You are on page 1of 10

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)

ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

A NOVEL METHOD FOR ENHANCING


LAECH PROTOCOL WITH TRAFFIC
MANAGEMENT SYSTEM
1

Chanchal Mahajan, 2Maninder Kaur


1

Professor, Master in ECE, DIET Kharar (PTU)

Master in ECE, DIET (PTU)

C
.O

ABSTRACT
Since the advent of the trend using Wireless sensors networks at different work places, field etc.
LEACH has been one of the prominent protocols that have been used for the purpose of routing of
and all. Many advance protocols like ELEACH, EBCH also exist. But out of them all the ELEACH
protocol from many years have been the most common choice for doing some advancement. The
scope of our dissertation extends itself to management of load and congestion of traffic on nodes.
There are schemes like we are taking as base for our work i.e. EBCH which is traffic distribution
protocol which splits up the traffic in different routes; but even after distribution some time resources
are not properly utilized. To improve upon those wasted resources is our scope and aim in this work.

IJ
T

Keywords: low energy adaptive clustering hierarchy (LEACH), transmit diversity, virtual multiple
input multiple output (MIMO), wireless sensor network.

I. INTRODUCTION

Energy conservation refers to reducing energy consumption through using less of an energy
service. Vitality preservation varies from effective vitality use, which alludes to utilizing less
vitality for a consistent administration. Case in point, driving less is a sample of vitality
preservation. Driving the same sum with a higher mileage vehicle is a sample of vitality
productivity. Vitality preservation and productivity are both vitality lessening methods.
Despite the fact that vitality protection diminishes vitality administrations, it can increments
ecological quality, national security, individual money related security and higher funds. It is
at the highest point of the manageable vitality chain of command. It additionally brings down
vitality costs by anticipating future asset consumption. One of the essential approaches to
enhance vitality preservation in structures is to utilize a vitality review. A vitality review is an
assessment and investigation of vitality utilize and streams for vitality preservation in a
building, procedure or framework to diminish the measure of vitality information into the
77

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

framework without adversely influencing the output(s). This is typically fulfilled via prepared
experts and can be a piece of a portion of the national projects talked about above. Likewise,
late advancement of smartphone apps empower mortgage holders to finish relatively
advanced vitality reviews themselves. Building innovations and savvy meters can permit
vitality clients, business and private, to see graphically the effect their vitality utilization can
have in their working environment or homes. Propelled ongoing vitality metering has the
capacity help individuals spare vitality by their activities. In detached sunlight based
building outline, windows, dividers, and floors are made to gather, store, and circulate sun
powered vitality as warmth in the winter and reject sun oriented warmth in the mid-year. This
is called latent sun powered configuration or climatic outline on the grounds that, dissimilar
to dynamic sunlight based warming frameworks, it doesn't include the utilization of
mechanical and electrical gadgets.

IJ
T

C
.O

The way to planning an aloof sunlight based building is to best exploit the nearby
atmosphere. Components to be considered incorporate window position and coating sort,
warm protection, warm mass, and shading. Uninvolved sun oriented outline systems can be
connected most effectively to new structures, however existing structures can be retrofitted.
A remote sensor system comprises of sensor hubs conveyed over a land territory for checking
physical phenomena like temperature, moistness, vibrations, seismic occasions, et cetera.
Ordinarily, a sensor hub is a little gadget that incorporates three fundamental parts: a
detecting subsystem for information obtaining from the physical encompassing environment,
a handling subsystem for nearby information preparing and stockpiling, and a remote
correspondence subsystem for information transmission. Likewise, a force source supplies
the vitality required by the gadget to perform the customized assignment. This force source
regularly comprises of a battery with a constrained vitality spending plan. Moreover, it could
be outlandish or badly arranged to energize the battery, in light of the fact that hubs may be
sent in a threatening or eccentric environment. Then again, the sensor system ought to have a
lifetime sufficiently long to satisfy the application necessities. By and large a lifetime in the
request of a while, or even years, may be needed. Hence, the urgent inquiry is: "the means by
which to delay the system lifetime to such quite a while?" Now and again it is conceivable to
search vitality from the outside environment (e.g., by utilizing sunlight based cells as force
source). Nonetheless, outside force supply sources frequently display a non-nonstop conduct
so that a vitality cushion is required also. Regardless, vitality is an exceptionally basic asset
and must be utilized sparingly. In this way, vitality protection is a key issue in the outline of
frameworks in light of remote sensor systems.

