SlideShare a Scribd company logo
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
DOI : 10.5121/ijngn.2016.8102 13
SIMULATION BASED ANALYSIS OF CLUSTER-BASED
PROTOCOL IN WIRELESS SENSOR NETWORK
Tarun Sharma1, Harsukhpreet Singh2, Anurag sharma3
Dept” of Computer Science & Engineering, CT Institute of Technology & Research1
Dept” of Electronics & Communication Engineering, CT Institute of Technology &
Research 2,3,Jalandhar, Punjab,India1,2,3
ABSTRACT
The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way to
systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat
monitoring, cropping monitoring, crowd including etc. The rising use of these networks is making
engineers evolve novel and efficient ideas in this field. A group of research in data routing, data density
and in network aggregation has been proposed in recent years. The energy consumption is the main
apprehension in the wireless sensor network. There are many protocols in wireless sensor network to
diminish the energy consumption and to put in to the network lifetime. Among a range of types of
techniques, clustering is the most efficient technique to diminish the energy expenditure of network. In
this effort, LEACH protocol has been second-hand for clustering in which cluster heads are nominated on
the basis of distance and energy. The LEACH protocol is been implemented in a simulated environment
and analyze their performance graphically.
KEYWORDS
Wireless sensor networks, energy efficiency, Clustering, LEACH protocol
1. INTRODUCTION
A wireless sensor network is complete up of a huge quantity of sensor nodes and a sink [2]. The
WSN is self-confident of sensor nodes from hundreds or thousands and every node is coupled to
one sensor nodes. A wireless sensor network entire up of a large number of nodes extend over a
precise area. A sensor node self-confident of the sensor, actuators, memory, a mainframe and
they do have communication aptitude. All the sensor nodes are permitted to communicate in the
course of a wireless intermediary. The wireless standard is of infrared, radio frequency that
having no wired tie friendly. So the sensor nodes are deployed in a random conduct and it make
ad-hoc network because they can discuss themselves [1]. If the node is unable to converse with
other nodes of the network through a direct link, it means the node is out of range. In such
kind of networks data broadcast from one node to another is perform via in the middle of
nodes. This idea is referred as multi- hoping. All sensors nodes work helpfully to serve the
requests [4].
1.1Energy Consumption Issues
The chief complicatedness in WSN, sensor node have classified battery life because the sensor
nodes size is small so battery size, processor, storage liberty for data, these all are small as sensor
nodes. So the main central point on lessening energy expenses in wireless sensor networks. In
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
14
WSN a package of sensed information and routing in order has to be send which after have some
time constraint so that information can be employable before any disaster occurs e.g.
manufacturing monitoring, apparatus Monitoring etc. In WSN the power authority utilization is
much better-quality data communication then internal processing. So, Energy preservation in
WSN is the need to the address [3]. The Wireless sensor is flat to node stop working due to
power hitting. In order to supply a reliable examine through a network, the network should be
celebrity adjusting and must have elastic properties as requisite from point in time to time. A
classified contact node may meet failure due to imperfect battery subsistence. In such case the
network protocol should be logical enough to such collapse to keep the network organized many
techniques are proposed for energy concession, clustering is single of them. The cluster heads
are voted periodically such that members of a cluster can converse with their cluster heads. These
cluster heads send data documented from its members to a base station. The multi-clustering
can also be used. The cluster head should have to be rotated for the complementary of energy
and then there will be an equal heaviness on every node. The energy expenditure can be strong
[3]. Energy plays a vital task in wireless sensor networks because nodes are battery operated.
Therefore numerous protocols have been proposed in order to diminish the energy consumption
of these nodes such as LEACH [6], PAMAS [5].
LEACH is conscious as the most fashionable routing protocol that exploit cluster based
routing in order to weaken the energy consumption, in this paper suggest a development on
the LEACH protocol that supplementary recover the power consumption, simulation results
express out that our protocol outperforms LEACH protocol in term of energy consumption
and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [10]. LEACH
form clusters and selects randomly cluster Heads for each cluster. Non- cluster heads sense the
data and broadcast this data to cluster head, and then cluster head combined the data and forward
this data to sink. The principle of this protocol is that it assigns overall energy consumption of the
network uniformly to each node by selecting periodically different nodes as a cluster head. There
are two phases of LEACH that are Setup phase and Steady state phase. In set up phase, clusters
are shaped and cluster heads are chosen. In steady state phase, data from non-cluster heads is
transmitted to sink. The sensor nodes communicate with cluster heads with allotted time using
TDMA. Cluster heads are arbitrarily chosen in each round. LEACH operation is divided into
several rounds. Each round begins with set-up phase. In this clusters are structured. LEACH set a
threshold value T(n) and then sensor node I generate a random number between 0 and 1. If the
random number is < T(n), the node will become cluster head for the current round and ordinary
nodes link the cluster and become cluster members [6].
