EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
Low-energy adaptive clustering hierarchy ("LEACH") is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs)
Low-energy adaptive clustering hierarchy ("LEACH") is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs)
Wireless sensor networks have recently come into prominence because they hold the
potential to revolutionize many segments. The Wireless Sensor Network (WSN) is made up of a
collection of sensor nodes, which were small energy constrained devices. Routing technique is one of
the research area in wireless sensor network. So by designing an efficient routing protocol for
reducing energy consumption is the important factor. In this paper, a brief introduction to routing
challenges in WSN have been mentioned. This paper also provides the basic classification of routing
protocols in WSNs along with the most energy efficient protocol named LEACH along with its
advantages and disadvantages. This paper also focus on some of the improved version of LEACH
protocol.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
Wireless sensor networks have recently come into prominence because they hold the
potential to revolutionize many segments. The Wireless Sensor Network (WSN) is made up of a
collection of sensor nodes, which were small energy constrained devices. Routing technique is one of
the research area in wireless sensor network. So by designing an efficient routing protocol for
reducing energy consumption is the important factor. In this paper, a brief introduction to routing
challenges in WSN have been mentioned. This paper also provides the basic classification of routing
protocols in WSNs along with the most energy efficient protocol named LEACH along with its
advantages and disadvantages. This paper also focus on some of the improved version of LEACH
protocol.
Black Hole Attack:
A malicious node advertises the wrong paths as good paths to the source node during the pathfinding process.
When the source selects the path including the attacker node, the traffic starts passing through the adversary node and this node starts dropping the packets selectively or in whole.
Black hole region is the entry point to a large number of harmful attacks.
Plenary lecture of the XIV SBPMat Meeting, given by Prof. Paul Ducheyne (University of Pennsylvania, USA) on September 29, 2015, in Rio de Janeiro (Brazil).
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
In heterogeneous sensor networks, certain nodes become cluster heads which aggregate the data of their cluster nodes and transfer it to the sink. An Improved Energy leach protocol for cluster head selection in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed in this research work. The proposed algorithm will use thresholding to improve the cluster head selection. The presented algorithm considers the sensor nodes in wireless network and randomly distributed in the heterogeneous network. The coordinates of the sink and the dimensions of the sensor field are known in prior.
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...IJERA Editor
In recent development, achieving the deployment of nodes, lifetime, fault tolerance, latency, energy efficiency in brief robustness and high reliability have become the prime research goals of wireless sensor network. In recent years many clustering protocols have been suggested on clustering structure based on heterogeneity. We propose improved deterministic energy-efficient clustering protocol for four types of nodes which extend the stability and lifetime of the network in team of first node get dead. Hence, it increases the heterogeneity and energy level of the network. I-DEC performs better than E-SEP, SEP and DEC with more stability and effective messages shows in simulation results.
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
In wireless sensor networks, sensor nodes play the most prominent role. These sensor nodes are mainly un-chargeable, so it
raises an issue regarding lifetime of the network. Mainly sensor nodes collect data and transmit it to the Base Station. So, most of the
energy is consumed in the communication process between sensor nodes and the Base Station. In this paper, we present an
improvement on LEACH protocol to enhance the network lifetime. Our goal is to reduce the transmissions between cluster heads and
the sink node. We will choose optimum number of Master Cluster Heads from variation cluster heads present in the network. The
simulation results show that our proposed algorithm enhances the network lifetime as compare to the LEACH protocol.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...ijfcstjournal
Wireless sensor network (WSNs) are network of Sensor Nodes (SNs) with inherent sensing, processing and
communicating abilities. One of current concerns in wireless sensor networks is developing a stable
clustered heterogeneous protocol prolonging the network lifetime with minimum consumption of battery
power. In the recent times, many routing protocols have been proposed increasing the network lifetime,
stability in short proposing a reliable and robust routing protocol. In this paper we study the impact of
hierarchical clustered network with sensor nodes of two-level heterogeneity. The main approach in this
research is to develop an enhanced multi-hop DEEC routing protocol unlike DEEC. Simulation results
show the proposed protocol is better than DEEC in terms of FDN (First Dead Node), energy consumption
and Packet transmission.
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...ijfcstjournal
Wireless sensor network (WSNs) are network of Sensor Nodes (SNs) with inherent sensing, processing and
communicating abilities. One of current concerns in wireless sensor networks is developing a stable
clustered heterogeneous protocol prolonging the network lifetime with minimum consumption of battery
power. In the recent times, many routing protocols have been proposed increasing the network lifetime,
stability in short proposing a reliable and robust routing protocol. In this paper we study the impact of
hierarchical clustered network with sensor nodes of two-level heterogeneity. The main approach in this
research is to develop an enhanced multi-hop DEEC routing protocol unlike DEEC. Simulation results
show the proposed protocol is better than DEEC in terms of FDN (First Dead Node), energy consumption
and Packet transmission.
