SlideShare uma empresa Scribd logo
1 de 15
LEACH protocol for
WIRELESS SENSOR NETWORK
CALCUTTA INSTITUTE OF ENGINEERING AND MANAGEMENT
24/1A, CHANDI GHOSH ROAD, KOLKATA-700040
2012-2013
Presented by: RAMESH VERMA
ANIL KUMAR
PRAVIND KUMAR
C.S.E.4th Year
Overview-LowEnergyAdaptiveClusteringHierarchy
(LEACH)
 Introduction to leach protocol
 Two phases of leach
 Set-up phase/ thresold algorithm
 Set-up phase/advertisement
 Set-up to steady state phase
 Weakness in leach
 DECSA(Distance Energy Cluster Structure Algorithm )
 Initialization stage
 Stable working stage
 comparision
IntroductiontoLEACHprotocol
 Falls under hierarchical networks
 Self-organizing, adaptive clustering protocol that
uses randomization to distribute energy load evenly
 Dense network of sensor nodes grouped into
clusters.
 All nodes are assumed to be homogenous + energy
constrained.
 Base station is fixed + away from sensors.
 Cluster member elect cluster head to avoid excessive
energy consumption.
 Incorporates data aggregation.
LEACH two phases
 It has two phases
 The set-up phase and the steady- state phase
 The set-up phase where cluster heads are chosen
 The steady state phase the cluster head is maintained
where data is transmitted between nodes
Set-up phase/ Thresold
algorithm
 Cluster-heads can be chosen stochastically
(randomly based) on this algorithm:
T(n) =P/1-P*(r mod/p) if n€G
0 , otherwise
Where n is a random no. between 0 and 1 and
P is cluster head probability and G is the set of
nodes that were not cluster head in the last round.
 If n <T(n), then that node becomes a cluster
head
 The algorithm is designed so that each node
becomes a cluster-head at least once
Algorithm - Setup Phase |
Advertisement
 Each node that elected itself a cluster-head for
current round broadcasts advertisement
message to rest of nodes
 All cluster-heads transmit advertisement using
same transmit energy
 Non-cluster-head nodes must keep receivers on
during this phase to hear advertisements
 now they decide which cluster to belong to for
this round by choosing cluster-head that requires
minimum communication energy
 In case of ties, random cluster-head chosen
Algorithm - Setup to Steady
Phase
 After node picks cluster, must inform cluster-
head
 Cluster-head now knows number of members
 cluster-head then creates a TDMA schedule
telling each node when it can transmit
 allows radio components of each non-cluster-
head node to be turned off during its transmit
time, thus minimizing energy dissipated in
individual sensors
 cluster-head now has all data from the nodes in
its cluster, aggregates data & transmits to base
Weakness in LEACH
LEACH assumes that
 all nodes can communicate with each other and are able to
reach the sink (therefore, it is only suitable for small size
networks)
 all nodes have data to send and so assign a time slot for a
node even though some nodes might not have data to
transmit.
 all nearby nodes have correlated data which is not always true
 all nodes are continuously listening ( this is not realistic in a
random distribution of the sensor nodes, for example, where
cluster-heads would be located at the edge of the network),
DECSA (Distance Energy Cluster
Structure Algorithm)
 DECSA is improvement over LEACH.
 It considers both the distance and residual energy
information of nodes.
 Three level hierarchy structure of DECSA consists of
BS(Base Station), BCH(Base Station Cluster Head), CH(
ordinary Cluster head), SN(sensor nodes)
Initialization Stage
 The process of cluster head select consists of following 2
parts: election of ordinary cluster head node (CH) and election
of Base Station Cluster head (BCH)
 First round cluster head is called false-cluster-head
 All nodes compare their k(i) with the false cluster head.
 If k(i) < false cluster head’s k(i), then false cluster head
becomes CH otherwise the node.
k(i)=En(i)/do(i)
k(i)=thresold of elected CH
En(i)=residual energy of node i
do(i)=average distance of node I from all other nodes in the
network
Initialization Stage
Selection of BCH
1.TBCH of all CH is calculated and compared
with predefinedTBCH0
2. CH whoseTBCH are larger than the predefined
thresholdTBCH0 becomes the base-station cluster-
head( BCH).
TBCH(i)=(En(i)/Eo)+(En(i)/d(i))
En(i)=current residual energy of node I
Eo is the initial energy of node in the network
d(i)= distance between node I and the base station
Stable working Stage
 base station broadcasts the message to the entire
network forming a communication path.
 Common nodes (SN) in the cluster will transmit data
packet to their closest cluster-head
 luster-head will collect and fusion those data and
transmit them to the base-station cluster- head, rather
than transmit them to the base station directly
 then, base-station-cluster-head will communicate with
the base station
Comparison
 DECSA prolongs 31% of the lifetime, reduces 40% of the energy
consumption and has a better performance than the original LEACH
protocol.
 . Residual energy relationship of nodes between DECSA and LEACH
Conclusion
 DECSA considering both the distance and
residual energy of nodes
 It improved the process of cluster head
election and the process of data transmission
of network
 Reduces the adverse effect on the energy
consumption of the cluster head
 prolongs 31% of the lifetime, reduces 40% of
the energy consumption.
Bibiliography
 “Low Energy Adaptive Clustering Hierarchy with
Deterministic Cluster-Head Selection”; M.J.Handy,
M. Haas, D.Timmermann; 2002;
http://www.vs.inf.ethz.ch/publ/se/IEEE_MWCN2
002.pdf
 “Probabilistic Modeling of Leach Protocol and
Computing Sensor Energy Consumption Rate in
Sensor Networks”; Song, Dezhen; February
22,2005;
http://www.cs.tamu.edu/academics/tr/tamu-cstr-
2005-2-2

