SlideShare a Scribd company logo
LEACH
Cluster-based Routing Protocol
for
Wireless Sensor Networks
By
AKANKSHA UPADHYAY
Research Student, SATI, Vidisha
Need
• Cheap and energy-efficient as possible and rely on their large
numbers to obtain high quality results.
• Fault tolerance while minimizing energy consumption.
• Since the limited wireless channel bandwidth must be shared
among all the sensors in the network, routing protocols for
these networks should be able to perform local collaboration to
reduce bandwidth requirements.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Network routing protocols for WSNs
(Energy Analysis)
• Direct communication with BS
• Minimum energy multi-hop routing using sensor networks and
radio models
• Clustering
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Direct communication with BS
• Each sensor sends its data directly to the base station.
• Possibly optimal if either the base station is close to the nodes,
or the energy required to receive data is large.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Minimum energy multi-hop routing
• Nodes route data destined ultimately for the base station
through intermediate nodes.
• The intermediate nodes are chosen such that the transmit
amplifier energy is minimized.
• Rather than just one (high-energy) transmit of the data, each
data message must go through n (low-energy) transmits and n
receives
• Shorten system lifetime as the nodes closest to the base station
are the ones to die out first since they are the ones most used
as “routers” for other sensors’ data.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Clustering
• Nodes are organized into clusters that communicate with a
local base station, and these local base stations transmit the
data to the global base station, where it is accessed by the end-
user.
• If the base station is an energy-constrained node, it would die
quickly, as it is being heavily utilized.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
LEACH
• Low-Energy Adaptive Clustering Hierarchy
• Clustering-based protocol
• Select sensor nodes as CHs by rotation, so the high energy
dissipation in communicating with the BS is distributed evenly
to all sensor nodes in the network.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Assumption
• The base station is fixed and located far from the sensors.
• All nodes in the network are homogeneous and energy
constrained.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Key Features
• Localized coordination and control for cluster set-up and
operation.
• Randomized rotation of the cluster “base stations” or “cluster-
heads” and the corresponding clusters.
• Local compression to reduce global communication.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
LEACH
• The nodes organize themselves into local clusters, with one
node acting as the local base station or cluster-head.
• Cluster-head nodes broadcast their status to the other sensors
in the network.
• Each sensor node determines to which cluster it wants to
belong by choosing the cluster-head.
• Each cluster-head creates a schedule for the nodes in its
cluster.
• Once the cluster-head has all the data from the nodes in its
cluster, the cluster-head node aggregates the data and then
transmits the compressed data to the base station.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Comparative Analysis
System lifetime using direct transmission,
MTE routing, static clustering, and
LEACH with 0.5 J/node
Total system energy dissipated using
direct communication, MTE routing
and LEACH for the 100node random
network,
Eelec=50nJ/bit, εamp=100pJ/bit/m2 and
the messages are 2000 bits
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Algorithm
• The operation of LEACH is broken up into rounds.
• Each round comprises 2 phases
1. Set-up phase: when the clusters are organized,
2. Steady-state phase: when data transfers to the base
station.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Set-up Phase
• Decision of nodes to become cluster head
• Node n selects random number between 0 and 1
• If number is less than threshold T(n), node become cluster head for
current round. [T(n)]
• Cluster head nodes uses CSMA MAC protocol to broadcast
advertisement message to the rest of the nodes with same transmit
energy.
• According to the received signal strength nodes decides the cluster to
which it will belong in the round.
• Each node transmit information of its cluster head selection to
the cluster head again using CSMA MAC protocol.
• Cluster head creates a TDMA schedule telling the nodes when
to transmit.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Set-up Phase
Threshold Computation
[BACK]
)
1
mod(*1
P
rP
P

