SlideShare a Scribd company logo
Pushpita Biswas (10EC65R10)

                Guided by – Prof. R. Datta




Department of Electronics and Electrical Communication
                      Engineering
       Indian Institute of Technology Kharagpur
1/18/2012                                                1
Contents

             Introduction

             Motivation

             Literature Survey

             Improved protocol technique (Work Done)

             Results and future work



1/18/2012                                               2
Introduction
  Why Wireless Sensor Networks?


 According to MIT’S Technology review, this technology is one of the ten new technologies

 which will change the world and manner of work.

  A sensor network is composed of a large number of sensor nodes that are

 randomly, densely deployed either inside the phenomenon or very close to it. This also means

 that sensor network protocols and algorithms must possess self-organizing capabilities.

  The battery is an important component of the sensor so focus is on innovative energy-

 optimized solutions at all levels of the system hierarchy, from the physical layer and

 communication protocols up to the application layer and efficient DSP design for microsensor

 nodes.


1/18/2012                                                                                       3
MOTIVATION

 Only 2.12% of the research work done in energy-optimization techniques for wireless
sensor networks is related to the network layer routing protocols.

 The existing protocols have certain disadvantages that can be improved upon.




OBJECTIVE

Propose a modification of the existing protocol or a new routing protocol that would
extend the life time of the sensor network.

  1/18/2012                                                                             4
These are a few types of routing protocols :
  Data-centric protocols

  Hierarchical protocols

  Location-based protocols

  Network flow and QoS-aware protocols




1/18/2012                                       5
Literature Survey – contd..


     Why hierarchical protocols are preferred?
 Scalability is one of the major design attributes of sensor networks.

 Single gateway or one-hop architecture is not scalable for a large set of sensors covering a wider
    area.

 Hierarchical routing efficiently involve proper energy consumption, data aggregation and fusion.

    Why LEACH (Low-energy Adaptive clustering Hierarchy) is the most basic important hierarchical
    protocol?

 LEACH [1] has been an inspiration for many hierarchical routing protocols. Provides a factor of 7
    reduction in energy dissipation compared to direct communication

 Energy consumption should be uniform so cluster formation must be dynamic as in LEACH.

 PEGASIS [2] outperforms LEACH by 100 to 300% in terms

    of lifetime but introduces excessive delay for distant

    node on chain and the single leader becomes a bottle neck.



    1/18/2012                                                                                         6
Literature Survey - Overview of Leach Protocol

                                                 Cluster head selection
       Stages in LEACH Protocol
                                                 Advertisement phase

                            Cluster Set-up
                                                 Cluster formation


       LEACH                                     Schedule creation


                                                 Data communication to CH
                            Steady-state
                                                 Data fusion
   Timeline of Leach Protocol
                                                 Data communication to BS
     Setup            Steady-state




                 Round                                                      7
Cluster head selection
                          Base
                         Station




                                   8
Literature Survey - Overview of Leach Protocol

    Cluster head selection

 Algorithm : ran(n) is a randomly generated value for each
  node n :




 If ran(n) < T(n), then that node becomes a cluster-head
 Analytical and mathematical proof yield that .01<p<0.06 is
  the optimal value for desired probability of cluster heads


                                                               9
Advertisement phase
                       Base
                      Station




 ADV




                                10
Cluster formation    Base
                    Station




                              11
Schedule creation    Base
                    Station




                              12
Data Transmission    Base
                    Station




                              13
Literature Survey - Overview of Leach Protocol


                                     Cluster heads get selected in a distributed manner.
                   Cluster head
                     selection
                                     Self-elected cluster-head for the broadcasts an advertisement
                  Advertisement      message(ADV) using CSMA MAC protocol.
Cluster Set-up       phase
    phase
                      Cluster        Non-cluster-head nodes send a Join(REQ) message to the
                     formation       corresponding cluster-head using CSMA MAC.


                     Schedule        The cluster head creates a TDMA schedule telling each node
                     creation        when it can transmit.


                       Data           Data send by node is only during their allocated transmission
                  transmission to     time to the cluster head.
                   cluster heads

Steady state                          Cluster head aggregates the data received from nodes in the
   phase           Data fusion        cluster.
                                      Communication within clusters is via direct-sequence spread
                 Multiple clusters    spectrum (DSSS), but from the cluster head nodes to the BS
                 to base station      using a fixed spreading code and CSMA.              14
Literature Survey – contd..



