IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Similar documents
A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks

Use of Tree Traversal Algorithms for Chain Formation in the PEGASIS Data Gathering Protocol for Wireless Sensor Networks

AN ALGORITHM TO DETERMINE ENERGY-AWARE MAXIMAL LEAF NODES DATA GATHERING TREE FOR WIRELESS SENSOR NETWORKS

Data Gathering in Sensor Networks using the Energy*Delay Metric

Data Gathering in Sensor Networks using the Energy*Delay Metric. Stephanie Lindsey Cauligi Raghavendra Krishna Sivalingam

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network

924 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 13, NO. 9, SEPTEMBER 2002

Hierarchical Routing Algorithm to Improve the Performance of Wireless Sensor Network

Power Aware Metrics for Wireless Sensor Networks

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

A Centroid Hierarchical Clustering Algorithm for Data Gathering in Wireless Sensor Networks.

Power Efficient Data Gathering and Aggregation in Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

An Energy Efficient Clustering in Wireless Sensor Networks

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Summary of Energy-Efficient Communication Protocol for Wireless Microsensor Networks

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs

ENERGY EFFICIENT TWO STAGE CHAIN ROUTING PROTOCOL (TSCP) FOR WIRELESS SENSOR NETWORKS

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

An Improved Chain-based Hierarchical Routing Protocol for Wireless Sensor Networks

Keywords Wireless Sensor Network, Cluster, Energy Efficiency, Heterogeneous network, Cluster, Gateway

A NOVEL DISTRIBUTED PROTOCOL FOR RANDOMLY DEPLOYED CLUSTERED BASED WIRELESS SENSOR NETWORK:

VORONOI LEACH FOR ENERGY EFFICIENT COMMUNICATION IN WIRELESS SENSOR NETWORKS

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

Volume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Binary Tree Routing for Parallel Data Gathering in Sensor Networks of Smart Home

Performance of a Novel Energy-Efficient and Energy Awareness Scheme for Long-Lifetime Wireless Sensor Networks

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

Gateway Based WSN algorithm for environmental monitoring for Energy Conservation

Power Aware Chain Routing Protocol for Data Gathering in Sensor Networks

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

Energy-efficient routing algorithms for Wireless Sensor Networks

Distributed clustering algorithms for data-gathering in wireless mobile sensor networks

Dalimir Orfanus (IFI UiO + ABB CRC), , Cyber Physical Systems Clustering in Wireless Sensor Networks 2 nd part : Examples

Chain-Based Protocols for Data Broadcasting and Gathering in the Sensor Networks Λ

732 IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 61, NO. 2, APRIL 2014

DE-LEACH: Distance and Energy Aware LEACH

Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks

K-SEP: A more stable SEP using K-Means Clustering and Probabilistic Transmission in WSN

MODIFIED LEACH-C PROTOCOL FOR CLUSTER BASED ROUTING IN ENERGY EFFICIENT WIRELESS SENSOR NETWORKS

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster-Head Selection

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

LEACH and PGASIS Protocols in wireless sensor network: Study and Simulation

Available online at ScienceDirect. Procedia Computer Science 92 (2016 )

Fault tolerant Multi Cluster head Data Aggregation Protocol in WSN (FMCDA)

A SEGMENT-BASED TREE TRAVERSAL ALGORITHM FOR ENHANCING DATA GATHERING IN WIRELESS SENSOR NETWORKS

Comparative Analysis of EDDEEC & Fuzzy Cost Based EDDEEC Protocol for WSNs

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS

Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks

Homogeneous vs Heterogeneous Clustered Sensor Networks: A Comparative Study

Energy- efficient Routing Protocol for Homogeneous Wireless Sensor Networks

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

New Data Clustering Algorithm (NDCA)

