• 沒有找到結果。

Multi-Chain Data Gathering in Wireless Sensor Networks

N/A
N/A
Protected

Academic year: 2021

Share "Multi-Chain Data Gathering in Wireless Sensor Networks"

Copied!
10
0
0

加載中.... (立即查看全文)

全文

(1)

Multi-Chain Data Gathering in Wireless Sensor

Networks

Shiow-Fen Hwang

, Kun-Hsien Lu

††

, Zen-You Huang

††

, Chyi-Ren Dow

†† Department of Information Engineering and Computer Science

Feng Chia University, Taichung, Taiwan 40724

Email:sfhwang@mail.fcu.edu.tw, ††{p9217988, m9503100, crdow}@fcu.edu.tw

Abstract—Data gathering is a fundamental operation

in wireless sensor networks (WSNs). Due to the limited battery power, energy conservation is an essential issue to reduce the total energy consumption of sensor nodes and prolong the network lifetime. In addition, the trans-mission delay of a round is also an important factor in data gathering applications. In this paper, we propose a Multi-Chain Data Gathering (MCDG) protocol for WSNs. MCDG organizes all sensor nodes to form a single chain that is further divided into several subchains of unequal size. In each subchain, an aggregation node is assigned for reducing the transmission delay and some of the other nodes take turns to be a subchain leader for balanced energy consumption. All subchain leaders cooperate to forward data to the base station. The objective of MCDG is to achieve energy-efficient data gathering with delay re-duction. Simulation results show that MCDG outperforms PEGASIS and COSEN in terms of the number of rounds and the energy × delay cost.

Index Terms—wireless sensor networks, data gathering,

chain, energy-efficient, delay reduction.

I. INTRODUCTION

In recent years, with advances in micro-electro-mechanical systems (MEMS) technology, wireless communications and digital electronics have en-abled the development of wireless sensor with low cost processor and low power consumption[1][2]. A wireless sensor network (WSN) usually consists of numerous sensors with light-weight and wireless communication ability and limited battery power. These sensors are deployed over an area of in-terest to collect useful information and transmit the collected data to a base station (BS) or a sink for post-processing. Therefore, wireless sensor networks have been generally applied to various military and civil applications, such as environment monitoring, disaster prediction, intrusion detection

and so on.

Data gathering is an fundamental operation in WSNs. A simple strategy to accomplish data gath-ering is direct transmission. Each node collects data from its surroundings and transmits data to the BS directly in a round of communication. Since the BS is usually located far away from the sensor field, the energy cost to transmit to the BS for any node is high so that nodes will die quickly. Therefore, energy conservation is an essential issue for data gathering applications. There are two approaches that have been widely used for saving energy in WSNs. One approach is multi-hop relay, which utilizes cooperation among nodes. Since the energy cost for data transmission is proportional to the square of the distance of transmission, the use of multi-hop relay reduces the total energy consump-tion of nodes efficiently. The other approach is data aggregation[3], which combines two or more packets into a same-size packet. Hence, the amount of data packets transmitted in the network can be reduced.

Another important factor for data gathering ap-plications, such as forest fire detection, is the trans-mission delay. As described in literature[4], the transmission delay can be measured as the number of transmissions to accomplish a round of data gathering. Therefore, by employing data gathering schedule and simultaneous data transmissions, the transmission delay can be reduced.

Various data gathering protocols, such as LEACH[5], PEGASIS[4][6], and PEDAP[7], have been proposed to minimize the total energy con-sumption of nodes and prolong the network lifetime. In these protocols, chain-based archi-tecture is widely adopted to efficiently achieve

(2)

the above goals. In general, the existing chain-based data gathering protocols group all nodes into a single chain[6][8] or multiple chains [4][9][10][11][12][13][14][15]. The protocols using a single chain can conserve energy because only one node becomes the leader to transmit data to the BS and every other node just transmits data to its next node. However, it also causes large transmission delay as the number of nodes becomes large. On the contrary, the protocols using multiple chains can reduce the transmission delay because all chains can perform data gathering simultaneously. But the use of multiple chains also increases the total energy consumption of nodes. Therefore, there is a tradeoff between the transmission delay and the energy consumption.

In this paper, we propose a Multi-Chain Data Gathering (MCDG) protocol in WSNs. MCDG first organizes all nodes to form a single chain by using the proposed chain formation algorithm. The single chain is then further divided into several subchains of unequal size. In each subchain, an aggregation node is assigned to reduce the transmission delay and some of the other nodes take turns to be a subchain leader for balanced energy consumption. These selected leader nodes cooperate to forward data to the BS. The objective of MCDG is to achieve energy-efficient data gathering with delay reduction. Simulation results indicate that MCDG outperforms PEGASIS and COSEN in terms of the number of rounds and the energy × delay cost.

