SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 141
Performance Evaluation of LEACH Protocol for Wireless
Sensor Network
Leena Y.Barai Mahendra A. Gaikwad
PG Student, M-Tech (Electronics) Principal
B. D. College of Engineering B. D. College of Engineering
Sewagram (Wardha) Sewagram (Wardha)
Maharashatra ( India ) Maharashatra ( India )
Abstract ---This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energy-
intensive than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
Keyword: -LEACH protocol, WSN, energy-efficient.
I. INTRODUCTION
A Wireless Sensor Network (WSN) holds the promise of a smart communication paradigm which enables setting up an
intelligent network capable of handling application that involve from user requirements. However due to nature of WSN
researches face new challenges related to the design of algorithm and protocol.
Wireless Sensor Networks (WSNs) can be defined as a self-configured and infrastructure-less wireless networks to
monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to
cooperatively pass their data through the network to a main location or sink where the data can be observed and analyzed. A sink
or base station acts like an interface between users and the network. One can retrieve required information from the network by
injecting queries and gathering results from the sink. Typically a wireless sensor network contains hundreds of thousands of
sensor nodes. The sensor nodes can communicate among themselves using radio signals. A wireless sensor node is equipped with
sensing and computing devices, radio transceivers and power components. The individual nodes in a wireless sensor network
(WSN) are inherently resource constrained: they have limited processing speed, storage capacity, and communication bandwidth.
After the sensor nodes are deployed, they are responsible for self-organizing an appropriate network infrastructure often with
multi-hop communication with them.
Thus, the sensor network is a bridge between the real world and computation world. Some important properties for a good sensor
network protocols are:
a) Ease of deployment: Sensor nodes may communicate in absence of established network also.
b) System lifetime: Sensor networks must extremely energy efficient.
c) Latency: Communication between nodes and base station should be timely manner.
d) Quality of service: End user does not require all data in the network so data aggregation is important issue in quality
of service.
Wireless sensor network enable new application and require non-conventional paradigms for protocol design due to several
constrains. Owing to the requirements for low device complexity together with low energy consumption and long network
lifetime. So nowadays most of the researches concentrated at design of energy efficient protocol.
II. Review of LEACH Protocol:-
This review paper is built on the work mentioned in [1],[2]. LEACH comes under the family of proactive network protocols, with
small changes. In proactive protocols [3]the node sense and send it to the base station periodically. Whereas reactive network
protocols like TEEN performs instantaneously for critical data. For achieving the design goal for LEACH protocol, the following
techniques are
i) Randomized and self-configuring formation
ii) Data aggregation
iii) Local control on data transmission.
LEACH is the first hierarchical cluster based routing Protocol, distributed algorithm is used to form clusters in network area. For
each cluster there is a cluster head node which is responsible for data aggregation and sends the important data in its TDMA
(Time Division Multiple Access) slot to the base station, where these data is needed using CDMA (Code Division Multiple
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 142
Access).Few numbers of nodes become the cluster head which act as the router to the base station. Energy dissipation is less as
data transmission is done by only cluster head node. Data aggregation technique is used, because there is a possibility of
correlated data in neighboring nodes of the same cluster. So data is processed locally in LEACH protocol.
Assumptions for development of LEACH:-
The sensor nodes and the underlying network model. For sensor nodes assume that all nodes can transmit with enough power to
reach the BS if needed, that nodes can use the power control to vary the amount of transmit power and computational power to
support MAC protocol and perform signal processing computations. For the network model, where the nodes always have data to
send to the end user and nodes and nodes located close to each other have correlated data.
Stages in LEACH:-
LEACH
Cluster Set-up Steady State
1) Cluster Head selection 1) Data communication to CH