An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui

Heterogeneous LEACH Protocol for Wireless Sensor Networks

e3d: An Energy-Efficient Routing Algorithm for Wireless Sensor Networks

Adapting Distance Based Clustering Concept to a Heterogeneous Network

High Speed Data Collection in Wireless Sensor Network

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks

A Modified LEACH Protocol for Increasing Lifetime of the Wireless Sensor Network

Heuristic Clustering Algorithms in Ad hoc Networks

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN

IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK

Keywords Clustering, Sensor Nodes, Residual Energy, Wireless Sensor Networks, Zones

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

PERFORMANCE EVALUATION OF DIFFERENT LOGICAL TOPOLOGIES AND THEIR RESPECTIVE PROTOCOLS FOR WIRELESS SENSOR NETWORKS

A Cluster-based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

Increase the Alive Nodes based on the Cluster Head Selection Algorithm for Heterogeneous Wireless Sensor Networks

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

Energy Aware Node Placement Algorithm for Wireless Sensor Network

SCH-BASED LEACH ALGORITHM TO ENHANCE THE NETWORK LIFE TIME IN WIRELESS SENSOR NETWORK (WSN)

HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

Performance Comparison of Energy Efficient Clustering Protocol in Heterogeneous Wireless Sensor Network

Data aggregation techniques in sensor networks: A survey

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

Zonal Rumor Routing for. Wireless Sensor Networks

DYNAMIC RE-CLUSTERING LEACH-BASED (DR-LEACH) PROTOCOL FOR WIRELESS SENSOR NETWORKS

Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS

Performance of I-LEACH Routing protocol for Wireless Sensor Networks

A Survey on Clustered-Aggregation Routing Techniques in Wireless Sensor Networks

A CLUSTERING TECHNIQUE BASED ON ENERGY BALANCING ALGORITHM FOR ROUTING IN WIRELESS SENSOR NETWORKS

A Proposed Technique for Reliable and Energy Efficient Hierarchical Routing in Heterogeneous Wireless Sensor Networks

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Transcription:

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu, natarajan.meghanathan@jsums.edu ABSTRACT The Power Efficient-Gathering in Sensor Information Systems (PEGASIS) protocol is one of the classical data gathering protocols for wireless sensor networks. PEGASIS works by forming a chain of the sensor nodes starting from the node farthest away to the sink. Data from etiher end of the chain gathers towards the leader node, selected for each round of data gathering, through a hop-by-hop transfer and aggregation process. The leader node transmits the aggregated data to the sink node. In this paper, we investigate the impact of the following leader node selection strategies for every round: Random (randomly selected node), Shuffle (a node is selected as leader only once in N rounds in a network of N nodes), High-energy (node with the highest energy), 2-block and 4-block (the network is divided into 2 or 4 blocks and the leader node is the highest energy node in the randomly chosen block of a round). We study the PEGASIS protocol for both TDMA and CDMA systems. For each combination of network topology (square, circular and rectangular) and sink location (center, origin and outside the network field), we identify the leader selection strategy that yields the longest network lifetime (up to 5% node failures) and the minimum energy*delay per round. Keywords: Wireless Sensor Networks, Data Gathering, Leader Selection, Energy, Chain. 1 INTRODUCTION A wireless sensor network is a network of smart sensors that collect data about the ambient environment and propagate the collected data to one or more control centers called sinks. The end user accesses the data through the sink. Sensor nodes are constrained with limited battery charge, transmission range (to save energy), computing and memory capacity. Also, a sensor network has limited bandwidth and nodes within the transmission range of each other share the communication medium. The sink is normally fixed and is located far away from the sensor network field. Because of all the above constraints, direct communication from each of the sensor nodes to the sink cannot be a viable solution from both the energy and bandwidth point of view. There would also be interference if several signals are simultaneously transmitted over long distance. All of the above observations motivate the need for data gathering protocols that can be effectively and efficiently run at the sensor nodes to combine the data and send only the aggregated data (that is a representative of the data collected from all the sensor nodes) to the sink. Throughout this paper, we use the terms data aggregation and data gathering interchangeably. They mean the same. Data gathering algorithms typically run in several rounds, wherein for each round, data from each of the sensor nodes are collected and aggregated, and then forwarded to the sink. Among the various data aggregation protocols proposed in the literature, the well-known protocols are the LEACH (Low-Energy Adaptive Clustering Hierarchy) [1] and the PEGASIS (Power-Efficient Gathering in Sensor Information Systems) [2][3] protocols. In LEACH, a certain percentage of the sensor nodes are elected as cluster heads for each round of communication. Each cluster head forms a cluster around it and a sensor node chooses to join the cluster whose cluster head is closest to it. If P is the percentage of nodes that can be cluster heads, LEACH ensures that a sensor node is elected as cluster head exactly once within every 1/P rounds of data communication. PEGASIS forms a single chain of sensor nodes, starting from the node farthest to the sink and the same chain is used for all the rounds of data communication. The chain of sensor nodes is formed using a greedy-heuristic based on the distance between the sensor nodes. For every round of data communication, a sensor node is uniformrandomly elected as the leader of the chain and data from either end of the chain gets forwarded towards the leader node. PEGASIS incurs a huge delay, especially for Time Division Multiple Access (TDMA) systems [4], as data moves across the Volume 4 Number 5 Page20 www.ubicc.org