The rest of this paper is organized as follows: Section II reviews the literatures about some chain-based data gathering protocols. The network model and energy model are introduced in Section III. Section IV presents the detail of the proposed multi-chain data gathering protocol. In Section V, we evaluate the proposed protocol and compare it with PEGASIS and COSEN. Finally, Section VI draws our conclusions.

II. RELATED WORK

Many chain-based data gathering protocols have been proposed in recent years. In this section, we briefly introduce PEGASIS[6], GSEN[10], and COSEN[11] which are related to our study.

A. PEGASIS

PEGASIS (Power-Efficient GAthering in Sensor

Information Systems)[6] is a representative

chain-based data gathering protocol. It organizes all nodes into a single chain by using greedy algorithm. Each node communicates with a close neighbor node, and takes turns to be a leader. The leader is responsible for transmitting the aggregated data of the chain to the BS in a round. Although PEGASIS reduces the total energy consumption of nodes than cluster-based data gathering protocols, such as LEACH[5], but it has some deficiencies. First, greedy algorithm is simple to construct a chain, however, long link between a pair of nodes may be generated. This is because a node in the chain may need to connect to another node that is not in the chain and far away from itself if most of nodes are added to the chain. Moreover, nodes far away from the BS consume much energy when transmitting data to the BS. Therefore, uneven energy consumption among nodes still exists in PEGASIS. Second, PEGASIS constructs a long chain and may result unacceptable transmission delay as the network size becomes large.

B. GSEN

N. Tabassum et al. proposed a two layer hierar-chial routing protocol, called Group-based SEnsor

Network (GSEN)[10]. GSEN divides all nodes into

several groups. In each group, a chain is formed by using greedy algorithm as presented in PEGA-SIS. A group leader is rotated in a random order among nodes in a chain, and collects data. All groups leaders then form a high-level chain, and one random chosen high-level leader is responsible for transmitting the aggregated data to the BS. GSEN not only makes more number of rounds than PEGASIS, but also introduces reasonable delay in a round of data gathering. However, long link problem also exists in GSEN because of the use of greedy algorithm.

C. COSEN

N. Tabassum et al. also proposed a hierarchi-cal chain-based protocol, hierarchi-called COSEN (Chain

Oriented SEnsor Network)[11]. Similar to GSEN,

COSEN groups all nodes into several low-level chains. Unlike the criterion of leader selection using

(3)

a random fashion in GSEN, COSEN selects leaders according to the residual energy of nodes. In each low-level chain, the node with the maximum resid-ual energy is elected to be the low-level leader. Be-sides, one high-level leader is elected from several low-level leaders based on the proposed formulation and transmits the aggregated data to the BS.

III. NETWORK AND ENERGY MODELS Our proposed protocol, MCDG, is based on the typical data gathering applications of sensor net-works where data are collected periodically from all sensor nodes to the BS. The network model of MCDG has the following assumptions.

1. All sensor nodes are homogeneous, energy constrained, and have the same capabilities. 2. The BS is located far away from the sensor

field.

3. The BS has global knowledge of the network for constructing chain topology.

4. No mobility of the BS and sensor nodes. 5. Sensor nodes have the ability of power control

to adjust their transmission power to commu-nicate with any other sensor node and the BS. MCDG uses the first order radio model presented in LEACH[5] to calculate the energy consumption of a node. The energy consumed in transmitting a l-bit data packet over a distance d is shown in Equation (1).

ET x(l, d) = Eelec× l + εamp× l × d2 (1) Equation (2) shows the energy consumed in re-ceiving a l-bit data packet.

ERx(l) = Eelec× l (2)

Here, a radio dissipates Eelec = 50 nJ/bit to run the transmitter or receiver circuitry, and εamp = 100 pJ/bit/m2 to run the transmitter amplifier. It is obvious that a fixed energy consumption (i.e.

Eelec × l) is needed for transmitting or receiving a data packet, and an additional energy consumption for data transmission which depends on the distance of transmission d. Besides, A sensor node also

consumes 5 nJ/bit/packet for data aggregation.

G H I F D J A B C E G H I F D J A B C E (a) PEGASIS (b) MCDG

Fig. 1. Single chain formation.

Algorithm 1 Single Chain Formation Algorithm

1: V : the set of deployed nodes.