  Problems in Traditional LEACH
 • Cluster Head selection is
     random, that does not take into
     account energy consumption
 • CHs can be located at the edges of
     the given area
 • Setup time increases compared to
     direct communication
 • Does not support movement of
     nodes


  1/18/2012                             15
Literature Survey – contd..
Modified-Leach [3]
The threshold function is changed to T(n)=        p          * En_residual
                                               1-p[r mod(1/p)] En_initial
Advantages :
Residual energy of nodes taken into consideration
Tremendous advantage when base-station is far away from sensing area

Disadvantages :
 Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the
network


Two-Layer Leach (TL-LEACH) [5]
The cluster heads themselves form another layer of nodes which in themselves group to form
clusters.
Advantages :
Increase of 30% of the lifetime compared to LEACH once the first node has dies
Disadvantages :
Inferior performances in the initial phase of work
 Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the
network                                                                                       16
Two Picture Page Layout
  Work Done Till Now
 Change in cluster head selection is introduced

 Each node is having a special added threshold value Th(n)

 Residual energy is also considered

 If a perfect cluster is found, a similar type of cluster can be formed in future

  rounds.

 Repetition of perfect clusters should be limited to a fixed number of times.

 Adding of extra threshold value signifies higher probability of the node

  becoming a Cluster Head in future rounds
                                                                              17
Work Done
Algorithm to find perfect cluster and change T(n) :

Step 1 : After cluster formation, farthest node in north, south, east, west
direction from CH is found.
Step 2 : The corresponding distances are calculated –> n, s, e, w
Step 3 : The calculated values must have very less difference
     (for a M*M network diff <         M          ) else continue with steady state
                                       ̄( ∏ * p* N)
Step 4 : Change individual added threshold Th(n) for all nodes in this cluster
         Th(n) = exp(-2 * dist) /avg            dist -> distance of node from CH
                                                avg -> n + s + e + w
                                                              4


                                                                               18
Work Done
Algorithm to find perfect cluster and change Th(n) :

Step 5: If r mod (1/p) = 0 clear all Th(n) ,so that nodes at the center of d perfect cluster do

not get exhausted.

Step 6: Random value generated for each node n be ran(n) and If ran(n) < T(n) then node

n is a cluster head




                                                                                        19
Simulation Conditions
       Base     •   All nodes in network are homogenous and energy-constrained
      Station
                •   100 nodes randomly placed and Each packet is of 2000 bits
(25,150)
                •   After data aggregation 5% compaction is done to the packet size
                    that is transmitted to base station.

                                   •   First order Radio Model is followed for all energy
                       (100,100)       reduction.
                                       Eelec = 50 nJ/bit for transmitter or receiver circuitry
                                             €amp = 100 pJ/bit/m2 transmitter amplifier

                                                           Transmitting:-
                                                 ETx(k,d) = ETx-elec(k) + ETx-amp(k,d)
                                                  ETx(k,d) = Eelec*k + €amp*k*d2

                                                            Receiving:-
                                                        ERx(k,d) = ERx-elec(k)
                                                         ERx(k,d) = Eelec*k
  (0,0)
                                   •   Optimal probability is found to be 0.05 and therefore
                                       used                                             20
Simulation results                             Routing protocols     0.25      0.50     1.00
                                                                      J/node    J/node   J/node
1. 50 different random                           Direct                   155    107      217
   allocations of the 100 sensor                 communication
   nodes in the 100*100 m area
                                                 Leach                    312    883     1548
   is simulated.
2. All readings correspond to the                Modification             462    975     1998
   round in which first node dies.

                                 Comparison Chart
             2500

             2000

             1500                                                Direct
                                                                 LEACH
             1000
                                                                 Modification done
             500

               0
                    0.25J/node   0.50 J/node   1.00 J/node
 1/18/2012                                                                                        21
Future Work

 Formulation of the mathematical base to find a perfect cluster.

 Design of a better protocol having negative JOIN(REQ) packet send to

    undesired Cluster heads to demolish them.

 Implementation of LEACH protocol on Heterogeneous types of nodes.

 Design of a routing protocol for specific application of

    wireless sensor networks.

