05.01.2015 Views

Wireless Sensor Networks : Technology, Protocols, and Applications

Wireless Sensor Networks : Technology, Protocols, and Applications

Wireless Sensor Networks : Technology, Protocols, and Applications

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

214 ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS<br />

Data aggregation in PEGASIS is achieved along the chain. In its simplest form,<br />

the aggregation process can be performed sequentially as follows. First, the chain<br />

leader issues a token to the last node in the right end of the chain. Upon receiving<br />

the token, the end node transmits its data to its downstream neighbor in the chain<br />

toward the leader. The neighboring node aggregates the data <strong>and</strong> transmits them to<br />

its downstream neighbor. This process continues until the aggregated data reach the<br />

leader. Upon receiving the data from the right side of the chain, the leader issues a<br />

token to the left end of the chain, <strong>and</strong> the same aggregation process is carried out<br />

until the data reach the leader. Upon receiving the data from both sides of the chain,<br />

the leader aggregates the data <strong>and</strong> transmits them to the data sink. Although simple,<br />

the sequential aggregation scheme may result in long delays before the aggregated<br />

data are delivered to the base station. Such a sequential scheme, however, may be<br />

necessary if arbitrarily close simultaneous transmission cannot be carried out without<br />

signal interference.<br />

A potential approach to reduce the delay required to deliver aggregated data to<br />

the sink is to use parallel data aggregation along the chain. A high degree of parallelism<br />

can be achieved if the sensor nodes are equipped with CDMA-capable<br />

transceivers. The added ability to carry out arbitrarily close transmissions without<br />

interference can be used to ‘‘overlay’’ a hierarchical structure onto the chain <strong>and</strong><br />

use the embedded structure to perform data aggregation. At each round, nodes at<br />

a given level of the hierarchy transmit to a close neighbor in the upper level of the<br />

hierarchy. This process continues until the aggregated data reach the leader at the<br />

top level of the hierarchy. The latter transmits the final data aggregate to the base<br />

station.<br />

To illustrate the chain-based approach, consider the example depicted in<br />

Figure 6.11. In this example it is assumed that all nodes have global knowledge<br />

3<br />

Node<br />

Position<br />

0 1<br />

1<br />

3<br />

5<br />

7<br />

Node<br />

Position<br />

0<br />

1<br />

2<br />

3<br />

0<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

Node<br />

Position<br />

0<br />

1<br />

2<br />

3<br />

Figure 6.11 Chain-based data gathering <strong>and</strong> aggregation scheme [6.21].<br />

4<br />

5<br />

6<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!