T (n) = p/1-p ×( r mod p-1 )
p is a probability of node to be selected as a cluster head, r is a number of rounds passed, G is a
selection of ordinary nodes. Once a node become cluster head never become cluster head once
more, only the node which have not become the cluster head and have elevated energy can
become cluster head at r+1.When cluster head assigns time slots to the members using TDMA
then it shifted to the steady state phase. After a shift in steady-state phase, members sent data
to cluster heads; cluster head procedure the data and then send data sequence to the base station.
After this round, it turn to next round and begin reconstruction new round. compensation of
LEACH are that LEACH is completely distributed. LEACH does not necessitate the control
information from the base station and the nodes do not require information of the global network
in order for LEACH to work. LEACH reduces communication energy by 8 times as contrast to
straight broadcast and smallest amount transmission energy routing. Disadvantages of LEACH
are that the cluster heads are chosen arbitrarily. So the distribution of cluster heads cannot be
ensured. In this protocol, the nodes with low energy have the same precedence as the nodes
having high energy and nodes having low energy can become cluster heads [10].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
15
In section ii presents the connected works, In section iii initiate problem formulation, In
section iv Simulation Setup, In section v result and discussion and section vi conclude the paper.
Figure1: LEACH protocol Architecture
2. LITERATURE REVIEW
A majority beneficial energy-saving spare organization, including spare collection and
named it LEACH-SM protocol (modified form of prominent LEACH protocol) was deliberate
by Baker B. et al.; (2014).In this author available a quantitative difference of energy
consumption and WSN lifetime for both mentioned protocols [6].
Genetic algorithm and optimization of LEACH protocol that are worn on LEACH protocol and
compare both domino effect on the basis of rounds that was discussed by Yadav S. et al.;
(2014). This comparison was based on optimal thresholding probability for cluster structure.
Finally, after comparison finds LEACH- GA method outperforms MTE, DT and LEACH in terms
of network lifetime, use for optimal vigor- efficient clustering [11].
The two significant clustering protocols, namely LEACH and LEACH-C (centralized), using
NS2 tool for numerous chosen scenarios, and study of simulation results against chosen
performance metrics with latency and network lifetime was planned by Nayak P.et al.;
(2014). As a conclusion of surveillance from results, it can be mentioned that LEACH can be
favored if restricted harmonization of nodes in clustering without involving to BS is of tall
priority than other factors like declaration over the desired number of clusters etc.; and LEACH-
C can be designated when centralized and deterministic approach jacket complete network is
unsurprising still bringing in enlarged network lifetime and desired number of clusters [7].
The tailored version of LEACH protocol called V-LEACH protocol and the contrast of LEACH
protocol with V-LEACH protocol was designed by Alhawat A. et al.;(2013). from the
simulation results were, first the numeral of busy nodes is more than the unique LEACH.
Second the figure of dead nodes is less than the unique LEACH protocol. Network life-time is
enlarged by 49.37% then original LEACH [6].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
16
Energy-LEACH protocol improves the CH selection procedure. It makes the lingering energy of
nodes as the major metric which decides whether the nodes twist into CH or not after the first
round. It same as LEACH protocol was projected by Xianging F. et al. ;( 2007). E-LEACH is
alienated into rounds, in the first round, every node has the alike likelihood to turn into CH, that
mean nodes are randomly chosen as CHs, In the next rounds, the left behind energy of
each node is dissimilar after one round e-mail and taken into account for the collection of the
CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer
energy [6].
A novel version of LEACH called two-level LEACH was planned by Loscri V. In this protocol,
CH collects data from other cluster members as exclusive LEACH, but rather than transport data
to the BS openly, it uses one of the CHs that mendacity between the CH and the BS as a transmit
station [8].
In LEACH, each CH straight communicates with BS no matter the distances between CH and BS
It will guzzle a lot of its energy if the distance is distant. So conquer this drawback multihop-
LEACH protocol was proposed by Zhou H. It selects a best possible path between the CH and
the BS through other CHs and use these CHs as a relay station to televise data over through them
[6].
