Académique Documents
Professionnel Documents
Culture Documents
BATCH NO:5
SUPERVISOR: Dr. R. VINOD KUMAR,Ph.D
BATCH MEMBERS:
Vibhu . S
Shiva .R
Ugeshraja .M
Krishna prasanth . M
LITERATURE REVIEW
Title-Detection of dishonest trust • In this paper the security mechanism of
recommendations in mobile ad hoc networks the current WSN is improved along with
Author:Zakirullah; Islam, M.H Khan the efficiency.
Year:2016 • Cluster Head based on neighborshood
Loss
Title:A SURVEY OF WIRELESS •Z-MAC does not use a global frame equal for
SENSOR NETWORK all nodes in the network.
ARCHITECTURES
Author:Almir Davis.C • It would be very difficult and expensive to
Year:2015 adapt when a topology change occurs.
Title:data-centric arthitecture in wsn •Data-centric architectures are characterized by
Author:Hwa Chang a vast number of randomly deployed sensors
Year:2015 that
• It only communicate node-to-node without any
global network identification.
• In these types of architectures, a sink node
sends a request query through the network of
nodes
• The LEACH protocol divides the whole network into several clusters.
• The splitting take place randomly and the nodes form clusters and elect a
cluster head randomly among themselves.
• Some clusters may have fewer nodes and some may have more nodes.
MOTIVATION:
• To achieve a longer lifetime and better performance of
the nodes by using less energy in an efficient manner.
• Parameters-
load balancing
Energy efficient
OBJECTIVE:
• To elect the cluster head based on their Residual
energy and Mobility parameters.
Transceiver
Memory Embedded
processor
Sensor
Battery
CLUSTER HEAD ELECTION
• The cluster head selection for each cluster is done by comparing the
residual energy of individual sensor node in every round.
• The selection of cluster head depends on threshold value. The
selection depends on 0 or 1.
• If the number is less than the threshold value then the corresponding
node becomes the head for the particular round.
T= P , if n G
1-p[r mod(1-p)]
0 , otherwise
DATA TRANSMISSION
• The data which is gathered by the nodes will be transmitted to the base
station by the cluster head in an energy efficient manner.
• Here only the active nodes which collect the data will send the data to
cluster head and then to the station.
• Other nodes are in sleep mode
STEP BY STEP PROCESS
STEP1: start
STEP2: select the cluster head based on the threshold value.
STEP3: If the node becomes cluster head,cluster head is selected.
STEP4: Wait for nearby node to send joint request.
STEP5: If the joint request is received by cluster head
STEP6: calculate the average energy
STEP7: create scheduling for data transmission using TDMA.
STEP8: If the data is received from all the cluster then send the data
to the base station.
STEP9: stop.
Proposed method
• To improve the existing LEACH protocol, we are proposing a new
protocol named as IM-LEACH (Improved Modified LEACH)
protocol.
• This protocol mainly focusses to improve the energy consumed by the
nodes in data gathering and to improve the lifetime of the nodes
• The first one is active then sleep mode node scheduling concept, and
the second is vice versa
• Our proposed system TDMA time slot is applied for each every nodes
SIMULATOR