SlideShare une entreprise Scribd logo
1  sur  24
Pushpita Biswas (10EC65R10)

                Guided by – Prof. R. Datta




Department of Electronics and Electrical Communication
                      Engineering
       Indian Institute of Technology Kharagpur
1/18/2012                                                1
Contents

             Introduction

             Motivation

             Literature Survey

             Improved protocol technique (Work Done)

             Results and future work



1/18/2012                                               2
Introduction
  Why Wireless Sensor Networks?


 According to MIT’S Technology review, this technology is one of the ten new technologies

 which will change the world and manner of work.

  A sensor network is composed of a large number of sensor nodes that are

 randomly, densely deployed either inside the phenomenon or very close to it. This also means

 that sensor network protocols and algorithms must possess self-organizing capabilities.

  The battery is an important component of the sensor so focus is on innovative energy-

 optimized solutions at all levels of the system hierarchy, from the physical layer and

 communication protocols up to the application layer and efficient DSP design for microsensor

 nodes.


1/18/2012                                                                                       3
MOTIVATION

 Only 2.12% of the research work done in energy-optimization techniques for wireless
sensor networks is related to the network layer routing protocols.

 The existing protocols have certain disadvantages that can be improved upon.




OBJECTIVE

Propose a modification of the existing protocol or a new routing protocol that would
extend the life time of the sensor network.

  1/18/2012                                                                             4
These are a few types of routing protocols :
  Data-centric protocols

  Hierarchical protocols

  Location-based protocols

  Network flow and QoS-aware protocols




1/18/2012                                       5
Literature Survey – contd..


     Why hierarchical protocols are preferred?
 Scalability is one of the major design attributes of sensor networks.

 Single gateway or one-hop architecture is not scalable for a large set of sensors covering a wider
    area.

 Hierarchical routing efficiently involve proper energy consumption, data aggregation and fusion.

    Why LEACH (Low-energy Adaptive clustering Hierarchy) is the most basic important hierarchical
    protocol?

 LEACH [1] has been an inspiration for many hierarchical routing protocols. Provides a factor of 7
    reduction in energy dissipation compared to direct communication

 Energy consumption should be uniform so cluster formation must be dynamic as in LEACH.

 PEGASIS [2] outperforms LEACH by 100 to 300% in terms

    of lifetime but introduces excessive delay for distant

    node on chain and the single leader becomes a bottle neck.



    1/18/2012                                                                                         6
Literature Survey - Overview of Leach Protocol

                                                 Cluster head selection
       Stages in LEACH Protocol
                                                 Advertisement phase

                            Cluster Set-up
                                                 Cluster formation


       LEACH                                     Schedule creation


                                                 Data communication to CH
                            Steady-state
                                                 Data fusion
   Timeline of Leach Protocol
                                                 Data communication to BS
     Setup            Steady-state




                 Round                                                      7
Cluster head selection
                          Base
                         Station




                                   8
Literature Survey - Overview of Leach Protocol

    Cluster head selection

 Algorithm : ran(n) is a randomly generated value for each
  node n :




 If ran(n) < T(n), then that node becomes a cluster-head
 Analytical and mathematical proof yield that .01<p<0.06 is
  the optimal value for desired probability of cluster heads


                                                               9
Advertisement phase
                       Base
                      Station




 ADV




                                10
Cluster formation    Base
                    Station




                              11
Schedule creation    Base
                    Station




                              12
Data Transmission    Base
                    Station




                              13
Literature Survey - Overview of Leach Protocol


                                     Cluster heads get selected in a distributed manner.
                   Cluster head
                     selection
                                     Self-elected cluster-head for the broadcasts an advertisement
                  Advertisement      message(ADV) using CSMA MAC protocol.
Cluster Set-up       phase
    phase
                      Cluster        Non-cluster-head nodes send a Join(REQ) message to the
                     formation       corresponding cluster-head using CSMA MAC.