2: N : the set of nodes not in the chain yet.

3: CHAIN : the set of nodes already added to the chain.

4: sa : the node with the index a in the chain.

5: d(a, b) : the distance between node a and node b.

6: AvgDist : the average length of all links in the chain.

7: α and β : constants.

8: /*Initialization phase*/

9: N← V ; AvgDist ← 0;

10: s0← the node closest to the BS;

11: CHAIN ← {s0}; N ← N− {s0};

12: /*Chain formation phase*/

13: for i= 0 to |V | − 2 do

14: Let x∈ N with d(si, x)=min{d(si, p)|p ∈ N};

15: temp← d(si, x);

16: if |CHAIN||V | ≥ α and d(si, x) ≥ β ∗ AvgDist then

17: for j= 0 to i − 2 do

18: Len[x, sj]=d(sj, x) + d(x, sj+1) − d(sj, sj+1);

19: end for

20: Select a node sj with minimum Len[x, sj];

21: if Len[x, sj] < d(si, x) then

22: Insert x between sj and sj+1in CHAIN ;

23: temp← Len[x, sj];

24: else

25: si+1 ← x; /*x becomes si+1.*/

26: end if

27: else

28: si+1 ← x;

29: end if

30: CHAIN ← CHAIN ∪ {x}; N← N− {x};

31: AvgDist←AvgDist∗i+tempi+1 ;

32: end for

IV. MULTI-CHAIN DATA GATHERING In this section, we present the proposed data gathering protocol, MCDG, which contains four phases: 1)single chain formation phase, 2)subchain formation phase, 3)aggregation node and leader node scheduling phase, and 4)data gathering and

(4)

transmission phase. Besides, we also analysis the transmission delay incurred in a round of data gathering.

A. Single Chain Formation Phase

A simple method to construct a chain connecting all nodes is the greedy algorithm that is adopted by PEGASIS. The greedy chain starts with the furthest node from the BS. The closest neighbor not in the chain to this node is elected as the next node in the chain. This process is repeated until all nodes are added to the chain. However, the greedy chain may consists of long links among nodes. For example, in Fig. 1(a), a greedy chain, which starts with node A, is constructed by PEGASIS. It is obvious that the length of the link between node I and node J is more longer than those of the others. Node I and node J will consume more energy than other nodes when transmitting data to each other. Therefore, in order to reduce the effect of long links, we simply modify greedy algorithm as shown in Algorithm 1. The proposed single chain formation algorithm aims to eliminate long links as much as possible. The detail of single chain formation is as follows.

Initially, the node that is closest to the BS is assigned to construct the chain. This node selects its closest neighbor not in the chain as the next node and adds it to the chain. Hence, a new link (or a new edge) is created between both of them. The process of selecting next node is the same as the greedy algorithm used in PEGASIS and is repeated until the two following conditions are satisfied.

1. The ratio of the number of nodes added to the chain to the number of deployed nodes is larger than or equal to a threshold value α.

2. The length of the new link is larger than or equal to a valueβ times the average length of all links of the chain.

Here, the values, α and β, are set to determine whether a new link should be eliminated or not. In line 14-26 of Algorithm 1, a nodex not in the chain

is elected as the next node by node si that is at the end of the chain. When both of these two conditions are satisfied simultaneously, a node sj (j ≤ i − 2) with minimum increased chain length in the chain is elected if we insert node x between node sj and nodesj+1. The increased chain length for nodesj is

d(sj, x) + d(x, sj+1) − d(sj, sj+1). Therefore, if the 4 s s5 s6 s7 s8 11 s s12 s13 s14 s15 16 s s17 s18 s19 s20 9 s s10 0 s s1 s2 s3 1 SC 2 SC 3 SC

Fig. 2. An example of subchain formation.

minimum increased chain length is smaller than the length of the new link between nodesi and nodex, node x will be inserted between node sj and node

sj+1. The new link between node si and node x is thus eliminated. Otherwise, node si still selects node x as the next node and adds it to the chain.

Figure 1(b) shows a single chain constructed by MCDG. The long link between node I and node J is eliminated, and node J is inserted between node C and node D to minimize the increased chain length. Therefore, MCDG reduces the chain length compared to PEGASIS (in Fig. 1(a)) and can save energy in data transmissions. Moreover, the selections of α and β values will affect the chain length of MCDG compared to that of PEGASIS. We will evaluate these two values in Section V.