The sensor system model delineated in fig. 1 and comprising of one sink hub (or base station)
and a (substantial) number of sensor hubs sent over a huge geographic range (detecting field).
Information are exchanged from sensor hubs to the sink through a multi-bounce
correspondence ideal model. We will consider first the case in which both the sink and the
sensor hubs are (static sensor system). At that point, we will likewise talk about vitality
protection plans for sensor systems with versatile components in Section VI, in which a
scanty sensor system building design where persistent end-to-end ways between sensor
hubs and the sink may not be accessible will be accounted as well.
78

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

Fig. 1: Energy Conservation Process

Experimental measurements have shown that generally data transmission is very expensive in
terms of energy consumption, while data processing consumes significantly less. The vitality
expense of transmitting a solitary bit of data is more or less the same as that required for
handling a thousand operations in an average sensor hub.

IJ
T

C
.O

The vitality utilization of the detecting subsystem relies on upon the particular sensor sort. By
and large it is insignificant concerning the vitality devoured by the preparing and, most
importantly, the correspondence subsystems. In different cases, the vitality use for
information detecting may be tantamount to, or considerably more prominent than, the
vitality required for information transmission. All in all, vitality sparing procedures
concentrate on two subsystems: the systems administration subsystem (i.e., vitality
administration is considered in the operations of every single hub, and additionally in the
outline of systems administration conventions), and the detecting subsystem. Vitality
preservation in sensor hubs, and presents the three fundamental methodologies (obligation
cycling, information decrease, and portability).
II. LITERATURE REVIEW

Heydar Ghasemzade and Fatemeh Dehghan et al.,(2014) Energy Consumption


Reduction in Wireless Sensor Networks[11]. In this paper a wireless Sensor Network
(WSN) comprises of thousands number of sensor hubs which have requirements on
reckoning, vitality and memory assets. Restricted vitality asset influences the lifetime of the
WSNs. All changes of LEACH convention give no ensure that group heads are consistently
dispersed in the system. We propose a convention named BN-LEACH to choose group heads
utilizing a Bayesian Network (BN) model in light of three components separation to the
Base Station (BS), remaining vitality and thickness. By correlation with LEACH, LEACH-C
and WEEC conventions, which are changes on LEACH, reproduction results demonstrate
that our proposed convention adjusts the vitality utilization of the sensor hubs, draws out the
system lifetime and develops the First Node Death (FND) further more from aforementioned
conventions. Vitality confinement of the sensor hubs is in media proportion to the lifetime of
79

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

a wireless sensor network. As a result, there are many protocols based on LEACH which
have concentrated on reducing energy consumption and controlling energy dissipation.

Ravi Kishore Kodali and Naveen Kumaret al., (2014) A survey on protocols in
Wireless Sensor Networks[7]. In this paper Wireless Sensor Network (WSN) consists of a
large number of small devices called sensor nodes, which are usually deployed randomly
over a wide area in order to sense and monitor various physical phenomena related
parameters including environmental conditions at various locations. Network lifetime, energy
efficiency, load balancing and more over scalability are some key requirements of WSN
applications. This work presents a multi level hierarchical routing protocol, which is based on
the LEACH protocol. This protocol improves both the energy efficiency and the lifetime of
the network. Various simulation models for the extensions of LEACH using three different
Hierarchical routing protocols have been created.

C
.O

Meena Malik and Dr.Yudhvir Singh et al.,(2013) Energy Efficient Routing Protocols for
wireless sensor network[1]. In this paper wireless Sensor Network is a network of sensor
nodes without having any focal controller. Its development is speedily expanding and that is
the reason there is a monstrous field for exploration here. So this paper shows an itemized
survey and investigation of LEACH protocol. Examination of different system parameters is
done as tables and diagrams. The recreation work has been done by utilizing own
arrangement of parameters and in the remainder of the paper conclusions is drawn. The
principle concern of this work is to analyze the vitality productivity and execution of LEACH
protocol utilizing own arrangement of parameters. This paper has secured execution of
LEACH protocol no one but, we can likewise pose as a viable rival this convention with
other steering protocols that might possibly be progressive in nature.