2) Advertisement phase 2) Data fusion.
3) Cluster formation 3) Data communication to BS
4) Schedule creation
Timeline of LEACH protocol:-
4. (A) Set-up phase
In LEACH, nodes take autonomous decisions to form clusters by using a distributed algorithm without any centralized control.
Here no long-distance communication with the base station is required and distributed cluster formation can be done without
knowing the exact location of any of the nodes in the network. In addition, No global communication is needed to set up the
clusters. The cluster formation algorithm should be designed such that nodes are cluster-heads approximately the same number of
time, assuming all the nodes start with the same amount of energy [8]. Finally, the cluster-head nodes should be spread
throughout the network, as this will minimize the distance the non-cluster-head nodes need to send their data. A sensor node
chooses a random number, r, between 0 and 1.
Let a threshold value be ( )
( ) = ∗
0																											
---- n
Otherwise
This random number is less than a threshold value, ( ), the node becomes a cluster-head for the current round. The threshold
value is calculated based on the above given equation that incorporates the desired percentage to become a cluster-head, the
current round, and the set of nodes that have not been selected as a cluster-head in the last(1/P) rounds, p is cluster head
probability. After the nodes have elected themselves to be cluster-heads, it broadcasts an advertisement message (ADV). This
message is a small message containing the node's ID and a header that distinguishes this message as an announcement message.
Each non-cluster-head node determines to which cluster it belongs by choosing the Cluster head that requires the minimum
communication energy, based on the received signal strength of the advertisement from each cluster-head. After each node has
decided to which cluster it belongs, it must inform the cluster-head node that it will be a member of the cluster. Each node
transmits a join-request message (Join- REQ) back to the chosen cluster-head. The cluster-heads in LEACH act as local control
centers to co-ordinate the data transmissions in their cluster [9]. The cluster-head node sets up a TDMA schedule and transmits
this schedule to the nodes in the cluster. This ensures that there are no collisions among data messages and also allows the radio
components of each non cluster-head node to be turned off at all times except during their transmit time, thus minimizing the
energy dissipated by the individual [8][10].
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 143
4 (B) Steady-State Phase
The steady-state operation is broken into frames where nodes send their data to the cluster-head at most once per frame during
their allocated transmission slot. The set-up phase does not guarantee that nodes are evenly distributed among the cluster head
nodes. Therefore, the number of nodes per cluster is highly variable in LEACH, and the amount of data each node can send to the
cluster-head varies depending on the number of nodes in the cluster. To reduce energy dissipation, each non-cluster-head node
uses power control to set the amount of transmits power based on the received strength of the cluster-head advertisement. The
radio of each non-cluster-head node is turned off until its allocated transmission time. Since all the nodes have data to send to the
cluster-head and the total bandwidth is fixed, using a TDMA schedule is efficient use of bandwidth and represents a low latency
approach, in addition to being energy-efficient[5][9]. The cluster-head must keep its receiver on to receive all the data from the
nodes in the cluster. Once the cluster-head receives all the data, it can operate on the data and then the resultant data are sent from
the cluster-head to the base station.
Simulation Parameter:-
Sr.No No. of Item description specification No. of Item description specification
1 Simulation Area 300 X 300
2 No. of nodes 11
3 Channel type Channel / Wireless channel
4 Simulation time 300ns
5 Antenna model Antenna / Omni antenna
6 Link Layer Type LL
7 Energy Model Battery
8 Communication model Bi-directional
9 Interface queue type Queue / drop tail / priqueue
Evaluation of LEACH protocol:-
Performance of LEACH protocol evaluated in NS2 simulator by following
I ) Throughput ii ) Energy of cluster heads iii) Packet Delivery Ratio iv) End to end delay
i) Throughput is the average data packets received at the destination (i.e at base station). Throughput usually measured
in data packets per second (Bits/sec or bps)
Fig. Time Verses Throughput
From above graph up to 40 seconds all packets not delivered at base station from 0 to 40 seconds maximum packets drop but after