B. Subchain Formation Phase

Let the single chain produced by Algorithm 1 be

{s0, s1, . . . , sn−1}, where s0 is the node closest to

the BS and sn−1 is the last node added to the chain. MCDG divides the single chain into k subchains of unequal size. The set of subchains is defined as

{SC1, SC2, . . . , SCk}, where k is an odd number and |SCi+1| = |SCi| − 2, for all 1 ≤ i ≤ k − 1. Therefore, the number of nodes in the subchainSCi is |SCi| = nk + (k − 2 × i + 1), for all 1 ≤ i ≤ k. The first subchain SC1 has maximum number of nodes while the last subchain SCk has minimum number of nodes. The main objective of dividing a single chain into several subchains is to reduce the transmission delay of a round because all subchains can perform data collection simultaneously. Figure 2 is an example of dividing a single chain with 21 nodes into three subchains,SC1,SC2 andSC3 with

nodes 9, 7, and 5, respectively.

The above approach of dividing the single chain into k subchains is the case that n is divisible by k. However, when n is not divisible by k, we can

(5)

4 s s5 s6 s7 s8 0 s s1 s2 s3 4 s s5 s6 s7 s8 0 s s1 s2 s3 4 s s5 s6 s7 s8 0 s s1 s2 s3 Round 1 Round 2 Round 7 įġ įġ į įġ įġ į 4 s s5 s6 s7 s8 0 s s1 s2 s3 Round 8

Leader node Aggregation node Ordinary node

(a) L = 9 11 s s12 s13 s14 s15 9 s s10 s16 s17 s18 11 s s12 s13 s14 s15 9 s s10 s16 s17 s18 įġį ġį 11 s s12 s13 s14 s15 9 s s10 s16 s17 s18 11 s s12 s13 s14 s15 9 s s10 s16 s17 s18 Round 1 Round 2 Round 7 įġ įġį Round 8 (b) L = 10

Fig. 3. Aggregation node and leader node scheduling.

SC1 to SCi in order, for some i < k. For example, if n is 23 and k is 3, the remainder is 2 (nodes). Therefore, three subchains,SC1, SC2, andSC3 will have 10, 8, and 5 nodes, respectively.

C. Aggregation Node and Leader Node Scheduling

Phase

In each subchain, an aggregation node and a leader node are assigned to collect and relay the aggregated data of the subchain. The other nodes is called ordinary node. Suppose that a subchain con-tains L nodes and starts with a node si, where i is the minimum index in the subchain. The selections of aggregation node and leader node are as follows. When L is an odd number, a node sj with the index j = L2 + i becomes the aggregation node. The other nodes in the subchains take turns to be the leader node. Figure 3(a) shows an subchain contain-ing 9 nodes. Node s4 is elected as the aggregation node of the chain and the other nodes, s0 ∼ s3 and

s5 ∼ s8, rotate to be the leader node from round

to round. However, when L is a even number, we

assign two nodes, sj andsj+1, wherej = L2 + i−1, to be the candidates for the aggregation node. The other nodes also take turns to be the leader node. Here, the aggregation node is elected depending on the index of the leader node. Assume that sx is the leader node in current round, if x is small than j,

nodesj then becomes the leader node in this round.

However, ifx is larger than j +1, node sj+1 will be the leader node. Figure 3(b) illustrates an subchain consisting of 10 nodes. Node s13 and node s14 are the candidates for the aggregation node. The other nodes, s9 ∼ s12 and s15 ∼ s18, take turns being the leader node. When the leader node is one of nodes s9 ∼ s12, node s13 is the aggregation node. Otherwise, node s14 becomes the aggregation node. Since the aggregation node is fixed at or near to the center of the subchain, the transmission delay of a round can be further reduced by applying simul-taneous data transmissions. Besides, the role of the leader is rotated among nodes in the subchain. When the number of nodes in the subchain increases, the average distance between the aggregation node and the leader node may also increase. This results in the increase of energy consumption for data transmission between the aggregation node and the leader node. Therefore, for each subchain, we set a value γ to limit the number of nodes to rotate the role of leader. For example, in Fig. 3(a), we set γ as 0.5. Therefore, 4 (=(9-1)*0.5) nodes, s2, s3, s5,

s6, will take turns to be the leader node. The value

γ is also evaluated in Section V.

D. Data Gathering and Transmission Phase

In a round, the process of gathering data from all nodes contains two parts: 1)intra-subchain commu-nication and 2)inter-subchain commucommu-nication.