complete chain of sensor nodes, one node at a time, before transmitted to the sink. For CDMA (Code Division Multiple Access) systems [5], PEGASIS has been later improved using a chain-based binary scheme to minimize the delay and the energy*delay metrics. The energy*delay metric best captures the tradeoff between energy and delay. In the chainbased binary scheme for PEGASIS [3], a round of data communication is accomplished using log N levels, where N is the number of nodes in the network. For a data gathering round, each node transmits to a close neighbor in a given level of the hierarchy. Nodes that receive data at a given level are the only nodes that move to the next level. At the top level, there will be only one node that will remain the leader and it will transmit the aggregated message to the sink. Communication takes place only one level at a time and all the communication within a level can occur simultaneously using unique CDMA codes assigned for each node. Through several research articles [2][3][6][7], it has been shown that, for both TDMA and CDMA systems, PEGASIS yields a larger node lifetime and a lower energy consumption per round compared to LEACH. The lifetime of the nodes achieved with PEGASIS is 1.5 2 times more than that incurred with LEACH, whereas the energy consumed per round for LEACH is 2 3 times more than that incurred for PEGASIS. We conjecture that the performance of PEGASIS (as vindicated by our simulation results presented in the later sections of the paper) very much depends on the choice of the leader node selected for a round. Even though the choice of uniform-randomly selection is aimed towards being fair to all sensor nodes, it cannot guarantee that a sensor node that has just served as the leader node for a round is not again selected as the leader before every other node in the network has served as leader nodes. More importantly, it important to consider the available energy at a node while deciding the choice for the leader node of a round. A sensor node located far away from the sink may lose more energy to transmit the data to the sink, compared to a sensor node located closer to the sink. Basically, all sensor nodes cannot be given equal chance to serve as the leader node. In this paper, we investigate the impact of the following leader node selection strategies: Random (leader of a round is selected randomly), Shuffle (a node is selected as leader only once in N rounds in a network of N nodes), High-energy (the node with the highest energy is selected as the leader of the round), 2-block and 4-block (the network is divided into two blocks or four blocks and for each round a random block is selected; the node with the highest energy in the selected block is the leader of the round). The Random and Shuffle strategies do not consider the available energy at the nodes before making the leadership decision. These two strategies will thus serve as the basis case to demonstrate the node lifetime obtained when we attempt to give equal chance to all the sensor nodes to serve as the leader. The High-energy, 2-block and 4-block strategies are energy-aware strategies that consider the energy available at the nodes before deciding on the leader node. For each of these five leader selection strategies, we study the performance of PEGASIS for both TDMA and CDMA systems in square, circular and rectangular network topologies and for three different sink locations (center, origin and outside the network field). For each combination of network topology and sink location, we identify the leader selection strategy that yields the largest network lifetime and the minimum energy*delay. The rest of the paper is organized as follows: Section 2 briefly reviews the PEGASIS protocol and its chain-based binary scheme for CDMA systems. Section 3 introduces the five leader selection strategies explored in this research. Section 4 illustrates the simulation results obtained for different network topologies and sink locations. Section 5 presents the results obtained for each combination of network topology and sink location and identifies the leader selection strategy that yields larger network lifetime and lower energy*delay. Section 6 concludes the paper. 2 REVIEW OF THE PEGASIS PROTOCOL The PEGASIS (Power-Efficient Gathering in Sensor Information Systems) protocol [2] forms a chain of the sensor nodes and uses this chain as the basis for data aggregation. The chain is formed using a greedy approach, starting from the node farthest to the sink. The nearest node to this node is put as the next node in the chain. This procedure is continued until all the nodes are included in the chain. A node can be in the chain at only one position. Figure 1: Example for PEGASIS Chain During each round, a leader node is randomly selected. The leader node is responsible for forwarding the aggregated data to the sink. Once the leader node is selected and notified by the sink node, each node in both sides of the chain (with respect to the leader node), receives and transmits the aggregated data to the next node in the chain, until the data reaches the leader node. For example, consider the chain formed in Figure 1 for a 10-node Volume 4 Number 5 Page 21 www.ubicc.org

