18.11.2014 Views

Download - ijcer

Download - ijcer

Download - ijcer

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Data Aggregation Protocols In Wireless…<br />

minimum spanning tree algorithm is employed to compute the routing paths with the sink as the root. The data<br />

packets are routed to the sink over the edges of the minimum spanning tree. In order to balance the load among<br />

the nodes, the residual energy of the nodes should be considered while aggregating the data. The PEDAP<br />

protocol requires global knowledge of the location of all nodes at the sink. The protocols operate in a centralized<br />

manner where the sink computes the routing information.<br />

3.8Cluster based protocols:<br />

Low-Energy Adaptive Clustering Hierarchy (LEACH)[16,17]:LEACH is an adaptive clusteringbased<br />

protocol using randomized rotation of cluster-heads to evenly distribute the energy load among the sensor<br />

nodes in the network . The data will be collected by cluster heads from the nodes in the cluster and after<br />

processing and data aggregation forwards it to base station. The three important features of LEACH are<br />

Localized co-ordination and control for cluster setup, Randomized cluster head rotation, Local compression to<br />

reduce global data communication<br />

LEACH is divided into five clusters, each cluster has a black circle represents the first cluster node, the rest of<br />

the white circle indicates a non cluster head node. Each cluster has a cluster head node, protocol randomly<br />

selecting cluster head node cycle, the energy of the entire network load equally distributed to each sensor node<br />

can achieve lower energy consumption, the purpose of improving network lifetime<br />

3.9.PEGASIS: PEGASIS (Power-Efficient Gathering in Sensor Information Systems)[18]:It is considered<br />

an optimization of the LEACH algorithm. The key idea in PEGASIS is to form a chain among the<br />

sensor nodes so that each node will receive from and transmit to a close neighbor. The chain is constructed with<br />

a greedy algorithm. It Gathers the data and moves from node to node, eventually a designated node transmits to<br />

the Base Station. For a network running PEGASIS, it is required to form a chain that contains all nodes. The<br />

chain construction starts with the farthest node from the base station. By using a greedy algorithm, it chooses the<br />

second farthest node as its neighbor. Then the third farthest node is chosen as the second farthest nodes other<br />

neighbor. This process is repeated until the closest node to the base station is chosen as the other end of the<br />

chain. PEGASIS outperforms LEACH by eliminating the overhead of dynamic cluster formation, minimizing<br />

the distance non leader-nodes must transmit, limiting the number of transmissions and receives among all nodes,<br />

and using only one transmission to the BS per round.<br />

3.10.TEEN: Threshold sensitive Energy Efficient sensor Network (TEEN)[19] is a hierarchical clustering<br />

protocol belongs to on-demand routing protocols category and mostly used for time crucial<br />

applications. In TEEN, nodes have two levels of cluster heads and also they follow hierarchical clustering<br />

design. After nodes have selected their cluster head, user needs to manually enter the attribute values, which will<br />

be broadcasted by cluster head in form of two parameters soft threshold and hard threshold.TEEN is a hybrid of<br />

hierarchical clustering and data-centric protocols designed for time-critical applications. It is a responsive<br />

protocol to sudden changes of some of the attributes observed in the WSN (e.g., temperature, pressure).The<br />

algorithm first goes through cluster formation. It enables CHs to impose a constraint on when the sensor should<br />

report their sensed data. After the clusters are formed, the CH broadcasts two thresholds to the nodes namely<br />

hard threshold (HT), This is a threshold value for the sensed attribute. It is the absolute value of the attribute<br />

beyond which, the node sensing this value must switch on its transmitter and report to its cluster head. and Soft<br />

threshold (ST) ,This is a small change in the value of the sensed attribute which triggers the node to switch on<br />

its transmitter and transmit. It is useful for the applications where the users can control a trade-off between<br />

energy efficiency, data accuracy, and response time dynamically.<br />

3.11.Adaptive Periodic Threshold Sensitive Energy Efficient Sensor Network Protocol (APTEEN)[20] :It<br />

has been proposed just as an improvement to TEEN in order to overcome its limitations and<br />

shortcomings. It mainly focuses on the capturing periodic data collections (LEACH) as well as reacting to timecritical<br />

events (TEEN). Thus, APTEEN is a hybrid clustering-based routing protocol that allows the sensor to<br />

send their sensed data periodically and react to any sudden change in the value of the sensed attribute by<br />

reporting the corresponding values to their CHs. The architecture of APTEEN is same as in TEEN, which uses<br />

the concept hierarchical clustering for energy efficient communication between source sensors and the sink.<br />

APTEEN guarantees lower energy dissipation and a helps in ensuring a larger number of sensors alive. In this,<br />

cluster is formed with 1st level and 2nd level cluster heads. After selecting the cluster head (CH) it receives the<br />

attribute from the user. The CH broadcasts the attribute, hard threshold (HT), soft threshold (ST), schedule and<br />

count time (CT) parameters to the cluster members. The sensor nodes sense continuously. If the sensed value is<br />

above the HT it is stored in the internal variable (SV) and transmitted to the CH through the TDMA schedule<br />

assigned for it. All the clusters formed here may not have uniform number of sensor nodes. The cluster formed<br />

www.<strong>ijcer</strong>online.com ||May ||2013|| Page 22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!