3. PROBLEM FORMULATION
In this work, LEACH protocol has been worn for clustering in which cluster heads are preferred
on the basis of distance and energy.
• In LEACH protocol Cluster head straight communiqué with BS no matter the distance
between Cluster head and the base station; it will use a group of its energy if the distance
is far [13].
• Due to far distance packet does not arrive at the destination because CHs straight
communicate with sink there is no inter-cluster communication, and this needs high
trans-mission power due to this node dies earlier before transmission.
4. SIMULATION SET UP
In this section, we evaluate the performance of LEACH protocol using NS2 tool. NS2 is used as
simulation podium. NS is a distinct event simulator, where the go forward of time depends on the
timing of events which are preserve by the scheduler. NS simulator is depending on two
languages: C++, and an OTcl (an object-oriented tool command language).
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
17
Table 1: NS-2 simulation parameters
Parameter settings
Simulation Area 500*500 meters
No of nodes 41
Channel Type Channel/wireless
Antennae model Antenna/omni antenna
Energy model battery
Interface queue Type Queue/Droptail/Priqueue
Link layer type LL
Initial energy 100
Routing protocol AODV
Traffic Source CBR
Type of MAC IEEE 802.11
Packet size 1000 bytes
The C++ defines the interior instrument of the simulation objects, the OTcL sets up simulation
by assembling and configuring the objects and scheduling discrete events. The OTcL are linked
together using TclCL [12]. The experiments are performed with a diverse number of nodes
placed in a 500m *500m field. Each sensor nodes is assumed to have an initial energy of 100
joules. The general simulation parameters are
To evaluate the performance of LEACH protocol using parameters such as Energy consumption,
Packet loss, End to End delay, Throughput and control overhead. Figure 2, shows energy
consumption graph, in this graph 100 joules energy is to be addicted in 10 seconds because
every cluster heads in LEACH protocol immediately communication with BS no stuff the
distance between Cluster head and the base station; it will use a lot of its energy if the
remoteness is far [13]. In figure 3, shows the packet loss graph, In this graph 16 number of the
packet is lost in 10 seconds because in LEACH protocol CHs minter cluster communication, and
this needs high trans-mission power due to this node dies earlier before transmission, packet does
not reach the destination [14,15].
In Figure 4, shows End to End Delay graph, in this graph to increase the time delay is high due
to high overhead which is a limitation of LEACH protocol [16]. In Figure 5, shows the
throughput graph, in this graph 12 packet delivered in 10 seconds because due to high packet
loss, delay, and control overhead so that the overall efficiency of the network is decreased [16].
In Figure 6, shows the control overhead. In this graph overhead is giant because in LEACH
protocol extra overheads due to cluster head change and calculation leading to energy
incompetence for dynamic clustering in large networks [17].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
18
Figure 2: Energy consumption graph of LEACH Protocol
Figure 3: packet losses graph of LEACH protocol
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
19
Figure 4 : End to End Delay of LEACH protocol
Figure 5:Throughput graph of LEACH protocol
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
20
Figure 6: Control overhead in LEACH protocol
6. CONCLUSION AND FUTURE WORK
The conclusion of this paper is to apply and evaluate the performance of LEACH protocol
using QoS parameters such as energy consumption, packet loss, End-to End-Delay, Throughput,
and Control Overhead. The energy consumption of LEACH is very high because each cluster
heads straight communiqué with BS no material the distance between Cluster head and the base
station; it will use a group of its energy if the remoteness is far. Due to far distance packet does
not arrive at the sink, packet loss problem is occurred so the overall performance of the
networks is decreased. With the outcome obtained in this paper, a further issue worthy of
consideration with RFID protocol can be done named as R- LEACH protocol. The design system
can be extended using R-LEACH protocol; Of course, since we have focused only on LEACH
protocol in this paper, the diagnosis can be done using R- LEACH protocol. We would like to
consider these issues in subsequent work.
ACKNOWLEDGEMENT
I hereby acknowledge that the above-referred work is my own research work and I am entirely
responsible for any kind of misuse of material. I thank my mentor Er. Harsukh Singh to guide
and encourage me and for putting all her valuable time for me to get the desired output.
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
21
REFERENCES
[1] S. Pant, N. Chauhan,P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks:
A Survey,” International. Journal of Computer Application., vol. 11, no. 10, pp. 17–21, 2010.