network. The index of the nodes in the chain is different from the identification numbers for the nodes (i.e., the node ID). If node 3 at chain index 6 is selected as the leader node, the flow of data would be in the following order: c0-7 c1-7 c2-7 c3-7 c4-7 c5-7 c6 c7 c8 c9. PEGASIS can lead to significant delays in data aggregation because of the waiting time at the leader node to receive data from both sides of the chain. network. However, the random selection strategy may not be the best approach if we try to maximize the lifetime of every sensor node in the network. A node located away from the sink would lose more energy to transmit a data packet to the sink, compared to a node located closer to the sink. Also, as a node can become the leader for any round, if there are N nodes in the chain, there is no guarantee that a node is not selected as a leader more than once within N rounds. 3.2 Shuffle Selection Figure 2: Example for Chain-based Binary Scheme of PEGASIS Improved Chain-based Binary Scheme of PEGASIS: This scheme [3] works primarily for CDMA systems [5] where there can be simultaneous communication between any pair of nodes if each node is assigned unique CDMA code and each node knows the CDMA code for communication with every other node. The chain formed using the greedy distance-based heuristic is still used as the basis for data aggregation. A round of data aggregation and transmission is comprised of log N levels, where N is the number of nodes in the network. Each node transmits the data to a close neighbor in a given level of the hierarchy. Nodes that receive data at a given level are the only nodes that rise to the next level. In order to lower the delay, data is aggregated simultaneously using as many pairs as possible at each level. Figure 2 shows an example of data aggregation at different levels for a 10-node chain. Here, node at chain index 3 is chosen as the leader of the round and data gets aggregated towards this node, which is responsible for transmission to the sink. 3 STRATEGIES FOR LEADER NODE SELECTION We now introduce the five leader node selection strategies explored in this paper. 3.1 Random Selection The leader node for a round is uniform-randomly selected among all the nodes in the chain. The advantage with the random selection strategy is that once node failures start occurring due to exhaustion of energy, the node failures will be uniformly distributed throughout the network and not concentrated in any particular area of the network, thus reducing the chances of creating a void in the The Shuffle selection strategy is similar to the Random selection strategy in many respects. The main difference is that in an N node network, for every N rounds of data communication, a node is selected as the leader exactly once. Initially, the chain of sensor nodes C initial is constructed using the greedy-distance based heuristic employed by PEGASIS. A copy of C initial, referred as C shuffle, is made and is randomly shuffled. The node at index i in the shuffled chain C shuffle is selected as the leader node for the i th round of a data gathering cycle of N rounds. Note that C shuffle is used only for selecting the leader node for a round. Once the leader node for a round is selected, the chain C initial is used for data forwarding and aggregation. At the end of a cycle of N rounds, the chain C shuffle is again shuffled and the above procedure is repeated. 3.3 High-energy Node Selection In this strategy, for every round of data communication, the node with the highest energy during that instant is chosen as the leader of the round. This strategy is aimed towards maximizing the lifetime of the nodes in the network. However, as nodes closer to the sink are more likely to be selected as leaders compared to nodes farther away from the sink, once node failures starts to happen, this strategy is vulnerable of creating a void in the network. The block approach proposed in Sections 3.4 and 3.5 balances this tradeoff between random node selection and high-energy node selection. 3.4 2-Block Approach for Node Selection The whole network region is divided into two equal, non-overlapping, contiguous blocks. For every round of data gathering, one of the two blocks is randomly chosen and the node with the highest available energy within the chosen block is selected as the leader node of the round. By randomly selecting a block, the chances of creating a void within a region of the network are reduced and by selecting the node with the highest energy in the randomly chosen block, the 2-block strategy aims to maximize the lifetime of the nodes in both the blocks. Volume 4 Number 5 Page22 www.ubicc.org

