SlideShare a Scribd company logo
ISSN (e): 2250 – 3005 || Volume, 05 || Issue, 05 || May – 2015 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 31
Enhanced Leach Protocol
1
Girish Prabhu, 2
Dr.G.R.Udupi
1,2
Dept of Electronics and Communication, Gogte Institute of Technology, Belgaum,India,
I. Introduction
A Wireless Sensor Networks (WSN) is a set of thousands of micro sensor nodes that are capable of
sensing, communicating between each other and performing computational and processing operations. Wireless
Sensor Networks can provide great advantages with respect to low-power, low-cost and fast deployment for
many applications without human supervision[1]. Energy efficiency is one of the most important issues while
designing protocols which are lifetime critical. Sensor nodes are equipped with tiny batteries with limited
power. They can be randomly dropped or deployed manually. Organizing the wireless network in efficient and
scalable manner is by using the clusters. Cluster head (CH) is responsible for information gathering by the nodes
of its cluster and may aggregate and compress the data before transmission to sink. However, this results in a
higher rate of energy utilization by cluster heads. The most popular clustering method is LEACH, which
addresses clustering energy problem by probabilistically changing the role of cluster head among all nodes. The
probability of becoming a cluster head should be selected wisely to increase the performance of the network.
The main focus of this paper is to address energy problem and developing a method for selection of cluster head
with the optimal probability from the point of minimizing the energy consumption [2].
II. Literature review
Firstly sensor networks were mainly used by military applications but later have been considered for the
applications such as environmental monitoring, health monitoring etc. A sensor network design is motivated by
many factors, which include Fault Tolerant Communication, Scalability, Power Consumption, Data Delivery
Models, Data Aggregation/Data Fusion, Node Deployment. LEACH is the network protocol used to increase
the lifetime of the network by using hierarchical routing for wireless sensor. All the nodes in a network
formulate themselves into local clusters, with one node performing as the cluster-head. All non-cluster-head
nodes transmit their data to the cluster-head. While the cluster-head node performs data processing like data
aggregation and then transmits data to the remote base station. Therefore, cluster-head node is much more
energy-intensive than other nodes of cluster. Thus, when a cluster-head node dies all the nodes that cluster lose
communication ability with base station. LEACH incorporates probabilistic rotation of the high-energy cluster-
head in order to avoid exhausting the battery of any one sensor in the cluster. In this way, the energy load of a
cluster-head is evenly distributed among the nodes of the cluster. Since the cluster-head knows all the member
nodes, it will create a TDMA schedule for each node, which tells the nodes exactly when to transmit its data.
Using a TDMA for data transfer avoids intra-cluster collisions. The cluster head is responsible for the transfer of
the data to the base station.
Abstract:
Technological advances in wireless sensor networks have made impact on everyday life. In
wireless sensor networks energy is main concern & it is considered while designing sensor
networks. We use hierarchical routing protocols based on clustering because of balanced
energy consumption and scalability. The efficient usage of energy in a sensor node is most
important parameter to increase the life time of wireless sensor network. In this paper we
analyze the design issues constructing the cluster in the wireless sensor networks and detail
working of LEACH (Low Energy Adaptive Clustering Hierarchy) protocol and its
SIMULATION .The results reveal the measure for performance of sensor networks.
Keywords: Cluster head, Data aggregation, Energy efficient, Hierarchical routing, LEACH,
Life time, Wireless sensor network
Enhanced Leach…
www.ijceronline.com Open Access Journal Page 32
III. Leach protocol
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol for sensor networks is proposed by W.
R. Heinzelman which tries to minimize energy dissipation in wireless sensor networks. The arrangement of
clusters is done depending on the of the received signal strength. The main purpose of LEACH protocol is to
provide data aggregation for sensor networks. In LEACH protocol the total nodes are divided into many small
groups called clusters for proportional distribution of power consumption inside the network. The cluster
formation will be done as shown in the figure1 [3]
Figure 1 Cluster formation
The cluster head can be selected randomly and then rotate this role probabilistically to evenly distribute the
