Professional Documents
Culture Documents
Supervisor:
Dr. P. P. Bhattacharya
FET, MITS
Submitted by:
Neha Rathi
Enroll.No. 110410
December 2012
Mody Institute of Technology & Science
(Deemed University u/s 3 of the UGC Act, 1956)
Faculty of Engineering & Technology
Lakshmangarh, Sikar 332311 (Rajasthan)
Date:21/12/2012
Certificate
This is to certify that Ms. Neha Rathi (Enrolment No. 110410) has successfully
completed the dissertation preliminary entitled Concentric Cluster Based
PEGASIS for Wireless Sensor Networks and has submitted the report in
partial fulfillment for the award of the degree of Master of Technology in Signal
Processing to Department of E&CE, Mody Institute of Technology and Science.
To the best of my knowledge, the work is original and has not been submitted
elsewhere for any other academic attainment.
It is further certified that Ms. Neha Rathi has fulfilled all the requirements laid
down by Faculty of Engineering & Technology, Mody Institute of Technology
and Science, Lakshmangarh for the submission of report.
(Supervisor Name)
Prof. P.P. Bhattacharya
Date: 21/12/2012
Examiner Certificate
External Examiner
Contents
Page no.
Acknowledgement
Abstract
List of Figures
List of Tables
List of Abbreviations
iv
v
vi
viii
ix
Chapter 1
1.
Introduction
1.1
1.2
Chapter 2
2.
Chapter 3
3.
3.2
3.3
Flat-Based Routing
6
6
3.1.1
3.1.2
SPIN
3.1.3
Directed Diffusion
3.1.4
Energy-Aware Routing
10
11
3.2.1
U-LEACH
12
3.2.2
TEEN
13
Location-Based Routing
13
13
3.3.1
CHAPTER 4
4.
15
15
4.1
Literature Review
15
4.2
PEGASIS
15
4.2.1
Chain Construction
15
4.2.2
Data Gathering
16
4.3
16
4.4
17
4.5
17
Chapter 5
5
18
Radio Model
18
5.2
19
Chapter 6
6
22
22
6.1
Level Assignment
22
6.2
23
6.3
23
Chapter 7
7
18
26
26
References
27
29
List of Figures
PageNo.
4
Fig.2.1
Fig.3.1
Fig.3.2
Fig. 3.3
SPIN Protocol
Fig.3.4
Network connectivity
10
Fig.3.5
Fig.3.6
An overview of U-LEACH
Fig. 4.1
16
Fig. 4.2
18
:
10
:
12
:
it to BS
Fig. 5.1
20
Fig.5.2
20
sets of Eelec.
Fig.5.3
20
of Eamp.
Fig.5.4
21
Fig.5.5
21
Fig.6.1
22
Fig.6.2
Creation of nodes
23
Fig.6.3
24
Fig.6.4
Level assignment
24
Fig.6.5
25
List of Tables
Table I
Variables
PageNo.
19
List of Abbreviations
WSNs
QoS
Quality of Service
ADCs
REQ
Request
ACK
Acknowledge
CHs
Cluster-Heads
GAF
HGAF
BS
Base- Station
Chapter 1
INTRODUCTION
The sensor nodes are constrained to limited resources itself, so the main target is on how
to design an effective and energy aware protocols in order to enhance the network lifetime for
specific application environment. Classically most routing protocol is classified as datacentric, hierarchical and location based protocols depending on the network structure and
applications. Energy Efficiency, Scalability, Latency, Fault-Tolerance, Accuracy, and Quality
of Service (QoS), which we must carefully consider when we design or choose the routing
protocols in WSNs. Yet the common aim is to build a steady transmission path in a quickrapid and lowcost manner.
AIM OF THE DISSERTATION
Objective of the dissertation is to design the enhanced PEGASIS protocol (one of the
routing protocol) based on concentric clustering scheme which can be used to minimize the
problem of redundant data transmission since one of the nodes in the chain is selected as a
head node regardless of the base station location. The main idea of the concentric clustering
scheme is to consider the location of the base station to enhance its performance and to
prolong the lifetime of the wireless sensor networks. In addition to this, the performance of
concentric cluster based PEGASIS for WSNs is also analyzed.