                     Schedule        The cluster head creates a TDMA schedule telling each node
                     creation        when it can transmit.


                       Data           Data send by node is only during their allocated transmission
                  transmission to     time to the cluster head.
                   cluster heads

Steady state                          Cluster head aggregates the data received from nodes in the
   phase           Data fusion        cluster.
                                      Communication within clusters is via direct-sequence spread
                 Multiple clusters    spectrum (DSSS), but from the cluster head nodes to the BS
                 to base station      using a fixed spreading code and CSMA.              14
Literature Survey – contd..



  Problems in Traditional LEACH
 • Cluster Head selection is
     random, that does not take into
     account energy consumption
 • CHs can be located at the edges of
     the given area
 • Setup time increases compared to
     direct communication
 • Does not support movement of
     nodes


  1/18/2012                             15
Literature Survey – contd..
Modified-Leach [3]
The threshold function is changed to T(n)=        p          * En_residual
                                               1-p[r mod(1/p)] En_initial
Advantages :
Residual energy of nodes taken into consideration
Tremendous advantage when base-station is far away from sensing area

Disadvantages :
 Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the
network


Two-Layer Leach (TL-LEACH) [5]
The cluster heads themselves form another layer of nodes which in themselves group to form
clusters.
Advantages :
Increase of 30% of the lifetime compared to LEACH once the first node has dies
Disadvantages :
Inferior performances in the initial phase of work
 Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the
network                                                                                       16
Two Picture Page Layout
  Work Done Till Now
 Change in cluster head selection is introduced

 Each node is having a special added threshold value Th(n)

 Residual energy is also considered

 If a perfect cluster is found, a similar type of cluster can be formed in future

  rounds.

 Repetition of perfect clusters should be limited to a fixed number of times.

 Adding of extra threshold value signifies higher probability of the node

  becoming a Cluster Head in future rounds
                                                                              17
Work Done
Algorithm to find perfect cluster and change T(n) :

Step 1 : After cluster formation, farthest node in north, south, east, west
direction from CH is found.
Step 2 : The corresponding distances are calculated –> n, s, e, w
Step 3 : The calculated values must have very less difference
     (for a M*M network diff <         M          ) else continue with steady state
                                       ̄( ∏ * p* N)
Step 4 : Change individual added threshold Th(n) for all nodes in this cluster
         Th(n) = exp(-2 * dist) /avg            dist -> distance of node from CH
                                                avg -> n + s + e + w
                                                              4


                                                                               18
Work Done
Algorithm to find perfect cluster and change Th(n) :

Step 5: If r mod (1/p) = 0 clear all Th(n) ,so that nodes at the center of d perfect cluster do

not get exhausted.

Step 6: Random value generated for each node n be ran(n) and If ran(n) < T(n) then node

n is a cluster head




                                                                                        19
Simulation Conditions
       Base     •   All nodes in network are homogenous and energy-constrained
      Station
                •   100 nodes randomly placed and Each packet is of 2000 bits
(25,150)
                •   After data aggregation 5% compaction is done to the packet size
                    that is transmitted to base station.

                                   •   First order Radio Model is followed for all energy
                       (100,100)       reduction.
                                       Eelec = 50 nJ/bit for transmitter or receiver circuitry
                                             €amp = 100 pJ/bit/m2 transmitter amplifier

                                                           Transmitting:-
                                                 ETx(k,d) = ETx-elec(k) + ETx-amp(k,d)
                                                  ETx(k,d) = Eelec*k + €amp*k*d2

                                                            Receiving:-
                                                        ERx(k,d) = ERx-elec(k)
                                                         ERx(k,d) = Eelec*k
  (0,0)
                                   •   Optimal probability is found to be 0.05 and therefore
                                       used                                             20
Simulation results                             Routing protocols     0.25      0.50     1.00
                                                                      J/node    J/node   J/node
1. 50 different random                           Direct                   155    107      217
   allocations of the 100 sensor                 communication
   nodes in the 100*100 m area
                                                 Leach                    312    883     1548
   is simulated.
2. All readings correspond to the                Modification             462    975     1998
   round in which first node dies.