energy load among the sensors in the cluster. The node n chooses a random number between 0 and 1 and the
nodes becomes a cluster head for the current round if the number is less than the threshold T (n).
Where, p- the desired percentage of cluster heads (e.g. 0.05),
r - the current round
G- the set of nodes that have not been cluster heads in last 1/p rounds.
There is only 5% of the nodes need to act as cluster head which act as a router to the base station.
The cluster head (CH) nodes receives the data and compress all the data coming from nodes that belong to the
respective cluster, and sends an aggregate data to the base station. Data aggregation is performed to minimize
the amount of information that must be transmitted to the base station. Data aggregation is performed local to
the cluster[4]. This protocol is divided into rounds and each round consists of two phases:
A. Setup phase
1. Advertisement phase
2. Cluster Set-up phase
B. Steady phase
1. Schedule creation
2. Data transmission
The setup consists of three steps. In Step 1 (advertisement step), nodes independently and probabilistically
decide whether or not to become a CH for the current round .The nodes sends a broadcast message as
indication of becoming CH, the message can heard by everyone in the network. To avoid collision, a carrier
sense multiple access protocol is used. In Step 2 (cluster joining step), the remaining nodes join a cluster based
on the largest received signal strength of an advertisement message, and inform their intention to join cluster by
sending a join request message. Once the CHs receive all the join requests, Step 3 (confirmation step) the CHs
broadcasts a message informing time slot schedule to be used by their cluster member nodes for
communication. Once the clusters are set up, the network goes to steady-state phase, where actual
communication between sensor nodes and the BS takes place. Each node knows its time slot, to transmit
information. The CHs combines the messages from all their cluster members, aggregates the information and
sends the result to the BS. The steady-state phase comprises of multiple reporting cycles, and will be of much
longer time compared to the setup phase [5].
When n k-bit of messages has gathered by cluster head in its cluster then it compresses the data to a µ (n * k) –
bit message and sends this message to base station, where µ≤1 is the compression coefficient [6].
Enhanced Leach…
www.ijceronline.com Open Access Journal Page 33
Figure 2 Time line of leach protocol
Figure 3 Cluster formation process
IV. Analysis of simulation and results
The simulation shows performance evaluation of LEACH protocol in terms of number of dead nodes.
With this simulation results the life time of LEACH protocol can be studied. The graph in the fig.5 shows the
number of alive nodes in the network. Initially there were zero dead nodes in the network. But when
transmission starts the number of dead nodes increases immediately. The energy consumption by the nodes
increases and finally attains zero.
Figure 4 Field distribution
Figure 5 shows the initial field distribution of the network implementation. A 100m*100m field has been
considered and nodes are randomly placed in the field. The base station, which is denoted by a ×, is placed at the
center of the field. Here, the cluster head are shown by a plus symbol (+) and other nodes by a circle. All the
nodes are alive in the network.
Enhanced Leach…
www.ijceronline.com Open Access Journal Page 34
Figure 5 Simulation result – alive nodes
V. Conclusion
In this paper we analyze the LEACH protocol, an existing protocol architecture for wireless sensor
networks that incorporates the concepts of energy efficient cluster based routing together with data aggregation
to achieve required performance. We can implement LEACH protocol on both ns2 and MATLAB platform to
evaluate the performance of LEACH protocol.
References
[1]. Wikipedia,"Wireless Sensor Networks , ”http://en.wikipedia.org/wiki/Wireless_sensor_network
[2]. Dr. R. R. Mudholkar, Dr. S. R. Sawant, V. C. Patil, Rjshree. V. Biradar “Classification & Comparison of Routing Protocols in
WSN” UbiCC Journal- Vol 4
[3]. Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, Erdal Cayirci: “ A Survey on Sensor Networks”, IEEE
Communication Magazine, pp. 102-114(August 2002)
[4]. Amrinder Kaur,Sunil Saini, “Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network”
[5]. Sunil Pariyani, Rajesh Patel, Vijay Ukani,” Energy and Throughput Analysis of Hierarchical Routing Protocol(LEACH) for
Wireless Sensor Networks”, International Journal of Computer Applications Volume 20- No. 4 (April 2011)
[6]. Yuh Ren Tsai, “Coverage Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks”, IEEE
Transactions on Wireless Communications, Volume 6- No. 4 (April 2007)