T(n) =
if n ϵ G
0 otherwise
n = node
P = the desired percentage of cluster
heads
r = the current round
G = set of nodes that have not been
cluster-heads in the last 1/P
rounds
During round 0, each node has a
probability P of becoming a
cluster-head. The nodes that are
cluster-heads in round 0 cannot
be cluster-heads for the next 1/P
rounds.
After 1/P-1 rounds, T=1for any
nodes that have not yet been
cluster-heads.
And after 1/P rounds, all nodes
are once again eligible to become
cluster-heads.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Steady-state Phase
• The radio of each non-cluster-head node can be turned off
until the node’s allocated transmission time ( according to
TDMA schedule).
• The cluster-head node must keep its receiver on to receive all
the data from the nodes in the cluster.
• When all the data has been received, then cluster head node
performs signal processing functions to compress the data into
a single signal.
• This composite signal is sent to the base station.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Conclusion
• LEACH distributes the energy among the nodes in the network
and is effective in reducing energy dissipation from a global
perspective.
• LEACH effectively enhances the system lifetime.
• LEACH is completely distributed, requiring no control
information from the base station, and the nodes do not require
knowledge of the global network in order for LEACH to
operate.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
Reference
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, “Energy-Efficient
Communication Protocol for Wireless Microsensor Networks”, Proceedings of the
33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA,
pp. 10–19, 4–7 January 2000.
AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
THANK YOU

More Related Content

What's hot

Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdma
JAIGANESH SEKAR
 
SDH BASICS
SDH BASICSSDH BASICS
SDH BASICS
Niranjan Poojary
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
Amit Dixit
 
Check sum
Check sumCheck sum
Check sum
Pooja Jaiswal
 
Ec 2401 wireless communication unit 2
Ec 2401 wireless communication   unit 2Ec 2401 wireless communication   unit 2
Ec 2401 wireless communication unit 2
JAIGANESH SEKAR
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmsk
JAIGANESH SEKAR
 
1. introduction to wireless communication
1. introduction to wireless communication1. introduction to wireless communication
1. introduction to wireless communication
JAIGANESH SEKAR
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 
Light wave-system-3855513
Light wave-system-3855513Light wave-system-3855513
Light wave-system-3855513Pooja Shukla
 
Digital Communication Unit 1
Digital Communication Unit 1Digital Communication Unit 1
Digital Communication Unit 1
Anjuman College of Engg. & Tech.
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)
NARENDRA KUMAR REDDY
 
Mimo in Wireless Communication
Mimo in Wireless CommunicationMimo in Wireless Communication
Mimo in Wireless Communication
kailash karki
 
System verilog coverage
System verilog coverageSystem verilog coverage
System verilog coverage
Pushpa Yakkala
 
OTN for Beginners
OTN for BeginnersOTN for Beginners
OTN for Beginners
MapYourTech
 
IP RAN 100NGN
IP RAN 100NGNIP RAN 100NGN
IP RAN 100NGN
Muhamad Yopan
 
Equalization
EqualizationEqualization
Equalization
@zenafaris91
 

What's hot (20)

Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
SDH Frame Structure
SDH Frame StructureSDH Frame Structure
SDH Frame Structure
 
2.5 capacity calculations of fdma, tdma and cdma
2.5   capacity calculations of fdma, tdma and cdma2.5   capacity calculations of fdma, tdma and cdma
2.5 capacity calculations of fdma, tdma and cdma
 
SDH BASICS
SDH BASICSSDH BASICS
SDH BASICS
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
 
Check sum
Check sumCheck sum
Check sum
 
Ec 2401 wireless communication unit 2
Ec 2401 wireless communication   unit 2Ec 2401 wireless communication   unit 2
Ec 2401 wireless communication unit 2
 
3.3 modulation formats msk and gmsk
3.3 modulation formats   msk and gmsk3.3 modulation formats   msk and gmsk
3.3 modulation formats msk and gmsk
 
1. introduction to wireless communication
1. introduction to wireless communication1. introduction to wireless communication
1. introduction to wireless communication
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Light wave-system-3855513
Light wave-system-3855513Light wave-system-3855513
Light wave-system-3855513
 