                                 Comparison Chart
             2500

             2000

             1500                                                Direct
                                                                 LEACH
             1000
                                                                 Modification done
             500

               0
                    0.25J/node   0.50 J/node   1.00 J/node
 1/18/2012                                                                                        21
Future Work

 Formulation of the mathematical base to find a perfect cluster.

 Design of a better protocol having negative JOIN(REQ) packet send to

    undesired Cluster heads to demolish them.

 Implementation of LEACH protocol on Heterogeneous types of nodes.

 Design of a routing protocol for specific application of

    wireless sensor networks.

Specifically for bridges having a super structure and a sub structure on a
rough terrain. (LEACH is designed on a plane)

1/18/2012                                                              22
References

1.   Heinzelman.W.B., Chandrakasan.A.P., Balakrishnan.H “An application-specific protocol architecture
     for wireless microsensor networks” IEEE transactions on Wireless Communication, Vol. 1, Issue.
     4, 2002, pp 660-670
2.   Lindsey. S, Raghavendra.C, Sivalingam.K.M “Data gathering algorithms in sensor networks using
     energy metrics” IEEE transactions on Parallel and Distributed Systems, Vol.
     13, Issue.9, 2003,        pp 924-935
3.   Yuhua Liu, Yongfeng Zhao, Jingju Gao, “A New Clustering mechanism based on LEACH Protocol”, 2009
     International Joint Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718
4.   S. Bandyopadhyay, E.J. Coyle, “An Energy-Efficient Hierarchical Clustering Algorithm for Wireless
     Sensor Networks” , Twenty-Second Annual Joint Conference of the IEEE Computer and
     Communications Societies, in IEEE INFOCOM:1713- 1723 vol.3, 2003.
5.   V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive
     clustering hierarchy (TL-LEACH)”, Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813



 1/18/2012                                                                                            23
Thank you!

Contenu connexe

Tendances

DBSCAN : A Clustering Algorithm
DBSCAN : A Clustering AlgorithmDBSCAN : A Clustering Algorithm
DBSCAN : A Clustering AlgorithmPınar Yahşi
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methodsKrish_ver2
 
NLP - Sentiment Analysis
NLP - Sentiment AnalysisNLP - Sentiment Analysis
NLP - Sentiment AnalysisRupak Roy
 
Lecture: Question Answering
Lecture: Question AnsweringLecture: Question Answering
Lecture: Question AnsweringMarina Santini
 
Web mining (structure mining)
Web mining (structure mining)Web mining (structure mining)
Web mining (structure mining)Amir Fahmideh
 
Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)Anmol Dwivedi
 
1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...
1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...
1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...PyData
 
Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...
Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...
Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...Mohammed Bennamoun
 
Lzw compression ppt
Lzw compression pptLzw compression ppt
Lzw compression pptRabia Nazir
 
CNN Attention Networks
CNN Attention NetworksCNN Attention Networks
CNN Attention NetworksTaeoh Kim
 
Neural Architectures for Named Entity Recognition
Neural Architectures for Named Entity RecognitionNeural Architectures for Named Entity Recognition
Neural Architectures for Named Entity RecognitionRrubaa Panchendrarajan
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithmsAlireza Andalib
 
Introduction to Neural Networks
Introduction to Neural NetworksIntroduction to Neural Networks
Introduction to Neural NetworksDatabricks
 
Data Mining Techniques
Data Mining TechniquesData Mining Techniques
Data Mining TechniquesHouw Liong The
 
Introduction to CNN
Introduction to CNNIntroduction to CNN
Introduction to CNNShuai Zhang
 

Tendances (20)

DBSCAN : A Clustering Algorithm
DBSCAN : A Clustering AlgorithmDBSCAN : A Clustering Algorithm
DBSCAN : A Clustering Algorithm
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methods
 
