SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1988
P
Energy Efficient LEACH protocol for Wireless Sensor Network
(I-LEACH)
Deepak Dembla1
Shivam H. Mehta2
1
Head of Department
1, 2
AIET, JAIPUR, India
Abstract—in the wireless sensor networks (WSNs), the
sensor nodes (called motes) are usually scattered in a sensor
field an area in which the sensor nodes are deployed. These
motes are small in size and have limited processing power,
memory and battery life. In WSNs, conservation of energy,
which is directly related to network life time, is considered
relatively more important souse of energy efficient routing
algorithms is one of the ways to reduce the energy
conservation. In general, routing algorithms in WSNs can be
divided into flat, hierarchical and location based routing.
There are two reasons behind the hierarchical routing Low
Energy Adaptive Clustering Hierarchy (LEACH) protocol
be in explored. One, the sensor networks are dense and a lot
of redundancy is involved in communication. Second, in
order to increase the scalability of the sensor network
keeping in mind the security aspects of communication.
Cluster based routing holds great promise for many to one
and one to many communication paradigms that are pre
valentines or networks.
I. INTRODUCTION
There are lots of work has been done in the area of Wireless
Sensor Network, but still a long way to go. Wireless Sensor
networks consist of hundreds of thousands of low power
multi-functional sensor nodes, operating in an unattended
environment, with limited computation and sensing
capabilities. Sensor nodes are equipped with small, often
irreplaceable batteries with limited power capacities. The
use of wireless sensor networks is increasing day by day and
at the same time it faces the problem of energy constraints in
terms of limited battery lifetime. Various approaches can be
taken to save energy caused by communication in wireless
sensor networks. One of them is to adopting energy efficient
routing algorithms. The routing algorithms in the sensor
networks broadly classified into three categories: Flat,
Hierarchical (or Cluster) and Location based routing. The
idea proposed in LEACH has been an inspiration for many
hierarchical routing protocols. The operation of LEACH is
broken up into rounds, where each round begins with a set-
up phase, when the clusters are organized, followed by a
steady-state phase, when data transfers to the base station
occur. In order to minimize overhead, the steady-state phase
is long compared to the set-up phase.
Set-up phase:A.
During this phase, each node decides whether or not to
become a cluster head (CH) for the current round. This
decision is based on choosing a random number between 0
and 1 if number is less than a threshold T(n), the node
become cluster head for the current round. The threshold
value is set as:
( ) { ( )
Where, P = desired percentage of cluster head, r =
current round and G is the set of nodes which did not
become cluster head in last 1rounds. Once the cluster head is
chosen, it will use the CSMA MAC protocol to advertise its
status. Remaining nodes will take the decision about their
cluster head for current round based on the received signal
strength of the advertisement message. Before steady-state
phase starts, certain parameters are considered, such as the
network topology and the relative costs of computation
versus the communication. A Time Division Multiple
Access (TDMA) schedule is applied to all the members of
the cluster group to send messages to the CH, and then to
the cluster head towards the base station. As soon as a
cluster head is selected for a region, steady-state phase
starts. Fig. 1 shows the flowchart of the phase.
Steady-state phase:B.
Once the clusters are created and the TDMA schedule is
fixed, data transmission can begin. Assuming nodes always
have data to send, they send it during their allocated
transmission time to the cluster head. This transmission uses
a minimal amount of energy (chosen based on the received
strength of the cluster-head advertisement). The radio of
each non-cluster-head node can be turned off until the nodes
allocated transmission time, thus minimizing energy
dissipation in these nodes.
Fig. 1: Flow chart of the Set-up phase of the LEACH
protocol
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
(IJSRD/Vol. 1/Issue 9/2013/0073)
All rights reserved by www.ijsrd.com 1989
II. RELETED WORK
Wireless sensor networks (WSNs) contain hundreds or
thousands of sensor nodes equipped with sensing,
computing and communication abilities. Each node has the
ability to sense elements of its environment perform simple
computations and communicate among its peers or directly