First, intra-subchain communication takes place within each subchain. In a subchain, the aggregation node is responsible for collecting the aggregated data sent from ordinary nodes. In the beginning of a round, two ordinary nodes that are at the end of the subchain start to transmit their sensed data toward the aggregation node simultaneously. An ordinary node, which received data from its previous ordinary node, aggregates the received data with its own into a single data packet, and then transmit it to the next node until the aggregation node. As the aggregation node has collected the aggregated data from all ordinary nodes, it then transmits to the leader node. Figure 4(a) shows that an example of intra-subchain communication. In the example, the subchain contains 5 nodes. Node s2 serves as the aggregation node, and the other nodes take turns to be the leader from round to round. In round 1, after the aggregation node s2 has collected the

(6)

4 s 0 s s1 s2 s3 4 s 0 s s1 s2 s3 4 s 0 s s1 s2 s3 Round 1 Round 2 Round 3 4 s 0 s s1 s2 s3 Round 4 1 2 1 3 1 1 2 3 3 1 1 1 2 2 1 3

Leader node Aggregation node Ordinary node Data transmission

(a) L = 5 4 s 0 s s1 s2 s3 4 s 0 s s1 s2 s3 4 s 0 s s1 s2 s3 Round 1 Round 2 Round 3 4 s 0 s s1 s2 s3 Round 4 4 1 1 2 4 4 1 1 1 2 2 3 3 5 s 5 s 5 s 5 s 1 2 3 1 3 1 4 (b) L = 6

Fig. 4. Two examples of intra-subchain communication. The number near to a solid arrow indicates the time slot for a node to forward data.

aggregated data sent via two routes, s1 → s2 and

s4 → s3 → s2, it then forwards data to the leader

nodes0. The number near to a solid arrow indicates the time slot for a node to transmit data. In this case, the transmission delay for the subchain in a round is 3 units. Figure 4(b) illustrates another example of intra-subchain communication, where a subchain contains 6 nodes.

For inter-subchain communication, all leader nodes cooperate to forward the aggregated data to-ward the BS. As described in Section IV-B, there are

k subchains, SC1, SC2, . . . , SCk, in the network. The leader node of the subchain SCk forwards the aggregated data toward the leader node of the subchain SC1 via the leader-to-leader route. Each leader node also performs data aggregation during inter-subchain communication. Finally, the leader node of the subchain SC1 transmits the aggregated data of all nodes to the BS and a round is completed. Although the leader node in the subchain SC1 does long-distance data transmission toward the BS, however, the subchain SC1 has maximum number

of nodes to rotate the role of the leader among nodes

4 s s5 s6 s7 s8 11 s s12 s13 s14 s15 16 s s17 s18 s19 s20 9 s s10 0 s s1 s2 s3 1 SC 2 SC 3 SC BS 1 2 3 1 2 3 2 1 3 2 1 4 5 4 3 5 6 7 1 2 1

Fig. 5. An example of inter-subchain communication. The trans-mission delay of round is 7 units. The number near to a solid arrow indicates the time slot for a node to forward data.

for sharing the energy consumption. Figure 5 shows an example of inter-subchain communication. After the leader node s16 of SC3 received the aggregated data sent from the aggregation nodes18, it performs data aggregation and then forwards data to the next leader node s9. Note that the leader node s16 has to wait 2 units of delay to start inter-subchain communication for collision avoidance. After the leader node s0 received data from the leader node

s9, it then sends the aggregated data of the network

to the BS. In this example, the transmission delay incurred in a round is 7 units.

E. Delay Analysis

In this subsection, we discuss the transmission delay of a round in MCDG. Suppose that n nodes is deployed in the network, and k subchains are

required. Since the maximum number of subchains is restricted by the number of nodes, thus we have the following lemma.

Lemma 1: Given a network with n nodes. If k

subchains are required in MCDG, then n has to be at least k2+ 3k.

Proof : In MCDG, the number of nodes in a

subschain is required to be at least 4, which are an aggregation node, a leader node, and two ordinary node. The set of the number of nodes in subchains is

{2k+2, 2k, . . . , 6, 4}. Hence, the sum n is k2+3k.

Based on the above relationship between n and k, and the following lemmas, we can obtain the

upper bound of the transmission delay of MCDG in Theorem 1.

(7)

and nk is an integer, then the transmission delay of a round is 2kn + k2 + 3 units.