Human Action Recognition
Human Action RecognitionHuman Action Recognition
Human Action Recognition
 
LSTM Basics
LSTM BasicsLSTM Basics
LSTM Basics
 
NLP - Sentiment Analysis
NLP - Sentiment AnalysisNLP - Sentiment Analysis
NLP - Sentiment Analysis
 
Lecture: Question Answering
Lecture: Question AnsweringLecture: Question Answering
Lecture: Question Answering
 
Web mining (structure mining)
Web mining (structure mining)Web mining (structure mining)
Web mining (structure mining)
 
Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)Linear Discriminant Analysis (LDA)
Linear Discriminant Analysis (LDA)
 
1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...
1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...
1D Convolutional Neural Networks for Time Series Modeling - Nathan Janos, Jef...
 
Deep Learning for Computer Vision: Object Detection (UPC 2016)
Deep Learning for Computer Vision: Object Detection (UPC 2016)Deep Learning for Computer Vision: Object Detection (UPC 2016)
Deep Learning for Computer Vision: Object Detection (UPC 2016)
 
Three classes of deep learning networks
Three classes of deep learning networksThree classes of deep learning networks
Three classes of deep learning networks
 
Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...
Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...
Artificial Neural Network Lecture 6- Associative Memories & Discrete Hopfield...
 
Link Analysis
Link AnalysisLink Analysis
Link Analysis
 
Lzw compression ppt
Lzw compression pptLzw compression ppt
Lzw compression ppt
 
CNN Attention Networks
CNN Attention NetworksCNN Attention Networks
CNN Attention Networks
 
Neural Architectures for Named Entity Recognition
Neural Architectures for Named Entity RecognitionNeural Architectures for Named Entity Recognition
Neural Architectures for Named Entity Recognition
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithms
 
Introduction to Neural Networks
Introduction to Neural NetworksIntroduction to Neural Networks
Introduction to Neural Networks
 
Data Mining Techniques
Data Mining TechniquesData Mining Techniques
Data Mining Techniques
 
Introduction to CNN
Introduction to CNNIntroduction to CNN
Introduction to CNN
 

En vedette

Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...kknsastry
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingEnhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingAM Publications,India
 
Sbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumarSbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumarAmitocc1996
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...Al Imran, CISA
 
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)अनिकेत चौधरी
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018IGEEKS TECHNOLOGIES
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSCSCJournals
 
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueHyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueCSCJournals
 
convergencia tecnologica
convergencia tecnologicaconvergencia tecnologica
convergencia tecnologicacarovel04
 

En vedette (20)

Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingEnhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
 
Sbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumarSbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumar
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
 
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Braingate system
Braingate systemBraingate system
Braingate system
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueHyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
 
convergencia tecnologica
convergencia tecnologicaconvergencia tecnologica
convergencia tecnologica
 

Similaire à Energy efficient communication techniques for wireless micro sensor networks

An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsnAyman Adel
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 

Similaire à Energy efficient communication techniques for wireless micro sensor networks (20)

An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
C04501027035
C04501027035C04501027035
C04501027035
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Energy efficient communication techniques for wireless micro sensor networks