Specifically for bridges having a super structure and a sub structure on a
rough terrain. (LEACH is designed on a plane)

1/18/2012                                                              22
References

1.   Heinzelman.W.B., Chandrakasan.A.P., Balakrishnan.H “An application-specific protocol architecture
     for wireless microsensor networks” IEEE transactions on Wireless Communication, Vol. 1, Issue.
     4, 2002, pp 660-670
2.   Lindsey. S, Raghavendra.C, Sivalingam.K.M “Data gathering algorithms in sensor networks using
     energy metrics” IEEE transactions on Parallel and Distributed Systems, Vol.
     13, Issue.9, 2003,        pp 924-935
3.   Yuhua Liu, Yongfeng Zhao, Jingju Gao, “A New Clustering mechanism based on LEACH Protocol”, 2009
     International Joint Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718
4.   S. Bandyopadhyay, E.J. Coyle, “An Energy-Efficient Hierarchical Clustering Algorithm for Wireless
     Sensor Networks” , Twenty-Second Annual Joint Conference of the IEEE Computer and
     Communications Societies, in IEEE INFOCOM:1713- 1723 vol.3, 2003.
5.   V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive
     clustering hierarchy (TL-LEACH)”, Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813



 1/18/2012                                                                                            23
Thank you!

More Related Content

What's hot

Object Detection Using R-CNN Deep Learning Framework
Object Detection Using R-CNN Deep Learning FrameworkObject Detection Using R-CNN Deep Learning Framework
Object Detection Using R-CNN Deep Learning Framework
Nader Karimi
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
Gaurav Chauhan
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
Swathi Ch
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
Ali Habeeb
 
Cognitive Radio Spectrum Management.pdf
Cognitive Radio Spectrum Management.pdfCognitive Radio Spectrum Management.pdf
Cognitive Radio Spectrum Management.pdf
AWANISHKUMAR84
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networksBeginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
3G4G
 
Leach
Leach Leach
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
Editor IJMTER
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
Ali Habeeb
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
Наказ 110.pdf
Наказ 110.pdfНаказ 110.pdf
Наказ 110.pdf
elizaveta_ell
 
OLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing ProtocolOLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing Protocol
Jagannath University, Bangladesh
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Object detection - RCNNs vs Retinanet
Object detection - RCNNs vs RetinanetObject detection - RCNNs vs Retinanet
Object detection - RCNNs vs Retinanet
Rishabh Indoria
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
Darwin Nesakumar
 

What's hot (20)

Object Detection Using R-CNN Deep Learning Framework
Object Detection Using R-CNN Deep Learning FrameworkObject Detection Using R-CNN Deep Learning Framework
Object Detection Using R-CNN Deep Learning Framework
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Cognitive Radio Spectrum Management.pdf
Cognitive Radio Spectrum Management.pdfCognitive Radio Spectrum Management.pdf
Cognitive Radio Spectrum Management.pdf
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networksBeginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
Beginners: Bandwidth, Throughput, Latency & Jitter in mobile networks
 
Leach
Leach Leach
Leach
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
 
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
Наказ 110.pdf
Наказ 110.pdfНаказ 110.pdf
Наказ 110.pdf
 
OLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing ProtocolOLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing Protocol
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Object detection - RCNNs vs Retinanet
Object detection - RCNNs vs RetinanetObject detection - RCNNs vs Retinanet
Object detection - RCNNs vs Retinanet
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
Atm
AtmAtm
Atm
 

Viewers also liked

Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
vivek pratap singh
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
Chinmoy Jena
 
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
kknsastry
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
IJORCS
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
ijsrd.com
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
zhendong
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
divya_prabha
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingEnhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
AM Publications,India
 
Sbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumarSbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumar
Amitocc1996
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
Editor IJCATR
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Al Imran, CISA
 
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
अनिकेत चौधरी
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
Santosh Regmi
 
Braingate system
Braingate systemBraingate system
Braingate system
KAMLESH KUMAR
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
IGEEKS TECHNOLOGIES
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
CSCJournals
 
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueHyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
CSCJournals
 
convergencia tecnologica
convergencia tecnologicaconvergencia tecnologica
convergencia tecnologica
carovel04
 

Viewers also liked (20)

Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingEnhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
 
Sbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumarSbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumar
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
 
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Braingate system
Braingate systemBraingate system
Braingate system
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueHyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
 
convergencia tecnologica
convergencia tecnologicaconvergencia tecnologica
convergencia tecnologica
 

Similar to Energy efficient communication techniques for wireless micro sensor networks

An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
IJERD Editor
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
Ayman Adel
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
ijsrd.com
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Editor IJCATR
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
IJERA Editor
 