More Related Content

What's hot (20)

PPTX
Thesis-Final-slide
Mahmuda Rahman
 
PDF
Various Clustering Techniques in Wireless Sensor Network
Editor IJCATR
 
PDF
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
PPTX
Energy efficient cluster head selection in LEACH protocol
ARUNP116
 
PDF
Cluster Head Selection for in Wireless Sensor Networks
editor1knowledgecuddle
 
PDF
Energy aware clustering protocol (eacp)
IJCNCJournal
 
PDF
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Associate Professor in VSB Coimbatore
 
PPTX
Energy Efficient Data Gathering Protocol in WSN
Zubin Bhuyan
 
PPTX
Energy efficient communication techniques for wireless micro sensor networks
Pushpita Biswas
 
PPTX
Hierarchical clustering algo for wsn
Samruddhi Gaikwad
 
PPTX
eeca
Yazhini Neha
 
PDF
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
PDF
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
IJCSIT Journal
 
PDF
Bn36386389
IJERA Editor
 
PPTX
Leach-Protocol
zhendong
 
PDF
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
PDF
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
IJMIT JOURNAL
 
PDF
Iaetsd survey on wireless sensor networks routing
Iaetsd Iaetsd
 
PDF
D031202018023
ijceronline
 
PDF
An Adaptive Cluster Based Routing Protocol for WSN
Eswar Publications
 
Thesis-Final-slide
Mahmuda Rahman
 
Various Clustering Techniques in Wireless Sensor Network
Editor IJCATR
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Energy efficient cluster head selection in LEACH protocol
ARUNP116
 
Cluster Head Selection for in Wireless Sensor Networks
editor1knowledgecuddle
 
Energy aware clustering protocol (eacp)
IJCNCJournal
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Associate Professor in VSB Coimbatore
 
Energy Efficient Data Gathering Protocol in WSN
Zubin Bhuyan
 
Energy efficient communication techniques for wireless micro sensor networks
Pushpita Biswas
 
Hierarchical clustering algo for wsn
Samruddhi Gaikwad
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
IJCSIT Journal
 
Bn36386389
IJERA Editor
 
Leach-Protocol
zhendong
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
IJMIT JOURNAL
 
Iaetsd survey on wireless sensor networks routing
Iaetsd Iaetsd
 
D031202018023
ijceronline
 
An Adaptive Cluster Based Routing Protocol for WSN
Eswar Publications
 

Viewers also liked (10)

PPTX
Boom boom incentive
gmtareq
 
PPTX
Memorimemoria tecnica
Cristian Bermeo El Chaval
 
PDF
Redes
saul
 
PDF
Ex1 4eso
Alex Perez
 
PPS
quem_foi_maria.pps
Herbert de Carvalho
 
PDF
Energy balanced improved leach routing protocol for wireless sensor networks
csandit
 
DOC
020 limites de funciones
Alex Perez
 
PPTX
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Majid Hajibaba
 
PPTX
NGN & IMS
Samuel Dratwa
 
PPT
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
Boom boom incentive
gmtareq
 
Memorimemoria tecnica
Cristian Bermeo El Chaval
 
Redes
saul
 
Ex1 4eso
Alex Perez
 
quem_foi_maria.pps
Herbert de Carvalho
 
Energy balanced improved leach routing protocol for wireless sensor networks
csandit
 
020 limites de funciones
Alex Perez
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Majid Hajibaba
 
NGN & IMS
Samuel Dratwa
 
Mobile cloud computing; Future of Cloud Computing
Vineet Garg
 
Ad

Similar to Enhanced Leach Protocol (20)

PDF
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
 
PDF
6 ijcse-01222-1
Shivlal Mewada
 
PDF
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
idescitation
 
PDF
Modified leach protocol in wireless sensor network a survey
IAEME Publication
 
PDF
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
IJERD Editor
 
PDF
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IAEME Publication
 
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
PDF
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Editor IJCATR
 
PDF
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
PDF
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
ijsrd.com
 
PDF
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
ijsrd.com
 
PDF
A multi-hop routing protocol for an energy-efficient in wireless sensor network
IJECEIAES
 
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
PDF
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
PDF
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
IJCNCJournal
 
PDF
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
ijsc
 
PDF
Protocol Enhancements in LEACH
Editor IJCATR
 
PDF
Protocol Enhancements in LEACH
Editor IJCATR
 
PDF
H0421043049
ijceronline
 
PDF
B045070510
IJERA Editor
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
 
6 ijcse-01222-1
Shivlal Mewada
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
idescitation
 
Modified leach protocol in wireless sensor network a survey
IAEME Publication
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
IJERD Editor
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IAEME Publication
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Editor IJCATR
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
ijsrd.com
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
ijsrd.com
 