[2] I. Akyildiz, W. Su, Y. Sankarasubramaniam,E. Cayirci, “Wireless sensor networks: a survey,”
Comput. Networks, vol. 38, pp. 393–422, 2002.
[3] D. Zhang, G. Li, K. Zheng, X. Ming, Z. H. Pan, “An energy-balanced routing method based on
forward-aware factor for wireless sensor networks,” IEEE TRANSACTIONS ON INDUSTRIAL
INFORMATICS, vol. 10, no. 1, pp. 766–773,2014.
[4] L. Jian-qi, C. Bin-fang, W. Li, W. Wen-Hu, “Energy optimized approach based on clustering routing
protocol for wireless sensor networks,” 2013 25th Chinese Control Decision. Conference, pp. 3710–
3715, 2013.
[5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with
signalling for ad hoc networks,” ACM SIGCOMM Computer. Communication. Review., vol. 28,
pp. 5–26, 1998.
[6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” International.
Journal of Digital Content Technology and its Application, vol. 3, pp. 132–136, 2009.
[7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH
Vs LEACH-C,” vol. 106, no. 11, pp. 1–6, 2014.
[8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor
Network-A Survey,” International. Journal of Computer Application vol. 116, no. 10, pp. 1–5, 2015.
[9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor
Networks,” Procedia Environmental Science,Elsevier, vol. 10, pp. 595–600, 2011.
[10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” International Journal of Recent
Development in Engineering and Technology vol. 2, no 6, pp. 69–71, 2014.
[11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol
in WSN,” 3rd Third International Conference on Advanced Computing & Communication
Technologies, ACCT, pp. 236–240, 2013.
[12] N. Singh, P. Rajeshwar, L. Dua, and V. Mathur, “Network Simulator NS2-2 .35,” International
Journal of Advanced Research in Computer Science and Software Engineering vol. 2, no. 5, pp. 224–
228, 2012.
[13] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in
Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in
Engineering and technology,London(U.K) , pp. 80–84, 2014.
[14] R. Kumar, “Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network,”
vol. 24, no. 5, pp. 227– 230, 2015.
[15] Gagandeep kaur , poonam arora, “To Reduce the Packet Collision by Using Adaptive Technique in
WSN, International Journal of Advanced Research in Electrical Electronics
andInstrumentationEngineering” Vol. 3, pp. 11336–11341, 2014.
[16] L. Y. Barai, “Performance Evaluation of LEACH Protocol for Wireless Sensor Network,” vol. 1, no.
6, pp. 141–145, 2014.
[17] Singh S. & Singh G., “A Noble Routing Protocol for Vehicular Adhoc Networks with Less
RoutingOverheads,”International Journal of Future Generation Communication and Networking,
Vol. 7, no.5,pp23-34,2014.

More Related Content

PDF
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
PDF
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
PDF
Enhanced Leach Protocol
PDF
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
PDF
Bn36386389
PPTX
Thesis-Final-slide
PDF
Study of Leach Protocol- A Review
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
Enhanced Leach Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
Bn36386389
Thesis-Final-slide
Study of Leach Protocol- A Review

What's hot (17)

PDF
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
PPTX
Energy efficient cluster head selection in LEACH protocol
PDF
B045070510
PDF
Cluster Head Selection for in Wireless Sensor Networks
PDF
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
PDF
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
PDF
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
PPT
Kianoosh&amp;sajjad
PDF
Various Clustering Techniques in Wireless Sensor Network
PDF
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
PDF
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
PDF
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
PDF
Energy efficient data communication approach in wireless sensor networks
PDF
Iaetsd survey on wireless sensor networks routing
PPT
Leach & Pegasis
PDF
Ijetcas14 591
PDF
1909 1913
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
Energy efficient cluster head selection in LEACH protocol
B045070510
Cluster Head Selection for in Wireless Sensor Networks
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Kianoosh&amp;sajjad
Various Clustering Techniques in Wireless Sensor Network
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Energy efficient data communication approach in wireless sensor networks
Iaetsd survey on wireless sensor networks routing
Leach & Pegasis
Ijetcas14 591
1909 1913
Ad

Similar to SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK (20)

PDF
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
PDF
6 ijcse-01222-1
PDF
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
PDF
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
PDF
20320130406029
PDF
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
PDF
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
PDF
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
PDF
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
PDF
Energy balanced on demand clustering algorithm based on leach-c
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
PDF
C04501027035
PDF
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
PDF
Modified leach protocol in wireless sensor network a survey
PDF
An energy efficient protocol based study of wsn to increase the lifetime
PDF
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
PDF
15 ijcse-01236
PDF
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
PDF
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
6 ijcse-01222-1
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
IRJET- Review on Energy Optimization and Cluster based Routing Protocol in WSN
20320130406029
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
Energy balanced on demand clustering algorithm based on leach-c
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
C04501027035
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
Modified leach protocol in wireless sensor network a survey
An energy efficient protocol based study of wsn to increase the lifetime
Hierarchical Routing Protocols in Wireless Sensor Networks: A Survey and its ...
