LEACH Protocol

14
Mid-Project Presentation (LEACH Protocol implementation) SAURABH GOEL 111438

description

clustering in wsn

Transcript of LEACH Protocol

Page 1: LEACH Protocol

Mid-Project Presentation(LEACH Protocol implementation)

SAURABH GOEL111438

Page 2: LEACH Protocol

Index

• Introduction to WSN• Applications• Challenges• LEACH in brief• Pros and Cons• Future Work

Page 3: LEACH Protocol

Introduction to WSN

A WSN consists of anywhere from a few hundreds to thousands of sensor nodes.

The sensor node equipment includes a• radio transceiver • along with an antenna,• a microcontroller,• an interfacing electronic circuit,• and an energy source, usually a battery.

Page 4: LEACH Protocol

Applications of Wireless Sensor networks

The applications can be divided in three categories:

1. Monitoring of objects.2. Monitoring of an area.3. Monitoring of both area and objects.

Page 5: LEACH Protocol

Examples

• Monitoring Area1. Environmental and Habitat Monitoring2. Military Surveillance• Monitoring Objects1. Structural Monitoring2. Urban terrain mapping• Monitoring Interactions between Objects and Space1. Wildlife Habitats2. Disaster Management

Page 6: LEACH Protocol

Characteristics of Wireless Sensor Networks

• Wireless Sensor Networks mainly consists of sensors. Sensors are -low powerlimited memoryenergy constrained due to their small size.

• Wireless networks can also be deployed in extreme environmental conditions and may be prone to enemy attacks.

• Although deployed in an ad hoc manner they need to be self organized and self healing and can face constant reconfiguration

Page 7: LEACH Protocol

Design Challenges

• HeterogeneityThe devices deployed maybe of various types and

need to collaborate with each other.• Distributed Processing

The algorithms need to be centralized as the processing is carried out on different nodes.

• Low Bandwidth CommunicationThe data should be transferred efficiently

between sensors

Page 8: LEACH Protocol

Continued..

• Large Scale CoordinationThe sensors need to coordinate with each other to

produce required results.• Utilization of Sensors

The sensors should be utilized in a ways that produce the maximum performance and use less energy.

• Real Time ComputationThe computation should be done quickly as new

data is always being generated.

Page 9: LEACH Protocol

Operational Challenges of Wireless Sensor Networks

• Energy Efficiency• Limited storage and computation• Low bandwidth and high error rates• Errors are common

Wireless communicationNoisy measurementsNode failure are expected

• Scalability to a large number of sensor nodes• Survivability in harsh environments• Experiments are time- and space-intensive

Page 10: LEACH Protocol

LEACH in brief

• This is a TDMA-based MAC protocol which is integrated with clustering and a simple routing protocol in wireless sensor networks (WSNs). The goal of LEACH is to lower the energy consumption required to create and maintain clusters in order to improve the life time of a wireless sensor network.

Page 11: LEACH Protocol

LEACH in brief

Randomized rotation of cluster heads among the sensors

All non-cluster head nodes transmit data to their cluster head

CH receives this data and performs signal processing

functions on the data and transmits data to the BS

Page 12: LEACH Protocol

Pros Incorporates data fusion into routing protocols

Amount of information to base station reduced

4-8 times effective over direct communication in prolonging network lifetime

Grid like area Better energy utilization and system lifetimeLoad balancing is achievedAll nodes die at a time

Page 13: LEACH Protocol

Cons

Only single hop clusters formedMight lead to large number of clusters

No discussion on optimal CH selection

All CHs should directly transmit to the data sink

Page 14: LEACH Protocol

Future Work..

• Implementation of LEACH Protocol in JAVA.