A multi-hop routing protocol for an energy-efficient in wireless sensor network
IJECEIAES
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
ijwmn
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
IJCNCJournal
 
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
ijsc
 
Protocol Enhancements in LEACH
Editor IJCATR
 
Protocol Enhancements in LEACH
Editor IJCATR
 
H0421043049
ijceronline
 
B045070510
IJERA Editor
 
Ad

Recently uploaded (20)

PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
July Patch Tuesday
Ivanti
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
July Patch Tuesday
Ivanti
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 

Enhanced Leach Protocol

  • 1. ISSN (e): 2250 – 3005 || Volume, 05 || Issue, 05 || May – 2015 || International Journal of Computational Engineering Research (IJCER) www.ijceronline.com Open Access Journal Page 31 Enhanced Leach Protocol 1 Girish Prabhu, 2 Dr.G.R.Udupi 1,2 Dept of Electronics and Communication, Gogte Institute of Technology, Belgaum,India, I. Introduction A Wireless Sensor Networks (WSN) is a set of thousands of micro sensor nodes that are capable of sensing, communicating between each other and performing computational and processing operations. Wireless Sensor Networks can provide great advantages with respect to low-power, low-cost and fast deployment for many applications without human supervision[1]. Energy efficiency is one of the most important issues while designing protocols which are lifetime critical. Sensor nodes are equipped with tiny batteries with limited power. They can be randomly dropped or deployed manually. Organizing the wireless network in efficient and scalable manner is by using the clusters. Cluster head (CH) is responsible for information gathering by the nodes of its cluster and may aggregate and compress the data before transmission to sink. However, this results in a higher rate of energy utilization by cluster heads. The most popular clustering method is LEACH, which addresses clustering energy problem by probabilistically changing the role of cluster head among all nodes. The probability of becoming a cluster head should be selected wisely to increase the performance of the network. The main focus of this paper is to address energy problem and developing a method for selection of cluster head with the optimal probability from the point of minimizing the energy consumption [2]. II. Literature review Firstly sensor networks were mainly used by military applications but later have been considered for the applications such as environmental monitoring, health monitoring etc. A sensor network design is motivated by many factors, which include Fault Tolerant Communication, Scalability, Power Consumption, Data Delivery Models, Data Aggregation/Data Fusion, Node Deployment. LEACH is the network protocol used to increase the lifetime of the network by using hierarchical routing for wireless sensor. All the nodes in a network formulate themselves into local clusters, with one node performing as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head. While the cluster-head node performs data processing like data aggregation and then transmits data to the remote base station. Therefore, cluster-head node is much more energy-intensive than other nodes of cluster. Thus, when a cluster-head node dies all the nodes that cluster lose communication ability with base station. LEACH incorporates probabilistic rotation of the high-energy cluster- head in order to avoid exhausting the battery of any one sensor in the cluster. In this way, the energy load of a cluster-head is evenly distributed among the nodes of the cluster. Since the cluster-head knows all the member nodes, it will create a TDMA schedule for each node, which tells the nodes exactly when to transmit its data. Using a TDMA for data transfer avoids intra-cluster collisions. The cluster head is responsible for the transfer of the data to the base station. Abstract: Technological advances in wireless sensor networks have made impact on everyday life. In wireless sensor networks energy is main concern & it is considered while designing sensor networks. We use hierarchical routing protocols based on clustering because of balanced energy consumption and scalability. The efficient usage of energy in a sensor node is most important parameter to increase the life time of wireless sensor network. In this paper we analyze the design issues constructing the cluster in the wireless sensor networks and detail working of LEACH (Low Energy Adaptive Clustering Hierarchy) protocol and its SIMULATION .The results reveal the measure for performance of sensor networks. Keywords: Cluster head, Data aggregation, Energy efficient, Hierarchical routing, LEACH, Life time, Wireless sensor network