to an external base station (BS) Deployment of a sensor
network can be in random fashion or planted manually.
These networks promise a maintenance-free, fault-tolerant
platform for gathering different kinds of data. Because a
sensor node needs to operate for a long time on a tiny
battery, innovative techniques to eliminate energy
inefficiencies that would shorten the lifetime of the network
must be used. A greater number of sensors allows for
sensing over larger geographical regions with greater
accuracy. Fig. 2 shows the basic components of the sensor
nodes and wireless sensor network architecture [1].
Fig. 2: Components of sensor node and WSN architecture
The design of routing protocols in WSNs is influenced by
many challenging factors[1]. Which include Energy
consumption without losing accuracy: Due to limited supply
of energy performing computations and transmitting
information in a wireless environment with reliability.
Power-Efficient Gathering in Sensor InformationA.
Systems (PEGASIS)
The main idea in PEGASIS is for each node to receive from
and transmit to close neighbors and take turns being the
leader for transmission to the BS [2]. This approach
distributes the energy load evenly among the sensor nodes in
the network. Sensor nodes are randomly deployed in the
sensor field, and therefore, it node is at a random location.
The nodes will be organized to form a chain, which can
either be accomplished by the sensor nodes themselves
using a greedy algorithm starting from some node.
Alternatively, the BS can compute this chain and broadcast
it to all the sensor nodes. For constructing the chain, it is
assumed that all nodes have global knowledge of the
network and employ the greedy algorithm. The greedy
approach to constructing the chain works well and this is
done before the first round of communication. To construct
the chain, it starts with the furthest node from the BS.
Threshold sensitive Energy Efficient sensor NetworkB.
protocol (TEEN)
The nodes in the network periodically switch on their
sensors and transmitters, sense the environment and transmit
the data of interest [3]. Thus, they provide a snapshot of the
relevant parameters at regular intervals called the proactive
networks. They are well suited for applications requiring
periodic data monitoring.
Hybrid Energy Efficient Distributed clustering (HEED)C.
Hybrid Energy-Efficient Distributed Clustering (HEED) [4]
which is a multi-hop clustering algorithm with focus on
efficient clustering by proper selection of cluster heads
based on the physical distance between nodes.
E- LEACH PROTOCOLD.
Energy-LEACH protocol improves the CH selection
procedure. It makes residual energy of node as the main
metric which decides whether the nodes turn into CH or not
after the first round [5]. Same as LEACH protocol, E-
LEACH is divided into rounds, in the first round, every
node has the same probability to turn into CH, that mean
nodes are randomly selected as CHs, in the next rounds, the
residual energy of each node is different after one round
communication and taken into account for the selection of
the CHs. That mean nodes have more energy will become a
CHs rather than nodes with less energy.
TL LEACH PROTOCOLE.
A new version of LEACH called Two-level Leach was
proposed. In this protocol; CH collects data from other
cluster members as original LEACH, but rather than transfer
data to the BS directly, it uses one of the CHs that lies
between the CH and the BS as a relay station [6].
M- LEACH PROTOCOLF.
In Multi hop LEACH protocol selects optimal path between
the CH and the BS through other CHs and use these CHs as
a relay station to transmit data over through them [7]. First,
multi-hop communication is adopted among CHs. Then,
according to the selected optimal path, these CHs transmit
data to the corresponding CH which is nearest to BS.
Finally, this CH sends data to BS. M-LEACH protocol is
almost the same as LEACH protocol, only makes
communication mode from single hop to multi-hop between
CHs and BS.
III. PROPOSED MODIFICATION IN LEACH
The proposed I-LEACH (Improved LEACH) ensures that
the elected cluster-heads will be uniformly distributed over
the network. Hence, there is no possibility that all cluster-
heads will be concentrated in one part of the network. The
performance of the proposed I-LEACH protocol is evaluated
mainly as per the following metrics:
1) Average Energy consumption: The average energy
consumed by the sensor nodes are measured at equal
intervals.
2) Average Throughput: The average number of packets
received at the sink.
3) Life time of the network: The total number of nodes
which are alive at the end of all the cycles of the
