicast
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Ne...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networks
 

Similar to OPTIMIZED R-LEACH ANALYSIS

SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...ijwmn
 
Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsIJECEIAES
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
 
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNRecent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNijsrd.com
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKScscpconf
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...IJCNCJournal
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 

Similar to OPTIMIZED R-LEACH ANALYSIS (20)

SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
B045070510
B045070510B045070510
B045070510
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
Magnify Network Lifetime in WSN by Reducing Data Aggregation Distance of Weak...
 
Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNs
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
 
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSNRecent Developments in Routing Algorithms for Achieving Elongated Life in WSN
Recent Developments in Routing Algorithms for Achieving Elongated Life in WSN
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
 
15 ijcse-01236
15 ijcse-0123615 ijcse-01236
15 ijcse-01236
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 

OPTIMIZED R-LEACH ANALYSIS

  • 1. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 DOI:10.5121/ijsc.2015.6401 1 COMPARE AND ANALYSES OF OPTIMIZED R-LEACH WITH LEACH ALGORITHM IN WSN Tarun Sharma1 , Harsukhpreet singh2 and Anurag sharma3 Dept” of Computer Science & Engineering, CT Institute of Technology & Research1 Dept” of Electronics & Communication Engineering, CT Institute of Technology & Research 2,3 Jalandhar, Punjab, India 1 ,2, 3 ABSTRACT Wireless sensor networks are composed of numerous small charge, little power devices with sensing, local processing and wireless communication capabilities. Minimizing energy consumption and maximizing network lifespan are significant issues in the design of routing protocols for sensor networks. In this paper, we analyses the efficiency of LEACH protocol in extending the existence for energy-constrained wireless sensor networks. Based on LEACH protocol, an enhanced protocol termed as R- LEACH is proposed which aims to diminish energy consumption within the wireless sensor networks. The simulation results suggest R-LEACH protocol could equilibrium network energy consumption and extend the network lifecycle more successfully as compared to LEACH. KEYWORDS Wireless sensor networks, energy efficiency, LEACH protocol, Algorithm for LEACH protocol. I. INTRODUCTION A wireless sensor network is prepared up of a huge number of sensor nodes and a sink [2]. The WSN is composed of sensor nodes from hundreds or thousands and each node is connected to one sensor nodes. A wireless sensor network made up of a huge number of nodes extends over a exact ssregion. A sensor node self-confident of a sensor, actuators, memory, a mainframe and they do have communication ability. All the sensor nodes are permitted to communicate in the course of a wireless intermediate. The wireless medium is of infrared, radio frequency that having no wired connection attached. So the sensor nodes are deployed in a random manner and it make ad-hoc network because they can communicate themselves [1]. If the node is not capable of communicating with other nodes of the network through straight connection, it means node is not in range. In such kind of networks data transmission from one node to another is performed via in the middle of nodes. This concept is referred as multi-hoping. All sensors nodes work cooperatively to serve the requests [4]. Energy acting a important site in wireless sensor networks because nodes are battery operated. As a result, many protocols have been planned in order to diminish the energy consumption of these nodes such as LEACH [6], PAMAS [5].LEACH is measured as the most designer routing protocol that use cluster based routing in order to reduce the energy expenditure, in this paper we propose an enhancement on the LEACH protocol that further improve the power utilization,
  • 2. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 2 simulation result transport out that our protocol outperforms LEACH protocol in term of energy expenditure and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [6]. LEACH form clusters and selects arbitrarily cluster Heads for each cluster. Non- cluster heads sense the data and transmit this data to cluster head, and then cluster head combined the data and send to sink. The principle of this protocol is that it assigns overall energy consumption of the network uniformly to each node by selecting periodically different nodes as a cluster head. There are two phases of LEACH that are Setup phase and Steady state phase. In setting up phase, clusters are created and cluster heads are chosen. In steady state phase, data from non-cluster heads is broadcast to sink. The sensor nodes converse with cluster heads with allotted time using TDMA. Cluster heads are randomly selected in all rounds. LEACH process is divided into numerous rounds. Each round starts with set-up phase. In this clusters are planned LEACH set a threshold value T (n) and then sensor node I generate a random digit between 0 and 1. If the random number is < T(n) , the node will develop into cluster head for the current round and common nodes join the cluster and turn into cluster members [6]. = ∗
