You are on page 1of 4

IJSTE - International Journal of Science Technology & Engineering | Volume 1 | Issue 11 | May 2015

ISSN (online): 2349-784X

Data Aggregation Extended Leach Protocol


Girish Prabhu
MCA Student
Department of Electronics and Communication Engineering
KLS Gogte Institute of Technology, Belgaum

Dr. G. R. Udupi
Associate Professor
Department of Electronics and Communication Engineering
Affiliation: Research Center, GIT, Belgaum

Abstract
Invent of new technology has yield the research in wireless sensor network (WSN), which are used in everyday life. Many
researches has been carried out in wireless sensor network technology to overcome the existing problems such as energy
consumption, placement of sensor nodes and the routing protocols to be used. To increase the lifetime of the wireless sensor
nodes the efficient utilization of the energy and scalability is achieved by using hierarchical routing based on the clustering
principle. The LEACH protocol uses TDMA (Time Division Multiple Access) based MAC (Medium Access Control) protocol
for balanced energy consumption. In this paper we analyze working of the LEACH (Low Energy Adaptive Clustering Hierarchy)
protocol with advancements and simulate the protocol using NS2 and MATLAB.
Keywords: LEACH, TDMA
________________________________________________________________________________________________________

I. INTRODUCTION
Wireless sensor network has been used in many application fields such as environment monitoring, disaster management,
medical and health, nuclear, military, home and industrial monitoring. The WSNs are mainly used in military application later it
is being used by the civilian applications.
WSNs are composed of the thousands of tiny sensor nodes which are deployed randomly. The sensor nodes are capable of
sensing and communication with the other neighboring nodes to reach destination. The energy and organization of network are
main consideration in designing the WSN. The main design considerations are scalability, distance, transmission media, data
aggregation, power consumption, node deployment.
The routing in WSN differs from wired networks, the routing protocols in WSN can be broadly classified as hierarchical,
location based, data centric, QoS based. Leach is the Hierarchical protocol based on the clustering to reduce the energy
consumption. The sensor nodes are grouped into cluster, each cluster will have cluster head (CH). The data aggregation is carried
out in the CH which will have direct connection to the base station (BS). The nodes in the cluster send the data to the CH and CH
forwards it to BS. Energy balancing is carried out by probabilistically changing the role of the CH among nodes of the cluster.

II. LITERATURE REVIEW


The WSN were used in the location where the wired network cant reach as wireless sensor networks are infrastructure free
networks. The responsiveness of WSN should me high along with good scalability and reliability. To achieve scalability and
efficiency the hierarchical cluster based routing protocols are used. Leach is one of the oldest cluster based routing protocol
which is incorporated to reduce the energy consumption and increase the life time of the sensor nodes. Sensor nodes are
deployed manually or randomly spread over a area to be monitored. The sensor nodes are energized by the tiny battery.
Leach protocol works by constructing the cluster among the nodes. The cluster organization depends on many factors such as
the distance of the nodes, range of the network, the energy of the received signal etc. each cluster will select the cluster head by
broadcasting the packets. The energy consumption of the network also depends on the number of cluster heads in the network.
So optimization of the cluster head in the network should be one of the considerations while designing the network.
The role of the cluster head will be randomly selected. The more energy consumption happens in cluster head as it has to
collect the data from other nodes of the cluster and aggregate and compress the data then send it to the base station. The role of
the cluster head changes after one round depending on probabilistic model to achieve energy balancing. The energy load of a
cluster head is evenly distributed among the nodes of the cluster. Since the cluster-head knows all the member nodes, it will
create a TDMA schedule for each node, which tells the nodes exactly when to transmit its data.

III. TOOLS
NS2 (Network Simulator 2) version 2.35 or
MATLAB

All rights reserved by www.ijste.org

285

Data Aggregation Extended Leach Protocol


(IJSTE/ Volume 1 / Issue 11 / 048)

IV. METHODOLOGY
Leach protocol for wireless sensor networks is proposed by W. R. Heinzelman which tries to minimize energy consumption in
sensor networks. The sensor nodes are grouped into clusters depending on the received strength of signal. The all the sensor
nodes are grouped into clusters. Depending on the requirement and the network parameters the number of the clusters can be
deployed. This will cause the proportional distribution of the power in the network. Each cluster will randomly select cluster
head for first time. The cluster formation is shown in figure 1