15 ijcse-01236
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Ad

More from ijngnjournal (20)

PPTX
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
PDF
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
PDF
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATION
PDF
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PDF
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PDF
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORK
PDF
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
PDF
The Performance of a Cylindrical Microstrip Printed Antenna for TM10 Mode as...
PDF
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...
PDF
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PDF
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
PDF
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systems
PDF
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
PDF
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
PDF
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
PDF
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
PDF
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
PDF
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
PDF
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
PDF
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATION
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORK
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
The Performance of a Cylindrical Microstrip Printed Antenna for TM10 Mode as...
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systems
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...

Recently uploaded (20)

PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
PPTX
AgentX UiPath Community Webinar series - Delhi
PPTX
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
DOCX
573137875-Attendance-Management-System-original
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
PPTX
Simulation of electric circuit laws using tinkercad.pptx
PPTX
“Next-Gen AI: Trends Reshaping Our World”
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
BRKDCN-2613.pdf Cisco AI DC NVIDIA presentation
AgentX UiPath Community Webinar series - Delhi
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Structs to JSON How Go Powers REST APIs.pdf
Operating System & Kernel Study Guide-1 - converted.pdf
Monitoring Global Terrestrial Surface Water Height using Remote Sensing - ARS...
573137875-Attendance-Management-System-original
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
Embodied AI: Ushering in the Next Era of Intelligent Systems
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
Simulation of electric circuit laws using tinkercad.pptx
“Next-Gen AI: Trends Reshaping Our World”
Model Code of Practice - Construction Work - 21102022 .pdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx

SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK

  • 1. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 DOI : 10.5121/ijngn.2016.8102 13 SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK Tarun Sharma1, Harsukhpreet Singh2, Anurag sharma3 Dept” of Computer Science & Engineering, CT Institute of Technology & Research1 Dept” of Electronics & Communication Engineering, CT Institute of Technology & Research 2,3,Jalandhar, Punjab,India1,2,3 ABSTRACT The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way to systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat monitoring, cropping monitoring, crowd including etc. The rising use of these networks is making engineers evolve novel and efficient ideas in this field. A group of research in data routing, data density and in network aggregation has been proposed in recent years. The energy consumption is the main apprehension in the wireless sensor network. There are many protocols in wireless sensor network to diminish the energy consumption and to put in to the network lifetime. Among a range of types of techniques, clustering is the most efficient technique to diminish the energy expenditure of network. In this effort, LEACH protocol has been second-hand for clustering in which cluster heads are nominated on the basis of distance and energy. The LEACH protocol is been implemented in a simulated environment and analyze their performance graphically. KEYWORDS Wireless sensor networks, energy efficiency, Clustering, LEACH protocol 1. INTRODUCTION A wireless sensor network is complete up of a huge quantity of sensor nodes and a sink [2]. The WSN is self-confident of sensor nodes from hundreds or thousands and every node is coupled to one sensor nodes. A wireless sensor network entire up of a large number of nodes extend over a precise area. A sensor node self-confident of the sensor, actuators, memory, a mainframe and they do have communication aptitude. All the sensor nodes are permitted to communicate in the course of a wireless intermediary. The wireless standard is of infrared, radio frequency that having no wired tie friendly. So the sensor nodes are deployed in a random conduct and it make ad-hoc network because they can discuss themselves [1]. If the node is unable to converse with other nodes of the network through a direct link, it means the node is out of range. In such kind of networks data broadcast from one node to another is perform via in the middle of nodes. This idea is referred as multi- hoping. All sensors nodes work helpfully to serve the requests [4]. 1.1Energy Consumption Issues The chief complicatedness in WSN, sensor node have classified battery life because the sensor nodes size is small so battery size, processor, storage liberty for data, these all are small as sensor nodes. So the main central point on lessening energy expenses in wireless sensor networks. In