Figure 3: Sensor Network with 2-blocks Overall, the strategy aims to reduce the chances of creating a void within either of the two blocks of the network. However, for larger block sizes, there is still a non-negligible chance of void created in regions towards the sink. Figure 4: Sensor Network with 4-blocks network field at (50, 300), (ii) the sink is located at the center of the network field at (50, 50) and (iii) the sink is located at the origin (0, 0). The different simulation scenarios are summarized in Figure 5. 3.5 4-Block Approach for Node Selection The 4-block approach for node selection is similar to the 2-block approach. The difference is that the whole network region is divided into four equal, non-overlapping, contiguous blocks. For every round of data gathering, one of the four blocks is randomly chosen and the node with the highest available energy within the chosen block is selected. For a given network field, due to the relatively smaller block sizes, the chances of creating a void within a block in a 4-block approach are low compared to the 2-block approach. Figures 3 and 4 illustrate how the 2-blocks and 4-blocks were created for the different network topologies considered in this paper. The total area of the network in all the cases is 10,000m 2. 4 SIMULATION ENVIRONMENT AND METRICS We conducted all of our simulations in a discrete-event simulator developed in Java. Such a simulator has also been previously used [6][7] to successfully report simulation results in sensor networks. Simulations of the PEGASIS protocol were run for both TDMA and CDMA systems. The area of the network field is 10,000m 2 and we chose three different network topologies that have this same area: a square field of dimensions 100m x 100m, a rectangular field of dimensions 1000m x 10m and a circular field of radius 56.4m. For each network field, simulations were conducted for three different sink locations (one sink location per simulation): (i) the sink is located outside the Figure 5: Overview of the Simulation Scenarios The number of nodes used in each of the simulations is 100. Each sensor node is assumed to be capable of conducting transmission power control: i.e. the sensor node will be able to adjust its transmission range depending on the distance to the receiver node. For CDMA systems, each sensor node has a unique CDMA code and it is assumed to be known to all of the other sensor nodes. The initial energy supplied to each node in all of our simulations is 1J. We had also conducted simulations with initial energy of 2J and 3J. The results for node lifetime obtained in these scenarios are basically double and triple the values obtained for 1J. The size of the data packet is 2000 bits. We assume that an aggregating node fuses its own data with the data collected from its peer node in the chain and sends a data packet of the same size to the next node in the chain. In other words, the size of the data packets does not increase with data aggregation. Volume 4 Number 5 Page 23 www.ubicc.org

