MACHINE-TO-MACHINE LEACH BASED CROSS-LAYER PROTOCOL FOR ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORKS

Amount: ₦8,000.00 |

Format: Ms Word |

1-5 chapters |




ABSTRACT

Wireless sensor network (WSN) consists of a group of sensor nodes  that enables the monitoring of a variety of environmental information for various applications. In WSNs, it is very important to operate a sensor network for a long time to achieve the intended purpose. Low Energy Adaptive Clustering Protocol (LEACH) is a clustering technique that provides solution to the short life span of a network. It is a self-organized protocol that has been modified with different parameters and direction to achieve long life span of WSN. The demand for information and increase in deployed sensor nodes per area has created limitation for performance of WSN in terms of long life span and energy utilization. Most modifications  on  LEACH as  a solution  to  energy efficiency in  WSN did  not  capture solution to the effect of this increase. This work was carried out on the scenario of large number of nodes in an area and large number of nodes per cluster to achieve efficient energy utilization and distribution. It entails utilization of contention window (CW) adjustment for effective communication within clusters, efficient number of clusters based on  deployed  nodes  and  number  of  neighbors.  This  technique  divides  the  nodes  in  a coverage area into clusters. These divided nodes sense data from the field and forward to their respective cluster heads that will in turn send to the upper parent nodes in the upper hierarchy till the packet gets to the sink. The intra cluster communication occurs between nodes   in   a   cluster   and   cluster   heads.   The   conventional   means   of   intra   cluster communication is through direct transmission since it is assumed that the nodes in a cluster are  many,  the  cluster  members  would  compete  for  channel  access  to  forward  their individual packets to the cluster heads. When the CW is small it leads to high collision and loss of data and degradation of the network performance when the CW is high It leads to waste of channel resources. Optimum contention window adjustment where the active number of nodes is taken into consideration when CW is selected for effective channel utilization and reduction of collision was utilized. The high demand of information has led to high number of nodes per coverage area which has become a problem for WSN with direct   transmission.   Contention   Window   LEACH   (CW_LEACH)   showed   better performance and longer network lifetime. The total number of rounds of communication was increased by 16% when simulated on MATLAB. The total successful transmission was 2400. This ensured maximization of energy of the nodes through proper utilization of channel, less idle listening and over hearing. This method can be applied in IoT and devices on 5G.

CHAPTER ONE

1.0 INTRODUCTION

1.1 Background to the Study

Wireless sensor network is simply an interconnection of devices that houses sensors with capabilities to detect and respond to some type of physical or environmental input such as pressure, temperature, light, sound, heat. The outputs of these sensors are usually electrical signals that are transmitted through wireless links for onward processing and utilization; Miao et al. (2016). It is a self-organized wireless network systems consisting of many low- cost and resource constraint sensor nodes. It can be comprised of hundreds or thousands of sensors, depending on the requirement of quality of service (QoS) and the capability to tolerate a fault, Jyoti et al., (2014). These sensors are battery powered with computational capabilities and low in cost. WSN explores different topologies for its communication; these topologies could  be star, tree or mesh.  The different types  of WSN are mainly categorized based on environmental deployment and purpose, which are; Terrestrial, Underwater, multimedia and mobile WSN just to mention a few. The application of WSN technology  is  endless  in  areas  such  as  health,  transportation,  IoT,  environmental monitoring, security etc.

Over the years this technology has undergone several improvements through research in the different areas of applications which covers distribution, communications, data processing, interconnection and energy efficiency which is the focus of this research. Wireless Sensor Networks (WSN) are on high demand Zhang et al., (2016). This is due to revolution in technology that needs independent processing, detection and activation of gadgets Patil et al., (2016), applications of internet of things (IoT) Kumar et al., (2016), body area network (BAN), wireless sensor network (WSN) and machine to machine (M2M) communication. However, to achieve better performance of the network, many researchers such as Wei et el., (2015), Alkadeki et al., (2015), Zhang et al., (2016) have leverage on the use of Wireless Local Area Network WLAN to achieve communication in M2M. To do this, IEEE 802.11 standards remains important.

1.1.1 Physical deployment of devices in WSN:

Star Topology: This topology is the type of topology where each node connects directly to the gateway or sink. A single sink can send and receive packets from different remote nodes. In this topology the remote nodes are not allowed to send packets to each other. Communication between remote nodes has to be routed through the gateway or sink. This characteristic brings about low latency communications between the nodes and the sink.

Tree Topology: This topology is also known as cascaded star topology in which each node connects to a node that is placed higher in the tree and then to the sink. The main advantage of tree topology is that the network could be expanded easily and also detects errors easily. The disadvantage of this topology is that it depends heavily on the bus cable. If the bus cable breaks, the whole network will collapse.

Mesh Topology: The mess topology allows transmission from one remote node to another which is within its transmission range, and if a node wants to communicate with another node that beyond its transmission range, it uses another remote node as an intermediate node to forward the packet to the desired node. The advantage of this topology includes easy detection and isolation of fault in the network.

Nodes in the fields are connected to the central node called access point as shown in Figure pressure or any other environmental metrics.

Figure 1.1 Node Communications in Wireless Network (Vojislav et al. 2015) With the topology considered above (which is an equivalent of start topology), it is obvious that Nodes 1 to Node n will all contend for the channel resource to communicate with the central node. In this research, part of the focus is on improving the power safe mode of the nodes.