  • 2. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 14 WSN a package of sensed information and routing in order has to be send which after have some time constraint so that information can be employable before any disaster occurs e.g. manufacturing monitoring, apparatus Monitoring etc. In WSN the power authority utilization is much better-quality data communication then internal processing. So, Energy preservation in WSN is the need to the address [3]. The Wireless sensor is flat to node stop working due to power hitting. In order to supply a reliable examine through a network, the network should be celebrity adjusting and must have elastic properties as requisite from point in time to time. A classified contact node may meet failure due to imperfect battery subsistence. In such case the network protocol should be logical enough to such collapse to keep the network organized many techniques are proposed for energy concession, clustering is single of them. The cluster heads are voted periodically such that members of a cluster can converse with their cluster heads. These cluster heads send data documented from its members to a base station. The multi-clustering can also be used. The cluster head should have to be rotated for the complementary of energy and then there will be an equal heaviness on every node. The energy expenditure can be strong [3]. Energy plays a vital task in wireless sensor networks because nodes are battery operated. Therefore numerous protocols have been proposed in order to diminish the energy consumption of these nodes such as LEACH [6], PAMAS [5]. LEACH is conscious as the most fashionable routing protocol that exploit cluster based routing in order to weaken the energy consumption, in this paper suggest a development on the LEACH protocol that supplementary recover the power consumption, simulation results express out that our protocol outperforms LEACH protocol in term of energy consumption and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [10]. LEACH form clusters and selects randomly cluster Heads for each cluster. Non- cluster heads sense the data and broadcast this data to cluster head, and then cluster head combined the data and forward this data to sink. The principle of this protocol is that it assigns overall energy consumption of the network uniformly to each node by selecting periodically different nodes as a cluster head. There are two phases of LEACH that are Setup phase and Steady state phase. In set up phase, clusters are shaped and cluster heads are chosen. In steady state phase, data from non-cluster heads is transmitted to sink. The sensor nodes communicate with cluster heads with allotted time using TDMA. Cluster heads are arbitrarily chosen in each round. LEACH operation is divided into several rounds. Each round begins with set-up phase. In this clusters are structured. LEACH set a threshold value T(n) and then sensor node I generate a random number between 0 and 1. If the random number is < T(n), the node will become cluster head for the current round and ordinary nodes link the cluster and become cluster members [6]. T (n) = p/1-p ×( r mod p-1 ) p is a probability of node to be selected as a cluster head, r is a number of rounds passed, G is a selection of ordinary nodes. Once a node become cluster head never become cluster head once more, only the node which have not become the cluster head and have elevated energy can become cluster head at r+1.When cluster head assigns time slots to the members using TDMA then it shifted to the steady state phase. After a shift in steady-state phase, members sent data to cluster heads; cluster head procedure the data and then send data sequence to the base station. After this round, it turn to next round and begin reconstruction new round. compensation of LEACH are that LEACH is completely distributed. LEACH does not necessitate the control information from the base station and the nodes do not require information of the global network in order for LEACH to work. LEACH reduces communication energy by 8 times as contrast to straight broadcast and smallest amount transmission energy routing. Disadvantages of LEACH are that the cluster heads are chosen arbitrarily. So the distribution of cluster heads cannot be ensured. In this protocol, the nodes with low energy have the same precedence as the nodes having high energy and nodes having low energy can become cluster heads [10].
  • 3. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 15 In section ii presents the connected works, In section iii initiate problem formulation, In section iv Simulation Setup, In section v result and discussion and section vi conclude the paper. Figure1: LEACH protocol Architecture 2. LITERATURE REVIEW A majority beneficial energy-saving spare organization, including spare collection and named it LEACH-SM protocol (modified form of prominent LEACH protocol) was deliberate by Baker B. et al.; (2014).In this author available a quantitative difference of energy consumption and WSN lifetime for both mentioned protocols [6]. Genetic algorithm and optimization of LEACH protocol that are worn on LEACH protocol and compare both domino effect on the basis of rounds that was discussed by Yadav S. et al.; (2014). This comparison was based on optimal thresholding probability for cluster structure. Finally, after comparison finds LEACH- GA method outperforms MTE, DT and LEACH in terms of network lifetime, use for optimal vigor- efficient clustering [11]. The two significant clustering protocols, namely LEACH and LEACH-C (centralized), using NS2 tool for numerous chosen scenarios, and study of simulation results against chosen performance metrics with latency and network lifetime was planned by Nayak P.et al.; (2014). As a conclusion of surveillance from results, it can be mentioned that LEACH can be favored if restricted harmonization of nodes in clustering without involving to BS is of tall priority than other factors like declaration over the desired number of clusters etc.; and LEACH- C can be designated when centralized and deterministic approach jacket complete network is unsurprising still bringing in enlarged network lifetime and desired number of clusters [7]. The tailored version of LEACH protocol called V-LEACH protocol and the contrast of LEACH protocol with V-LEACH protocol was designed by Alhawat A. et al.;(2013). from the simulation results were, first the numeral of busy nodes is more than the unique LEACH. Second the figure of dead nodes is less than the unique LEACH protocol. Network life-time is enlarged by 49.37% then original LEACH [6].