Figure 6.1: Sink Location (50, 300), TDMA Figure 6.2: Sink Location (50, 300), CDMA Figure 6.3: Sink Location (50, 50), TDMA Figure 6.4: Sink Location (50, 50), CDMA Figure 6.5: Sink Location (0, 0), TDMA Figure 6.6: Sink Location (0, 0), CDMA Figure 6: Performance of the PEGASIS Protocol in a Square Network Topology 4.1 Energy Consumption Model We use the following first order radio model [8] that has been also previously used (e.g., [2][3][6][7]) to model energy consumption. According to this model, the energy expended by a radio to run the transmitter or receiver circuitry is E elec = 50 nj/bit and amp = 100 pj/bit/m2 for the transmitter amplifier. The radios are turned off when a node wants to avoid receiving unintended transmissions. An r 2 energy loss model is used to compute the transmission costs. The energy lost in transmitting a k-bit message over a distance d is given by: E TX (k, d) = E elec * k + *k* d amp 2. The energy lost in receiving a k-bit message is E RX (k) = E elec * k. The cost of fusion is 5 nj/bit/message. 4.2 Performance Metrics The performance metrics measured are the following: (i) Network lifetime and (ii) Energy * delay per round. For a given sink node location and network topology, the simulation results presented in Figures 6 through 9 are average values obtained for five different trials under each of the 18 different simulation scenarios presented in Figure 5. The network lifetime is measured as the number of successful rounds of data aggregation that have been completed at the time of failure of 1%, 2% 3%, 4% and 5% of the nodes in the network. As we start our simulations with 100 nodes, our definition of network lifetime translates to measuring the number of rounds of successful data aggregation at the time of the 1 st, 2 nd, 3 rd, 4 th and the 5 th node failures. The energy consumed per round is the sum of the energy lost at all the nodes for transmission, reception and fusion of the data. For TDMA systems, the delay per round would be the number of nodes in the network. For CDMA systems, the delay per round would be the number of levels of simultaneous data aggregation and it is theoretically equal to the logarithm (to the base 2) of the number of nodes in the network. The energy*delay per round best captures the tradeoff between energy consumed and the delay incurred per round. Lower values of the energy*delay per round are preferred. For simplicity, the energy consumed per round and the delay per round (and hence the energy*delay per round) are measured until the time of first node failure. Volume 4 Number 5 Page24 www.ubicc.org

Figure 7.1: Sink Location (50, 300), TDMA Figure 7.2: Sink Location (50, 300), CDMA Figure 7.3: Sink Location (50, 50), TDMA Figure 7.4: Sink Location (50, 50), CDMA Figure 7.5: Sink Location (0, 0), TDMA Figure 7.6: Sink Location (0, 0), CDMA Figure 7: Performance of the PEGASIS Protocol in a Circular Network Topology 5 SIMULATION RESULTS 5.1 Impact of Sink Node Location A quick look at the values of network lifetime illustrated in Figures 6 through 8 indicates that the magnitude of the network lifetime is the greatest when the sink is located at the center of the network and it is the least when the sink is located outside the network field. This observation holds good for each of the leader node selection strategies and for both TDMA and CDMA systems. The observation can be justified from the fact that more energy is lost at a leader node to transmit the data to a far away sink node than to a sink node that is located within the network field (i.e., at the center of the network) or at the boundary of the network field (i.e., at the origin of the network). 5.2 TDMA vs. CDMA Systems The network lifetime values, observed as a result of node failures, are larger for TDMA systems than that observed for CDMA systems. This is due to the higher energy consumed per round incurred by the PEGASIS protocol for CDMA systems compared to that obtained for TDMA systems. In a CDMA system, as the level of data aggregation increases, nodes are more likely to forward data to peer nodes located far away. For each combination of sink location and network topology, the difference in the magnitude of the network lifetime obtained for TDMA and CDMA systems increases with increase in the number of node failures. For a given network topology, when the sink is located outside the network field, the maximum difference between the network lifetime for TDMA and CDMA systems occurs when we use the Random and Shuffle node selection strategies. On the other hand, when the sink is located at the center or the origin of the network field, the maximum difference between the network lifetime for TDMA and CDMA systems occurs when we use the energyaware High-energy, 2-block and 4-block strategies. 5.3 Impact of Network Topology Magnitude-wise, for a given system (TDMA or CDMA), sink location and leader node selection strategy, the network lifetime obtained with both the square and circular network topologies are almost the same. A slightly larger network lifetime is obtained under circular network topologies, but the difference in magnitude is within 5%. Network lifetime values Volume 4 Number 5 Page 25 www.ubicc.org