IJ
T

Asaduzzaman and Hyung Yun Konget al.,(2013) LEACH Protocol of Wireless Sensor
Network[6]. In this paper, a basic modification in grouping calculation of the LEACH
protocol is proposed to endeavour virtual different data numerous yield (MIMO) based client
participation. A diagnostic technique to assess the vitality utilization in light of BER bend is
displayed. Investigation and recreation results demonstrate that proposed helpful LEACH
protocol can spare a gigantic measure of vitality over LEACH protocol with same
information rate, bit mistake rate, postponement and transfer speed prerequisites. The
aggregate vitality utilization of our proposed helpful LEACH convention can be partitioned
into three noteworthy parts: The vitality utilization in bunch setup, vitality utilization in
neighborhood transmission, and vitality utilization in long term transmission. Examination
and reproduction results demonstrate that our proposition outflanks conventional LEACH
PROTOCOL with keeping up all the upsides of LEACH protocol.
Asha Ahlawat and Meena Maliket al., (2013) Energy Efficient Routing Protocols for
wireless sensor network [1].In this paper Wireless Sensor Networks (WSNs) are networks of
light-weight sensors that are battery powered used majorly to monitor purposes. Several
clustering schemes and algorithm such as LEACH, DEEC, have been proposed with varying
objectives such as load balancing, fault- tolerance, increased connectivity with reduced delay
and network longevity. We have discussed the Low Energy Adaptive Clustering Hierarchy
80

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

(LEACH) protocol and examined the protocol based on alive nodes, and dead node in wsn.
Followed by an overview of LEACH protocol implementations, then we proposed a new
version of LEACH protocol called V-LEACH protocol.

S. H. Gajjar and K. S. Dasguptaet al., (2012) Protocols for wireless sensor network[1].
The job of developing a generic protocol framework for Wireless Sensor Networks (WSN) is
challenging because, limited processing capabilities, memory and power supply of sensor
node make it hard to provide food necessities of flexible utilizations of these systems.. From
among the cross layer conventions proposed in the writing Low Energy Adaptive Clustering
Hierarchy (LEACH), is well alluded convention structural planning for WSN. At the point
when planning convention architectures for WSN, it is vital to consider the extreme vitality
imperatives of the nodes, end application, information collection, simplicity of sending, self
setup of hubs and limitations of remote channel. These components are considered in
LEACH, where measure of information transmitted is decreased by information
conglomeration at CH, there may be cases at the point when hubs with less remaining vitality
and/or the ones which are a long way from the BS may be selected as CH. I-LEACH, our
proposed work is improved LEACH.

IJ
T

C
.O

G Huiling Zhou and Chi Zhanget et al.,(2012) Improvement on LEACH Protocol of


Wireless Sensor Network[6]. In this paper, we analyze the defects of LEACH protocol and
clustering taking into account RSSI running calculation. Chiefly considering the system
burden adjust, the leftover vitality and convention overhead variables, a made strides protocol
is proposed based on LEACH protocol and uneven clustering. By simulating the improved
protocol, a conclusion is drawn that the number of cluster head produced by the improved
protocol is more stable than that of the unimproved LEACH protocol, and the improved
protocol can extend the network lifetime effectively. The defects of LEACH protocol and
clustering based on RSSI ranging algorithm have been analyzed. We introduce three ideas,
uneven clustering, cluster head collection based on energy and ranging algorithm based on
node statistics, to improve the protocol performance.
D.Manivannan1and B.Vijayalakshmiand et al.,(2011) Wireless sensor network[1].
Huge gathering of small sensor Nodes structure WSNs and these are put in open, unattended
milieu. Because of this reason, Nodes in WSN can persevere through select experiences.
WSNs are more helpless against dynamic and latent assaults than wired ones because of their
TV nature, limits in assets and intemperate situations. Notwithstanding, security will be a
huge variable for their complete usage. Another convention taking into account consistency
mathematical statements and number hypothesis ideas have been acquainted with accomplish
secure validation among Nodes in WSNs. Examination of the proposed convention with
existing conventions is finished. It mirrors that it gives moment validation, least memory use
and withstands replay assault, listening stealthily. This convention turns out to be a proficient,
secure and versatile convention to create confirmation between Nodes, Node to group head
and bunch head to base station. It is suitable for both static and element WSNs. Any pair of
Nodes can authenticate themselves in secure group communication and even if any new Node
is introduced, just congruence calculations need to be calculated and loaded into Nodes.

81

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

Wendi RabinerHeinzelman and HariBalakrishnan et al.,(2010) Wireless sensor


networks: a survey, Computer Networks[4][8]. In this paper, we look at communication
protocols, which can have significant impact on the overall energy dissipation of these
networks. Based on our findings that the conventional protocols of direct transmission,
minimum-transmission-energy, multihop routing, and static clustering may not be optimal for
sensor networks, we propose LEACH (Low-Energy Adaptive Clustering Hierarchy), a
clustering-based protocol that utilizes randomized rotation of local cluster base
stations(cluster-heads) to equally disperse the vitality load among the sensors in the system..
Drain is totally appropriated, obliging no control data from the base station, and the hubs
don't oblige information of the worldwide system with the goal LEACH should work.