algorithms.
 Proposed algorithm for I-LEACH
I-LEACH employs the distributed clustering approach as
compare to LEACH protocol. The total sensor field is
divided into the equal sub-region. The choice of the cluster
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
(IJSRD/Vol. 1/Issue 9/2013/0073)
All rights reserved by www.ijsrd.com 1990
head (CH) from each sub-region is determined by the
threshold approach as in LEACH protocol. Following is the
algorithm for the I-LEACH protocol.
Proposed I-LEACH Algorithm
Let Ni or Nj denote a common node
S(Ni) = (N1, N2 ........Nn) denote the set of n nodes
E(Ni) denote energy in a node
Nxyz denote node location
Ci denote a cluster ID
CH(Ni) denotes a cluster head node.
dij denote distance measured from node Ni to Nj
thresh (Ni) denote the threshold value of node Ni
Initialization
Create node Ni
Set node position Nxyz Clusters formation
Divide the sensor field into equal sub-region Ri
Select CH from the each sub-region Ri based on threshold
value.
if Ni Ri && thresh(Ni) < Threshold && has not been CH
yet then
Ni = CH (Ni) for sub-region Ri
else
Ni =Nj (normal node)
end if Send Data to Base station
CH(Ni) sends data to Base station Repeat the steps 12 to 18
for different rounds
End of algorithm
The sensor field is divided into equal sub region as shown in
fig 3 for 100 nodes
Fig. 3 Sensor network topology for 100 nodes with base
station at (50, 50)
IV. SIMULATION RESULTS AND ANALYSIS
The performance of the proposed I-LEACH is compared
with basic LEACH protocol in terms of Average energy
consumption, Life time of the network and Average
throughput. All experiment results presented in this section
are average of three simulation runs in 100 nodes network
size. The following table shows the simulation results at
various simulation runs.
Network
Size
LEACH I-LEACH
Life
Time(s)
Through-
put
Life
Time(s)
Through-
put
100
1 372.30 35905 566.90 51106
2 404.60 27889 603.50 50517
3 433.80 44871 570.20 50563
Table. 1: Simulation Results
Average energy consumptionA.
As simulation started with equal amount of energy (2J) with
each sensor nodes, so total energy with the network will be
200J for 100 nodes simulation. Fig. 4 shows the comparison
of average energy consumption at various times between
LEACH and I-LEACH protocols for 100.
Fig. 4: Average energy consumption comparisons
Lifetime comparisonB.
The total number of nodes which are alive at the end of each
round is shown in fig. 5 for the 100 nodes network. The
simulation will stop if total number of live nodes is less than
five in the case of 100 nodes network.
Fig. 5: Life time comparisons
Average throughputC.
It will measure the average number of packets reaching at
the sink (base station) node. The location of the sink is
(50,50) in the 100 nodes network. Fig. 6 shows throughput
achieved.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
(IJSRD/Vol. 1/Issue 9/2013/0073)
All rights reserved by www.ijsrd.com 1991
Fig. 6: Throughput comparisons
V. CONCLUSION
The proposed I-LEACH ensures that the elected cluster-
heads are uniformly distributed over the network. Hence,
there is no possibility that all cluster-heads will be
concentrated in one part of the network. The result of
simulations conducted indicates that the proposed clustering
approach is more energy efficient and scalable and hence
effective in prolonging the network life time compared to
LEACH. It also outperforms LEACH with respect to
throughput of the network. I-LEACH improves energy
consumption by around 43% and throughput by 40% in 100
nodes network size.
REFERENCES
[1] Mohammad Ilyas and Imad Mahgoub. “Handbook of
sensor networks: compact wireless and wired sensing
systems”, Book, Chapter 1 & 6 CRC Press, 2005.
[2] S. Lindsey and C. Raghavendra, “PEGASIS: Power-
Efficient Gathering in Sensor Information Systems,”
IEEE Aerospace Conf. Proceding, vol. 3, 9-16, pp.
1125-30, 2002.
[3] A. Manjeshwar, D. P. Agrawal, “TEEN: a protocol for
enhanced efficiency in wireless sensor networks”, in:
Proceedings of the 1st International Workshop on
Parallel and Distributed Computing Issues in Wireless
Networks and Mobile Computing, San Francisco, CA,
April, 2001.
[4] Younis O., Fahmy S. “HEED: A Hybrid, Energy-
Efficient, Distributed Clustering Approach for Ad Hoc
Sensor Networks.” IEEE Transactions on Mobile
Computing, 3(4), 660669, 2004.
[5] Fan Xiangning, Song Yulin. “Improvement on LEACH
Protocol of Wireless Sensor Network, 2007.
[6] V. Loscr, G. Morabito and S. Marano. “A Two Levels
Hierarchy for Low-Energy Adaptive Clustering
Hierarchy.
[7] Dissertation, Hang Zhou, Zhe Jiang and Mo Xiaoyan,
“Study and Design on Cluster Routing Protocols of
Wireless Sensor Networks, 2006.