Figure 8.1: Sink Location (50, 300), TDMA Figure 8.2: Sink Location (50, 300), CDMA Figure 8.3: Sink Location (50, 50), TDMA Figure 8.4: Sink Location (50, 50), CDMA Figure 8.5: Sink Location (0, 0), TDMA Figure 8.6: Sink Location (0, 0), CDMA Figure 8: Network Lifetime for the PEGASIS Protocol in a Rectangular Network Topology obtained under the rectangular network topology are significantly low compared to those obtained for the square and circular network topologies. This could be attributed to the predominantly one-dimensional structure of the network field in the case of the rectangular topology studied in this paper. 5.4 Sink Location: Outside the Network Field When the sink is located outside the network field, the Random and Shuffle selection strategies perform very poor. For both TDMA and CDMA systems, the energy-aware High-energy and the Block-based strategies yield a relatively 20-35% larger network lifetime for square and circular network topologies and 100-250% larger network lifetime for rectangular network topologies. The High-energy strategy slightly outperforms the Blockbased approaches, and the difference in the magnitude of network lifetime is within 10%. The better performance of the energy-aware leader selection strategies, compared to the Random and Shuffle selection strategies can be attributed to the prudent consideration of the available energy levels of the nodes before letting the nodes to transmit over a longer distance. 5.5 Sink Location: Center of the Network Field When the sink is located at the center of the network field, for both TDMA and CDMA systems, the Random and Shuffle leader selection strategies yield a larger network lifetime compared to the energy-aware leader selection strategies, for both square and circular network topologies. As the sink is actually located in the center of the network field for both the square and circular network topologies, it is essential to guarantee fairness of node usage as illustrated by the performance under the Shuffle leader selection strategy. The Shuffle leader selection strategy yields about 5-15% larger lifetime compared to the other strategies. Among the energy-aware leader selection strategies, the 4-block strategy yields a larger network lifetime sometimes close enough to that of the Shuffle strategy. This is because the 4- block leader selection strategy attempts to achieve fairness in region selection in addition to considering the available energy level of the nodes within the selected block. For rectangular network topologies, especially for TDMA systems, the energy-aware leader selection strategies yield significantly larger network lifetime compared to the Random and Shuffle leader Volume 4 Number 5 Page26 www.ubicc.org

Figure 9.1: Square Networks TDMA Figure 9.2: Square Networks CDMA Figure 9.3: Circular Networks TDMA Figure 9.4: Circular Networks CDMA Figure 9.5: Rectangular Networks TDMA Figure 9.6: Rectangular Networks CDMA Figure 9: Energy * Delay Product for the PEGASIS Protocol selection strategies. This can be also attributed to the fact that the simulations conducted for the rectangular topology still consider (50, 50) as the sink location, even though the center of the rectangular network field is (5, 50). 5.6 Sink Location: Origin of the Network Field When the sink is located at the origin of the network field, we observe the High-energy and Shuffle selection strategies to respectively yield a relatively larger network lifetime for TDMA and CDMA systems. However, for both square and circular network topologies, the difference in the network lifetime observed among the various leader selection strategies is within 5% (i.e., all the five leader selection strategies perform almost equally well). For rectangular network topology and TDMA system, the energy-aware leader selection strategies perform better and yield a relatively larger lifetime. On the other hand, for rectangular network topology and CDMA system, all the five leader selection strategies yield a relatively lower lifetime (compared to that obtained for TDMA systems), with the Random and Shuffle strategies yielding a slightly larger network lifetime. 5.7 Energy * Delay per Round Figures 9.1 through 9.6 illustrate that the energy*delay per round is the lowest when the sink is located at the center of the network field and it is the maximum when the sink is located outside the network field. This observation holds good for each of the leader node selection strategies and for both TDMA and CDMA systems. For a given leader node election strategy and sink location, the energy consumed per round for CDMA systems is 14% - 27% more than that obtained for TDMA systems for square and circular network topologies and is 32% - 137% more than that obtained for TDMA systems for rectangular network topologies. However, the delay incurred in TDMA systems is roughly about 12 12.5 times more than that incurred for CDMA systems. As a result, the energy*delay per round incurred for TDMA systems is significantly larger (as large as by a factor of 10) than that obtained for CDMA systems. For both square and circular network topologies, the difference in the energy consumed per round Volume 4 Number 5 Page 27 www.ubicc.org