  • 3. ∈ 0 ℎ ………………. (1) P is a possibility of the node to be chosen as a cluster head, r is a number of rounds passed, G is the collection of ordinary nodes. One time a node become cluster head never become cluster head yet again, only the node which have not become the cluster head and have high energy can turn into cluster head at r+1.When cluster head assigns time slots to the members using TDMA then it shifted to the steady state phase. After the shifting in steady- state phase, members sent data to cluster heads; cluster head process the data and then send data information to the base station. After these circles, it turns to next round and begins rebuilding new round. Advantages of LEACH are that LEACH is completely circulated. LEACH does not need the control information from the base station and the nodes do not need information of the global network in order for LEACH to function. Disadvantages of LEACH are that the cluster heads are chosen randomly. So the distribution of cluster heads cannot be ensured. In this protocol, the nodes with low energy have similar precedence as the nodes having high energy and nodes having little energy can become cluster heads, but that can’t be used in huge level communication networks [9]. Figure1: LEACH protocol Architecture Sink
  • 4. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 3 In section ii presents the related work, in section iii introduced proposed algorithm for LEACH enhancement, in section iv simulation setup and section v , results and discussion, at last we conclude the paper. II LITERATURE REVIEW An optimal energy-saving spare organization, counting spare collection and named it LEACH- SM protocol (modified form of prominent LEACH protocol) was planned by Baker B. et al.; (2014).In this paper, author presented a quantitative contrast of energy consumption and WSN life span for both mentioned protocols [12]. Genetic algorithm and optimization of LEACH protocol that are used on LEACH protocol and compare both results on the basis of rounds that was discussed by Yadav S. et al.; (2014) . The contrast was based on optimal thresholding possibility for cluster arrangement .Finally, after evaluation finds LEACH-GA method outperforms MTE, DT and LEACH in conditions of network lifetime, use for optimal energy-efficient clustering [10]. The two major clustering protocols, namely LEACH and LEACH-C (centralized), via NS2 tool for frequent selected scenarios, and study of simulation results against chosen presentation metrics with latency and network lifetime was considered by Nayak P.et al.; (2014). As a termination of observation from results, it can be mentioned that LEACH can be favored if localized coordination of nodes in clustering without involving BS is of high priority than other factors like assurance over desired number of clusters etc.; and LEACH-C can be chosen when centralized and deterministic approach covering entire network is expected still bringing in increased network lifetime and desired number of clusters [7, 13]. The Enhance version of LEACH protocol called V-LEACH protocol and the comparison of LEACH protocol with V-LEACH protocol was planned by Ahlawat A. et al.; from the simulation results were, first the number of alive nodes is more than the original LEACH. Second the number of dead nodes is less than the original LEACH protocol. Network life time is increased by 49.37% then original LEACH [11]. Energy-LEACH protocol improves the CH collection procedure. It makes residual energy of nodes as the main thing which decides whether the nodes twist into CH or not after the initial round. It same as LEACH protocol, was proposed by Yassein M. et al.; (2009) E-LEACH is separated into rounds, in the first round, every node has the same opportunity to spin into CH, that mean nodes are arbitrarily chosen as CHs, In the next rounds, the residual energy of each node is dissimilar after one round communication and taken into account for the collection of the CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer energy [6]. A new edition of LEACH called two-level LEACH was proposed by Kaur A. et al.; (2015). In this protocol, CH collects data from further cluster members as original LEACH, but somewhat transport data to the BS , it uses one of the CHs that lies between the CH and the BS as a relay station [8].