More Related Content

What's hot

Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishorijaprr_editor
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 

What's hot (19)

Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
6 ijcse-01222-1
6 ijcse-01222-16 ijcse-01222-1
6 ijcse-01222-1
 
H0421043049
H0421043049H0421043049
H0421043049
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor Network
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
eeca
eecaeeca
eeca
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Routing
RoutingRouting
Routing
 

Viewers also liked

Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...ijsrd.com
 
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...ijsrd.com
 
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...ijsrd.com
 
Safety Optimization in Bikes
Safety Optimization in BikesSafety Optimization in Bikes
Safety Optimization in Bikesijsrd.com
 
Design of up converter at 2.4GHz using Analog VLSI with 22nm Technology
Design of up converter at 2.4GHz using Analog VLSI with 22nm TechnologyDesign of up converter at 2.4GHz using Analog VLSI with 22nm Technology
Design of up converter at 2.4GHz using Analog VLSI with 22nm Technologyijsrd.com
 
Design of Efficient High Speed Vedic Multiplier
Design of Efficient High Speed Vedic MultiplierDesign of Efficient High Speed Vedic Multiplier
Design of Efficient High Speed Vedic Multiplierijsrd.com
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...ijsrd.com
 
Web Crawling Using Location Aware Technique
Web Crawling Using Location Aware TechniqueWeb Crawling Using Location Aware Technique
Web Crawling Using Location Aware Techniqueijsrd.com
 
A Low Power Wearable Physiological Parameter Monitoring System
A Low Power Wearable Physiological Parameter Monitoring SystemA Low Power Wearable Physiological Parameter Monitoring System
A Low Power Wearable Physiological Parameter Monitoring Systemijsrd.com
 
To Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
To Improve the Calorific Value of Cotton Waste by Anaerobic DigestionTo Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
To Improve the Calorific Value of Cotton Waste by Anaerobic Digestionijsrd.com
 
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...ijsrd.com
 
Utilization of Fibers in Construction Industries for Properties Improvement o...
Utilization of Fibers in Construction Industries for Properties Improvement o...Utilization of Fibers in Construction Industries for Properties Improvement o...
Utilization of Fibers in Construction Industries for Properties Improvement o...ijsrd.com
 
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...ijsrd.com
 
A Single-Phase Clock Multiband Low-Power Flexible Divider
A Single-Phase Clock Multiband Low-Power Flexible DividerA Single-Phase Clock Multiband Low-Power Flexible Divider
A Single-Phase Clock Multiband Low-Power Flexible Dividerijsrd.com
 
GPS & GSM based Voice Alert System for Blind Person
GPS & GSM based Voice Alert System for Blind PersonGPS & GSM based Voice Alert System for Blind Person
GPS & GSM based Voice Alert System for Blind Personijsrd.com
 
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car ModelMathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Modelijsrd.com
 

Viewers also liked (16)

Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...Study, analysis and formulation of a new method for integrity protection of d...
Study, analysis and formulation of a new method for integrity protection of d...
 
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
Experimental Observation on Reduction of Foot Formation of 4600-M Aluminum Al...
 
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
Study and Comparison of Open Source and Licensed VLSI CAD Tools using CMOS De...
 
Safety Optimization in Bikes
Safety Optimization in BikesSafety Optimization in Bikes
Safety Optimization in Bikes
 
Design of up converter at 2.4GHz using Analog VLSI with 22nm Technology
Design of up converter at 2.4GHz using Analog VLSI with 22nm TechnologyDesign of up converter at 2.4GHz using Analog VLSI with 22nm Technology
Design of up converter at 2.4GHz using Analog VLSI with 22nm Technology
 
Design of Efficient High Speed Vedic Multiplier
Design of Efficient High Speed Vedic MultiplierDesign of Efficient High Speed Vedic Multiplier
Design of Efficient High Speed Vedic Multiplier
 
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
Adaptive Delegation Authority Enhancement to Hasbe for Efficient Access Contr...
 