In present work, the sensor network is divided into several clusters and each node in the
sensor networks is assigned its own level from the base station. In each level area, the chain
construction is started at the farthest node from the base station using the greedy algorithm.
This process of the chain construction is the same with the current PEGASIS protocol. The
performance of enhanced PEGASIS protocol based on concentric clustering scheme for
wireless sensor network is also analyzed.
ORGANIZATION OF THE DISSERTATION
The dissertation is organized as follows: Chapter 2 includes the introduction of wireless
sensor networks. Routing protocols for wireless sensor networks is organized in chapter 3.
Basic concept of PEGASIS is described in chapter 4. Chapter 5 shows the performance
analysis of energy consumption in PEGASIS. Design and Simulation scenario for cluster
based PEGASIS is describe in chapter 6. Conclusion and future work is shown in chapter 7.
Chapter 2
WIRELESS SENSOR NETWORK (WSNs)
Wireless sensor networks have seen extensive proliferation of applications and interest in
research and industry. Such networks can be densely deployed over a diverse geographic
area ranging from 10s of meters to several hundreds of kilometers through deploying small,
low cost devices that can observe and influence the physical world around them by gathering
status information and then transforming this into radio signals. Such signals are then
transmitted to a local sink which may be connected to a gateway to send the data to external
network such as internet. The data thus received may be analyzed and appropriate
decision/action taken depending on the type of application. Unfortunately, these sensors
suffer from resources constraint and power limitation as these sensors are usually deployed in
remote places that are not easy to reach. Inevitably, there is a finite life time duration for such
devices and new sensors have to be deployed to replace the old ones. It is some of these
limitations that has shown an increasing interest from the scientific community to research in
such devises that would enhance the longevity and coverage of the devices by using various
new technology developments in this field. The main emphasis is on maximizing the life time
of sensors and to use the limited resources efficiently by adopting mechanisms, algorithms
and protocols that consider these limited resources as main priorities and challenges to
produce efficient and reliable networks [1].
A sensor node is made up of four basic components, as shown in Figure 2.1, sensing unit, a
processing unit, a transceiver unit, and a power unit. They may also have additional
application-dependent components such as a location finding system, power generator, and
mobilizer. Sensing units are usually composed of two subunits:
I. Sensors
II. Analog-to-digital converters (ADCs).
The analog signals produced by the sensors based on the observed phenomenon are converted
to digital signals by the ADC, and then fed into the processing unit. The processing unit,
which is generally associated with a small storage unit, manages the procedures that make the
sensor node collaborate with the other nodes to carry out the assigned sensing tasks. A
transceiver unit connects the node to the network. One of the most important components of a
sensor node is the power unit. Power units may be supported by power scavenging units such
as solar cells. There are also other subunits that are application-dependent. Most of the sensor
network routing techniques and sensing tasks require knowledge of location with high
accuracy. Thus, it is common that a sensor node has a location finding system. A mobilizer
may sometimes be needed to move sensor nodes when it is required to carry out the assigned
tasks.
Sensor networks are application specific that is design requirements of a sensor network
change with application. Position awareness of sensor nodes is important since data
collection is normally based on the location. Routing mechanisms consider the inherent
features of WSNs and the application and architecture requirements. The task of finding and
maintaining routes in WSNs is nontrivial since energy restrictions and sudden changes in
node status cause frequent and unpredictable topological changes. To minimize energy
consumption, routing techniques proposed in the literature for WSNs employ some well
known routing tactics as well as tactics special to WSNs. Classification of almost all of the
routing protocols can be according to the network structure as flat, hierarchical, or location
based. In flat networks, all nodes play the same role while hierarchical protocols aims at
clustering the nodes so that cluster heads can do some aggregation and reduction of data in
order to save energy. Location-based protocols utilize the position information to relay the
data to the desired regions rather than the whole network. In this work, flat based,
hierarchical based and location based protocols are discussed and classified. The various
protocols include SPIN, DD, ACQUIRE, RR, COUGAR, LEACH, TEEN, APTEEN,
PEGASIS, GEAR and GAF. SPIN, DD and RR. The characteristics of these protocols along
with their advantages and disadvantages are presented in the paper. Finally a comparison is
made followed by a conclusion [2]. The advantages and disadvantages of wireless sensor
networks can be summarized as follows [3]:
Advantages:
Ideal for the non-reachable places such as across the sea, mountains, rural areas or
deep forests.
