GURU NANAK COLLEGE BUDHLADA JAVA ASSIGNMENT ON INTEGRITY IN WIRELESS SENSOR NETWORK Submitted To

GURU NANAK COLLEGE BUDHLADA
JAVA ASSIGNMENT ON INTEGRITY IN WIRELESS SENSOR NETWORK
Submitted To:- Submitted By:-
Prof. Rekha Kalra Manisha Rollno =1957
Class:-M.C.A.LT2
DEPARTMENT OF COMPUTER SCIENCE
GURU NANAK COLLEGE BARETA JAKHAL ROAD
BUDHLADA 151502
WIRELESS SENSOR NETWORK:
Wireless Sensor Network:-wireless sensor network are present almost everywhere. It used for measuring some physical Parameters like temperature, pressure, sounds, chemical composition etc. A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves using radio signals, and deployed in quantity to sense, monitor and understand the physical world. Wireless sensor network provide a bridge between the real physical and virtual worlds.
Types of Wireless Sensor Networks
Wireless sensor network are three types. which are given below:-
Terrestrial Wireless sensor network
Underground wireless sensor network
Mobile wireless sensor network
Leach protocol:

Is a heads aggregate and compress the data and forward it to the base station (sink). Each node uses a stochastic algorithm at each round to determine whether it will become a cluster head in this round. LEACH assumes that each node has a radio powerful enough to directly reach the base station LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the cluster or the nearest cluster head, but that using this radio at full power all the time would waste energy.
Nodes that have been cluster heads cannot become cluster heads again for P rounds, where P is the desired percentage of cluster heads. Thereafter, each node has a 1/P probability of becoming a cluster head again. At the end of each round, each node that is not a cluster head selects the closest cluster head and joins that cluster. The cluster head then creates a schedule for each node in its cluster to transmit its data.
All nodes that are not cluster heads only communicate with the cluster head in a TDMA fashion, according to the schedule created by the cluster head. They do so using the minimum energy needed to reach the cluster head, and only need to keep their radios on during their time slot.
Properties:
Properties of this algorithm include:
Cluster based
Random cluster head selection each round with rotation. Or cluster head selection based on sensor having highest energy
Cluster membership adaptive
Data aggregation at cluster head
Cluster head communicate directly with sink or user
Communication done with cluster head via TDMA Threshold value
Simulation:
There are many both of open source and commercial networks simulator for leach such as:
Open source
Proprietary software
IDE
MATLAB
Phases of leach protocol:
It has two phases:
1.The set up phase and steady phase.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

2.The set up phase where cluster heads are choosen.

x

Hi!
I'm Antonia!

Would you like to get a custom essay? How about receiving a customized one?

Check it out