SlideShare une entreprise Scribd logo
1  sur  24
Pushpita Biswas (10EC65R10)

                Guided by – Prof. R. Datta




Department of Electronics and Electrical Communication
                      Engineering
       Indian Institute of Technology Kharagpur
1/18/2012                                                1
Contents

             Introduction

             Motivation

             Literature Survey

             Improved protocol technique (Work Done)

             Results and future work



1/18/2012                                               2
Introduction
  Why Wireless Sensor Networks?


 According to MIT’S Technology review, this technology is one of the ten new technologies

 which will change the world and manner of work.

  A sensor network is composed of a large number of sensor nodes that are

 randomly, densely deployed either inside the phenomenon or very close to it. This also means

 that sensor network protocols and algorithms must possess self-organizing capabilities.

  The battery is an important component of the sensor so focus is on innovative energy-

 optimized solutions at all levels of the system hierarchy, from the physical layer and

 communication protocols up to the application layer and efficient DSP design for microsensor

 nodes.


1/18/2012                                                                                       3
MOTIVATION

 Only 2.12% of the research work done in energy-optimization techniques for wireless
sensor networks is related to the network layer routing protocols.

 The existing protocols have certain disadvantages that can be improved upon.




OBJECTIVE

Propose a modification of the existing protocol or a new routing protocol that would
extend the life time of the sensor network.

  1/18/2012                                                                             4
These are a few types of routing protocols :
  Data-centric protocols

  Hierarchical protocols

  Location-based protocols

  Network flow and QoS-aware protocols




1/18/2012                                       5
Literature Survey – contd..


     Why hierarchical protocols are preferred?
 Scalability is one of the major design attributes of sensor networks.

 Single gateway or one-hop architecture is not scalable for a large set of sensors covering a wider
    area.

 Hierarchical routing efficiently involve proper energy consumption, data aggregation and fusion.

    Why LEACH (Low-energy Adaptive clustering Hierarchy) is the most basic important hierarchical
    protocol?

 LEACH [1] has been an inspiration for many hierarchical routing protocols. Provides a factor of 7
    reduction in energy dissipation compared to direct communication

 Energy consumption should be uniform so cluster formation must be dynamic as in LEACH.

 PEGASIS [2] outperforms LEACH by 100 to 300% in terms

    of lifetime but introduces excessive delay for distant

    node on chain and the single leader becomes a bottle neck.



    1/18/2012                                                                                         6
Literature Survey - Overview of Leach Protocol

                                                 Cluster head selection
       Stages in LEACH Protocol
                                                 Advertisement phase

                            Cluster Set-up
                                                 Cluster formation


       LEACH                                     Schedule creation


                                                 Data communication to CH
                            Steady-state
                                                 Data fusion
   Timeline of Leach Protocol
                                                 Data communication to BS
     Setup            Steady-state




                 Round                                                      7
Cluster head selection
                          Base
                         Station




                                   8
Literature Survey - Overview of Leach Protocol

    Cluster head selection

 Algorithm : ran(n) is a randomly generated value for each
  node n :




 If ran(n) < T(n), then that node becomes a cluster-head
 Analytical and mathematical proof yield that .01<p<0.06 is
  the optimal value for desired probability of cluster heads


                                                               9
Advertisement phase
                       Base
                      Station




 ADV




                                10
Cluster formation    Base
                    Station




                              11
Schedule creation    Base
                    Station




                              12
Data Transmission    Base
                    Station




                              13
Literature Survey - Overview of Leach Protocol


                                     Cluster heads get selected in a distributed manner.
                   Cluster head
                     selection
                                     Self-elected cluster-head for the broadcasts an advertisement
                  Advertisement      message(ADV) using CSMA MAC protocol.
Cluster Set-up       phase
    phase
                      Cluster        Non-cluster-head nodes send a Join(REQ) message to the
                     formation       corresponding cluster-head using CSMA MAC.


                     Schedule        The cluster head creates a TDMA schedule telling each node
                     creation        when it can transmit.