There are different ways nodes communicate in a network environment depending on the number of nodes, their states (active or inactive) or their position (mobile or static). The aim of deploying nodes to an environment is to extract relevant data from the environment for onward processing and utilization, in other to achieve this aim and maximize resources, multiple nodes are deployed at the same time and the method of deployment also differs. These deployed nodes do communicate with each other and with the sink. This gives birth to  the  term  cooperative  communication,  which  is  a  scheme  that  provide  solution  for effective communication among nodes in a network to achieve some objectives such as energy efficiency in  the  network;  Vojislav  et  al.,  (2015), efficient  channel  utilization, increase in network operation period, reduction in network interferences, expansion in coverage, transmission reliability, network throughput and network stability.

One  of  the  major  areas  of  cooperative  communication  which  forms  the  basis  of  this research is clustering. This is the grouping of sensor nodes or communication devices to form clusters for the sole purpose of attaining efficient usage of network resources. Clustering technique help to utilize energy efficiently and reduce collision at the network access point. The access to the network gateway or sink is through the cluster head which also aggregate all the data from the cluster member nodes. Peng et al., (2014). Clustering protocols define the topology of the hierarchical non-overlapping clusters of sensor nodes in the network. An effective clustering protocol ensures the creation of clusters that are described with the radius that is similar and perfectly positioned cluster head to serve all cluster members with equity. All nodes in the network that is clustered are linked to the selected cluster head. The cluster heads find their own appropriate routes to the sink in the network. When considering a sensor network that is covering a wide area, clustering approach will reduce complication in the network. (Sucasas et al., 2016).

All the clustering protocols have elected to choose the cluster head first then the cluster members align accordingly based on some criteria. Border nodes join the nearest cluster and sometimes serves as gateway for inter cluster heads communication.

1.2 Statement of the Research Problem

The focus in LEACH and other clustering protocols has been on efficient energy utilization and channel access through effective energy distribution in clusters and effective communication between cluster nodes and cluster heads then cluster heads and sink. Little has been done on inter cluster communication through the use of border nodes as gateway or relay node and also few have considered intra cluster communication. The number of nodes in a cluster could vary depending on coverage area and total number of deployed nodes in the network. The aim of energy efficiency is defeated when the members of a cluster that contend to forward their packets to the cluster head is high. An M2M network might possess hundreds or thousands of nodes (devices) densely located over small or medium area due to the demand for information and growth of number of devices that extract or deliver the needed information Zhang et al., (2012). When this happens, the number of nodes in a small cluster area will grow exponentially, the effective communication with less contention and energy waste due to idle listening between cluster nodes and cluster heads, child node and parent node will go a long way to determine life span of the node and indirectly the efficiency of the network. We propose optimum contention window adjustment for optimum selection of window period for active nodes for effective channel utilization, energy efficiency and reduction of packet loss due to collision.

1.3 Aim and Objectives of the Study

The aim of the research is to develop a machine-to-machine LEACH based cross-layer protocol for energy efficiency in wireless sensor networks. This would be achieved via the following objectives.

1.  To develop a cross-layer contention window based LEACH protocol

2.  To simulate the scenario with defined network parameters

3.  To evaluate the overall network performance in terms of energy efficiency and distribution.

1.4 Justification of the Research

Since idle listening and overhearing during communication in WSN network is one of the major reason for more power waste Wei et al. (2015), which is also a problem with intra cluster communication with cluster heads due to the use of direct transmission (DTx). We propose optimum contention window adjustment based on active nodes in  a round as solution to a large number of nodes in a cluster communicating efficiently with their cluster heads in a LEACH network to further reduced energy consumed during idle listening, overhearing and balance the load in the network. The contention window is adjusted strictly based on active nodes in the cluster. Based on our research, no method like this has been applied to hierarchical intra cluster communication.

1.5 Scope of the Study

The scope of this work is limited to enhancing the energy performance of a LEACH hierarchical clustering protocol through contention window adjustment based on active node in rounds of transmissions, analysis of results and comparison with the Novel LEACH protocol. This work provides solution to a scenario where the number of deployed nodes is high which brings with it the challenge of intra-cluster communication and effective power management. Optimum contention window adjustment is applied to manage the competing nodes for channel access through selection of window size based on the number of active nodes with packets in their buffer then the nodes multi-hop their packets through other nodes to the sink. The investigation carried out suggests that this technique display superior performance when the number of deployed nodes over a coverage area is very high.

1.6 Thesis Outline

This rest of this thesis is structured as follows; Chapter 2 has the Literature review that presents various techniques proposed by different researchers to combat the challenge of WSN short battery life and improve the performance of the networks, LEACH, modifications of LEACH. Chapter 3 presents Research Methodology and how the aim and objectives of this research was achieved. Chapter 4 has the presentation of result and discussion, Chapter 5 has the Conclusion and Recommendations.



This material content is developed to serve as a GUIDE for students to conduct academic research


MACHINE-TO-MACHINE LEACH BASED CROSS-LAYER PROTOCOL FOR ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORKS

NOT THE TOPIC YOU ARE LOOKING FOR?



A1Project Hub Support Team Are Always (24/7) Online To Help You With Your Project

Chat Us on WhatsApp » 09063590000

DO YOU NEED CLARIFICATION? CALL OUR HELP DESK:

  09063590000 (Country Code: +234)
 
YOU CAN REACH OUR SUPPORT TEAM VIA MAIL: [email protected]


Related Project Topics :

Choose Project Department