Download - ijcer
Download - ijcer
Download - ijcer
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Data Aggregation Protocols In Wireless…<br />
minimum spanning tree algorithm is employed to compute the routing paths with the sink as the root. The data<br />
packets are routed to the sink over the edges of the minimum spanning tree. In order to balance the load among<br />
the nodes, the residual energy of the nodes should be considered while aggregating the data. The PEDAP<br />
protocol requires global knowledge of the location of all nodes at the sink. The protocols operate in a centralized<br />
manner where the sink computes the routing information.<br />
3.8Cluster based protocols:<br />
Low-Energy Adaptive Clustering Hierarchy (LEACH)[16,17]:LEACH is an adaptive clusteringbased<br />
protocol using randomized rotation of cluster-heads to evenly distribute the energy load among the sensor<br />
nodes in the network . The data will be collected by cluster heads from the nodes in the cluster and after<br />
processing and data aggregation forwards it to base station. The three important features of LEACH are<br />
Localized co-ordination and control for cluster setup, Randomized cluster head rotation, Local compression to<br />
reduce global data communication<br />
LEACH is divided into five clusters, each cluster has a black circle represents the first cluster node, the rest of<br />
the white circle indicates a non cluster head node. Each cluster has a cluster head node, protocol randomly<br />
selecting cluster head node cycle, the energy of the entire network load equally distributed to each sensor node<br />
can achieve lower energy consumption, the purpose of improving network lifetime<br />
3.9.PEGASIS: PEGASIS (Power-Efficient Gathering in Sensor Information Systems)[18]:It is considered<br />
an optimization of the LEACH algorithm. The key idea in PEGASIS is to form a chain among the<br />
sensor nodes so that each node will receive from and transmit to a close neighbor. The chain is constructed with<br />
a greedy algorithm. It Gathers the data and moves from node to node, eventually a designated node transmits to<br />
the Base Station. For a network running PEGASIS, it is required to form a chain that contains all nodes. The<br />
chain construction starts with the farthest node from the base station. By using a greedy algorithm, it chooses the<br />
second farthest node as its neighbor. Then the third farthest node is chosen as the second farthest nodes other<br />
neighbor. This process is repeated until the closest node to the base station is chosen as the other end of the<br />
chain. PEGASIS outperforms LEACH by eliminating the overhead of dynamic cluster formation, minimizing<br />
the distance non leader-nodes must transmit, limiting the number of transmissions and receives among all nodes,<br />
and using only one transmission to the BS per round.<br />
3.10.TEEN: Threshold sensitive Energy Efficient sensor Network (TEEN)[19] is a hierarchical clustering<br />
protocol belongs to on-demand routing protocols category and mostly used for time crucial<br />
applications. In TEEN, nodes have two levels of cluster heads and also they follow hierarchical clustering<br />
design. After nodes have selected their cluster head, user needs to manually enter the attribute values, which will<br />
be broadcasted by cluster head in form of two parameters soft threshold and hard threshold.TEEN is a hybrid of<br />
hierarchical clustering and data-centric protocols designed for time-critical applications. It is a responsive<br />
protocol to sudden changes of some of the attributes observed in the WSN (e.g., temperature, pressure).The<br />
algorithm first goes through cluster formation. It enables CHs to impose a constraint on when the sensor should<br />
report their sensed data. After the clusters are formed, the CH broadcasts two thresholds to the nodes namely<br />
hard threshold (HT), This is a threshold value for the sensed attribute. It is the absolute value of the attribute<br />
beyond which, the node sensing this value must switch on its transmitter and report to its cluster head. and Soft<br />
threshold (ST) ,This is a small change in the value of the sensed attribute which triggers the node to switch on<br />
its transmitter and transmit. It is useful for the applications where the users can control a trade-off between<br />
energy efficiency, data accuracy, and response time dynamically.<br />
3.11.Adaptive Periodic Threshold Sensitive Energy Efficient Sensor Network Protocol (APTEEN)[20] :It<br />
has been proposed just as an improvement to TEEN in order to overcome its limitations and<br />
shortcomings. It mainly focuses on the capturing periodic data collections (LEACH) as well as reacting to timecritical<br />
events (TEEN). Thus, APTEEN is a hybrid clustering-based routing protocol that allows the sensor to<br />
send their sensed data periodically and react to any sudden change in the value of the sensed attribute by<br />
reporting the corresponding values to their CHs. The architecture of APTEEN is same as in TEEN, which uses<br />
the concept hierarchical clustering for energy efficient communication between source sensors and the sink.<br />
APTEEN guarantees lower energy dissipation and a helps in ensuring a larger number of sensors alive. In this,<br />
cluster is formed with 1st level and 2nd level cluster heads. After selecting the cluster head (CH) it receives the<br />
attribute from the user. The CH broadcasts the attribute, hard threshold (HT), soft threshold (ST), schedule and<br />
count time (CT) parameters to the cluster members. The sensor nodes sense continuously. If the sensed value is<br />
above the HT it is stored in the internal variable (SV) and transmitted to the CH through the TDMA schedule<br />
assigned for it. All the clusters formed here may not have uniform number of sensor nodes. The cluster formed<br />
www.<strong>ijcer</strong>online.com ||May ||2013|| Page 22