Disadvantages:
Less secure because hackers can enter the access point and get all the information.
Lower speed compared to a wired network.
More complex to configure than a wired network.
Easily affected by surroundings.
Chapter 3
ROUTING PROTOCOLS FOR WSNs
The sensor nodes are constrained to limited resources itself, so the main target is on how
to design an effective and energy awareness protocols in order to enhance the networks
lifetime for specific application environment. Since sensor nodes are not given a unified ID
for identification and much redundant data collected at destination nodes, energy efficiency,
scalability, latency, fault-tolerance, accuracy and QOS, are some aspects which must be kept
in mind while designing the routing protocols in wireless sensor networks.
Classically most routing protocol could be classified as data-centric, hierarchical and location
based protocols depending on the network structure and application. A few distinct protocols
are based on the network flow and QOS awareness. Routing protocols can be classified into
multipath-based, query based and negotiation based, QOS based, or coherent based routing
techniques depends on protocol operation. Routing protocol depending on network structure
is discussed here.
FLAT BASED ROUTING
It is not possible to assign global identifiers to each node in wireless sensor networks
because of dense deployment and dynamic environment of sensor nodes. Random
deployment and dynamics make it hard to select a specific set of sensor nodes to be queried.
Thus routing in the system should operate autonomously, changing its configuration as
required.
Data is usually transmitted within deployment region from every sensor node with significant
redundancy. Since this is vulnerable in terms of energy consumption. Routing protocol is
considered to aggregate data from the cluster of sensor nodes, which helps in saving energy
and transmit the data to destination. This consideration has led to data-centric routing, where
all nodes are typically equal and acts as same functionality.
In data-centric routing, sinks sends queries to certain regions and waits for data from sensors
located in the selected regions. To facilitate data-centric characteristics of sensor queries, an
attribute-based naming scheme is used to specify the properties of data.
Flooding and Gossiping
Flooding and gossiping [4] are the most traditional network routing. They do not need to
know the network topology or any routing algorithms. In flooding mechanism, each sensor
receives a data packet and then broadcasts to all neighboring nodes. When the packet arrives
at the destination or the maximum number of hops is reached, the broadcasting process is
stopped. On the other hand, gossiping is slightly enhanced version of flooding where the
receiving node sends the packet to randomly selected neighbors, which picks another random
neighbor to forward the packet to and so on. Although flooding is very easy, it has several
drawbacks like implosion, overlap and resource blindness problem.
Implosion caused by duplicate message sent to same node as shown in figure 3.1. A starts
by flooding its data to all its neighbors. Two copies of data eventually end at node D. The
system wastes energy and bandwidth.
Overlap caused when two nodes sensing the same region send similar packets to the same
neighbor and resource blindness by consuming large amount of energy without consideration
for the energy constraints. Overloading problem shown in figure 3.2.
Gossiping avoids the problem of implosion by sending information to a random neighbor
instead of classical broadcasting mechanism sending packets to all neighbors. However,
gossiping caused another problem of delay in a propagation of data among sensor nodes.
SPIN
Joanna Kulik et al. in [4][5] proposed a family of adaptive protocol, called SPIN (Sensor
Protocol for Information via Negotiation) that efficiently disseminates information among
sensors in an energy-constrained wireless sensor network and overcome the problem of
implosion and overlap caused in classic flooding. Nodes running a SPIN communication
protocol name their data using high-level data descriptors, called metadata. SPIN nodes
negotiate with each other before transmitting data. Negotiation helps to ensure that the
transmission of redundant data throughout the network is eliminated and only useful
information will be transferred.