                       Data           Data send by node is only during their allocated transmission
                  transmission to     time to the cluster head.
                   cluster heads

Steady state                          Cluster head aggregates the data received from nodes in the
   phase           Data fusion        cluster.
                                      Communication within clusters is via direct-sequence spread
                 Multiple clusters    spectrum (DSSS), but from the cluster head nodes to the BS
                 to base station      using a fixed spreading code and CSMA.              14
Literature Survey – contd..



  Problems in Traditional LEACH
 • Cluster Head selection is
     random, that does not take into
     account energy consumption
 • CHs can be located at the edges of
     the given area
 • Setup time increases compared to
     direct communication
 • Does not support movement of
     nodes


  1/18/2012                             15
Literature Survey – contd..
Modified-Leach [3]
The threshold function is changed to T(n)=        p          * En_residual
                                               1-p[r mod(1/p)] En_initial
Advantages :
Residual energy of nodes taken into consideration
Tremendous advantage when base-station is far away from sensing area

Disadvantages :
 Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the
network


Two-Layer Leach (TL-LEACH) [5]
The cluster heads themselves form another layer of nodes which in themselves group to form
clusters.
Advantages :
Increase of 30% of the lifetime compared to LEACH once the first node has dies
Disadvantages :
Inferior performances in the initial phase of work
 Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the
network                                                                                       16
Two Picture Page Layout
  Work Done Till Now
 Change in cluster head selection is introduced

 Each node is having a special added threshold value Th(n)

 Residual energy is also considered

 If a perfect cluster is found, a similar type of cluster can be formed in future

  rounds.

 Repetition of perfect clusters should be limited to a fixed number of times.

 Adding of extra threshold value signifies higher probability of the node

  becoming a Cluster Head in future rounds
                                                                              17
Work Done
Algorithm to find perfect cluster and change T(n) :

Step 1 : After cluster formation, farthest node in north, south, east, west
direction from CH is found.
Step 2 : The corresponding distances are calculated –> n, s, e, w
Step 3 : The calculated values must have very less difference
     (for a M*M network diff <         M          ) else continue with steady state
                                       ̄( ∏ * p* N)
Step 4 : Change individual added threshold Th(n) for all nodes in this cluster
         Th(n) = exp(-2 * dist) /avg            dist -> distance of node from CH
                                                avg -> n + s + e + w
                                                              4


                                                                               18
Work Done
Algorithm to find perfect cluster and change Th(n) :

Step 5: If r mod (1/p) = 0 clear all Th(n) ,so that nodes at the center of d perfect cluster do

not get exhausted.

Step 6: Random value generated for each node n be ran(n) and If ran(n) < T(n) then node

n is a cluster head




                                                                                        19
Simulation Conditions
       Base     •   All nodes in network are homogenous and energy-constrained
      Station
                •   100 nodes randomly placed and Each packet is of 2000 bits
(25,150)
                •   After data aggregation 5% compaction is done to the packet size
                    that is transmitted to base station.

                                   •   First order Radio Model is followed for all energy
                       (100,100)       reduction.
                                       Eelec = 50 nJ/bit for transmitter or receiver circuitry
                                             €amp = 100 pJ/bit/m2 transmitter amplifier

                                                           Transmitting:-
                                                 ETx(k,d) = ETx-elec(k) + ETx-amp(k,d)
                                                  ETx(k,d) = Eelec*k + €amp*k*d2

                                                            Receiving:-
                                                        ERx(k,d) = ERx-elec(k)
                                                         ERx(k,d) = Eelec*k
  (0,0)
                                   •   Optimal probability is found to be 0.05 and therefore
                                       used                                             20
Simulation results                             Routing protocols     0.25      0.50     1.00
                                                                      J/node    J/node   J/node
1. 50 different random                           Direct                   155    107      217
   allocations of the 100 sensor                 communication
   nodes in the 100*100 m area
                                                 Leach                    312    883     1548
   is simulated.
2. All readings correspond to the                Modification             462    975     1998
   round in which first node dies.

                                 Comparison Chart
             2500

             2000

             1500                                                Direct
                                                                 LEACH
             1000
                                                                 Modification done
             500

               0
                    0.25J/node   0.50 J/node   1.00 J/node
 1/18/2012                                                                                        21
Future Work

 Formulation of the mathematical base to find a perfect cluster.