  • 4. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 16 Energy-LEACH protocol improves the CH selection procedure. It makes the lingering energy of nodes as the major metric which decides whether the nodes twist into CH or not after the first round. It same as LEACH protocol was projected by Xianging F. et al. ;( 2007). E-LEACH is alienated into rounds, in the first round, every node has the alike likelihood to turn into CH, that mean nodes are randomly chosen as CHs, In the next rounds, the left behind energy of each node is dissimilar after one round e-mail and taken into account for the collection of the CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer energy [6]. A novel version of LEACH called two-level LEACH was planned by Loscri V. In this protocol, CH collects data from other cluster members as exclusive LEACH, but rather than transport data to the BS openly, it uses one of the CHs that mendacity between the CH and the BS as a transmit station [8]. In LEACH, each CH straight communicates with BS no matter the distances between CH and BS It will guzzle a lot of its energy if the distance is distant. So conquer this drawback multihop- LEACH protocol was proposed by Zhou H. It selects a best possible path between the CH and the BS through other CHs and use these CHs as a relay station to televise data over through them [6]. 3. PROBLEM FORMULATION In this work, LEACH protocol has been worn for clustering in which cluster heads are preferred on the basis of distance and energy. • In LEACH protocol Cluster head straight communiqué with BS no matter the distance between Cluster head and the base station; it will use a group of its energy if the distance is far [13]. • Due to far distance packet does not arrive at the destination because CHs straight communicate with sink there is no inter-cluster communication, and this needs high trans-mission power due to this node dies earlier before transmission. 4. SIMULATION SET UP In this section, we evaluate the performance of LEACH protocol using NS2 tool. NS2 is used as simulation podium. NS is a distinct event simulator, where the go forward of time depends on the timing of events which are preserve by the scheduler. NS simulator is depending on two languages: C++, and an OTcl (an object-oriented tool command language).
  • 5. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 17 Table 1: NS-2 simulation parameters Parameter settings Simulation Area 500*500 meters No of nodes 41 Channel Type Channel/wireless Antennae model Antenna/omni antenna Energy model battery Interface queue Type Queue/Droptail/Priqueue Link layer type LL Initial energy 100 Routing protocol AODV Traffic Source CBR Type of MAC IEEE 802.11 Packet size 1000 bytes The C++ defines the interior instrument of the simulation objects, the OTcL sets up simulation by assembling and configuring the objects and scheduling discrete events. The OTcL are linked together using TclCL [12]. The experiments are performed with a diverse number of nodes placed in a 500m *500m field. Each sensor nodes is assumed to have an initial energy of 100 joules. The general simulation parameters are To evaluate the performance of LEACH protocol using parameters such as Energy consumption, Packet loss, End to End delay, Throughput and control overhead. Figure 2, shows energy consumption graph, in this graph 100 joules energy is to be addicted in 10 seconds because every cluster heads in LEACH protocol immediately communication with BS no stuff the distance between Cluster head and the base station; it will use a lot of its energy if the remoteness is far [13]. In figure 3, shows the packet loss graph, In this graph 16 number of the packet is lost in 10 seconds because in LEACH protocol CHs minter cluster communication, and this needs high trans-mission power due to this node dies earlier before transmission, packet does not reach the destination [14,15]. In Figure 4, shows End to End Delay graph, in this graph to increase the time delay is high due to high overhead which is a limitation of LEACH protocol [16]. In Figure 5, shows the throughput graph, in this graph 12 packet delivered in 10 seconds because due to high packet loss, delay, and control overhead so that the overall efficiency of the network is decreased [16]. In Figure 6, shows the control overhead. In this graph overhead is giant because in LEACH protocol extra overheads due to cluster head change and calculation leading to energy incompetence for dynamic clustering in large networks [17].