C
.O

Edith C.-H. Ngai and Ioana Rodhe et al.,(2009). Improving the LEACH protocol for
wireless sensor networks[10]. Wireless sensor network is widely used in both developing
civil and military applications now a days. In wireless sensor networks, attacker can make use
of the traffic information to locate the monitored objects, e.g. to hunt endangered animals, to
kill soldier or stole some important information. In area monitoring in wireless sensor
network the sensor collect the data and report the data to the sink .Sink is a data collector
which collect all the data from the sensor of specific wireless sensor area network. Attacker
may locate the sink easily by reading the destination In the future the sensor networks will be
widely use with the help of promising sensing and wireless technologies. These technologies
can be deployed in civil or military applications. Sensor network are regularly used in
application where it is difficult to setup wired network for example: monitoring in wild life
,military surveillance and tracking objects. In this work they introduce a scheme in sink move
in the network and collect the data randomly from the sensor nodes in the network. They also
calculate the delivery rate collection of data and delay. In this work they show that their
scheme can provide strong privacy of location and sink effectively

IJ
T

III. TECHNIQUES (METHODOLOGY)


In the whole process the prime focus was on reducing the load on node which will in turn
provide a good platform to improve. Now we had two major schemes to discuss and
implement.
EBCH i.e. Load distributing protocol
TBLEACH (Traffic Balancing Low- energy adaptive clustering hierarchy)

82

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

Fig. 2: EBCH Technique

C
.O

In the paper that we have taken as our base of work for tsp the Load distribution is done but
contrastingly the load distributed is not balanced as evident in the figure above that the data is
split in different paths of equal capacity but if that data if not balanced it will cause
congestion. The green part is the travelling data, the blue part is empty slots and the red ones
are which are waiting for slots to be free. This red part is the one which hinders the
performance of the system.

IJ
T

The problem is evident enough from the above scenario that the traffic that is distributed
needs to be balanced immediately and for that purpose we have used TBLEACH as explained
in brief above in which our focus is on removing this unbalanced load on paths. EBCH
improves the problem single path but the scope of improvement is still there in the multipath
mechanism.

Fig. 2: TBLEACH Technique


83

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

For fulfilling the above stated purpose and for full filling the TBLEACH mechanism we
simulated the situation with equal distribution while EBCH was undertaken. the packets
which were earlier waiting for the slots to get free for the communication now are assigned to
different paths which in return gives the right solution for their communication over same
paths which faced heavy congestion earlier, reduced but still prominent in case of EBCH but
with now the situation is under control.
IV. COMPARE RESULTS
A. Software detail

MATLAB is a programming environment as well as a high level, interpreted, dynamically


typed language. It is well suited for numerical computation, particularly computations
involving matrix operations and linear algebra.

C
.O

B. Result
This section analyses that the Load balancing with lesser congestion flow, Through
trafficking, we are utilizing power, Lesser power consumption, Greater amount of power left
after each round, Greater throughput.

IJ
T

V. CONCLUSION
In our proposed plan, Versatile Load adjusting is utilized as a part of grouping. In LEACH
utilizing TBLEACH, group heads are chosen in every group on the premise of remaining hub
vitality. TBLEACH plan diminish the blockage in the system which make the WSN
correspondence more vitality proficient. The security time of system and system lifetime
have been streamlined in our proposed procedure. Recreation results demonstrate that when
contrasted and existing steering conventions TBLEACH utilizing EBCH, there is critical
change in every one of these parameters. Conclusion is achieved from the simulation results:
The simulation results shows how the Load balancing with lesser congestion flow, Through
trafficking, we are utilizing power, Lesser power consumption, Greater amount of power left
after each round ad also the Greater throughput.

ACKNOWLEDGEMENT

Working on this thesis of A Novel Method For Enhancing Leach Protocol With Traffic
Management System provided a unique experience and analysis, I feel great pleasure and
privilege in working over this research. I am deeply indebted to Doaba Institute of
Engineering & Technology, Kharar under Punjab Technical University, Jalandhar for
the guidance, support and motivation for the many other aids without which it would have
been impossible to complete this project. I have no words to express my deep sense of
gratitude for Prof. Maninder Kaur for her enlightening guidance, directive encouragement,
suggestions and constructive criticism for always listening to our problems and helping us out
with their full cooperation. Last but not the least, Mr.Baldev Mahajan, Mrs. Shita Mahajan

84

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

who have given me that much strength to keep moving on forward every time, we are greatly
thankful to them and have no words to express my gratitude to them.
REFERENCES
[1] A. S. Mohammed and M. N. Shanmukhaswmy "A Novel Algorithm to Select Cluster
Heads with Highes and Balanced Energy in Wireless Sensor Networks", International Jornal
of Computer Applications, vol. 54, 2012
[2] Bo Shen, et al, Cluster-Based Routing Protocols for Wireless Sensor Networks, Journal of
Software,2006.