Digital Communication Unit 1
Digital Communication Unit 1Digital Communication Unit 1
Digital Communication Unit 1
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)MINIMUM SHIFT KEYING(MSK)
MINIMUM SHIFT KEYING(MSK)
 
Mimo in Wireless Communication
Mimo in Wireless CommunicationMimo in Wireless Communication
Mimo in Wireless Communication
 
System verilog coverage
System verilog coverageSystem verilog coverage
System verilog coverage
 
OTN for Beginners
OTN for BeginnersOTN for Beginners
OTN for Beginners
 
IP RAN 100NGN
IP RAN 100NGNIP RAN 100NGN
IP RAN 100NGN
 
Equalization
EqualizationEqualization
Equalization
 

Viewers also liked

Leach
Leach Leach
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
divya_prabha
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
Yogesh Fulara
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
Jimit Rupani
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
divya_prabha
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL9914814928
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetime
IAEME Publication
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
IOSR Journals
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
ARUNP116
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
Munisekhar Gunapati
 
stable election protocol
stable election protocolstable election protocol
stable election protocol
apuu34
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
Rajesh Piryani
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
Editor IJMTER
 
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
Etat  De L\'art Algo RéSeaux De Capteurs sans-filEtat  De L\'art Algo RéSeaux De Capteurs sans-fil
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
mabrouk
 
Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil
Nader Abdallah
 

Viewers also liked (20)

Leach
Leach Leach
Leach
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetime
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 
stable election protocol
stable election protocolstable election protocol
stable election protocol
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
Etat  De L\'art Algo RéSeaux De Capteurs sans-filEtat  De L\'art Algo RéSeaux De Capteurs sans-fil
Etat De L\'art Algo RéSeaux De Capteurs sans-fil
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil Presentation : Réseau de capteurs sans fil
Presentation : Réseau de capteurs sans fil
 

Similar to Leach

Energy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor NetworkEnergy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor Network
Shivang Rana
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
AjayTiwari301041
 
A04560105
A04560105A04560105
A04560105
IOSR-JEN
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
nooralleema
 
H0421043049
H0421043049H0421043049
H0421043049
ijceronline
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Alexander Decker
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
ijsrd.com
 
Wireless Sensor
Wireless SensorWireless Sensor
Wireless Sensor
Deepak Prabhu
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
Sathish Silence
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
idescitation
 
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
Sitamarhi Institute of Technology
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
Ayman Adel
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 

Similar to Leach (20)

Energy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor NetworkEnergy Efficient Clustering: Wireless Sensor Network
Energy Efficient Clustering: Wireless Sensor Network
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
 
A04560105
A04560105A04560105
A04560105
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
H0421043049
H0421043049H0421043049
H0421043049
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
Wireless Sensor
Wireless SensorWireless Sensor
Wireless Sensor
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
eeca
eecaeeca
eeca
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
unit-iv-wireless-sensor-networks-wsns-and-mac-protocols
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 