Fig.3.3. SPIN Protocol. Node A starts by advertising its data to node B (a). Node B responds by
sending a request to node A (b). After receiving the request data (c). Node B then sends out
advertisements to its neighbors (d) who in turn send requests back to B (e-f)
SPIN nodes use three types of messages to communicate between nodes. These are ADV,
REQ, DATA. ADV message allow sensor to advertise a particular meta-data. REQ for
request data. DATA message is actual sensor data with a meta-data header. ADV and REQ
messages are smaller and cheaper to send and receive because they contain meta-data. SPIN
protocol is suggested in figure 3.3. Node A sends an ADV message to Node B, after
receiving a packet node B checks whether it possesses al the advertised data (a). If not, node
B sends a REQ message back to node A, listing all of the data it would like to acquire (b).
When node A receives the REQ packet, it retrieves the requested data and sends it back to
node B as a DATA message (c). Node B, in turn, sends ADV messages advertising the new
data it received from node A to all of its neighbors (d). It does not send an advertisement
back to node A, because it knows that node A already has the data. These nodes then send
advertisements of the new data to all of their neighbors, and the protocol continues. Nodes
are not required to respond to every message in the protocol. One neighbor does not send an
REQ packet back to node B (e). This would occur if that node already possessed the data
being advertised.
The disadvantage of SPIN protocol is that it is not sure about the data will certainly reached
the target or not and it is also not good for high-density distribution of nodes. Other drawback
is that if the nodes that are interested in the data are far away from the source node and the
nodes between source and destination are not interested in that data, such data will not be
delivered to the destination at all. Therefore, SPIN is not a good choice for applications.
Directed Diffusion
Directed diffusion protocol in highly mobile environments will lead to much network
overhead and poor performance. T. Purusothaman et al. [6] proposed a simple solution to
improve the performance of directed diffusion in mobile scenario. To achieve this, they
modified the interest propagation mechanism and control the interest propagation with
respect to the mobility as well as the nearby density of the propagating node.
In the proposed method, a sensor node will propagate the interest message only if the
condition is based on speed of the node and the density of nearby nodes is satisfied. In the
proposed this method, if a node receives a packet then the node will check the Packet Pi that
is a new packet or not. If the received packet is not a new one then the node will recheck the
packet is already been forwarded. If that is the case then the packet will be dropped, on the
contrary if the packet is not forwarded then the interest timer is updated. If the packet is new
and it is an interest packet then the number of adjacent nodes and mobility factors are
calculated. Ni is number of nearby nodes for a particular node; the mobility factor is defined
as the ratio of node speed and the expected node speed. If Ni is less than minimum expected
Neighbors then propagate the interest packets into the network. Else if the Mobility factor is
less than mobility threshold then propagate the interest packets into the Network. If both the
conditions are not satisfied then it will not propagate the interest. If the received packet is not
an interest packet then it is handled normally.
The proposed directed diffusion protocol implies the better performance than other protocols
in terms of overhead, MAC load and dropped packets. This algorithm is very well
recommended for mobile and very dense networks.
Energy-Aware Routing
Energy aware routing protocol is efficient method to minimize the energy cost for
communication and can increase the network lifetime. Unlike directed diffusion, data
transmission is done through several optimum paths at higher rates instead of transmitting
through one optimal path. The transmission path selection is done by choosing a probability
value of each path. The probability value balanced the initial network load and enhanced the
network lifetime.
An energy aware routing protocol is proposed in [7] which provide a reliable transmission
environment with low energy consumption. The energy efficient routing algorithm proposed
is used for making decision on which neighbor a sensor node should forward the data
message. A node is selected on the basis of its residual energy level and signal strength.
Ideally, the greater the energy of the node, is more likely to be selected on the next hop. The
nodes which are not selected will move to the sleep state to conserve power. Network
connectivity is shown in figure 3.4 [7]. There are many intermediate nodes available in the
network. All nodes within the radio range of the nodes receive the broadcast message at the
same time. When the sink initially broadcast the message, the nodes A, E and G receive the
message. Assume that the available energy at A is larger than at E and G, and also A is within
the required signal strength threshold, hence node A is selected to broadcast the message to
the neighboring nodes. The process continues and node B which is selected sends out the
broadcast message which is received by nodes F and C, it is found that both F and C have the
same energy level and are within the required signal strength threshold.