Proof : the transmission delay of a round, called

Ttotal, is generated from three parts: 1)intra-subchain communication, 2)inter-subchain communication, 3)data transmission between the leader node and the BS. First, the transmission delay for intra-subchain communication, called Tintra, is determined by the units spent by the subchain with maximum number of nodes. Hence, Tintra is 2kn + k2 + 1 units. Second, the transmission delay for inter-subchain communication, called

Tinter, is k − 1 units. Third, the transmission delay for the leader node to the BS, called TBS, is 1 unit. Here, note that some time slots in intra-subchain communication and inter-subchain communication overlap. For example, in Fig. 5, intra-subchain communication and inter-subchain communication overlap in time slot 5. The units for overlap, called To, is k − 2 units. Consequently, we can get

Ttotal= Tintra+Tinter+TBS−To = 2kn +k2 +3. When n is not divisible by k, then two cases that nk is either odd or even, are described in the following Lemma 3 and Lemma 4.

Lemma 3: Let nk be not an integer. If k is odd and nk is odd, then the transmission delay of a round is 2kn + k2 + 4 units.

Proof : similar to the proof of Lemma 2. 

Lemma 4: Let nk be not an integer. If k is odd and nk is even, then the transmission delay of a round is 2kn + k2 + 3 units.

Proof : similar to the proof of Lemma 2. 

Theorem 1: The transmission delay of a round

in MCDG is at most 2kn + k2 + 4 units, where

n is the number of nodes and k is the number of

subchains.

Proof : the result follows from Lemma 2∼4 directly. 

We also briefly show the transmission delay of a round in COSEN for performance comparison. As described in Section II-C, COSEN groups n nodes into k low-level chains. When n is divisible by k, the transmission delay of a round is nk + k − 1

units. However, if n is not divisible by k, the

transmission delay of a round isnk +k units. From the above results of delay analysis, MCDG has lower transmission delay of a round than COSEN in all situations.

V. PERFORMANCE EVALUATION

We developed a custom simulator written in C++ Language. The proposed protocol, MCDG, is com-pared with two chain-based data gathering proto-cols, PEGASIS and COSEN. We first simulate the effect of the values,α, β, and γ on the performance of MCDG. Three metrics are then evaluated in the simulations, which are 1) the number of rounds until first node dies (FND), 2) the energy consumption per round (energy cost), and 3) the energy × delay cost.

Six simulation environments, from E1 to E6, are utilized to simulate the three metrics and are listed in Table I. The BS is located far away from the sensor field. All sensor nodes are randomly deployed. The size of a data packet is 2,000 bits. The initial energy for each node is 0.5 Joule. The first order radio model is used to evaluate the energy consumption of nodes.

We first compare the length of the chain con-structed by MCDG with that concon-structed by PE-GASIS. Figure 6 shows the percentage of decreased chain length for variousα and β in a 100m×100m network with 500 nodes. The result shows that the proposed single chain formation algorithm reduce the chain length up to 7% when α is 0.8 and β is 4. Figure 7 illustrates the number of rounds before first node dies (FND) for various γ under six environ-ments. The value γ is used to limit the number of nodes to rotate the role of leader in a subchain. We varyγ from 0.2 to 1 and set k as 5. The result shows

that when the number of nodes increases, the value

γ should appropriately decrease to achieve highest

number of rounds. We observe that γ can be set

TABLE I SIMULATION ENVIRONMENTS. Sensing area 100m×100m 200m×200m BS location (50,200) (100,400) 250 nodes E1 E4 500 nodes E2 E5 750 nodes E3 E6

(8)

1 2 3 4 5 6 7 8 9 4.0 4.5 5.0 5.5 6.0 6.5 7.0 7.5 8.0 ȡ P er cent age o f dec rease d cha in l engt h (% ) Ƞ=0.9 Ƞ=0.85 Ƞ=0.8 Ƞ=0.75 Ƞ=0.7

Fig. 6. The percentage of decreased chain length versusα and β values. E1 E2 E3 E4 E5 E6 0 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 Nu m b er of ro und s (F ND) Environment Ȣ= 0.2 Ȣ= 0.4 Ȣ= 0.6 Ȣ= 0.8 Ȣ= 1.0

Fig. 7. The impact of the valueγ under six environments.

as 0.4 for good performance in most environments. Hence, based on the above results, we set α, β, and γ as 0.8, 4, and 0.4, respectively for MCDG in the

following simulations.