Leach

  • 1. LEACH Cluster-based Routing Protocol for Wireless Sensor Networks By AKANKSHA UPADHYAY Research Student, SATI, Vidisha
  • 2. Need • Cheap and energy-efficient as possible and rely on their large numbers to obtain high quality results. • Fault tolerance while minimizing energy consumption. • Since the limited wireless channel bandwidth must be shared among all the sensors in the network, routing protocols for these networks should be able to perform local collaboration to reduce bandwidth requirements. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 3. Network routing protocols for WSNs (Energy Analysis) • Direct communication with BS • Minimum energy multi-hop routing using sensor networks and radio models • Clustering AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 4. Direct communication with BS • Each sensor sends its data directly to the base station. • Possibly optimal if either the base station is close to the nodes, or the energy required to receive data is large. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 5. Minimum energy multi-hop routing • Nodes route data destined ultimately for the base station through intermediate nodes. • The intermediate nodes are chosen such that the transmit amplifier energy is minimized. • Rather than just one (high-energy) transmit of the data, each data message must go through n (low-energy) transmits and n receives • Shorten system lifetime as the nodes closest to the base station are the ones to die out first since they are the ones most used as “routers” for other sensors’ data. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 6. Clustering • Nodes are organized into clusters that communicate with a local base station, and these local base stations transmit the data to the global base station, where it is accessed by the end- user. • If the base station is an energy-constrained node, it would die quickly, as it is being heavily utilized. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 7. LEACH • Low-Energy Adaptive Clustering Hierarchy • Clustering-based protocol • Select sensor nodes as CHs by rotation, so the high energy dissipation in communicating with the BS is distributed evenly to all sensor nodes in the network. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 8. Assumption • The base station is fixed and located far from the sensors. • All nodes in the network are homogeneous and energy constrained. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 9. Key Features • Localized coordination and control for cluster set-up and operation. • Randomized rotation of the cluster “base stations” or “cluster- heads” and the corresponding clusters. • Local compression to reduce global communication. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 10. LEACH • The nodes organize themselves into local clusters, with one node acting as the local base station or cluster-head. • Cluster-head nodes broadcast their status to the other sensors in the network. • Each sensor node determines to which cluster it wants to belong by choosing the cluster-head. • Each cluster-head creates a schedule for the nodes in its cluster. • Once the cluster-head has all the data from the nodes in its cluster, the cluster-head node aggregates the data and then transmits the compressed data to the base station. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 11. Comparative Analysis System lifetime using direct transmission, MTE routing, static clustering, and LEACH with 0.5 J/node Total system energy dissipated using direct communication, MTE routing and LEACH for the 100node random network, Eelec=50nJ/bit, εamp=100pJ/bit/m2 and the messages are 2000 bits AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 12. Algorithm • The operation of LEACH is broken up into rounds. • Each round comprises 2 phases 1. Set-up phase: when the clusters are organized, 2. Steady-state phase: when data transfers to the base station. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 13. Set-up Phase • Decision of nodes to become cluster head • Node n selects random number between 0 and 1 • If number is less than threshold T(n), node become cluster head for current round. [T(n)] • Cluster head nodes uses CSMA MAC protocol to broadcast advertisement message to the rest of the nodes with same transmit energy. • According to the received signal strength nodes decides the cluster to which it will belong in the round. • Each node transmit information of its cluster head selection to the cluster head again using CSMA MAC protocol. • Cluster head creates a TDMA schedule telling the nodes when to transmit. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 14. Set-up Phase Threshold Computation [BACK] ) 1 mod(*1 P rP P  T(n) = if n ϵ G 0 otherwise n = node P = the desired percentage of cluster heads r = the current round G = set of nodes that have not been cluster-heads in the last 1/P rounds During round 0, each node has a probability P of becoming a cluster-head. The nodes that are cluster-heads in round 0 cannot be cluster-heads for the next 1/P rounds. After 1/P-1 rounds, T=1for any nodes that have not yet been cluster-heads. And after 1/P rounds, all nodes are once again eligible to become cluster-heads. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 15. Steady-state Phase • The radio of each non-cluster-head node can be turned off until the node’s allocated transmission time ( according to TDMA schedule). • The cluster-head node must keep its receiver on to receive all the data from the nodes in the cluster. • When all the data has been received, then cluster head node performs signal processing functions to compress the data into a single signal. • This composite signal is sent to the base station. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 16. Conclusion • LEACH distributes the energy among the nodes in the network and is effective in reducing energy dissipation from a global perspective. • LEACH effectively enhances the system lifetime. • LEACH is completely distributed, requiring no control information from the base station, and the nodes do not require knowledge of the global network in order for LEACH to operate. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha
  • 17. Reference W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, pp. 10–19, 4–7 January 2000. AKANKSHA UPADHYAY, Research Student, SATI, Vidisha