So both F and C start a back-off timer and if the back-off timer of node F ends before C an
implicit acknowledgement is sent by node F which is also received by node C, and so node C
stops its back-off timer as shown in Figure 3.5. When the broadcast message reaches the
target source, the source transmits the route reply packet through the nodes it received the
broadcast message. This protocol provides reliable packet delivery for unicast transmission.
Data is cached in the sender until an ACK is received from the receiver. If no ACK is
received within a timeout period, an error report is generated and the data will be sent back to
the original source of this data in order to retransmit.
The disadvantage is that energy-aware routing needs to exchange local information between
neighbor nodes and all nodes have a unified address, which enlarges the price of building
routing paths.
HIERARCHICAL BASED ROUTING (CLUSTERING)
Hierarchical routing is a guarantee approach for point-to- point routing with very small
routing state [8]. Scalability is one of the essential design features of the sensor networks. A
single-gateway architecture can cause the gateway to overload which might cause a break in
communication and tracking of events is unhealthy. Other major disadvantage is that long
haul communication is not possible because it is not scalable for large set of sensors. To
overcome these drawbacks network clustering has been pursued in some routing approaches.
Hierarchical or cluster based methods are well known techniques with special advantage of
scalability and efficient communication. Nodes play different roles in the network.
Hierarchical routing maintains the energy consumption of sensor nodes and performs data
aggregation which helps in decreasing the number of transmitted messages to base station.
The whole WSNs is divided into a number of clusters in term with the specific rules. Some
hierarchical protocols are discussed here.
U-LEACH
LEACH (LowEnergy Adaptive Clustering Hierarchy), a clustering-based protocol that
utilizes randomized rotation of Cluster-Heads (CHs) to evenly distribute the energy among
the sensors in the network.
network. Therefore there is the possibility that the elected CHs will be concentrated in certain
area of the network. Hence, some nodes will not have any CHs in their vicinity. The proposed
approach U-LEACH [9] is an approach to address this problem. It wisely organizes the
network through consistent distribution of clustering as shown in figure 3.6. LEACH Protocol
works in the following steps : Step 1: Decide CHs and broadcast advertisement. Step 2:
Nodes transmit membership. Step 3: Heads broadcast schedule. Step 4: Nodes transmit data.
Step 5: Heads compress data and send to base station. Step 6: New turn begins go to Step 1.
If the coverage area of each CH can be predefined before Step 1, then the limitation of
uniform distribution of CHs can be improved. The CHs will be efficiently allocated
throughout the network. Initially all nodes are homogeneous. The node, which has the
maximum remaining energy, advertises itself as the first CH. Then the first CH selects an
area, no other node in that particular area can advertise itself as CH. After that another CH is
selected from rest of the network. In this way the whole network is divided into some
predefined areas. Each area contains one CH and all the nodes in that area constructs a
cluster, not a single node will remain outside these areas. Thus the CHs are uniformly
distributed throughout the network. A uniform distribution technique of U-LEACH for
selecting CHs can not only reduce energy consumption but also increase nodes life time.
particular nodes on the basis of signal strength so that energy consumption can be estimated.
Location information is also utilized in routing data in energy efficient way when addressing
scheme for sensor network is not known. It is worth noting that there have been many
location-based protocols in Ad Hoc networks and it makes great effects when we transplant
those research achievements for wireless sensor networks in some ways.
GAF and HGAF
GAF [11], is adaptive fidelity algorithm in which large numbers of sensor nodes are
placed in observed area and only few nodes in the observed area are selected to transmit
messages, while the other nodes sleep. In this way, GAF reduces the number of nodes needed
to form a network and saves nodes battery.
Hierarchical Geographical Adaptive Fidelity (HGAF) saves much more battery by enlarging
the cell of GAF by adding a layered structure for selecting an active node in each cell. GAF
saves battery power by enlarging the size of the cell. The connectivity between active nodes
in two adjacent cells must be guaranteed because active nodes works as cluster heads to
deliver packets between cells. Because of this limitation, GAF needs an active node in every
area whose maximum size is R2/5.
HGAF limits the position of active node in a cell and synchronizes the position in each cell
among all cells. Through this modification, the connectivity between active nodes in two
adjacent cells can be guaranteed for a larger cell than in GAF.