Figure 8 shows the number of rounds for PEGA-SIS, COSEN, and MCDG under six environments. We set k as 5 for COSEN and MCDG. Due to the existence of long links produced by using the greedy algorithm in PEGASIS, some nodes consume much energy in transmitting data to each other. Besides, nodes far away from the BS also consume more energy than nodes near to the BS when transmit-ting data to the BS. Hence, the first death node appears quickly in PEGASIS. Although COSEN selects leader nodes based on the residual energy of nodes, but it also suffers from the same problems in PEGASIS. On the contrary, the proposed single chain formation algorithm eliminates long links as

E1 E2 E3 E4 E5 E6 0 100 200 300 400 500 600 700 800 900 1000 1100 1200 1300 N um ber of r ounds ( F N D ) Environment PEGASIS COSEN MCDG

Fig. 8. The number of rounds for three protocols under six environments. E1 E2 E3 E4 E5 E6 0.00 0.05 0.10 0.15 0.20 0.25 E ne rgy c onsum pt ion pe r r ou nd ( Joul e) Environment PEGASIS COSEN MCDG

Fig. 9. The energy consumption per round for three protocols under six environments.

much as possible. Therefore, MCDG achieves more number of rounds than PEGASIS and COSEN under all environments.

Figure 9 illustrates the energy consumption per round for three protocols under six environments. The energy consumption per round is the amount of energy consumed by all nodes to accomplish a round of data gathering and is treated as the energy cost. The result shows the energy consumption per round for three protocols are approximately same. Figure 10 shows the energy × delay cost, which is equal to the energy cost multiplied by the delay cost. Here, the delay cost means the transmission delay of a round. We list the delay cost for three protocols in Table II. The delay cost of PEGASIS is equal to the number of nodes since all nodes transmit their aggregated data one by one. The delay cost of

(9)

E1 E2 E3 E4 E5 E6 0 20 40 60 80 100 120 140 160 En er gy x De la y Environment PEGASIS COSEN MCDG

Fig. 10. The energy × delay cost for three protocols under six environments.

TABLE II

THE DELAY COST FORPEGASIS, COSENANDMCDG. 250 nodes 500 nodes 750 nodes

PEGASIS 250 500 750

COSEN 54 104 154

MCDG 30 55 80

COSEN and MCDG can be calculated by equations described in Section IV-E. MCDG reduces the delay cost by employing several subchains of unequal size and simultaneous data transmissions in each subchain, hence, it achieves lower energy × delay cost than PEGASIS and COSEN.

Figure 11 shows the energy × delay cost of MCDG over the number of subchains. The max-imum number of subchains for 250, 500, 750 nodes are 13, 19, and 25, respectively according to Lemma 1. When the number of subchains increases, the number of leader nodes participate in inter-subchain communication increases. Although this causes the slight increase of the energy consumption per round and the number of rounds drops slightly as shown in Fig. 12, but we observe that the delay cost is also reduced due to the increase of the number of subchains. Therefore, the energy× delay cost of MCDG is thus reduced.

VI. CONCLUSIONS

In this paper, we propose a Multi-Chain Data Gathering (MCDG) protocol that aims to reduce the transmission delay of a round and achieves a lower energy× delay cost. In our protocol, all nodes first form a single chain using the proposed chain

5 7 9 11 13 15 17 19 21 23 25 0 2 4 6 8 10 12 14 16 18 En er gy x De la y Number of subchains (k) 250 nodes 500 nodes 750 nodes

Fig. 11. The energy × delay cost for MCDG over the number of subchains in a 200m×200m network. 5 7 9 11 13 15 17 19 21 23 25 0 100 200 300 400 500 600 700 Num be r of r oun ds ( F N D ) Number of subchains (k) 250 nodes 500 nodes 750 nodes

Fig. 12. The number of rounds for MCDG over the number of subchains in a 200m×200m network.

formation algorithm. The single chain is then fur-ther divided into several subchains of unequal size. For intra-subchain communication, an aggregation node and a leader node are elected to collect the aggregated data of the chain in each subchain, and the transmission delay can be reduced. For inter-subchain communication, several leader nodes co-operate to forward the aggregated data of all nodes to the BS. Simulation results show that MCDG outperforms PEGASIS and COSEN in terms of the number of rounds and energy × delay cost.

ACKNOWLEDGMENT

This research is supported by the National Sci-ence Council of the Republic of China under grant number NSC-98-2221-E-035-048.

(10)

REFERENCES

[1] I.F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, E. Cayirci, ”Wireless sensor networks: a survey,” Computer Networks, vol. 38, no.4, pp. 393-422, 2002.

[2] I.F. Akyildiz, Weilian Su, Y. Sankarasubramaniam, E. Cayirci, ”A survey on sensor networks,” IEEE Communications

Maga-zine, vol. 40, no. 8, pp. 102-114, 2002.