  • 1. Pushpita Biswas (10EC65R10) Guided by – Prof. R. Datta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur 1/18/2012 1
  • 2. Contents  Introduction  Motivation  Literature Survey  Improved protocol technique (Work Done)  Results and future work 1/18/2012 2
  • 3. Introduction  Why Wireless Sensor Networks? According to MIT’S Technology review, this technology is one of the ten new technologies which will change the world and manner of work.  A sensor network is composed of a large number of sensor nodes that are randomly, densely deployed either inside the phenomenon or very close to it. This also means that sensor network protocols and algorithms must possess self-organizing capabilities.  The battery is an important component of the sensor so focus is on innovative energy- optimized solutions at all levels of the system hierarchy, from the physical layer and communication protocols up to the application layer and efficient DSP design for microsensor nodes. 1/18/2012 3
  • 4. MOTIVATION  Only 2.12% of the research work done in energy-optimization techniques for wireless sensor networks is related to the network layer routing protocols.  The existing protocols have certain disadvantages that can be improved upon. OBJECTIVE Propose a modification of the existing protocol or a new routing protocol that would extend the life time of the sensor network. 1/18/2012 4
  • 5. These are a few types of routing protocols :  Data-centric protocols  Hierarchical protocols  Location-based protocols  Network flow and QoS-aware protocols 1/18/2012 5
  • 6. Literature Survey – contd.. Why hierarchical protocols are preferred?  Scalability is one of the major design attributes of sensor networks.  Single gateway or one-hop architecture is not scalable for a large set of sensors covering a wider area.  Hierarchical routing efficiently involve proper energy consumption, data aggregation and fusion. Why LEACH (Low-energy Adaptive clustering Hierarchy) is the most basic important hierarchical protocol?  LEACH [1] has been an inspiration for many hierarchical routing protocols. Provides a factor of 7 reduction in energy dissipation compared to direct communication  Energy consumption should be uniform so cluster formation must be dynamic as in LEACH.  PEGASIS [2] outperforms LEACH by 100 to 300% in terms of lifetime but introduces excessive delay for distant node on chain and the single leader becomes a bottle neck. 1/18/2012 6
  • 7. Literature Survey - Overview of Leach Protocol Cluster head selection  Stages in LEACH Protocol Advertisement phase Cluster Set-up Cluster formation LEACH Schedule creation Data communication to CH Steady-state Data fusion  Timeline of Leach Protocol Data communication to BS Setup Steady-state Round 7
  • 8. Cluster head selection Base Station 8
  • 9. Literature Survey - Overview of Leach Protocol Cluster head selection  Algorithm : ran(n) is a randomly generated value for each node n :  If ran(n) < T(n), then that node becomes a cluster-head  Analytical and mathematical proof yield that .01<p<0.06 is the optimal value for desired probability of cluster heads 9
  • 10. Advertisement phase Base Station ADV 10
  • 11. Cluster formation Base Station 11
  • 12. Schedule creation Base Station 12
  • 13. Data Transmission Base Station 13
  • 14. Literature Survey - Overview of Leach Protocol Cluster heads get selected in a distributed manner. Cluster head selection Self-elected cluster-head for the broadcasts an advertisement Advertisement message(ADV) using CSMA MAC protocol. Cluster Set-up phase phase Cluster Non-cluster-head nodes send a Join(REQ) message to the formation corresponding cluster-head using CSMA MAC. Schedule The cluster head creates a TDMA schedule telling each node creation when it can transmit. Data Data send by node is only during their allocated transmission transmission to time to the cluster head. cluster heads Steady state Cluster head aggregates the data received from nodes in the phase Data fusion cluster. Communication within clusters is via direct-sequence spread Multiple clusters spectrum (DSSS), but from the cluster head nodes to the BS to base station using a fixed spreading code and CSMA. 14
  • 15. Literature Survey – contd.. Problems in Traditional LEACH • Cluster Head selection is random, that does not take into account energy consumption • CHs can be located at the edges of the given area • Setup time increases compared to direct communication • Does not support movement of nodes 1/18/2012 15