Mais conteúdo relacionado

Mais procurados

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolGaurav Chauhan
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 

Mais procurados (20)

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
QoS in WSN thesis
QoS in WSN thesisQoS in WSN thesis
QoS in WSN thesis
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 

Destaque

Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
stable election protocol
stable election protocolstable election protocol
stable election protocolapuu34
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 

Destaque (20)

Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
 
Leach
Leach Leach
Leach
 
Leach
LeachLeach
Leach
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
hwsn deec protocol
hwsn deec protocol hwsn deec protocol
hwsn deec protocol
 
stable election protocol
stable election protocolstable election protocol
stable election protocol
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Presentation hwsn
Presentation hwsnPresentation hwsn
Presentation hwsn
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
SEP in WSN
SEP in WSNSEP in WSN
SEP in WSN
 

Semelhante a Leach protocol

Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkIJERD Editor
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsnAyman Adel
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkIRJET Journal
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkIRJET Journal
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 

Semelhante a Leach protocol (20)

Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
Performance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor NetworkPerformance Analysis of Clustering Protocols for Wireless Sensor Network
Performance Analysis of Clustering Protocols for Wireless Sensor Network
 
Leach
LeachLeach
Leach
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
 
H0421043049
H0421043049H0421043049
H0421043049
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Leach protocol

  • 1. LEACH protocol for WIRELESS SENSOR NETWORK CALCUTTA INSTITUTE OF ENGINEERING AND MANAGEMENT 24/1A, CHANDI GHOSH ROAD, KOLKATA-700040 2012-2013 Presented by: RAMESH VERMA ANIL KUMAR PRAVIND KUMAR C.S.E.4th Year
  • 2. Overview-LowEnergyAdaptiveClusteringHierarchy (LEACH)  Introduction to leach protocol  Two phases of leach  Set-up phase/ thresold algorithm  Set-up phase/advertisement  Set-up to steady state phase  Weakness in leach  DECSA(Distance Energy Cluster Structure Algorithm )  Initialization stage  Stable working stage  comparision
  • 3. IntroductiontoLEACHprotocol  Falls under hierarchical networks  Self-organizing, adaptive clustering protocol that uses randomization to distribute energy load evenly  Dense network of sensor nodes grouped into clusters.  All nodes are assumed to be homogenous + energy constrained.  Base station is fixed + away from sensors.  Cluster member elect cluster head to avoid excessive energy consumption.  Incorporates data aggregation.
  • 4. LEACH two phases  It has two phases  The set-up phase and the steady- state phase  The set-up phase where cluster heads are chosen  The steady state phase the cluster head is maintained where data is transmitted between nodes
  • 5. Set-up phase/ Thresold algorithm  Cluster-heads can be chosen stochastically (randomly based) on this algorithm: T(n) =P/1-P*(r mod/p) if n€G 0 , otherwise Where n is a random no. between 0 and 1 and P is cluster head probability and G is the set of nodes that were not cluster head in the last round.  If n <T(n), then that node becomes a cluster head  The algorithm is designed so that each node becomes a cluster-head at least once