 Design of a better protocol having negative JOIN(REQ) packet send to

    undesired Cluster heads to demolish them.

 Implementation of LEACH protocol on Heterogeneous types of nodes.

 Design of a routing protocol for specific application of

    wireless sensor networks.

Specifically for bridges having a super structure and a sub structure on a
rough terrain. (LEACH is designed on a plane)

1/18/2012                                                              22
References

1.   Heinzelman.W.B., Chandrakasan.A.P., Balakrishnan.H “An application-specific protocol architecture
     for wireless microsensor networks” IEEE transactions on Wireless Communication, Vol. 1, Issue.
     4, 2002, pp 660-670
2.   Lindsey. S, Raghavendra.C, Sivalingam.K.M “Data gathering algorithms in sensor networks using
     energy metrics” IEEE transactions on Parallel and Distributed Systems, Vol.
     13, Issue.9, 2003,        pp 924-935
3.   Yuhua Liu, Yongfeng Zhao, Jingju Gao, “A New Clustering mechanism based on LEACH Protocol”, 2009
     International Joint Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718
4.   S. Bandyopadhyay, E.J. Coyle, “An Energy-Efficient Hierarchical Clustering Algorithm for Wireless
     Sensor Networks” , Twenty-Second Annual Joint Conference of the IEEE Computer and
     Communications Societies, in IEEE INFOCOM:1713- 1723 vol.3, 2003.
5.   V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive
     clustering hierarchy (TL-LEACH)”, Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813



 1/18/2012                                                                                            23
Thank you!

Contenu connexe

Tendances

Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
inside-BigData.com
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 

Tendances (20)

Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Adaptive Resonance Theory
Adaptive Resonance TheoryAdaptive Resonance Theory
Adaptive Resonance Theory
 
3.3 hierarchical methods
3.3 hierarchical methods3.3 hierarchical methods
3.3 hierarchical methods
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Presentation on K-Means Clustering
Presentation on K-Means ClusteringPresentation on K-Means Clustering
Presentation on K-Means Clustering
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 

En vedette

Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueHyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
CSCJournals
 

En vedette (20)

Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
Efficient Cluster Optimization Using A Hybrid Extended Compact Genetic Algori...
 
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN  Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy BalancingEnhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing
 
Sbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumarSbit ppt format 2015 (new)by Amit kumar
Sbit ppt format 2015 (new)by Amit kumar
 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
 
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Braingate system
Braingate systemBraingate system
Braingate system
 
Final year project titles 2017 2018
Final year project titles 2017 2018Final year project titles 2017 2018
Final year project titles 2017 2018
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding TechniqueHyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
Hyperspectral Data Compression Using Spatial-Spectral Lossless Coding Technique
 
convergencia tecnologica
convergencia tecnologicaconvergencia tecnologica
convergencia tecnologica
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 

Similaire à Energy efficient communication techniques for wireless micro sensor networks

Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
Iaetsd Iaetsd
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
M H
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
Chính Cao
 

Similaire à Energy efficient communication techniques for wireless micro sensor networks (20)

An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
C04501027035
C04501027035C04501027035
C04501027035
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
MuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical RoutingMuMHR: Multi-path, Multi-hop Hierarchical Routing
MuMHR: Multi-path, Multi-hop Hierarchical Routing
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
 
B045070510
B045070510B045070510
B045070510
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Energy efficient communication techniques for wireless micro sensor networks