40 sec to 100 sec maximum packets delivered at destination.
ii) Packet Delivery Ratio is the ratio of packets send to the number of packets received at destination. The greater value
of packet delivery ratio means better performance of protocol.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 144
Fig :- Time Verses Packet Delivery Ratio
From above figure Packet delivery ratio for LEACH protocol evaluate graph shows that maximum packets delivered at
destinations .As greater value of packet delivery ratio means better performance of protocol.
iii) Energy of clusters head
As we focus on energy efficiency of wireless sensor network so energy of sensor node is important parameter
Fig. Number of clusters verses energy
.
Fig 4:- Time Verses Delay
Total energy of network during communication with base station not possible evaluate in LEACH because of LEACH elect
cluster heads in random fashion .So above graph drawn between no. of clusters verses energy
iv) End to end delay is average packet to arrive in destination .It also included delay caused by route discovery process and queue
in the data packet transmission. Only data packets that successfully delivered to destination that counted Figure shows that end to
end delay which the average data packet to arrive at the destination. From above graph end to end delay increases with time which
is limitation of LEACH protocol.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 6 (July 2014) http://ijirae.com
_______________________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 145
LEACH Assumptions/ Limitations:-
As LEACH is (Low Energy Adaptive Clustering Hirarchy) protocol is able to increase network life time but there are still some
factors to improve in assumptions of LEACH protocol. LEACH assumes that homogeneous distribution of sensor nodes in the
given area. But it not realistic. LEACH assumes that nodes in always have data to send to the end user have correlated data. It is
not possible no of clusters heads uniformly distributed throughout network. It may possible that all cluster heads placed nearby
due to this information other part of network unable to reach to the destination.
CONCLUSION:-
Wireless Sensor Network (WSN) consists of base stations (BS) and several nodes which are unattended and have limited resource
and they can work until the energy exists inside them. In this paper we take overview of LEACH protocol with its assumptions
and performance evaluated considering some properties throughput, packet delivery ratio, energy of cluster head, end to end
delay. But out of these properties we observed end to end delay is linearly increases with time. So this is drawback that must be
overcome to increase lifetime of network and make LEACH protocol energy efficient.
VIII. REFERENCES
[1]Heinzelman.W.B.,Chandrakasan.A.P.,Balakrishnan.H“An application-specific protocol architecture for wireless
microsensornetworks”IEEE transactions on Wireless Communication, Vol. 1, Issue. 4, 2002, pp 660-670
[2]Yuhua Liu, Yongfeng Zhao, JingjuGao, “A New Clustering mechanism based on LEACH Protocol”, 2009 International Joint
Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718
[3]Beibei Wang & Chong Shen& Jing Li “ Study and Improvement on LEACH protocol in WSN’S International Jouranal of
Wireless Communication and Networking ISSN :0975-7163
[4]V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive clustering hierarchy (TL-LEACH)”,
Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813
[5]Haosong Gou and YounghwanYoo“An Energy Balancing LEACH Algorithm for Wireless Sensor Networks “978-0-7695-
3984-3/10 $26.00 © 2010 IEEE
[6] Jlan-FengYann& Yuan-Liu Liu“Improved LEACH Routing Protocol ForLarge Scale Wireless Sensor Networks Routing”
978-1-4577-0321-8/11/$26.00 ©2011 IEEE
[7] Ms.V.MuthuLakshmi “Advanced LEACH Protocol in Large scale WirelessSensor Networks” Volume 4, Issue 5, May-2013
ISSN 2229-5518
[8] NavneetVerma, Dr. Devendra Prasad, MukeshChawla “Energy and Throughput of Hierarchical Routing Protocol Leach and
Leach-C for WSNS: A Review” International Journal of Research in Management, Science & Technology Vol.1, No. 1
[9]Meenakshi Sharma, Anil Kumar. Shaw “Transmission Time and Throughput analysis ofEEE LEACH, LEACH and Direct
TransmissionProtocol: A Simulation Based Approach”Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5,
September 2012.
[10] Rajesh Patel, Sunil Pariyani “Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless
Sensor Network” International Journal of Computer Applications (0975 – 8887) Volume 20– No.4, April 2011
[11]M.Shankar, Dr.M.Sridar, Dr.M.Rajani“Performance Evaluation of LEACH Protocol inWireless Network” International
Journal of Scientific & Engineering Research, Volume 3, Issue 1, January-2012ISSN 2229-5518