Simulation result shows that HGAF outperforms GAF in terms of survived nodes and the
packet delivery ratio when the node density is high. The lifetime of dense and randomly
distributed networks with HGAF is about 200% as long as ones with GAF.
Chapter 4
POWER-EFFICIENT GATHERING IN SENSOR
INFORMATION SYSTEM
LITERATURE REVIEW
Simple approach to collect data from sensor nodes is direct approach where each sensor
nodes transmit the data directly to the base station (BS) which is located far away. Cost to
transmit data from each sensor node to BS is very high, thus nodes die quickly and hence
reducing the lifetime of the network. Therefore to utilize energy efficiently goal is to use as
few transmissions as possible. LEACH Protocol is designed where sensor nodes are
organized to form local cluster with one node in cluster selected as cluster head. Sensor nodes
from one cluster send data to its cluster head where data is aggregated and fused data is
transmitted to BS. Cluster heads are chosen randomly and achieve a factor of 8 improvements
compared to direct approach. Although LEACH protocol reduces energy consumption by
factor 8, energy is consumed is forming cluster. In LEACH 5% of the nodes are the head
nodes at the same time that also amounts to energy consumption [12].
PEGASIS (Power-Efficient Gathering in Sensor Information System)
PEGASIS is the improved protocol where only one node is chosen a head node which
sends the fused data to the BS per round. This achieves factor of 2 improvement compared to
LEACH protocol [12]. PEGASIS protocol requires formation of chain which is achieved in
two steps:
Chain construction
To construct the chain we start from the furthest node from the BS and then greedy
approach is used to construct the chain. In figure 4.1, node c0 lies furthest from the base
station, chain construction start from node c0 which connects to node c1, node c1 connects to
node c2, node c2 connects to node c3, and node c3 connects to node c4, node c4 connect to
c5.
Gathering Data
Leader of each round is selected randomly. Randomly selecting head node also provides
benefit as it is more likely for nodes to die at random locations thus providing robust
network. When a node dies chain is reconstructed to bypass the dead node [13].
After the leader is selected it passes token to initiate data gathering process. Passing token
also requires energy consumption but cost of passing token is very small because token size
is very small. In figure 4.2 node c3 is selected as head node for particular round. Node c5
passes the data to c3 along the chain, c0 passes the data to c3 along the chain. c3 receives the
data, fuses all the data it has received and transmit to the base station.
ADVANTAGES OF PEGASIS OVER LEACH
Compare to LEACH transmitting distance for most of the node reduces in PEGASIS.
Messages received by each head node are at most 2 in PEGASIS is less compared to
LEACH.
Since each node gets selected once, energy dissipation is balanced among sensor
nodes.
When a head node is selected, there is no consideration how far the BS is located
from the head node [14].
Since there is only one node head, it may be the bottle neck of the network causing
delay.
Chapter 5
PERFORMANCE ANALYSIS OF ENERGY
CONSUMPTION IN PEGASIS
where,
Eelec = per bit energy consumption in the transmitter circuitry
k
= Data bits
Eamp=
(ETX-elec=ERX-elec=Eelec)
ETX-elec=50 nJ/bit
TABLE I. Variables
Type
Parameter
Value
Transmitter Electronics
Eelec
50Nj
Transmit Amplifier
Eamp
100pJ
Data Bits
500
Eagg
5nJ
Eelec
consumption will not increase with increase in number of nodes and Eelec.
It is shown in figure 5.3 that energy consumption is independent of transmit amplifier energy.
14
x 10
K=500
K=1000
K=1500
K=2000
K=2500
12
Energy Consumption(nJ)
10
8
20
0
10
30
40
50
60
Number of Nodes
70
80
90
100
Fig.5.1. Number of nodes vs Energy Consumption with different sets of data bits.
6
14
x 10
Eelec=50
Eelec=100
Eelec=150
Eelec=200
Eelec=250
12
Energy Consumption
10
8
20
0
10
30
40
50
60
Number of Nodes
70
80
90
100
2.5
x 10
Eamp=0.5
Eamp=0.1
Eamp=0.15
Eamp=0.2
Eamp=0.25
Energy Consumption
1.5
0.5
0
10
8
20
30
40
50
60
Number of Nodes
70
80
90
100
Figure 5.4 shows that when n nodes receive the data from neighbor nodes increases, the
energy consumption in one round also enhanced. So it is clear that number of nodes receiving
data should be in minimum to reduce the energy consumption.