Fig. 1: Cluster Formation

Leach protocol works on round basis and each round consists of two phases:
1) Setup phase
2) Steady state phase
Setup phase starts with forming the cluster and selecting the cluster head. At the beginning of each round node broadcasts its
probability of becoming the cluster head. The node with highest probability will be chosen as cluster head and it broadcasts the
announcement message informing other nodes that its the cluster head. Other nodes depending on the received signal strength
decide which cluster it should join. After initial phase all the other nodes will send the joining message to cluster head. This
forms the cluster and this process repeats every round. Every node selects the number between 0 to 1, the node becomes the
cluster head if its value is less than threshold. The threshold value can be calculated as follows
( )

p Desired cluster head percentage


r Current round
G - The set of nodes that have not been cluster heads in last 1/p rounds.

Fig. 2: Working Leach Protocol

All rights reserved by www.ijste.org

286

Data Aggregation Extended Leach Protocol


(IJSTE/ Volume 1 / Issue 11 / 048)

Once the cluster has been setup the cluster head sends the broadcast message informing the slot schedule of each node using
TDMA (Time Division Multiple Access) slots. The actual data transmission happens in steady state phase, where the nodes in
the cluster send the data in their time slots to the cluster head. The cluster head aggregates the data from all nodes and send it to
the base station. The duration of the steady state is more than that of the setup phase. When n k-bit of messages has gathered by
cluster head in its cluster then it compresses the data to a (n * k) bit message and sends this message to base station, where
1 is the compression coefficient.

V. ANALYSIS OF SIMULATIONS AND RESULTS


The simulation of the Leach protocol has been implemented using MATLAB R2014b. The field distribution of the sensor nodes
has been done 100m*100m area. The nodes are densely scattered in the field randomly. The base station is denoted by as and
placed at the centre of the field. The cluster heads are denoted by a plus symbol (+) and other nodes by a circle ().

Fig. 3: Field Distributions of Nodes

The simulation shows performance evaluation of LEACH protocol in terms of data rate and the energy consumption by the
nodes. The data transmission at the beginning increases gradually as all the nodes will send the data and control information.
Once the clusters are formed data aggregation and fusion takes place which maintains the data rate almost constant. The energy
of the nodes reduces in ideal mode, awake mode while transmitting and receiving the signals. Maximum energy is utilized in the
cluster head as it has to combine the data and compress it and send to base station. By changing the role of the cluster head the
energy balancing can be done in the network which intern increases the life time of the network.

Fig. 4: Simulation Result Bit Rate

Fig. 5: Simulation Result Node Energy Consumption

All rights reserved by www.ijste.org

287

Data Aggregation Extended Leach Protocol


(IJSTE/ Volume 1 / Issue 11 / 048)

VI. CONCLUSION
The Leach protocol can be implemented in both NS2 and MATLAB. The main parameters in designing the wireless sensor
network are the life time of the sensor nodes, organization of the network , energy utilization etc. the Leach protocol is used to
improve the life time of the network by properly arranging the nodes in cluster and selecting optimized cluster heads. This intern
reduces the energy consumption as cluster based algorithm arrogates the data. The overall performance of wireless sensor
network can be improved by using the Data Aggregation Extended Leach protocol.

REFERENCES
[1]
[2]
[3]
[4]
[5]

Wikipedia,"Wireless Sensor Networks , http://en.wikipedia.org/wiki/Wireless_sensor_network [2] Dr. R. R. Mudholkar, Dr. S. R. Sawant, V. C. Patil,
Rjshree. V. Biradar Classification & Comparison of Routing Protocols in WSN UbiCC Journal- Vol 4
Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, Erdal Cayirci: A Survey on Sensor Networks, IEEE Communication Magazine, pp. 102114(August 2002)
Amrinder Kaur,Sunil Saini, Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network
Sunil Pariyani, Rajesh Patel, Vijay Ukani, Energy and Throughput Analysis of Hierarchical Routing Protocol(LEACH) for Wireless Sensor Networks,
International Journal of Computer Applications Volume 20- No. 4 (April 2011)
Yuh Ren Tsai, Coverage Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks, IEEE Transactions on Wireless
Communications, Volume 6- No. 4 (April 2007)

All rights reserved by www.ijste.org

288

You might also like