Energy aware clustering protocol (eacp)IJCNCJournal
Energy saving to prolong the network life is an important design issue while developing a new routing
protocol for wireless sensor network. Clustering is a key technique for this and helps in maximizing the
network lifetime and scalability. Most of the routing and data dissemination protocols of WSN assume a
homogeneous network architecture, in which all sensors have the same capabilities in terms of battery
power, communication, sensing, storage, and processing. Recently, there has been an interest in
heterogeneous sensor networks, especially for real deployments. This research paper has proposed a new
energy aware clustering protocol (EACP) for heterogeneous wireless sensor networks. Heterogeneity is
introduced in EACP by using two types of nodes: normal and advanced. In EACP cluster heads for normal
nodes are elected with the help of a probability scheme based on residual and average energy of the
normal nodes. This will ensure that only the high residual normal nodes can become the cluster head in a
round. Advanced nodes use a separate probability based scheme for cluster head election and they will
further act as a gateway for normal cluster heads and transmit their data load to base station when they
are not doing the duty of a cluster head. Finally a sleep state is suggested for some sensor nodes during
cluster formation phase to save network energy. The performance of EACP is compared with SEP and
simulation result shows the better result for stability period, network life and energy saving than SEP.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijcseit
The placement of base stations in wireless sensor networks affect the energy consumption for
communication between sensor node and base station. In this paper we analyzed the performance of the
zone based clustering protocol [2] under varying position of base stations, different zone sizes and the
effect on network life time with multiple base stations. While evaluating the communication overhead of
various cluster sizes, we observed that the optimal cluster size for a given network is complex, depending
on a range of parameters. Simulation results show that communication overhead decreases as we increase
the number of zone in the network. We show that placing multiple base stations in place of single base
station in zone based routing protocol enhance the network life time.
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
Wireless Sensor Networks (WSNs) is a networks of thousands of inexpensive miniature devices capable of computation, communication and sensing. WSN is being been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. In the near future, wireless sensor network is expected to consists of thousand of inexpensive nodes, each having sensing capability with limited computational and communication power which enables to deploy large scale sensor networks. Large scale WSN is usually implemented as a cluster network. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, how to adjust threshold based on the residual energy, and the measurement of energy required for transmission, based on the distance of cluster head from the base station, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of residual energy and required energy, and the time length of each round are deduced, thereby modifying the threshold value calculation. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy restrictions. As the
performance of Sensor Networks is strongly dependence to the network lifetime, researchers seek a way to
use node energy supply effectively and increasing network lifetime. As a consequence, it is crucial to use
routing algorithms result in decrease energy consumption and better bandwidth utilization. The purpose of
this paper is to increase Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering
Network environment, it is divided into two virtual layers (using distance between sensor nodes and base
station) and then regarding to sensors position in each of two layers, residual energy of sensor and
distance from base station is used in clustering. In this article, we compare proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous environment (with equal energy for all sensors)
and heterogeneous one (energy of half of sensors get doubled), also for static and dynamic situation of base
station. Results show that our proposed algorithm delivers improved performance.
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
One of the most important issues in Wireless Sensor Networks (WSNs) is severe energy restrictions. As the
performance of Sensor Networks is strongly dependence to the network lifetime, researchers seek a way to
use node energy supply effectively and increasing network lifetime. As a consequence, it is crucial to use
routing algorithms result in decrease energy consumption and better bandwidth utilization. The purpose of
this paper is to increase Wireless Sensor Networks lifetime using LEACH-algorithm. So before clustering
Network environment, it is divided into two virtual layers (using distance between sensor nodes and base
station) and then regarding to sensors position in each of two layers, residual energy of sensor and
distance from base station is used in clustering. In this article, we compare proposed algorithm with wellknown LEACH and ELEACH algorithms in homogenous environment (with equal energy for all sensors)
and heterogeneous one (energy of half of sensors get doubled), also for static and dynamic situation of base
station. Results show that our proposed algorithm delivers improved performance.
This paper considers a heterogeneous network of energy constrained sensors deployed over a region. Each
Normal sensor node in a network is systematically gathering and transmitting sensed data to the clusterhead,
and then cluster head sending data to a base station (via intermediate cluster- heads). This paper
focuses on reducing the energy consumption and hence improving lifetime of wireless sensor Networks.