Web Crawling Using Location Aware Technique
Web Crawling Using Location Aware TechniqueWeb Crawling Using Location Aware Technique
Web Crawling Using Location Aware Technique
 
A Low Power Wearable Physiological Parameter Monitoring System
A Low Power Wearable Physiological Parameter Monitoring SystemA Low Power Wearable Physiological Parameter Monitoring System
A Low Power Wearable Physiological Parameter Monitoring System
 
To Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
To Improve the Calorific Value of Cotton Waste by Anaerobic DigestionTo Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
To Improve the Calorific Value of Cotton Waste by Anaerobic Digestion
 
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
A Review on Potential of Utilizing Metal Industry Wastes in Construction Indu...
 
Utilization of Fibers in Construction Industries for Properties Improvement o...
Utilization of Fibers in Construction Industries for Properties Improvement o...Utilization of Fibers in Construction Industries for Properties Improvement o...
Utilization of Fibers in Construction Industries for Properties Improvement o...
 
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
Design and Implementation of a Real Time Obstacle Avoiding Subsumption Contro...
 
A Single-Phase Clock Multiband Low-Power Flexible Divider
A Single-Phase Clock Multiband Low-Power Flexible DividerA Single-Phase Clock Multiband Low-Power Flexible Divider
A Single-Phase Clock Multiband Low-Power Flexible Divider
 
GPS & GSM based Voice Alert System for Blind Person
GPS & GSM based Voice Alert System for Blind PersonGPS & GSM based Voice Alert System for Blind Person
GPS & GSM based Voice Alert System for Blind Person
 
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car ModelMathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
Mathematical Modeling and Simulation of Two Degree of Freedom Quarter Car Model
 

Similar to Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)

Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...IJCNCJournal
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 

Similar to Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH) (20)

Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
C04501027035
C04501027035C04501027035
C04501027035
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
B045070510
B045070510B045070510
B045070510
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
B05630814
B05630814B05630814
B05630814
 