More Related Content

What's hot

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
Routing
RoutingRouting
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
Pawan Kumar Tiwari
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsn
Kamal Patel
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
Ayman Adel
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
Jimit Rupani
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ijsrd.com
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
Sathish Silence
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
Aarthi Raghavendra
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
ijtsrd
 

What's hot (20)

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Routing
RoutingRouting
Routing
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsn
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 

Viewers also liked

Taltirelin 103300-74-9 -api
Taltirelin 103300-74-9 -apiTaltirelin 103300-74-9 -api
Taltirelin 103300-74-9 -api
Taltirelin-103300-74-9-api
 
Mule ESB Dropbox connector
Mule ESB Dropbox connectorMule ESB Dropbox connector
Mule ESB Dropbox connector
Krishnakanth Goud
 
Ecn30205 course outline august 2015 semester
Ecn30205 course outline   august 2015 semesterEcn30205 course outline   august 2015 semester
Ecn30205 course outline august 2015 semester
chloeesim
 
EMenu Card systems for Restaurants
EMenu Card systems for RestaurantsEMenu Card systems for Restaurants
EMenu Card systems for Restaurants
AM Publications
 
Brand extension_Mia by Tanishq
Brand extension_Mia by TanishqBrand extension_Mia by Tanishq
Brand extension_Mia by Tanishq
Sameer Mathur
 
Es Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 PresentationEs Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 Presentation
baezcond
 
10 langkah cek tegangan pondasi tiang menggunakan software safe 12
10 langkah cek tegangan pondasi tiang menggunakan software safe 1210 langkah cek tegangan pondasi tiang menggunakan software safe 12
10 langkah cek tegangan pondasi tiang menggunakan software safe 12
Afret Nobel
 
A Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home SystemA Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home System
AM Publications
 
Circular motion
Circular motionCircular motion
Circular motion
IB School
 

Viewers also liked (10)

Taltirelin 103300-74-9 -api
Taltirelin 103300-74-9 -apiTaltirelin 103300-74-9 -api
Taltirelin 103300-74-9 -api
 
Mule ESB Dropbox connector
Mule ESB Dropbox connectorMule ESB Dropbox connector
Mule ESB Dropbox connector
 
Ecn30205 course outline august 2015 semester
Ecn30205 course outline   august 2015 semesterEcn30205 course outline   august 2015 semester
Ecn30205 course outline august 2015 semester
 
EMenu Card systems for Restaurants
EMenu Card systems for RestaurantsEMenu Card systems for Restaurants
EMenu Card systems for Restaurants
 
Brand extension_Mia by Tanishq
Brand extension_Mia by TanishqBrand extension_Mia by Tanishq
Brand extension_Mia by Tanishq
 
Es Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 PresentationEs Tiempo Unihealth 2014 Presentation
Es Tiempo Unihealth 2014 Presentation
 
10 langkah cek tegangan pondasi tiang menggunakan software safe 12
10 langkah cek tegangan pondasi tiang menggunakan software safe 1210 langkah cek tegangan pondasi tiang menggunakan software safe 12
10 langkah cek tegangan pondasi tiang menggunakan software safe 12
 
A Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home SystemA Study of Motion Detection Method for Smart Home System
A Study of Motion Detection Method for Smart Home System
 
Circular motion
Circular motionCircular motion
Circular motion
 
s
ss
s
 

Similar to Performance Evaluation of LEACH Protocol for Wireless Sensor Network

A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
cscpconf
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
ijsrd.com
 
E1073644
E1073644E1073644
E1073644
IJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
IOSRJECE
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET Journal
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
ijceronline
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
IRJET Journal
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
ShrutiGupta858540
 

Similar to Performance Evaluation of LEACH Protocol for Wireless Sensor Network (20)

A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
E1073644
E1073644E1073644
E1073644
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
20320130406029
2032013040602920320130406029
20320130406029
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 

More from AM Publications

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 

More from AM Publications (20)

DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNTHE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONHMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
 
INTELLIGENT BLIND STICK
INTELLIGENT BLIND STICKINTELLIGENT BLIND STICK
INTELLIGENT BLIND STICK
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNNOPTICAL CHARACTER RECOGNITION USING RBFNN
OPTICAL CHARACTER RECOGNITION USING RBFNN
 
DETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECTDETECTION OF MOVING OBJECT
DETECTION OF MOVING OBJECT
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTSIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

Performance Evaluation of LEACH Protocol for Wireless Sensor Network

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _______________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 141 Performance Evaluation of LEACH Protocol for Wireless Sensor Network Leena Y.Barai Mahendra A. Gaikwad PG Student, M-Tech (Electronics) Principal B. D. College of Engineering B. D. College of Engineering Sewagram (Wardha) Sewagram (Wardha) Maharashatra ( India ) Maharashatra ( India ) Abstract ---This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head, while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g., data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energy- intensive than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii) Throughput iii) Delay iv) lifetime. Keyword: -LEACH protocol, WSN, energy-efficient. I. INTRODUCTION A Wireless Sensor Network (WSN) holds the promise of a smart communication paradigm which enables setting up an intelligent network capable of handling application that involve from user requirements. However due to nature of WSN researches face new challenges related to the design of algorithm and protocol. Wireless Sensor Networks (WSNs) can be defined as a self-configured and infrastructure-less wireless networks to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location or sink where the data can be observed and analyzed. A sink or base station acts like an interface between users and the network. One can retrieve required information from the network by injecting queries and gathering results from the sink. Typically a wireless sensor network contains hundreds of thousands of sensor nodes. The sensor nodes can communicate among themselves using radio signals. A wireless sensor node is equipped with sensing and computing devices, radio transceivers and power components. The individual nodes in a wireless sensor network (WSN) are inherently resource constrained: they have limited processing speed, storage capacity, and communication bandwidth. After the sensor nodes are deployed, they are responsible for self-organizing an appropriate network infrastructure often with multi-hop communication with them. Thus, the sensor network is a bridge between the real world and computation world. Some important properties for a good sensor network protocols are: a) Ease of deployment: Sensor nodes may communicate in absence of established network also. b) System lifetime: Sensor networks must extremely energy efficient. c) Latency: Communication between nodes and base station should be timely manner. d) Quality of service: End user does not require all data in the network so data aggregation is important issue in quality of service. Wireless sensor network enable new application and require non-conventional paradigms for protocol design due to several constrains. Owing to the requirements for low device complexity together with low energy consumption and long network lifetime. So nowadays most of the researches concentrated at design of energy efficient protocol. II. Review of LEACH Protocol:- This review paper is built on the work mentioned in [1],[2]. LEACH comes under the family of proactive network protocols, with small changes. In proactive protocols [3]the node sense and send it to the base station periodically. Whereas reactive network protocols like TEEN performs instantaneously for critical data. For achieving the design goal for LEACH protocol, the following techniques are i) Randomized and self-configuring formation ii) Data aggregation iii) Local control on data transmission. LEACH is the first hierarchical cluster based routing Protocol, distributed algorithm is used to form clusters in network area. For each cluster there is a cluster head node which is responsible for data aggregation and sends the important data in its TDMA (Time Division Multiple Access) slot to the base station, where these data is needed using CDMA (Code Division Multiple
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _______________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 142 Access).Few numbers of nodes become the cluster head which act as the router to the base station. Energy dissipation is less as data transmission is done by only cluster head node. Data aggregation technique is used, because there is a possibility of correlated data in neighboring nodes of the same cluster. So data is processed locally in LEACH protocol. Assumptions for development of LEACH:- The sensor nodes and the underlying network model. For sensor nodes assume that all nodes can transmit with enough power to reach the BS if needed, that nodes can use the power control to vary the amount of transmit power and computational power to support MAC protocol and perform signal processing computations. For the network model, where the nodes always have data to send to the end user and nodes and nodes located close to each other have correlated data. Stages in LEACH:- LEACH Cluster Set-up Steady State 1) Cluster Head selection 1) Data communication to CH 2) Advertisement phase 2) Data fusion. 