  • 16. Literature Survey – contd.. Modified-Leach [3] The threshold function is changed to T(n)= p * En_residual 1-p[r mod(1/p)] En_initial Advantages : Residual energy of nodes taken into consideration Tremendous advantage when base-station is far away from sensing area Disadvantages :  Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the network Two-Layer Leach (TL-LEACH) [5] The cluster heads themselves form another layer of nodes which in themselves group to form clusters. Advantages : Increase of 30% of the lifetime compared to LEACH once the first node has dies Disadvantages : Inferior performances in the initial phase of work  Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the network 16
  • 17. Two Picture Page Layout Work Done Till Now  Change in cluster head selection is introduced  Each node is having a special added threshold value Th(n)  Residual energy is also considered  If a perfect cluster is found, a similar type of cluster can be formed in future rounds.  Repetition of perfect clusters should be limited to a fixed number of times.  Adding of extra threshold value signifies higher probability of the node becoming a Cluster Head in future rounds 17
  • 18. Work Done Algorithm to find perfect cluster and change T(n) : Step 1 : After cluster formation, farthest node in north, south, east, west direction from CH is found. Step 2 : The corresponding distances are calculated –> n, s, e, w Step 3 : The calculated values must have very less difference (for a M*M network diff < M ) else continue with steady state ̄( ∏ * p* N) Step 4 : Change individual added threshold Th(n) for all nodes in this cluster Th(n) = exp(-2 * dist) /avg dist -> distance of node from CH avg -> n + s + e + w 4 18
  • 19. Work Done Algorithm to find perfect cluster and change Th(n) : Step 5: If r mod (1/p) = 0 clear all Th(n) ,so that nodes at the center of d perfect cluster do not get exhausted. Step 6: Random value generated for each node n be ran(n) and If ran(n) < T(n) then node n is a cluster head 19
  • 20. Simulation Conditions Base • All nodes in network are homogenous and energy-constrained Station • 100 nodes randomly placed and Each packet is of 2000 bits (25,150) • After data aggregation 5% compaction is done to the packet size that is transmitted to base station. • First order Radio Model is followed for all energy (100,100) reduction. Eelec = 50 nJ/bit for transmitter or receiver circuitry €amp = 100 pJ/bit/m2 transmitter amplifier Transmitting:- ETx(k,d) = ETx-elec(k) + ETx-amp(k,d) ETx(k,d) = Eelec*k + €amp*k*d2 Receiving:- ERx(k,d) = ERx-elec(k) ERx(k,d) = Eelec*k (0,0) • Optimal probability is found to be 0.05 and therefore used 20
  • 21. Simulation results Routing protocols 0.25 0.50 1.00 J/node J/node J/node 1. 50 different random Direct 155 107 217 allocations of the 100 sensor communication nodes in the 100*100 m area Leach 312 883 1548 is simulated. 2. All readings correspond to the Modification 462 975 1998 round in which first node dies. Comparison Chart 2500 2000 1500 Direct LEACH 1000 Modification done 500 0 0.25J/node 0.50 J/node 1.00 J/node 1/18/2012 21
  • 22. Future Work  Formulation of the mathematical base to find a perfect cluster.  Design of a better protocol having negative JOIN(REQ) packet send to undesired Cluster heads to demolish them.  Implementation of LEACH protocol on Heterogeneous types of nodes.  Design of a routing protocol for specific application of wireless sensor networks. Specifically for bridges having a super structure and a sub structure on a rough terrain. (LEACH is designed on a plane) 1/18/2012 22
  • 23. References 1. Heinzelman.W.B., Chandrakasan.A.P., Balakrishnan.H “An application-specific protocol architecture for wireless microsensor networks” IEEE transactions on Wireless Communication, Vol. 1, Issue. 4, 2002, pp 660-670 2. Lindsey. S, Raghavendra.C, Sivalingam.K.M “Data gathering algorithms in sensor networks using energy metrics” IEEE transactions on Parallel and Distributed Systems, Vol. 13, Issue.9, 2003, pp 924-935 3. Yuhua Liu, Yongfeng Zhao, Jingju Gao, “A New Clustering mechanism based on LEACH Protocol”, 2009 International Joint Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718 4. S. Bandyopadhyay, E.J. Coyle, “An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks” , Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, in IEEE INFOCOM:1713- 1723 vol.3, 2003. 5. V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive clustering hierarchy (TL-LEACH)”, Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813 1/18/2012 23