Clustering sensor node is an effective topology for the energy constrained networks. So energy saving
algorithm has been developed in which clusters are formed considering a subset of high energy nodes as a
cluster-head and another subset of powerful nodes is ask to go to sleep. When Cluster heads deplete their
energy another subset of nodes becomes active and acts as a cluster head. Proposed approach is
implemented in MATLAB, Simulation results shows that it can prolong the network lifetime than LEACH
protocol, and achieves better performance than the existing clustering algorithms such as LEACH.
Similar to Wireless Sensor Networks LEACH & EDEEC (20)
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
Wireless Sensor Networks LEACH & EDEEC
1. Performance Analysis of Wireless Sensor
Network Protocol: LEACH & EDEEC
Name Designation University/Address Phone Email
Yogesh kumar
Fulara
ME Student
(Electronics)
PEC University of Technology
Chandigarh
+91-9780900443 fularayogesh@gmail.
com
Dr. Deepak Bagai Prof. ECE Dept. PEC University of Technology
Chandigarh
+97-9872376347 dbagai@yahoo.com
Authors:
13 May 2015 Paper ID: ICCICT7047
2. Wireless Sensor Network
A wireless sensor network (WSN) is
A group of specialized transducers
With a communication interface
Intended to monitor and record condition at diverse location
Commonly monitored parameters are
Temperature, Humidity, pressure , wind direction and speed
Illumination, intensity, vibration intensity, sound intensity,
Power-line voltage, chemical concentrations, pollutant levels and vital body
function
3. Components of WSNs
The WSN consist of two main components:
1. Sensor Nodes, and
2. Base Station (Central Gateway).
From : Book “Ad Hoc and sensor networks” by Carlos de Morais Cordeiro.
Figure: 1
5. Characteristics of WSNs
Ability to withstand harsh environmental conditions
Ability to cope with node failure
Dynamic network topology
Communication failures
Limited power they can harvest or store
Heterogeneity of nodes
Large scale of deployment
Node capacity is scalable (only limited by bandwidth of gateway node)
6. Applications of WSNs
HEALTH CARE
MONITORING
ENVIRONMENTAL
MONITORING
SMART OFFICE AND
HOME/ OFFICE AND
INDUSTRIAL
ASSEMBLY LINES
GREENHOUSE
MONITORING
REAR LOCATION PARAMETER
MONITORING
AGRICULTURE
HABITAT
MONITORING
BUILDING,
BRIDGE ST.
MONITORING
SECURITYAND
SURVEILLANCE
DEFENSE
APPLICATION
APPLICATION
OF WSNS
Figure: 3
7. Objective
The main objective of this paper is to compare the performance of the LEACH
( Homogeneous) and EDEEC ( Heterogeneous) protocols for WSNs.
Conserve and balance the energy consumption for WSNs.
To find out the total data transmitted and received in the Networks using
LEACH and EDEEC protocols.
8. Network Model
ISO developed a network model consist five functional area:
Configuration Management
Fault Management
Security Management
Performance Management
Accounting Management
9. Configuration Management
Configuration Management entails initial set-up of the network devices and
continuous monitoring and controlling of these devices.
One key aspect of configuration management for WSNs is topology
management
Which consider how the nodes arranged in network.
Primary goal of topology management is to maintain network connectivity in an
energy-efficient manner.
◦ Three categories
◦ Topology Discovery
◦ Sleep Cycle Management
◦ Clustering
10. Clustering
Organizes the sensor nodes into
clusters
Each cluster is governed by a
cluster-head
Only heads send messages to a BS
Suitable for data fusion
Self-organizing
10From : Junping, H., Yuhui, J. and Liang, D.: `A Time-based Cluster-Head Selection Algorithm for LEACH', IEEE
Symposium on Computers and Communications, 2008. ISCC 2008, pp. 1172-1176.
Figure: 4
11. Types of clustering Algorithms
Homogeneous clustering Algorithms
The network which all sensor network have same amount of energy are called
Homogeneous Network.