3) Cluster formation 3) Data communication to BS 4) Schedule creation Timeline of LEACH protocol:- 4. (A) Set-up phase In LEACH, nodes take autonomous decisions to form clusters by using a distributed algorithm without any centralized control. Here no long-distance communication with the base station is required and distributed cluster formation can be done without knowing the exact location of any of the nodes in the network. In addition, No global communication is needed to set up the clusters. The cluster formation algorithm should be designed such that nodes are cluster-heads approximately the same number of time, assuming all the nodes start with the same amount of energy [8]. Finally, the cluster-head nodes should be spread throughout the network, as this will minimize the distance the non-cluster-head nodes need to send their data. A sensor node chooses a random number, r, between 0 and 1. Let a threshold value be ( ) ( ) = ∗ 0 ---- n Otherwise This random number is less than a threshold value, ( ), the node becomes a cluster-head for the current round. The threshold value is calculated based on the above given equation that incorporates the desired percentage to become a cluster-head, the current round, and the set of nodes that have not been selected as a cluster-head in the last(1/P) rounds, p is cluster head probability. After the nodes have elected themselves to be cluster-heads, it broadcasts an advertisement message (ADV). This message is a small message containing the node's ID and a header that distinguishes this message as an announcement message. Each non-cluster-head node determines to which cluster it belongs by choosing the Cluster head that requires the minimum communication energy, based on the received signal strength of the advertisement from each cluster-head. After each node has decided to which cluster it belongs, it must inform the cluster-head node that it will be a member of the cluster. Each node transmits a join-request message (Join- REQ) back to the chosen cluster-head. The cluster-heads in LEACH act as local control centers to co-ordinate the data transmissions in their cluster [9]. The cluster-head node sets up a TDMA schedule and transmits this schedule to the nodes in the cluster. This ensures that there are no collisions among data messages and also allows the radio components of each non cluster-head node to be turned off at all times except during their transmit time, thus minimizing the energy dissipated by the individual [8][10].
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _______________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 143 4 (B) Steady-State Phase The steady-state operation is broken into frames where nodes send their data to the cluster-head at most once per frame during their allocated transmission slot. The set-up phase does not guarantee that nodes are evenly distributed among the cluster head nodes. Therefore, the number of nodes per cluster is highly variable in LEACH, and the amount of data each node can send to the cluster-head varies depending on the number of nodes in the cluster. To reduce energy dissipation, each non-cluster-head node uses power control to set the amount of transmits power based on the received strength of the cluster-head advertisement. The radio of each non-cluster-head node is turned off until its allocated transmission time. Since all the nodes have data to send to the cluster-head and the total bandwidth is fixed, using a TDMA schedule is efficient use of bandwidth and represents a low latency approach, in addition to being energy-efficient[5][9]. The cluster-head must keep its receiver on to receive all the data from the nodes in the cluster. Once the cluster-head receives all the data, it can operate on the data and then the resultant data are sent from the cluster-head to the base station. Simulation Parameter:- Sr.No No. of Item description specification No. of Item description specification 1 Simulation Area 300 X 300 2 No. of nodes 11 3 Channel type Channel / Wireless channel 4 Simulation time 300ns 5 Antenna model Antenna / Omni antenna 6 Link Layer Type LL 7 Energy Model Battery 8 Communication model Bi-directional 9 Interface queue type Queue / drop tail / priqueue Evaluation of LEACH protocol:- Performance of LEACH protocol evaluated in NS2 simulator by following I ) Throughput ii ) Energy of cluster heads iii) Packet Delivery Ratio iv) End to end delay i) Throughput is the average data packets received at the destination (i.e at base station). Throughput usually measured in data packets per second (Bits/sec or bps) Fig. Time Verses Throughput From above graph up to 40 seconds all packets not delivered at base station from 0 to 40 seconds maximum packets drop but after 40 sec to 100 sec maximum packets delivered at destination. ii) Packet Delivery Ratio is the ratio of packets send to the number of packets received at destination. The greater value of packet delivery ratio means better performance of protocol.