Energy consumptioninoneround(nJ)
2.5
x 10
1.5
0.5
5
6
neighbour nodes
10
The energy consumption of the aggregation at one node is Eagg. then an energy consumption
of entire nodes in one round increases when nodes which aggregating data increases. So it is
clear from figure 5.5 that number of nodes aggregating data should be kept minimum to
reduce the energy consumption.
Energy consumption vs nodes aggregating data
50
45
40
35
30
25
20
15
10
5
4
5
6
7
nodes aggregating data
10
Chapter 6
DESIGN AND SIMULATION FOR CONCENTRIC
CLUSTER BASED PEGASIS
1000
118
6537 20
178
135 128 143
76
13610
171
82
59
900
157
4
44 139
34
30
39
7
77 147 9652
17
42
54116160 177 108 9
133 75
800 159
103
158
129 13070 74 80 141
45
101
3
700 92
106
127
63
46109 161
149
117
112
38
95
89
64
36
132 79
84
91 15
164
69
155
600 124 99
137
175 26
172
179
126
115 83
100
154
145
122
86
165 66
140
102
500
152
53104
110
174
170
55
56
2 29
57
21
153
131
43
98
51
142
7358
94
169
400
67
93
25
90
71
97
78
24
113
121
151
22
88
148 47
173
23
300
61
146
163
5
168
32
123
6
138
35
12
85
8
11
200 162
68
81
50
16105
18
1948
176
33
49
114
41
1
27
111
156
100
167
134
14
144
120
166
150
13
125
62
180 28 40
72
60
0
0
100
200
300
400
500
600
700
800
900 1000
31
87
107
119
Neighbor of each node within 100 meter range is calculated in figure 6.3 for example. 119 is a
neighbor of 107, 31 and 171 are the neighbor nodes of 118. Chain construction is performed with the
help of these neighbor nodes.
1000
118
6537 20
178
135 128 143
76
13610
171
82
59
900
157
4
44 139
34
30
39
7
77 147 9652
17
42
54116160 177 108 9
133 75
800 159
103
158
129 13070 74 80 141
45
101
3
700 92
106
127
63
46109 161
149
117
112
38
95
89
64
36
15
132
84
91 164
69
79
600 155
137
124 99
175 26
172
179
126
115 83
100
154
145
66
122
86
165
140
102
500
152
53104
110 170
174
55
56
2 29
57
21
153
131
43
98
51
142
7358
94
169
400
67
93
25
90
71
97
78
24
113
121
151
22
88
148 47
173
23
300
61
146
163
5
168
32
123
6 12
138
35
85
8
11
200 162
68
81
50
16105
18
19
48
176
33
49
114
41
1
27
111
156
100
167
134
14
144
120
166
150
13
125
62
180 28 40
72
60
0
0
100
200
300
400
500
600
700
800
900 1000
31
87
107
119
In figure 6.4, each node in the sensor networks is assigned its own level from the base station.
The interval of level may be various according to setting values in the base station. The
number of these levels depends on the location of the base station.
1000
118
6537 20
178
135 128 143
76
13610
171
82
59
900
157
4
44 139
34
30
39
7
77 147 9652
17
42
54116160 177 108 9
133 75
800 159
103
158
129 13070 74 80 141
45
101
3
700 92
106
127
63
46109 161
149
117
112
38
95
89
64
36
15
132 79
84
91 164
69
600 155
137
124 99
175 26
172
179
126
83
115
100
154
145
122
86
165 66
140
102
500
152
53104
110 170
174
55
56
2 29
57
21
153
131
43
98
51
142
7358
94
169
400
67
93
25
90
71
97
78
24
113
121
151
47
22
88
148
173
23
300
61
146
163
5
168
32
123
6
138
35
12
85
8
11
200 162
68
81
50
16105
18
1948
176
33
49
114
41
1
27
111
156
100
167
134
14
144
120
166
150
13
125
62
180 28 40
72
60
0
0
100
200
300
400
500
600
700
800
900 1000
31
87
107
119
In each level area, the chain construction is started at the farthest node from the base station
using the greedy algorithm as shown in Figure 6.6. In each level, farthest node from the base
station finds the closest neighbor of it in same level and start the process of chain
construction. Figure 6.5 shows the neighbor nodes at different level assignment. This process
of the chain construction is the same with the current PEGASIS protocol.