HEED (Hybrid Energy Efficient Distributed Clustering)
PEGASIS (Power Efficient Gathering in Sensor Information System)
LEACH (low Energy Adaptive Clustering Hierarchy)
12. Introduction to LEACH: Low-Energy
Adaptive Clustering Hierarchy
Self-Organizing, Adaptive clustering protocol
Randomized rotation of the high energy cluster head
Sensors elect themselves to chose a cluster head
Each node chooses its own cluster
Local data fusion at local BS –Compresses data to send, reduces transmit power
Within each clusters, nodes access the channel using TDMA (MAC)
Each local BS picks a CDMA code at random for communication inside the
cluster
13. LEACH Algorithm
Advertisement Phase:
Node n chooses a number between 0 and 1, if the number is less than the
threshold, then n becomes a cluster head
Notations: T(n) is the threshold number
P = the desired percentage of cluster heads
r = the current round
G is the set of nodes that have not been cluster-heads in the last 1/P rounds
14. LEACH Algorithm
1. Advertisement Phase
Elected node broadcasts advertisement using CSMA-MAC protocol
All elected nodes transmit with same energy
Based on the received advertisement signal strength, the non-cluster-head node chooses
its cluster
The node chooses the cluster-head whose advertisement has the highest received power
Since the amount of transmit energy needed to communicate to this cluster head is
minimal
15. LEACH Algorithm
2. Cluster Set-Up Phase:
Each node informs the cluster-head
node about its choice
Each node uses CSMA-MAC
protocol to transmit this information
Cluster heads must keep receivers on
Figure: 5
16. LEACH Algorithm
Schedule Creation:
Cluster head creates a TDMA schedule based on the number of nodes in the cluster
The head broadcasts the schedule back to his nodes
Data Transmission:
Nodes send with minimal required energy to the local cluster head, and turn off their
radio when not sending
Local cluster heads receive data, compress it into a single signal
At the end of the round (decided upon before), Start from the beginning
To avoid interference between clusters, CDMA codes are picked at random by local
cluster heads and broadcasted to their cluster nodes
17. Heterogeneous clustering
The network which some of the sensor network have extra power as compared to
other nodes in the network are called Heterogeneous Network.
Regarding their power level, three types of Heterogeneous networks
Two, Three and Multi-Level Heterogeneous Networks.
SEP (Stable Election Protocol)
DEEC (Distributed Energy Efficient Clustering)
EDEEC (Enhanced Distributed Energy Efficient Clustering)
DDEEC (Developed Distributed Energy Efficient Clustering)
EDDEEC (Enhanced Developed Distributed Energy Efficient Clustering)
19. EDEEC: Enhanced Distributed Energy
Efficient Clustering
Used for Heterogeneous wireless Sensor Networks
Uses same scheme for cluster head choice base on
Initial,
Remaining energy of the nodes,
Radio dissipation and
Average energy of the network .
21. Probability Of Nodes
Where
E(r) is the average energy at round r of the network,
Ei (r) is residual energy at round r, m is fraction between node heterogeneity,
Popt is the probability of optimum number of cluster head and
a, b is boost a power for advance and super nodes.
22. Assumptions of the Network
Simulation works
Sensor Nodes are uniformly randomly deployed in the network.
Sensor Nodes position is fixed.
There is one Base Station which is located at the centre of the sensing field.
Nodes always have the data to send to the base station.
Each nodes send 4000 bits of data during transmission.
Nodes are location-unaware, i.e. not equipped with GPS-capable antennae.
All nodes have similar capabilities in terms of processing and communication
and of equal significance.
23. NETWORK SIMULATION MODEL
1. Deployment of nodes
RANDOM DEPLOYMENT OF NODES
FOR LEACH
RANDOM DEPLOYMENT OF NODES
FOR EDEEC
Figure: 6 Figure: 7
25. 3. Simulation Parameter
Parameter Value
Area(x, y) (100,100) m
Base station (x, y) (50, 50) m
Number of Nodes (N) 100
Probability (P) 0.1
Initial Energy 0.1J
Transmitter Energy 50 nJ/bit
Receiver Energy 50 nJ/bit
Free space Energy (amplifier) 10 nJ/bit/ m^2
Multipath Energy (Amplifier) 0.0013 pJ/bit/m^4
A Energy factor between Normal nodes and super Nodes 3
B (Energy factor between normal Nodes and advance Nodes) 2
Number of rounds 5000
Message size 4000 bits
M (fraction of Advance Nodes) 0.3
X (fraction of Super Nodes) 0.3
Table: 1
27. Lifetime of Network
Observation the first nodes dies for
◦ EDEEC : after 1276 rounds
◦ LEACH : after 1008 rounds.
We can also find out that all the nodes
are alive for large time than that of
LEACH protocol.
Which defines the life-life of the
networks.
Figure: 8
28. Energy Dissipation
Observation
◦ I found that the loss of nodes energy decrease
in EDEEC protocol with the slower rate than
that of LEACH protocols.