  • 5. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 4 In LEACH, each CH openly communicates with BS no issue what the distances between CH and BS It will consume a lot of its energy if the distance is far. So overcome this drawback multihop- LEACH protocol was proposed by Zhou H. It selects best path between the CH and the BS through other CHs and use these CHs as a relay station to transmit data over through them [6]. The modification of R-LEACH protocol in LEACH protocol enables an alternative node to get replaced in place of a node was proposed by Ramesh R. et al.; (2014) which loses its energy such that it extends the life span of the whole network and avoids data loss. The alteration R- LEACH protocol has been implemented with 40 nodes in the network simulator-2 and its packet delivery ratio and energy level has been experimental which is superior than that of existing LEACH [3]. III PROPOSED ALGORITHM FOR LEACH ENHANCEMENT In LEACH protocol, the chosen of cluster head randomly due to this the energy of cluster head is very low. Cluster heads are in charge not only for sending data to the base station but also for collecting and fusing the data from ordinary nodes in their own clusters. In the process of data collection and broadcast, the energy consumed by data transmission is superior to that of data fusion. If the present energy of a cluster head is fewer or the distance to the base station is much far, then the cluster head will be died rapidly because of a heavy energy burden. To add ress these issues, this article proposes a new improved algorithm R-LEACH (RFID protocol). To overcome the limitation modifies LEACH protocol by embedding communications modes like Active, Ready and Sleep modes in the network. In Active, mode only sensed data, in ready mode sensed as well as transmitting data to the BS as shown in the figure 2. In this scenario , the nodes in orange are CH and is in a ready state used for transmitting data, the node in blue is the base station and a rest of the nodes is in active and sleep state. The node in sleep mode used for saving the energy consumption and also balance the energy loads of the CHs. Figure 2: cluster based mechanism use in proposed methodology (R-LEACH protocol)
  • 6. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 5 IV. SIMULATION SET UP In this section, we evaluate the performance of R-LEACH protocol using NS2 tool and compare its performance with LEACH protocol, using the same initial values and following the same scenario. The algorithm is tested in network simulator version 2. The experiments are performed with a diverse number of nodes placed in an 800m * 800m field. Each sensor nodes is assumed to have an initial energy of 100 joules. The general simulation parameters are Table 1: NS-2 simulation parameters V RESULTS AND DISCUSSION To evaluate the performance comparison of LEACH and R-LEACH protocol using parameters such as, Energy consumption, Packet loss, End to End delay, Throughput and control overhead. Calculating the average energy consumption is the measure of rate at which energy is used by sensor nodes in an exacting time. From the graph It is observed that standard the energy consumption for R-LEACH is less as compared to LEACH as shown in Figure 3. every cluster heads directly communication with sink no issue the distance between Cluster head and sink; it will use a more energy if the distance is far [3]. RFID protocols works on modes like active sleep and ready .In RFID some nodes are in sleep modes so energy consumption is to be reduced. In table 2, energy is improved in comparison to the old one. Figure 4 calculates packet loss is the total number of lost of packets during the transmission from source to destination. From the graph it is observed that average of packet loss for R-LEACH is less as compared to LEACH. In parameter settings Simulation Area 800*800 meters No of nodes 41 Channel Type Channel/wireless Antennae model Antenna/omniantenna Energy model battery Interface queue Type Queue/Droptail/Priqueue Link layer type LL Simulation time 10s Initial Energy Model 100 J Routing protocol AODV Traffic Source CBR Type of MAC MAC/ 802-11 Packet size 1000 bytes
  • 7. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 6 LEACH packet loss is more because the node having short energy is chosen as CH then node will die soon due to which data does not reach to the BS, packet loss is occurred [16]. In Figure 5, calculates the End to End delay as the time taken for a packet to be transmitted across a network form source to destination. The average end to end for R-LEACH is fewer as compared to LEACH protocol because in LEACH protocol energy consumption is high due to this it causes delay for data transmission [14]. In Figure 6, calculates Throughput is the average data packets received at the destination. From the graph, it is observed that the R-LEACH has better throughput as compared to LEACH protocol. In LEACH protocol throughput will be decrease due to high energy consumption, packet loss and overhead [15 ].In figure 7, calculates control overhead is the ratio between a total number of control packets and total number of packets delivered successfully. From the graph it is observed that LEACH has high overhead due to delay increase [18]. In table 2, calculates the Average of all parameters and R-LEACH is improved in comparison to the old that mean the latest edition of LEACH outperforms the original version of LEACH protocol. Figure 3: Compared Rfid energy graph with Leach Energy graph. Figure 4: Figure 3: Compared Rfid Packetloss graph with Leach packet loss graph.
