SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Clustering protocol in WSN
Jimit Rupani
Nirma University
14mcen18@nirmauni.ac.in
April 9, 2015
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 1 / 12
Introduction
A Wireless Sensor Network (WSN) of spatially distributed
autonomous sensors to monitor physical or environmental conditions,
such as temperature, sound, pressure,humidity,wind direction and
speed,vibration intensity,power-line voltage, etc. and to cooperatively
pass their data through the network to a main location.
Provide a bridge between the real physical and virtual worlds
Allow the ability to observe the previously unobservable at a fine
resolution over large spatio-temporal scales
Applications in Disaster,Surveillance,Agriculture,etc
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 2 / 12
Communication In Wireless Sensor Network
There are mainly three types of communication in WSN
Direct Communication
Node-BS
Multi-Hop Communication
Node-Node-BS
Communication Using clustering
Node-CH-BS
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 3 / 12
Types of Clustering Issues WSN
Selection of Cluster head in WSN
Communication in Wireless Sensor Networks
Algorithm complexity of clustering protocols in WSN
Nodes and CH mobility In WSN
For maximizing network lifetime in WSN
Hardware And Operating System of CH For WSN
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 4 / 12
Different Types of Clustering Protocol in WSN
HEED: A hybrid energy efficient distributed clustering approach for
ad-hoc sensor networks
Design of a distributed energy-efficient clustering algorithm for
heterogeneous wireless sensor networks
MOCA, A randomized, distributed Multi-hop Overlapping Clustering
Algorithm
LEACH-Energy efficient communication protocol for WSN
EEHC: Energy efficient heterogeneous clustered scheme for WSN
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 5 / 12
Leach-Low-Energy Adaptive Clustering Hierarchy
LEACH was proposed by Heinzelman,Chandrakasan,Balakrishnan At
MIT.Which one of the pioneering clustering routing approaches for
WSNS.
In the literature, various modifications have been made to the LEACH
protocol, which form LEACH family, such as A-LEACH,E-LEACH,
S-LEACH,LEACH-C,LEACH-B,LEACH-B,L-LEACH,T-LEACH
The LEACH network has two phases:
Set-up Phase:
Where cluster-heads are chosen
Steady Phase:
The cluster-head is maintained
When data is transmitted between nodes
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 6 / 12
Figure: TDMA slot in LEACH
Figure: LEACH protocol
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 7 / 12
Properties of LEACH
Cluster based
Random cluster head selection each round with the probability.
T(n) =
P
1 − p ∗ (rmod(1/p))
, ifn G (1)
T(n) = 0, Otherwise (2)
Data aggregation at cluster head
Cluster head communicate directly with sink
Inter Cluster TDMA and Intra Cluster CDMA
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 7 / 12
Advantages and Disadvantages of LEACH
Advantages
Any node that served as a CH in certain round cannot be selected as
the CH again
Because of TDMA schedule it prevents CHs from unnecessary collisions
Data aggregation at cluster head
Cluster head communicate directly with sink
Disadvantages
Not applicable to large-region networks
No real load balancing because CHs are elected in terms of probabilities
without energy considerations
dynamic clustering brings extra overhead
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 8 / 12
Issues in LEACH
It Not works good in heterogeneous environment.
The cluster heads are elected randomly, so the optimal number and
distribution of cluster heads cannot be ensured.
The CH is assumed to have a long communication range so that the
data can reach the BS from the CH directly. This isn’t always a
realistic assumption.
It’s not consider mobility in the network.
We assumed that must have to send data in it’s TDMA slot.
It’s not good for large networks.
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 9 / 12
Proposed Solution
First of all we will set the wireless network topology to form wireless
sensor network
After initializing the sensor network, we configure the number of
sensor nodes that can join cluster of wireless sensor network.
We can consider energy levels to elect the CH .
We configure the traffic load for the entire wireless sensor network.
We can limit the no. of node who can elect as a CH.
We can implement hierarchical clustering.
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 10 / 12
Reverences
A survey on clustering algorithms for wireless sensor networks,Ameer
Ahmed Abbasi, Mohamed Younis,elsevier,2007
Improvement in LEACH Protocol for Large-scale Wireless Sensor
Networks,IEEE,2011
An Energy Efficient Extended LEACH (EEE LEACH),IEEE,2012
Design of a distributed energy-efficient clustering algorithm for
heterogeneous wireless sensor networks,elsevier,2006
Clustering for Improving Network Performance in Wireless Sensor
Networks,IEEE,2008
An Extend Vice-Cluster Selection Approach To Improve V-LEACH
Protocol In WSN,IEEE,2013
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 11 / 12
Thank You
Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 12 / 12

Contenu connexe

Tendances

Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)mabualsh
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsnSamruddhi Gaikwad
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Vinish Alikkal
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 

Tendances (20)

Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)Machine Learning (ML) in Wireless Sensor Networks (WSNs)
Machine Learning (ML) in Wireless Sensor Networks (WSNs)
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsn
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Routing
RoutingRouting
Routing
 
Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)Mobile ad hoc networks (manet)
Mobile ad hoc networks (manet)
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Leach
LeachLeach
Leach
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 

Similaire à clustering protocol in WSN:LEACH

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksLeila_maleke
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similaire à clustering protocol in WSN:LEACH (20)

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
B05630814
B05630814B05630814
B05630814
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
550 537-546
550 537-546550 537-546
550 537-546
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
A04560105
A04560105A04560105
A04560105
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
B0781013215
B0781013215B0781013215
B0781013215
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Transmission efficient ppt
Transmission efficient pptTransmission efficient ppt
Transmission efficient ppt
 
D031202018023
D031202018023D031202018023
D031202018023
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Dernier

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Dernier (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

clustering protocol in WSN:LEACH

  • 1. Clustering protocol in WSN Jimit Rupani Nirma University 14mcen18@nirmauni.ac.in April 9, 2015 Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 1 / 12
  • 2. Introduction A Wireless Sensor Network (WSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure,humidity,wind direction and speed,vibration intensity,power-line voltage, etc. and to cooperatively pass their data through the network to a main location. Provide a bridge between the real physical and virtual worlds Allow the ability to observe the previously unobservable at a fine resolution over large spatio-temporal scales Applications in Disaster,Surveillance,Agriculture,etc Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 2 / 12
  • 3. Communication In Wireless Sensor Network There are mainly three types of communication in WSN Direct Communication Node-BS Multi-Hop Communication Node-Node-BS Communication Using clustering Node-CH-BS Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 3 / 12
  • 4. Types of Clustering Issues WSN Selection of Cluster head in WSN Communication in Wireless Sensor Networks Algorithm complexity of clustering protocols in WSN Nodes and CH mobility In WSN For maximizing network lifetime in WSN Hardware And Operating System of CH For WSN Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 4 / 12
  • 5. Different Types of Clustering Protocol in WSN HEED: A hybrid energy efficient distributed clustering approach for ad-hoc sensor networks Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks MOCA, A randomized, distributed Multi-hop Overlapping Clustering Algorithm LEACH-Energy efficient communication protocol for WSN EEHC: Energy efficient heterogeneous clustered scheme for WSN Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 5 / 12
  • 6. Leach-Low-Energy Adaptive Clustering Hierarchy LEACH was proposed by Heinzelman,Chandrakasan,Balakrishnan At MIT.Which one of the pioneering clustering routing approaches for WSNS. In the literature, various modifications have been made to the LEACH protocol, which form LEACH family, such as A-LEACH,E-LEACH, S-LEACH,LEACH-C,LEACH-B,LEACH-B,L-LEACH,T-LEACH The LEACH network has two phases: Set-up Phase: Where cluster-heads are chosen Steady Phase: The cluster-head is maintained When data is transmitted between nodes Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 6 / 12
  • 7. Figure: TDMA slot in LEACH Figure: LEACH protocol Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 7 / 12
  • 8. Properties of LEACH Cluster based Random cluster head selection each round with the probability. T(n) = P 1 − p ∗ (rmod(1/p)) , ifn G (1) T(n) = 0, Otherwise (2) Data aggregation at cluster head Cluster head communicate directly with sink Inter Cluster TDMA and Intra Cluster CDMA Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 7 / 12
  • 9. Advantages and Disadvantages of LEACH Advantages Any node that served as a CH in certain round cannot be selected as the CH again Because of TDMA schedule it prevents CHs from unnecessary collisions Data aggregation at cluster head Cluster head communicate directly with sink Disadvantages Not applicable to large-region networks No real load balancing because CHs are elected in terms of probabilities without energy considerations dynamic clustering brings extra overhead Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 8 / 12
  • 10. Issues in LEACH It Not works good in heterogeneous environment. The cluster heads are elected randomly, so the optimal number and distribution of cluster heads cannot be ensured. The CH is assumed to have a long communication range so that the data can reach the BS from the CH directly. This isn’t always a realistic assumption. It’s not consider mobility in the network. We assumed that must have to send data in it’s TDMA slot. It’s not good for large networks. Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 9 / 12
  • 11. Proposed Solution First of all we will set the wireless network topology to form wireless sensor network After initializing the sensor network, we configure the number of sensor nodes that can join cluster of wireless sensor network. We can consider energy levels to elect the CH . We configure the traffic load for the entire wireless sensor network. We can limit the no. of node who can elect as a CH. We can implement hierarchical clustering. Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 10 / 12
  • 12. Reverences A survey on clustering algorithms for wireless sensor networks,Ameer Ahmed Abbasi, Mohamed Younis,elsevier,2007 Improvement in LEACH Protocol for Large-scale Wireless Sensor Networks,IEEE,2011 An Energy Efficient Extended LEACH (EEE LEACH),IEEE,2012 Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks,elsevier,2006 Clustering for Improving Network Performance in Wireless Sensor Networks,IEEE,2008 An Extend Vice-Cluster Selection Approach To Improve V-LEACH Protocol In WSN,IEEE,2013 Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 11 / 12
  • 13. Thank You Jimit Rupani (ITNU) Clustering protocol in WSN April 9, 2015 12 / 12