◦ This is because of in LEACH protocol Nodes
consumes large energy to transmitting and
receiving data than in EDEEC protocol.
◦ We can observed that EDEEC is more stable
protocol than LEACH protocol.
Figure: 9
29. Data Transmission
Observation
◦ In EDEEC the data transmitting and
receiving is greater than that of
LEACH protocol.
◦ We can observed from that EDEEC
has better network monitoring
quality than the LEACH algorithms.
Figure:10
30. Conclusion
Simulation results we can conclude that the characteristics of Heterogeneous
WSNs algorithms are better than the Homogeneous WSNs in term of the first
node dies and the number of packets sent to the base station.
Heterogeneous WSNs cluster-based protocols have the better ability to manage
the clusters and their member nodes and can better balance the energy
consumption of the nodes in the whole network than Homogeneous WSNs.
31. REFERENCES
G. Han, H. Xu, T. Q. Duong, J. Jiang, and T. Hara, “Localization algorithms of wireless sensor networks: a survey”, Telecommunication Systems, vol. 52, no. 4, pp. 2419–2436,
2013. View at Publisher · View at Google Scholar · View at Scopus.
N. Javaid, T.N. Khan, A. Iqbal, A. Akhtar, M. Ishfaq, “Enhanced Developed Distributed Energy-Efficient Clustering for Heterogeneous Wireless Sensor Networks.” Published by
Elsevir B.V., on International Workshop on Body Area Networks (BASNet-2013), Procedia Computer Science 19 (2013), pp.914-919.
O. Younis and S. Fahmy, “ HEED : a Hybrid, Energy-Efficient Distributed Clustering Approach, vol. 3 no. 4, pp. 366-379, Dec. 2004.
S.Lindsey, C.S. Raghavenda, “ PEGASIS: Power efficient gathering in sensor information systems”, in: Proceedings of the IEEE Aerospace Conference, Big Sky, Montana,
march 2002
W. Heinzelman, A. Chandrakasan, H.Balakrishna, “An application specific protocol architecture for Wireless Microsensor Networks”. IEEE Transactions on wireless
communication, vol., 1 no. 4, pp. 660-670, year 2002.
T.N. Qureshi, N.Javid, M.Malik, U. Qasim, A.A. Khan, “On performance evalutation of varients of DEEC in WSNs”, Broadband, Wireless Computing, Communication and
Applications (BWCCA), 2012 seventh International Conference, vol. 1, pp. 162-169, 12-14 nov 2012.
G. Smaragdakis, I. Matta, Bestavros, “SEP: A Stable Election protocol for clustered heterogeneous wireless sensor networks”, in: second international workshop on sensor and
actor network protocols and application, year 2004.
L. Qing, Q.Zhu, M. Wang, “Design of a distributed energy efficient clustering algorithm for heterogeneous wireless sensor network”, ELSEVIER, Computer Communications 29,
pp. 2230-2237, year 2006.
Brahim Elbhir, Rachid saadane, Sanaa EL Fkihi, Driss Aboutajdine, “Developed Distributed energy-efficient clustering (DEEC) for heterogeneous wireless sensor networks”, in
5th international symposium on I/V Communications and Mobile Network (ISVC), year 2010.
Parul saini, Ajay kumar sharma, “E-DEEC Enhanced Distributed Energy Efficient Clustering Scheme for Heterogeneous WSN”, in 1st international conference on papallel,
Distributed and Grid Computing (PDGC year 2010).
Ankita joshi and Lakshmi Priya.m, “A survey of Hierarchical Routing Protocols in Wireless Sensor Network”, MES Journal of technology and Management, pp.67-71.
Editor's Notes
In WSN, sensor nodes sense data from the sensing region and pass it to the base station or sink. As information from neighbouring sensor nodes may be redundant and correlated, it is very difficult for the base station to process or compute large amount of information. In addition, sensor nodes have their own power because of redundant transmissions and power loss, lifetime of sensor nodes can decline.
2 level : There are two power level of sensor nodes in this network. Normal and advance node.
Total Node N, Nm advance node Nm where m is the fraction of advance node.
3 Level :There are three power level Normal, Advanced and Super Node
Multi-Level: The initial power of the sensor node is distributed over the close set.
m is fraction b/w node Heterogeneity.
a, b are boots energy fraction for advance and super nodes.
L= Length of message of size of message =4000 bits
Eelec = Transmission Energy
Efs = Free space Energy
Etx = Total Transmission Energy
d= distance b/w node and BS
d0 = threshold distance