  • 6. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 18 Figure 2: Energy consumption graph of LEACH Protocol Figure 3: packet losses graph of LEACH protocol
  • 7. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 19 Figure 4 : End to End Delay of LEACH protocol Figure 5:Throughput graph of LEACH protocol
  • 8. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 20 Figure 6: Control overhead in LEACH protocol 6. CONCLUSION AND FUTURE WORK The conclusion of this paper is to apply and evaluate the performance of LEACH protocol using QoS parameters such as energy consumption, packet loss, End-to End-Delay, Throughput, and Control Overhead. The energy consumption of LEACH is very high because each cluster heads straight communiqué with BS no material the distance between Cluster head and the base station; it will use a group of its energy if the remoteness is far. Due to far distance packet does not arrive at the sink, packet loss problem is occurred so the overall performance of the networks is decreased. With the outcome obtained in this paper, a further issue worthy of consideration with RFID protocol can be done named as R- LEACH protocol. The design system can be extended using R-LEACH protocol; Of course, since we have focused only on LEACH protocol in this paper, the diagnosis can be done using R- LEACH protocol. We would like to consider these issues in subsequent work. ACKNOWLEDGEMENT I hereby acknowledge that the above-referred work is my own research work and I am entirely responsible for any kind of misuse of material. I thank my mentor Er. Harsukh Singh to guide and encourage me and for putting all her valuable time for me to get the desired output.
  • 9. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 21 REFERENCES [1] S. Pant, N. Chauhan,P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks: A Survey,” International. Journal of Computer Application., vol. 11, no. 10, pp. 17–21, 2010. [2] I. Akyildiz, W. Su, Y. Sankarasubramaniam,E. Cayirci, “Wireless sensor networks: a survey,” Comput. Networks, vol. 38, pp. 393–422, 2002. [3] D. Zhang, G. Li, K. Zheng, X. Ming, Z. H. Pan, “An energy-balanced routing method based on forward-aware factor for wireless sensor networks,” IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 10, no. 1, pp. 766–773,2014. [4] L. Jian-qi, C. Bin-fang, W. Li, W. Wen-Hu, “Energy optimized approach based on clustering routing protocol for wireless sensor networks,” 2013 25th Chinese Control Decision. Conference, pp. 3710– 3715, 2013. [5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with signalling for ad hoc networks,” ACM SIGCOMM Computer. Communication. Review., vol. 28, pp. 5–26, 1998. [6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” International. Journal of Digital Content Technology and its Application, vol. 3, pp. 132–136, 2009. [7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH Vs LEACH-C,” vol. 106, no. 11, pp. 1–6, 2014. [8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor Network-A Survey,” International. Journal of Computer Application vol. 116, no. 10, pp. 1–5, 2015. [9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor Networks,” Procedia Environmental Science,Elsevier, vol. 10, pp. 595–600, 2011. [10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” International Journal of Recent Development in Engineering and Technology vol. 2, no 6, pp. 69–71, 2014. [11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol in WSN,” 3rd Third International Conference on Advanced Computing & Communication Technologies, ACCT, pp. 236–240, 2013. [12] N. Singh, P. Rajeshwar, L. Dua, and V. Mathur, “Network Simulator NS2-2 .35,” International Journal of Advanced Research in Computer Science and Software Engineering vol. 2, no. 5, pp. 224– 228, 2012. [13] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in Engineering and technology,London(U.K) , pp. 80–84, 2014. [14] R. Kumar, “Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network,” vol. 24, no. 5, pp. 227– 230, 2015. [15] Gagandeep kaur , poonam arora, “To Reduce the Packet Collision by Using Adaptive Technique in WSN, International Journal of Advanced Research in Electrical Electronics andInstrumentationEngineering” Vol. 3, pp. 11336–11341, 2014. [16] L. Y. Barai, “Performance Evaluation of LEACH Protocol for Wireless Sensor Network,” vol. 1, no. 6, pp. 141–145, 2014. [17] Singh S. & Singh G., “A Noble Routing Protocol for Vehicular Adhoc Networks with Less RoutingOverheads,”International Journal of Future Generation Communication and Networking, Vol. 7, no.5,pp23-34,2014.