  • 8. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 7 Figure 5: Compared Rfid delay graph with leach delay graph. Figure 7: compared Rfid throughput with Leach throughput. Figure 7: compared Rfid overhead with leach overhead.
  • 9. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 8 VI CONCLUSION In this paper considered a well- known protocol for wireless sensor networks called LEACH protocol which is the first and the most svery important protocol in wireless sensor networks which uses clusters based distribution techniques followed by an outline of LEACH protocol implementations, then we proposed a new edition of LEACH protocol called R-LEACH protocol. From the simulation results, R-LEACH protocol could balance the energy consumption and enlarge the network life cycle more successfully as compared to original LEACH protocol. ACKNOWLEDGEMENT I hereby acknowledge that the above- referred work is my own research work and I am entirely responsible for any kind of misuse of material. I thank my mentor Mr Harsukh Singh to guide and encourage me and for putting all her valuable time for me to get the desired output. REFERENCES [1] S. Pant, N. Chauhan, and P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks: A Survey,” Int. J. Comput. Appl., vol. 11, no. 10, pp. 17–21, 2010. [2] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Comput. Networks, vol. 38, pp. 393– 422, 2002. [3] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in Engineering and technology,London(U.K)ends in Eng pp. 80–84, 2014. [4] L. Jian-qi, C. Bin-fang, W. Li, and W. Wen-Hu, “Energy optimized approach based on clustering routing protocol for wireless sensor networks,” 2013 25th Chinese Control Decis. Conf., pp. 3710– 3715, 2013. [5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with signalling for ad hoc networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 28, pp. 5–26, 1998. [6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” Int. J. Digit. Content Technol. its Appl., vol. 3, pp. 132–136, 2009. [7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH Vs LEACH-C,” Int. J. Comput. Appl., vol. 106, no. 11, pp. 1–6, 2014. [8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor Network-A Survey,” Int. J. Comput. Appl.,vol. 116, no. 10, pp. 1–5, 2015. [9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor Networks,” Procedia Environ. Sci., vol. 10, pp. 595–600, 2011. [10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” vol. 2, no. 6, pp. 69–71, 2014. [11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol in WSN,” Int. Conf. Adv. Comput. Commun. Technol. ACCT, pp. 236–240, 2013. [12] B. A. Bakr and L. T. Lilien, “Comparison by Simulation of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM,” Procedia Comput. Sci., vol. 34, pp. 180–187, 2014. [13] V. Geetha, P. V. Kallapur, and S. Tellajeera, “Clustering in Wireless Sensor Networks: Performance Comparison of LEACH LEACH-C Protocols Using NS2,” Procedia Technol., vol. 4, pp. 163–170, 2012. [14] M. A. G. R, “A Delay-Aware Network Structure for Wireless Sensor Networks With Consecutive Data Collection Processes.pdf,”IEEE, vol. 7, no. 4, pp. 198–201, 2014.
  • 10. International Journal on Soft Computing (IJSC) Vol.6, No. 4, November 2015 9 [15] M. Sharma, “Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach,” Adv. Comput. An Int. J., vol. 3, no. 5, pp. 97–104, 2012. [16] C. Cirstea, M. Cernaianu, and A. Gontean, “Packet loss analysis in wireless sensor networks routing protocols,” 2012 35th Int. Conf. Telecommun. Signal Process., pp. 37–41, 2012. [17] N. Singh, P. Rajeshwar, L. Dua, and V. Mathu “Network Simulator NS2-2 .35,” International Journal of Advanced Research in Computer Science and Software Engineering vol. 2, no. 5, pp. 224–228, 2012. [18] Singh S. Singh G. (2014), “A Noble Routing Protocol for Vehicular Adhoc Networks with Less Routing Overheads,”International Journal of Future Generation Communication and Networking, Vol. 7, no. 5, pp 23-34, ISSN: 2233-7857 IJFGCN, 2014. [19] S. Murthy and J. J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM Mobile Networks and App. Journal, Special Issue on Routing in Mobile Communication Networks, pp.183-97, 1996. TABLE 2. Compare the Average value of LEACH and R-LEACH Protocol.