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NET...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1988 P Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH) Deepak Dembla1 Shivam H. Mehta2 1 Head of Department 1, 2 AIET, JAIPUR, India Abstract—in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks. I. INTRODUCTION There are lots of work has been done in the area of Wireless Sensor Network, but still a long way to go. Wireless Sensor networks consist of hundreds of thousands of low power multi-functional sensor nodes, operating in an unattended environment, with limited computation and sensing capabilities. Sensor nodes are equipped with small, often irreplaceable batteries with limited power capacities. The use of wireless sensor networks is increasing day by day and at the same time it faces the problem of energy constraints in terms of limited battery lifetime. Various approaches can be taken to save energy caused by communication in wireless sensor networks. One of them is to adopting energy efficient routing algorithms. The routing algorithms in the sensor networks broadly classified into three categories: Flat, Hierarchical (or Cluster) and Location based routing. The idea proposed in LEACH has been an inspiration for many hierarchical routing protocols. The operation of LEACH is broken up into rounds, where each round begins with a set- up phase, when the clusters are organized, followed by a steady-state phase, when data transfers to the base station occur. In order to minimize overhead, the steady-state phase is long compared to the set-up phase. Set-up phase:A. During this phase, each node decides whether or not to become a cluster head (CH) for the current round. This decision is based on choosing a random number between 0 and 1 if number is less than a threshold T(n), the node become cluster head for the current round. The threshold value is set as: ( ) { ( ) Where, P = desired percentage of cluster head, r = current round and G is the set of nodes which did not become cluster head in last 1rounds. Once the cluster head is chosen, it will use the CSMA MAC protocol to advertise its status. Remaining nodes will take the decision about their cluster head for current round based on the received signal strength of the advertisement message. Before steady-state phase starts, certain parameters are considered, such as the network topology and the relative costs of computation versus the communication. A Time Division Multiple Access (TDMA) schedule is applied to all the members of the cluster group to send messages to the CH, and then to the cluster head towards the base station. As soon as a cluster head is selected for a region, steady-state phase starts. Fig. 1 shows the flowchart of the phase. Steady-state phase:B. Once the clusters are created and the TDMA schedule is fixed, data transmission can begin. Assuming nodes always have data to send, they send it during their allocated transmission time to the cluster head. This transmission uses a minimal amount of energy (chosen based on the received strength of the cluster-head advertisement). The radio of each non-cluster-head node can be turned off until the nodes allocated transmission time, thus minimizing energy dissipation in these nodes. Fig. 1: Flow chart of the Set-up phase of the LEACH protocol
  • 2. Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH) (IJSRD/Vol. 1/Issue 9/2013/0073) All rights reserved by www.ijsrd.com 1989 II. RELETED WORK Wireless sensor networks (WSNs) contain hundreds or thousands of sensor nodes equipped with sensing, computing and communication abilities. Each node has the ability to sense elements of its environment perform simple computations and communicate among its peers or directly to an external base station (BS) Deployment of a sensor network can be in random fashion or planted manually. These networks promise a maintenance-free, fault-tolerant platform for gathering different kinds of data. Because a sensor node needs to operate for a long time on a tiny battery, innovative techniques to eliminate energy inefficiencies that would shorten the lifetime of the network must be used. A greater number of sensors allows for sensing over larger geographical regions with greater accuracy. Fig. 2 shows the basic components of the sensor nodes and wireless sensor network architecture [1]. Fig. 2: Components of sensor node and WSN architecture The design of routing protocols in WSNs is influenced by many challenging factors[1]. Which include Energy consumption without losing accuracy: Due to limited supply of energy performing computations and transmitting information in a wireless environment with reliability. Power-Efficient Gathering in Sensor InformationA. Systems (PEGASIS) The main idea in PEGASIS is for each node to receive from and transmit to close neighbors and take turns being the leader for transmission to the BS [2]. This approach distributes the energy load evenly among the sensor nodes in the network. Sensor nodes are randomly deployed in the sensor field, and therefore, it node is at a random location. The nodes will be organized to form a chain, which can either be accomplished by the sensor nodes themselves using a greedy algorithm starting from some node. Alternatively, the BS can compute this chain and broadcast it to all the sensor nodes. For constructing the chain, it is assumed that all nodes have global knowledge of the network and employ the greedy algorithm. The greedy approach to constructing the chain works well and this is done before the first round of communication. To construct the chain, it starts with the furthest node from the BS. Threshold sensitive Energy Efficient sensor NetworkB. protocol (TEEN) The nodes in the network periodically switch on their sensors and transmitters, sense the environment and transmit the data of interest [3]. Thus, they provide a snapshot of the relevant parameters at regular intervals called the proactive networks. They are well suited for applications requiring periodic data monitoring. Hybrid Energy Efficient Distributed clustering (HEED)C. Hybrid Energy-Efficient Distributed Clustering (HEED) [4] which is a multi-hop clustering algorithm with focus on efficient clustering by proper selection of cluster heads based on the physical distance between nodes. E- LEACH PROTOCOLD. Energy-LEACH protocol improves the CH selection procedure. It makes residual energy of node as the main metric which decides whether the nodes turn into CH or