  • 4. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _______________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 144 Fig :- Time Verses Packet Delivery Ratio From above figure Packet delivery ratio for LEACH protocol evaluate graph shows that maximum packets delivered at destinations .As greater value of packet delivery ratio means better performance of protocol. iii) Energy of clusters head As we focus on energy efficiency of wireless sensor network so energy of sensor node is important parameter Fig. Number of clusters verses energy . Fig 4:- Time Verses Delay Total energy of network during communication with base station not possible evaluate in LEACH because of LEACH elect cluster heads in random fashion .So above graph drawn between no. of clusters verses energy iv) End to end delay is average packet to arrive in destination .It also included delay caused by route discovery process and queue in the data packet transmission. Only data packets that successfully delivered to destination that counted Figure shows that end to end delay which the average data packet to arrive at the destination. From above graph end to end delay increases with time which is limitation of LEACH protocol.
  • 5. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 6 (July 2014) http://ijirae.com _______________________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 145 LEACH Assumptions/ Limitations:- As LEACH is (Low Energy Adaptive Clustering Hirarchy) protocol is able to increase network life time but there are still some factors to improve in assumptions of LEACH protocol. LEACH assumes that homogeneous distribution of sensor nodes in the given area. But it not realistic. LEACH assumes that nodes in always have data to send to the end user have correlated data. It is not possible no of clusters heads uniformly distributed throughout network. It may possible that all cluster heads placed nearby due to this information other part of network unable to reach to the destination. CONCLUSION:- Wireless Sensor Network (WSN) consists of base stations (BS) and several nodes which are unattended and have limited resource and they can work until the energy exists inside them. In this paper we take overview of LEACH protocol with its assumptions and performance evaluated considering some properties throughput, packet delivery ratio, energy of cluster head, end to end delay. But out of these properties we observed end to end delay is linearly increases with time. So this is drawback that must be overcome to increase lifetime of network and make LEACH protocol energy efficient. VIII. REFERENCES [1]Heinzelman.W.B.,Chandrakasan.A.P.,Balakrishnan.H“An application-specific protocol architecture for wireless microsensornetworks”IEEE transactions on Wireless Communication, Vol. 1, Issue. 4, 2002, pp 660-670 [2]Yuhua Liu, Yongfeng Zhao, JingjuGao, “A New Clustering mechanism based on LEACH Protocol”, 2009 International Joint Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718 [3]Beibei Wang & Chong Shen& Jing Li “ Study and Improvement on LEACH protocol in WSN’S International Jouranal of Wireless Communication and Networking ISSN :0975-7163 [4]V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive clustering hierarchy (TL-LEACH)”, Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813 [5]Haosong Gou and YounghwanYoo“An Energy Balancing LEACH Algorithm for Wireless Sensor Networks “978-0-7695- 3984-3/10 $26.00 © 2010 IEEE [6] Jlan-FengYann& Yuan-Liu Liu“Improved LEACH Routing Protocol ForLarge Scale Wireless Sensor Networks Routing” 978-1-4577-0321-8/11/$26.00 ©2011 IEEE [7] Ms.V.MuthuLakshmi “Advanced LEACH Protocol in Large scale WirelessSensor Networks” Volume 4, Issue 5, May-2013 ISSN 2229-5518 [8] NavneetVerma, Dr. Devendra Prasad, MukeshChawla “Energy and Throughput of Hierarchical Routing Protocol Leach and Leach-C for WSNS: A Review” International Journal of Research in Management, Science & Technology Vol.1, No. 1 [9]Meenakshi Sharma, Anil Kumar. Shaw “Transmission Time and Throughput analysis ofEEE LEACH, LEACH and Direct TransmissionProtocol: A Simulation Based Approach”Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012. [10] Rajesh Patel, Sunil Pariyani “Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Network” International Journal of Computer Applications (0975 – 8887) Volume 20– No.4, April 2011 [11]M.Shankar, Dr.M.Sridar, Dr.M.Rajani“Performance Evaluation of LEACH Protocol inWireless Network” International Journal of Scientific & Engineering Research, Volume 3, Issue 1, January-2012ISSN 2229-5518