C04501027035
C04501027035C04501027035
C04501027035
ijceronline
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
IJCNCJournal
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
idescitation
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
ijceronline
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IJTET Journal
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Jamia Hamdard
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 

Similar to Energy efficient communication techniques for wireless micro sensor networks (20)

An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
C04501027035
C04501027035C04501027035
C04501027035
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Energy efficient communication techniques for wireless micro sensor networks

  • 1. Pushpita Biswas (10EC65R10) Guided by – Prof. R. Datta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur 1/18/2012 1
  • 2. Contents  Introduction  Motivation  Literature Survey  Improved protocol technique (Work Done)  Results and future work 1/18/2012 2
  • 3. Introduction  Why Wireless Sensor Networks? According to MIT’S Technology review, this technology is one of the ten new technologies which will change the world and manner of work.  A sensor network is composed of a large number of sensor nodes that are randomly, densely deployed either inside the phenomenon or very close to it. This also means that sensor network protocols and algorithms must possess self-organizing capabilities.  The battery is an important component of the sensor so focus is on innovative energy- optimized solutions at all levels of the system hierarchy, from the physical layer and communication protocols up to the application layer and efficient DSP design for microsensor nodes. 1/18/2012 3
  • 4. MOTIVATION  Only 2.12% of the research work done in energy-optimization techniques for wireless sensor networks is related to the network layer routing protocols.  The existing protocols have certain disadvantages that can be improved upon. OBJECTIVE Propose a modification of the existing protocol or a new routing protocol that would extend the life time of the sensor network. 1/18/2012 4
  • 5. These are a few types of routing protocols :  Data-centric protocols  Hierarchical protocols  Location-based protocols  Network flow and QoS-aware protocols 1/18/2012 5
  • 6. Literature Survey – contd.. Why hierarchical protocols are preferred?  Scalability is one of the major design attributes of sensor networks.  Single gateway or one-hop architecture is not scalable for a large set of sensors covering a wider area.  Hierarchical routing efficiently involve proper energy consumption, data aggregation and fusion. Why LEACH (Low-energy Adaptive clustering Hierarchy) is the most basic important hierarchical protocol?  LEACH [1] has been an inspiration for many hierarchical routing protocols. Provides a factor of 7 reduction in energy dissipation compared to direct communication  Energy consumption should be uniform so cluster formation must be dynamic as in LEACH.  PEGASIS [2] outperforms LEACH by 100 to 300% in terms of lifetime but introduces excessive delay for distant node on chain and the single leader becomes a bottle neck. 1/18/2012 6
  • 7. Literature Survey - Overview of Leach Protocol Cluster head selection  Stages in LEACH Protocol Advertisement phase Cluster Set-up Cluster formation LEACH Schedule creation Data communication to CH Steady-state Data fusion  Timeline of Leach Protocol Data communication to BS Setup Steady-state Round 7
  • 8. Cluster head selection Base Station 8
  • 9. Literature Survey - Overview of Leach Protocol Cluster head selection  Algorithm : ran(n) is a randomly generated value for each node n :  If ran(n) < T(n), then that node becomes a cluster-head  Analytical and mathematical proof yield that .01<p<0.06 is the optimal value for desired probability of cluster heads 9
  • 10. Advertisement phase Base Station ADV 10
  • 11. Cluster formation Base Station 11
  • 12. Schedule creation Base Station 12
  • 13. Data Transmission Base Station 13
  • 14. Literature Survey - Overview of Leach Protocol Cluster heads get selected in a distributed manner. Cluster head selection Self-elected cluster-head for the broadcasts an advertisement Advertisement message(ADV) using CSMA MAC protocol. Cluster Set-up phase phase Cluster Non-cluster-head nodes send a Join(REQ) message to the formation corresponding cluster-head using CSMA MAC. Schedule The cluster head creates a TDMA schedule telling each node creation when it can transmit. Data Data send by node is only during their allocated transmission transmission to time to the cluster head. cluster heads Steady state Cluster head aggregates the data received from nodes in the phase Data fusion cluster. Communication within clusters is via direct-sequence spread Multiple clusters spectrum (DSSS), but from the cluster head nodes to the BS to base station using a fixed spreading code and CSMA. 14