not after the first round [5]. Same as LEACH protocol, E- LEACH is divided into rounds, in the first round, every node has the same probability to turn into CH, that mean nodes are randomly selected as CHs, in the next rounds, the residual energy of each node is different after one round communication and taken into account for the selection of the CHs. That mean nodes have more energy will become a CHs rather than nodes with less energy. TL LEACH PROTOCOLE. A new version of LEACH called Two-level Leach was proposed. In this protocol; CH collects data from other cluster members as original LEACH, but rather than transfer data to the BS directly, it uses one of the CHs that lies between the CH and the BS as a relay station [6]. M- LEACH PROTOCOLF. In Multi hop LEACH protocol selects optimal path between the CH and the BS through other CHs and use these CHs as a relay station to transmit data over through them [7]. First, multi-hop communication is adopted among CHs. Then, according to the selected optimal path, these CHs transmit data to the corresponding CH which is nearest to BS. Finally, this CH sends data to BS. M-LEACH protocol is almost the same as LEACH protocol, only makes communication mode from single hop to multi-hop between CHs and BS. III. PROPOSED MODIFICATION IN LEACH The proposed I-LEACH (Improved LEACH) ensures that the elected cluster-heads will be uniformly distributed over the network. Hence, there is no possibility that all cluster- heads will be concentrated in one part of the network. The performance of the proposed I-LEACH protocol is evaluated mainly as per the following metrics: 1) Average Energy consumption: The average energy consumed by the sensor nodes are measured at equal intervals. 2) Average Throughput: The average number of packets received at the sink. 3) Life time of the network: The total number of nodes which are alive at the end of all the cycles of the algorithms.  Proposed algorithm for I-LEACH I-LEACH employs the distributed clustering approach as compare to LEACH protocol. The total sensor field is divided into the equal sub-region. The choice of the cluster
  • 3. Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH) (IJSRD/Vol. 1/Issue 9/2013/0073) All rights reserved by www.ijsrd.com 1990 head (CH) from each sub-region is determined by the threshold approach as in LEACH protocol. Following is the algorithm for the I-LEACH protocol. Proposed I-LEACH Algorithm Let Ni or Nj denote a common node S(Ni) = (N1, N2 ........Nn) denote the set of n nodes E(Ni) denote energy in a node Nxyz denote node location Ci denote a cluster ID CH(Ni) denotes a cluster head node. dij denote distance measured from node Ni to Nj thresh (Ni) denote the threshold value of node Ni Initialization Create node Ni Set node position Nxyz Clusters formation Divide the sensor field into equal sub-region Ri Select CH from the each sub-region Ri based on threshold value. if Ni Ri && thresh(Ni) < Threshold && has not been CH yet then Ni = CH (Ni) for sub-region Ri else Ni =Nj (normal node) end if Send Data to Base station CH(Ni) sends data to Base station Repeat the steps 12 to 18 for different rounds End of algorithm The sensor field is divided into equal sub region as shown in fig 3 for 100 nodes Fig. 3 Sensor network topology for 100 nodes with base station at (50, 50) IV. SIMULATION RESULTS AND ANALYSIS The performance of the proposed I-LEACH is compared with basic LEACH protocol in terms of Average energy consumption, Life time of the network and Average throughput. All experiment results presented in this section are average of three simulation runs in 100 nodes network size. The following table shows the simulation results at various simulation runs. Network Size LEACH I-LEACH Life Time(s) Through- put Life Time(s) Through- put 100 1 372.30 35905 566.90 51106 2 404.60 27889 603.50 50517 3 433.80 44871 570.20 50563 Table. 1: Simulation Results Average energy consumptionA. As simulation started with equal amount of energy (2J) with each sensor nodes, so total energy with the network will be 200J for 100 nodes simulation. Fig. 4 shows the comparison of average energy consumption at various times between LEACH and I-LEACH protocols for 100. Fig. 4: Average energy consumption comparisons Lifetime comparisonB. The total number of nodes which are alive at the end of each round is shown in fig. 5 for the 100 nodes network. The simulation will stop if total number of live nodes is less than five in the case of 100 nodes network. Fig. 5: Life time comparisons Average throughputC. It will measure the average number of packets reaching at the sink (base station) node. The location of the sink is (50,50) in the 100 nodes network. Fig. 6 shows throughput achieved.
  • 4. Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH) (IJSRD/Vol. 1/Issue 9/2013/0073) All rights reserved by www.ijsrd.com 1991 Fig. 6: Throughput comparisons V. CONCLUSION The proposed I-LEACH ensures that the elected cluster- heads are uniformly distributed over the network. Hence, there is no possibility that all cluster-heads will be concentrated in one part of the network. The result of simulations conducted indicates that the proposed clustering approach is more energy efficient and scalable and hence effective in prolonging the network life time compared to LEACH. It also outperforms LEACH with respect to throughput of the network. I-LEACH improves energy consumption by around 43% and throughput by 40% in 100 nodes network size. REFERENCES [1] Mohammad Ilyas and Imad Mahgoub. “Handbook of sensor networks: compact wireless and wired sensing systems”, Book, Chapter 1 & 6 CRC Press, 2005. [2] S. Lindsey and C. Raghavendra, “PEGASIS: Power- Efficient Gathering in Sensor Information Systems,” IEEE Aerospace Conf. Proceding, vol. 3, 9-16, pp. 1125-30, 2002. [3] A. Manjeshwar, D. P. Agrawal, “TEEN: a protocol for enhanced efficiency in wireless sensor networks”, in: Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, CA, April, 2001. [4] Younis O., Fahmy S. “HEED: A Hybrid, Energy- Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks.” IEEE Transactions on Mobile Computing, 3(4), 660669, 2004. [5] Fan Xiangning, Song Yulin. “Improvement on LEACH Protocol of Wireless Sensor Network, 2007. [6] V. Loscr, G. Morabito and S. Marano. “A Two Levels Hierarchy for Low-Energy Adaptive Clustering Hierarchy. [7] Dissertation, Hang Zhou, Zhe Jiang and Mo Xiaoyan, “Study and Design on Cluster Routing Protocols of Wireless Sensor Networks, 2006.