[3] R. Rajagopalan, P.K. Varshney, ”Data-aggregation techniques in sensor networks: a survey,” IEEE Communications Surveys &

Tutorials, vol. 8, no. 4, pp. 48-63, 2006.

[4] S. Lindsey, C. Raghavendra, K. M. Sivalingam, ”Data Gathering Algorithms in Sensor Networks Using Energy Metrics,” IEEE

Transactions on Parallel and Distributed Systems, vol. 13, no.

9, pp. 924-935, 2002.

[5] W. R. Heinzelman, A. Chandrakasan, H. Balakrishnan, ”Energy-Efficient Communication Protocol for Wireless Microsensor Net-works,” in Proc. of the 33rd Hawaii International Conference on

System Sciences, 2000.

[6] S. Lindsey, C. S. Raghavendra, ”PEGASIS: Power-Efficient Gathering in Sensor Information Systems,” in Proc. of IEEE

Aerospace Conference, pp. 1125-1130, 2002.

[7] H. O. Tan, I. Korpeoglu, ”Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks,” ACM SIGMOD Record, vol. 32, no. 4, pp. 66-71, 2003.

[8] Jisoo Shin, Changjin Suh, ”Energy-Efficient Chain Topology in Ubiquitous Sensor Network,” in Proc. of 10th International

Conference on Advanced Communication Technology, pp.

1688-1693, 2008.

[9] K. Du, J. Wu, D. Zhou, ”Chain-Based Protocols for Data Broadcasting and Gathering in the Sensor Networks,” in Proc.

of the 17th International Symposium on Parallel and Distributed Processing, 2003.

[10] N. Tabassum, Y. Urano, A.K.M Ahsanul Haque, ”GSEN: An Efficient Energy Consumption Routing Scheme for Wireless Sensor Network,” in Proc. of ICNICONSMCL, 2006.

[11] N. Tabassum, Q.E.K.M. Mamun, Y. Urano, ”COSEN: A Chain Oriented Sensor Network for Efficient Data Collection,” in Proc.

of Third International Conference on Information Technology: New Generations, pp. 262-267, 2006.

[12] D. Mandala, X. Du, F. Dai, C. You, ”Load balance and energy efficient data gathering in wireless sensor networks,” Wireless

Communications and Mobile Computing, vol. 8, no. 5, pp.

645-659, 2007.

[13] S.-M. Jung, Y.-J. Han, T.-M. Chung, ”The Concentric Cluster-ing Scheme for Efficient Energy Consumption in the PEGASIS,” in Proc. of 9th International Conference on Advanced

Commu-nication Technology, pp. 260-265, 2007.

[14] Lingyun Yuan, Yunlong Zhu, Tianwei Xu, ”A Multi-Layered Energy-Efficient and Delay-Reduced Chain-Based Data Gather-ing Protocol for Wireless Sensor Network,” in Proc. of

Inter-national Conference on Mechtronic and Embedded Systems and Applications, pp. 13-18, 2008.

[15] K.-H. Chen, J.-M. Huang, C.-C. Hsiao, ”CHIRON: An Energy-Efficient Chain-Based Hierarchical Routing Protocol in Wireless Sensor Networks,” in Proc. of Wireless Telecommunications

數據

Fig. 1. Single chain formation.
Fig. 5. An example of inter-subchain communication. The trans- trans-mission delay of round is 7 units
Figure 7 illustrates the number of rounds before first node dies (FND) for various γ under six  environ-ments
Fig. 10. The energy × delay cost for three protocols under six environments.

參考文獻

相關文件

– The The readLine readLine method is the same method used to read method is the same method used to read  from the keyboard, but in this case it would read from a 

了⼀一個方案,用以尋找滿足 Calabi 方程的空 間,這些空間現在通稱為 Calabi-Yau 空間。.

Reading Task 6: Genre Structure and Language Features. • Now let’s look at how language features (e.g. sentence patterns) are connected to the structure

Now, nearly all of the current flows through wire S since it has a much lower resistance than the light bulb. The light bulb does not glow because the current flowing through it

volume suppressed mass: (TeV) 2 /M P ∼ 10 −4 eV → mm range can be experimentally tested for any number of extra dimensions - Light U(1) gauge bosons: no derivative couplings. =&gt;

• Formation of massive primordial stars as origin of objects in the early universe. • Supernova explosions might be visible to the most

This kind of algorithm has also been a powerful tool for solving many other optimization problems, including symmetric cone complementarity problems [15, 16, 20–22], symmetric

Following the supply by the school of a copy of personal data in compliance with a data access request, the requestor is entitled to ask for correction of the personal data