1000
118
6537 20
178
135 128 143
76
171
82
59
900
157
34
30
39
77 147 9652
17
42
54116160 177 108 9
133 75
800 159
103
158
129 13070 74 80 141
45
101
3
700 92
106
127
63
46109 161
149
117
112
38
95
89
64
36
15
132 79
84
91 164
69
600 155
137
124 99
175 26
172
179
126
83
115
100
154
145
122
86
165 66
140
102
500
152
53104
110 170
174
55
56
2 29
57
21
153
131
43
98
51
142
7358
94
169
400
67
93
25
90
71
97
78
24
113
121
151
22
88
148 47
173
23
300
61
146
163
5
168
32
123
6
138
35
12
85
8
11
200 162
68
81
50
16105
18
1948
176
33
49
114
41
1
27
111
156
100
167
134
14
144
120
166
150
125
6213
28
180
72
40
60
0
0
100
200
300
400
500
600
700
800
900 1000
31
87
107
119
13610
4
44 139
7
1000
118
6537 20
178
135 128 143
76
13610
171
82
59
900
157
4
44 139
34
30
39
7
147
52
77
17
96
42
54116160 177 108 9
133 75
800 159
103
158
129 13070 74 80 141
45
101
3
700 92
106
127
63
46109 161
149
117 89
112
38
95
64
36
15
132 79
84
91 164
69
600 155
137
124 99
175 26
172
179
126
83
115
100
154
145
122
86
165 66
140
102
500
152
53104
110 170
174
55
56
2 29
57
21
153
131
43
98
51
142
7358
94
169
400
67
93
25
90
71
97
78
24
113
121
151
47
22
88
148
173
23
300
61
146
163
5
168
32
123
6
138
35
12
85
8
11
200 162
68
81
50
16105
18
1948
176
33
49
114
41
1
27
111
156
100
167
134
14
144
120
166
150
125
6213
28
180
72
40
60
0
0
100
200
300
400
500
600
700
800
900 1000
31
87
107
119
Fig.6.6.Chain Construction
Chapter 7
CONCLUSION AND FUTURE WORK
The results indicate that when number of nodes, energy consumption per bit and number
of data bits increases, energy consumption increases. So, all these parameters should be kept
low to minimize energy consumption. It is also analyzed that nodes aggregating data and
neighbor nodes receiving data should be kept low so that energy consumption does not
increase. In this work, nodes are created and neighbor of each node is assigned at each level
and chain construction of node is done in each level area.
In future, the residual energy of all nodes will be calculated so that the node with the
highest level will be selected as a head node and data will be accumulated towards it. A new
method will be chosen for selecting the node as a head node to observe the energy
consumption compared to existing PEGASIS. In addition to this, I would like to add 10 back
up nodes in the task so that when the existing head node going to die out it will transfer all its
work load of transferring data to the next node in the queue.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
K. E. Kannammal and
[8]
[9]
[11] Tokuya Inagaki and Susumu Ishihara, HGAF: A power saving scheme for
wireless sensor network, Journal of Information Processing, vol. 17, pp. 255266, Oct. 2009.
[12] Stephanie Lindsey, Cauligi S. Raghvendra, PEGASIS: Power-Efficient
Gathering in Sensor Information System, Aerospace Conference Proceedings,
2002. IEEE, Vol.3, pp. 3-1125- 3-113.
[13] Stephanie Lindsey, Cauligi Raghavendra and Krishna Sivalingam, Data
Gathering in Sensor Networks using Energy Delay Metric, Proceedings of the
15th International Parallel & Distributed Processing Symposium, pp. 188,
2001.
[14] Vrinda Gupta and Rajoo Pandey, Investigating Clustering Algorithms in
Microsensor
Networks
Proceedings
of
the
World
Congress
on