[3] CAI Yuejie, HU Fangming, An Improved Algorithm of Routing Protocol Based on


LEACH[J]. Electronic Science and technology, 2012, 25(8): pp. 128-131

[4] GAO Wei, HU Yanjun, A Cooperative Communication Algorithm Based on LEACH in


WSN, Communication technology, 2010, 10(43): pp. 81-83.

C
.O

[5] Heydar Ghasemzadeh andMehdi Rezaeian An Improvement on LEACH Protocol using


Bayesian Networks for Energy Consumption Reduction in Wireless Sensor Networks, 7th
International Symposium on Telecommunications, 2014.
[6] H. Gou and Y. Yoo, An Energy Balancing LEACH Algorithm for Wireless Sensor
Networks Proc. International Conference. Information Technology, pp. 822-827, 2010.
[7] I. F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci, Wireless sensor
networks: a survey, Computer Networks, Vol.38, pp. 393,422, March 2002.

IJ
T

[8] J. kulik, W. Heinzelman and H. Balakrishnan "Negotiation-based protocols for


disseminating information in wireless sensor networks", Wireless Networks, pp.169 -185
2002

[9] K. Akkaya, M. Younis, A survey on Routing Protocols for Wireless Sensor Networks,
Computer Networks (Elsevier) Journal, 2004.
[10] LIAO Ming-hua, ZHANG Hua, WANG Dong, Improved Clusterhead Election
Algorithm Based on LEACH Protocol[J]. Computer Engineering. 2011, 37(7): pp. 112-114.

[11] L. Qing, Q. Zhu and M. Wang "Desing of a distributed energy-efficient clustering


algorithm for heterogeneous wireless senor networks", ELSEVIER, Computer
Communications, vol. 29, pp.2230 -2237 2006
[12] M. BaniYassein, A. Al-zou'bi, Y. Khamayseh, W. Mardini Improvement on LEACH
Protocol of Wireless Sensor Network (VLEACH), International Journal of Digital Content
Technology and its Applications Volume 3, Number 2, June 2009.

85

INTERNATIONAL JOURNAL OF TECHNOLOGY AND COMPUTING (IJTC)


ISSN-2455-099X,
Volume 2, Issue 4 April 2016.

[13] Meena Malik and Dr. Yudhvir Singh, Energy Efficient Routing Protocols for wireless
sensor network: A survey NCACCNES, Mar2012.
[14] M. J. Handy, M. Haase, D. Timmermann, \Low Energy Adaptive Clustering Hierarchy
with Deterministic Cluster-Head Selection", IEEE MWCN, 2002.
[15] Parminder Kaur, Mrs. MamtaKatiyar,The Energy-Efficient Hierarchical Routing
Protocols for WSN: A Review IJARCSSE, Volume 2, Issue 11, November 2012 ISSN:
2277 128X
[16] Sabarish B A, Guru Moorthy S M, Dhivya M A, Sakthi Naveen K, Vaishnavi S A
survey on clustering protocols in Wireless Sensor Networks International Journal Of
Advances In Computing and Information Technology, published on April 2012.

[17] S.Cui, A. J. Goldsmith, and A. Bahai, Energyefficiency of MIMOand Cooperative


MIMO Techniques in Sensor Networks, IEEE Journal on Selected Areas inCommunication,
vol. 22, pp. 1089-1098, 2004.

C
.O

[18] W. R. Heinzelman, A. Chandrakasan and H. Balakrishnan "Energy-efficient


communication protocol for wireless micro sensor networks", Annual Hawii International
Conference on system Sciences, vol. 2, pp.3005 -3014
[19] W. B. Heinzelman An Application-Specific Protocol for Wireless Micro sensor
Networks, IEEE TRANSACTIONSON WIRELESS COMMUNICATIONS, OCT 2002

IJ
T

[20] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, An Application-Specific


Protocol Architecture for Wireless Microsensor Networks, IEEE Transactions on Wireless
Communications, vol. 1, pp. 660- 670, 2002

86

You might also like