  • 15. Literature Survey – contd.. Problems in Traditional LEACH • Cluster Head selection is random, that does not take into account energy consumption • CHs can be located at the edges of the given area • Setup time increases compared to direct communication • Does not support movement of nodes 1/18/2012 15
  • 16. Literature Survey – contd.. Modified-Leach [3] The threshold function is changed to T(n)= p * En_residual 1-p[r mod(1/p)] En_initial Advantages : Residual energy of nodes taken into consideration Tremendous advantage when base-station is far away from sensing area Disadvantages :  Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the network Two-Layer Leach (TL-LEACH) [5] The cluster heads themselves form another layer of nodes which in themselves group to form clusters. Advantages : Increase of 30% of the lifetime compared to LEACH once the first node has dies Disadvantages : Inferior performances in the initial phase of work  Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the network 16
  • 17. Two Picture Page Layout Work Done Till Now  Change in cluster head selection is introduced  Each node is having a special added threshold value Th(n)  Residual energy is also considered  If a perfect cluster is found, a similar type of cluster can be formed in future rounds.  Repetition of perfect clusters should be limited to a fixed number of times.  Adding of extra threshold value signifies higher probability of the node becoming a Cluster Head in future rounds 17
  • 18. Work Done Algorithm to find perfect cluster and change T(n) : Step 1 : After cluster formation, farthest node in north, south, east, west direction from CH is found. Step 2 : The corresponding distances are calculated –> n, s, e, w Step 3 : The calculated values must have very less difference (for a M*M network diff < M ) else continue with steady state ̄( ∏ * p* N) Step 4 : Change individual added threshold Th(n) for all nodes in this cluster Th(n) = exp(-2 * dist) /avg dist -> distance of node from CH avg -> n + s + e + w 4 18
  • 19. Work Done Algorithm to find perfect cluster and change Th(n) : Step 5: If r mod (1/p) = 0 clear all Th(n) ,so that nodes at the center of d perfect cluster do not get exhausted. Step 6: Random value generated for each node n be ran(n) and If ran(n) < T(n) then node n is a cluster head 19
  • 20. Simulation Conditions Base • All nodes in network are homogenous and energy-constrained Station • 100 nodes randomly placed and Each packet is of 2000 bits (25,150) • After data aggregation 5% compaction is done to the packet size that is transmitted to base station. • First order Radio Model is followed for all energy (100,100) reduction. Eelec = 50 nJ/bit for transmitter or receiver circuitry €amp = 100 pJ/bit/m2 transmitter amplifier Transmitting:- ETx(k,d) = ETx-elec(k) + ETx-amp(k,d) ETx(k,d) = Eelec*k + €amp*k*d2 Receiving:- ERx(k,d) = ERx-elec(k) ERx(k,d) = Eelec*k (0,0) • Optimal probability is found to be 0.05 and therefore used 20
  • 21. Simulation results Routing protocols 0.25 0.50 1.00 J/node J/node J/node 1. 50 different random Direct 155 107 217 allocations of the 100 sensor communication nodes in the 100*100 m area Leach 312 883 1548 is simulated. 2. All readings correspond to the Modification 462 975 1998 round in which first node dies. Comparison Chart 2500 2000 1500 Direct LEACH 1000 Modification done 500 0 0.25J/node 0.50 J/node 1.00 J/node 1/18/2012 21
  • 22. Future Work  Formulation of the mathematical base to find a perfect cluster.  Design of a better protocol having negative JOIN(REQ) packet send to undesired Cluster heads to demolish them.  Implementation of LEACH protocol on Heterogeneous types of nodes.  Design of a routing protocol for specific application of wireless sensor networks. Specifically for bridges having a super structure and a sub structure on a rough terrain. (LEACH is designed on a plane) 1/18/2012 22
  • 23. References 1. Heinzelman.W.B., Chandrakasan.A.P., Balakrishnan.H “An application-specific protocol architecture for wireless microsensor networks” IEEE transactions on Wireless Communication, Vol. 1, Issue. 4, 2002, pp 660-670 2. Lindsey. S, Raghavendra.C, Sivalingam.K.M “Data gathering algorithms in sensor networks using energy metrics” IEEE transactions on Parallel and Distributed Systems, Vol. 13, Issue.9, 2003, pp 924-935 3. Yuhua Liu, Yongfeng Zhao, Jingju Gao, “A New Clustering mechanism based on LEACH Protocol”, 2009 International Joint Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718 4. S. Bandyopadhyay, E.J. Coyle, “An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks” , Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, in IEEE INFOCOM:1713- 1723 vol.3, 2003. 5. V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive clustering hierarchy (TL-LEACH)”, Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813 1/18/2012 23