  • 1. Pushpita Biswas (10EC65R10) Guided by – Prof. R. Datta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur 1/18/2012 1
  • 2. Contents  Introduction  Motivation  Literature Survey  Improved protocol technique (Work Done)  Results and future work 1/18/2012 2
  • 3. Introduction  Why Wireless Sensor Networks? According to MIT’S Technology review, this technology is one of the ten new technologies which will change the world and manner of work.  A sensor network is composed of a large number of sensor nodes that are randomly, densely deployed either inside the phenomenon or very close to it. This also means that sensor network protocols and algorithms must possess self-organizing capabilities.  The battery is an important component of the sensor so focus is on innovative energy- optimized solutions at all levels of the system hierarchy, from the physical layer and communication protocols up to the application layer and efficient DSP design for microsensor nodes. 1/18/2012 3
  • 4. MOTIVATION  Only 2.12% of the research work done in energy-optimization techniques for wireless sensor networks is related to the network layer routing protocols.  The existing protocols have certain disadvantages that can be improved upon. OBJECTIVE Propose a modification of the existing protocol or a new routing protocol that would extend the life time of the sensor network. 1/18/2012 4
  • 5. These are a few types of routing protocols :  Data-centric protocols  Hierarchical protocols  Location-based protocols  Network flow and QoS-aware protocols 1/18/2012 5
  • 6. Literature Survey – contd.. Why hierarchical protocols are preferred?  Scalability is one of the major design attributes of sensor networks.  Single gateway or one-hop architecture is not scalable for a large set of sensors covering a wider area.  Hierarchical routing efficiently involve proper energy consumption, data aggregation and fusion. Why LEACH (Low-energy Adaptive clustering Hierarchy) is the most basic important hierarchical protocol?  LEACH [1] has been an inspiration for many hierarchical routing protocols. Provides a factor of 7 reduction in energy dissipation compared to direct communication  Energy consumption should be uniform so cluster formation must be dynamic as in LEACH.  PEGASIS [2] outperforms LEACH by 100 to 300% in terms of lifetime but introduces excessive delay for distant node on chain and the single leader becomes a bottle neck. 1/18/2012 6
  • 7. Literature Survey - Overview of Leach Protocol Cluster head selection  Stages in LEACH Protocol Advertisement phase Cluster Set-up Cluster formation LEACH Schedule creation Data communication to CH Steady-state Data fusion  Timeline of Leach Protocol Data communication to BS Setup Steady-state Round 7
  • 8. Cluster head selection Base Station 8
  • 9. Literature Survey - Overview of Leach Protocol Cluster head selection  Algorithm : ran(n) is a randomly generated value for each node n :  If ran(n) < T(n), then that node becomes a cluster-head  Analytical and mathematical proof yield that .01<p<0.06 is the optimal value for desired probability of cluster heads 9
  • 10. Advertisement phase Base Station ADV 10
  • 11. Cluster formation Base Station 11
  • 12. Schedule creation Base Station 12
  • 13. Data Transmission Base Station 13
  • 14. Literature Survey - Overview of Leach Protocol Cluster heads get selected in a distributed manner. Cluster head selection Self-elected cluster-head for the broadcasts an advertisement Advertisement message(ADV) using CSMA MAC protocol. Cluster Set-up phase phase Cluster Non-cluster-head nodes send a Join(REQ) message to the formation corresponding cluster-head using CSMA MAC. Schedule The cluster head creates a TDMA schedule telling each node creation when it can transmit. Data Data send by node is only during their allocated transmission transmission to time to the cluster head. cluster heads Steady state Cluster head aggregates the data received from nodes in the phase Data fusion cluster. Communication within clusters is via direct-sequence spread Multiple clusters spectrum (DSSS), but from the cluster head nodes to the BS to base station using a fixed spreading code and CSMA. 14
  • 15. Literature Survey – contd.. Problems in Traditional LEACH • Cluster Head selection is random, that does not take into account energy consumption • CHs can be located at the edges of the given area • Setup time increases compared to direct communication • Does not support movement of nodes 1/18/2012 15