  • 6. Algorithm - Setup Phase | Advertisement  Each node that elected itself a cluster-head for current round broadcasts advertisement message to rest of nodes  All cluster-heads transmit advertisement using same transmit energy  Non-cluster-head nodes must keep receivers on during this phase to hear advertisements  now they decide which cluster to belong to for this round by choosing cluster-head that requires minimum communication energy  In case of ties, random cluster-head chosen
  • 7. Algorithm - Setup to Steady Phase  After node picks cluster, must inform cluster- head  Cluster-head now knows number of members  cluster-head then creates a TDMA schedule telling each node when it can transmit  allows radio components of each non-cluster- head node to be turned off during its transmit time, thus minimizing energy dissipated in individual sensors  cluster-head now has all data from the nodes in its cluster, aggregates data & transmits to base
  • 8. Weakness in LEACH LEACH assumes that  all nodes can communicate with each other and are able to reach the sink (therefore, it is only suitable for small size networks)  all nodes have data to send and so assign a time slot for a node even though some nodes might not have data to transmit.  all nearby nodes have correlated data which is not always true  all nodes are continuously listening ( this is not realistic in a random distribution of the sensor nodes, for example, where cluster-heads would be located at the edge of the network),
  • 9. DECSA (Distance Energy Cluster Structure Algorithm)  DECSA is improvement over LEACH.  It considers both the distance and residual energy information of nodes.  Three level hierarchy structure of DECSA consists of BS(Base Station), BCH(Base Station Cluster Head), CH( ordinary Cluster head), SN(sensor nodes)
  • 10. Initialization Stage  The process of cluster head select consists of following 2 parts: election of ordinary cluster head node (CH) and election of Base Station Cluster head (BCH)  First round cluster head is called false-cluster-head  All nodes compare their k(i) with the false cluster head.  If k(i) < false cluster head’s k(i), then false cluster head becomes CH otherwise the node. k(i)=En(i)/do(i) k(i)=thresold of elected CH En(i)=residual energy of node i do(i)=average distance of node I from all other nodes in the network
  • 11. Initialization Stage Selection of BCH 1.TBCH of all CH is calculated and compared with predefinedTBCH0 2. CH whoseTBCH are larger than the predefined thresholdTBCH0 becomes the base-station cluster- head( BCH). TBCH(i)=(En(i)/Eo)+(En(i)/d(i)) En(i)=current residual energy of node I Eo is the initial energy of node in the network d(i)= distance between node I and the base station
  • 12. Stable working Stage  base station broadcasts the message to the entire network forming a communication path.  Common nodes (SN) in the cluster will transmit data packet to their closest cluster-head  luster-head will collect and fusion those data and transmit them to the base-station cluster- head, rather than transmit them to the base station directly  then, base-station-cluster-head will communicate with the base station
  • 13. Comparison  DECSA prolongs 31% of the lifetime, reduces 40% of the energy consumption and has a better performance than the original LEACH protocol.  . Residual energy relationship of nodes between DECSA and LEACH
  • 14. Conclusion  DECSA considering both the distance and residual energy of nodes  It improved the process of cluster head election and the process of data transmission of network  Reduces the adverse effect on the energy consumption of the cluster head  prolongs 31% of the lifetime, reduces 40% of the energy consumption.
  • 15. Bibiliography  “Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection”; M.J.Handy, M. Haas, D.Timmermann; 2002; http://www.vs.inf.ethz.ch/publ/se/IEEE_MWCN2 002.pdf  “Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks”; Song, Dezhen; February 22,2005; http://www.cs.tamu.edu/academics/tr/tamu-cstr- 2005-2-2