  • 2. Enhanced Leach… www.ijceronline.com Open Access Journal Page 32 III. Leach protocol Low Energy Adaptive Clustering Hierarchy (LEACH) protocol for sensor networks is proposed by W. R. Heinzelman which tries to minimize energy dissipation in wireless sensor networks. The arrangement of clusters is done depending on the of the received signal strength. The main purpose of LEACH protocol is to provide data aggregation for sensor networks. In LEACH protocol the total nodes are divided into many small groups called clusters for proportional distribution of power consumption inside the network. The cluster formation will be done as shown in the figure1 [3] Figure 1 Cluster formation The cluster head can be selected randomly and then rotate this role probabilistically to evenly distribute the energy load among the sensors in the cluster. The node n chooses a random number between 0 and 1 and the nodes becomes a cluster head for the current round if the number is less than the threshold T (n). Where, p- the desired percentage of cluster heads (e.g. 0.05), r - the current round G- the set of nodes that have not been cluster heads in last 1/p rounds. There is only 5% of the nodes need to act as cluster head which act as a router to the base station. The cluster head (CH) nodes receives the data and compress all the data coming from nodes that belong to the respective cluster, and sends an aggregate data to the base station. Data aggregation is performed to minimize the amount of information that must be transmitted to the base station. Data aggregation is performed local to the cluster[4]. This protocol is divided into rounds and each round consists of two phases: A. Setup phase 1. Advertisement phase 2. Cluster Set-up phase B. Steady phase 1. Schedule creation 2. Data transmission The setup consists of three steps. In Step 1 (advertisement step), nodes independently and probabilistically decide whether or not to become a CH for the current round .The nodes sends a broadcast message as indication of becoming CH, the message can heard by everyone in the network. To avoid collision, a carrier sense multiple access protocol is used. In Step 2 (cluster joining step), the remaining nodes join a cluster based on the largest received signal strength of an advertisement message, and inform their intention to join cluster by sending a join request message. Once the CHs receive all the join requests, Step 3 (confirmation step) the CHs broadcasts a message informing time slot schedule to be used by their cluster member nodes for communication. Once the clusters are set up, the network goes to steady-state phase, where actual communication between sensor nodes and the BS takes place. Each node knows its time slot, to transmit information. The CHs combines the messages from all their cluster members, aggregates the information and sends the result to the BS. The steady-state phase comprises of multiple reporting cycles, and will be of much longer time compared to the setup phase [5]. When n k-bit of messages has gathered by cluster head in its cluster then it compresses the data to a µ (n * k) – bit message and sends this message to base station, where µ≤1 is the compression coefficient [6].
  • 3. Enhanced Leach… www.ijceronline.com Open Access Journal Page 33 Figure 2 Time line of leach protocol Figure 3 Cluster formation process IV. Analysis of simulation and results The simulation shows performance evaluation of LEACH protocol in terms of number of dead nodes. With this simulation results the life time of LEACH protocol can be studied. The graph in the fig.5 shows the number of alive nodes in the network. Initially there were zero dead nodes in the network. But when transmission starts the number of dead nodes increases immediately. The energy consumption by the nodes increases and finally attains zero. Figure 4 Field distribution Figure 5 shows the initial field distribution of the network implementation. A 100m*100m field has been considered and nodes are randomly placed in the field. The base station, which is denoted by a ×, is placed at the center of the field. Here, the cluster head are shown by a plus symbol (+) and other nodes by a circle. All the nodes are alive in the network.
  • 4. Enhanced Leach… www.ijceronline.com Open Access Journal Page 34 Figure 5 Simulation result – alive nodes V. Conclusion In this paper we analyze the LEACH protocol, an existing protocol architecture for wireless sensor networks that incorporates the concepts of energy efficient cluster based routing together with data aggregation to achieve required performance. We can implement LEACH protocol on both ns2 and MATLAB platform to evaluate the performance of LEACH protocol. References [1]. Wikipedia,"Wireless Sensor Networks , ”http://en.wikipedia.org/wiki/Wireless_sensor_network [2]. Dr. R. R. Mudholkar, Dr. S. R. Sawant, V. C. Patil, Rjshree. V. Biradar “Classification & Comparison of Routing Protocols in WSN” UbiCC Journal- Vol 4 [3]. Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, Erdal Cayirci: “ A Survey on Sensor Networks”, IEEE Communication Magazine, pp. 102-114(August 2002) [4]. Amrinder Kaur,Sunil Saini, “Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network” [5]. Sunil Pariyani, Rajesh Patel, Vijay Ukani,” Energy and Throughput Analysis of Hierarchical Routing Protocol(LEACH) for Wireless Sensor Networks”, International Journal of Computer Applications Volume 20- No. 4 (April 2011) [6]. Yuh Ren Tsai, “Coverage Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Volume 6- No. 4 (April 2007)