  • 16. Literature Survey – contd.. Modified-Leach [3] The threshold function is changed to T(n)= p * En_residual 1-p[r mod(1/p)] En_initial Advantages : Residual energy of nodes taken into consideration Tremendous advantage when base-station is far away from sensing area Disadvantages :  Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the network Two-Layer Leach (TL-LEACH) [5] The cluster heads themselves form another layer of nodes which in themselves group to form clusters. Advantages : Increase of 30% of the lifetime compared to LEACH once the first node has dies Disadvantages : Inferior performances in the initial phase of work  Non-uniform distribution of cluster heads, thus increases the total energy dissipated in the network 16
  • 17. Two Picture Page Layout Work Done Till Now  Change in cluster head selection is introduced  Each node is having a special added threshold value Th(n)  Residual energy is also considered  If a perfect cluster is found, a similar type of cluster can be formed in future rounds.  Repetition of perfect clusters should be limited to a fixed number of times.  Adding of extra threshold value signifies higher probability of the node becoming a Cluster Head in future rounds 17
  • 18. Work Done Algorithm to find perfect cluster and change T(n) : Step 1 : After cluster formation, farthest node in north, south, east, west direction from CH is found. Step 2 : The corresponding distances are calculated –> n, s, e, w Step 3 : The calculated values must have very less difference (for a M*M network diff < M ) else continue with steady state ̄( ∏ * p* N) Step 4 : Change individual added threshold Th(n) for all nodes in this cluster Th(n) = exp(-2 * dist) /avg dist -> distance of node from CH avg -> n + s + e + w 4 18
  • 19. Work Done Algorithm to find perfect cluster and change Th(n) : Step 5: If r mod (1/p) = 0 clear all Th(n) ,so that nodes at the center of d perfect cluster do not get exhausted. Step 6: Random value generated for each node n be ran(n) and If ran(n) < T(n) then node n is a cluster head 19
  • 20. Simulation Conditions Base • All nodes in network are homogenous and energy-constrained Station • 100 nodes randomly placed and Each packet is of 2000 bits (25,150) • After data aggregation 5% compaction is done to the packet size that is transmitted to base station. • First order Radio Model is followed for all energy (100,100) reduction. Eelec = 50 nJ/bit for transmitter or receiver circuitry €amp = 100 pJ/bit/m2 transmitter amplifier Transmitting:- ETx(k,d) = ETx-elec(k) + ETx-amp(k,d) ETx(k,d) = Eelec*k + €amp*k*d2 Receiving:- ERx(k,d) = ERx-elec(k) ERx(k,d) = Eelec*k (0,0) • Optimal probability is found to be 0.05 and therefore used 20
  • 21. Simulation results Routing protocols 0.25 0.50 1.00 J/node J/node J/node 1. 50 different random Direct 155 107 217 allocations of the 100 sensor communication nodes in the 100*100 m area Leach 312 883 1548 is simulated. 2. All readings correspond to the Modification 462 975 1998 round in which first node dies. Comparison Chart 2500 2000 1500 Direct LEACH 1000 Modification done 500 0 0.25J/node 0.50 J/node 1.00 J/node 1/18/2012 21
  • 22. Future Work  Formulation of the mathematical base to find a perfect cluster.  Design of a better protocol having negative JOIN(REQ) packet send to undesired Cluster heads to demolish them.  Implementation of LEACH protocol on Heterogeneous types of nodes.  Design of a routing protocol for specific application of wireless sensor networks. Specifically for bridges having a super structure and a sub structure on a rough terrain. (LEACH is designed on a plane) 1/18/2012 22
  • 23. References 1. Heinzelman.W.B., Chandrakasan.A.P., Balakrishnan.H “An application-specific protocol architecture for wireless microsensor networks” IEEE transactions on Wireless Communication, Vol. 1, Issue. 4, 2002, pp 660-670 2. Lindsey. S, Raghavendra.C, Sivalingam.K.M “Data gathering algorithms in sensor networks using energy metrics” IEEE transactions on Parallel and Distributed Systems, Vol. 13, Issue.9, 2003, pp 924-935 3. Yuhua Liu, Yongfeng Zhao, Jingju Gao, “A New Clustering mechanism based on LEACH Protocol”, 2009 International Joint Conference on Artificial Intelligence, 2009. JCAI '09. pp 715-718 4. S. Bandyopadhyay, E.J. Coyle, “An Energy-Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks” , Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, in IEEE INFOCOM:1713- 1723 vol.3, 2003. 5. V. Loscrì, G. Morabito, S. Marano, “A two levels hierarchy for low energy adaptive clustering hierarchy (TL-LEACH)”, Vehicular Technology Conference, 2005, Vol. 3, pp 1809-1813 1/18/2012 23