among the leader node selection strategies is within 5%. As a result, the difference in the energy*delay per round among the leader node selection strategies is also within 5%. This observation holds good for both TDMA and CDMA systems. However, for the rectangular network topology, the energy-aware leader selection strategies (especially the 2-block and 4-block strategies) yield significantly lower energy consumption per round compared to the Random and Shuffle selection strategies. As a result, the energyaware leader selection strategies (High-energy, 2- block and 4-block strategies) yield a lower energy*delay product, as low as half the value obtained for Random and Shuffle selection strategies. Table 1: Leader Node Selection Strategies Yielding the Largest Network Lifetime (up to 5% Node Failures) when the sink is located at the center of the network field, the Random and Shuffle strategies should be preferred; whereas, when the sink is located at the origin of the network field, all the five leader selection strategies yield network lifetime values that are very close and the difference is only within 5%. The leader node selection strategies that yield the largest network lifetime (5% node failures) for each of the different scenarios considered are highlighted in Table 1. With respect to the energy*delay per round, we observe that for both the square and circular network topologies and for both TDMA and CDMA systems, all the five leader node selection strategies yield very close energy*delay values; the difference is only within 5%. However, for rectangular network topologies, especially for TDMA systems, the energy-aware leader selection strategies (especially the 2-block and 4-block strategies) yield a relatively lower energy*delay value. 6 CONCLUSIONS The overall contribution of this paper is the identification of the leader node selection strategies that would yield a larger network lifetime and lower energy*delay product for the PEGASIS protocol. The leader node selection strategies considered are: Random, Shuffle and energy-aware strategies such as High-energy node selection, 2-block and 4-block strategies. To obtain the maximum network lifetime, the energy-aware selection strategies should be considered when the sink is located outside the network field for any network topology. Also, the energy-aware selection strategies should be considered for rectangular topologies with respect to any sink location. For square and circular topologies, 7 ACKNOWLEDGMENTS The research is supported through the National Science Foundation grant (CNS-0851646) entitled: REU Site: Undergraduate Research Program in Wireless Ad hoc Networks and Sensor Networks, hosted by the Department of Computer Science at Jackson State University, USA. The authors also acknowledge Dr. Loretta Moore, Dr. Gordon Skelton and Mrs. Brenda Johnson (all at Jackson State University) for their services to this program. 8 REFERENCES [1] W. Heinzelman, A. Chandrakasan and H. Balakarishnan, Energy-Efficient Communication Protocols for Wireless Microsensor Networks, Proceedings of the Hawaaian International Conference on Systems Science, January 2000. [2] S. Lindsey, C. Raghavendra and K. M. Sivalingam, Data Gathering Algorithms in Sensor Networks using Energy Metrics, IEEE Transactions on Parallel and Distributed Systems, Vol. 13, No. 9, pp. 924-935, September 2002. [3] S. Lindsey, C. Raghavendra and K. M. Sivalingam, Data Gathering in Sensor Networks using the Energy*Delay Metric, Proceedings of the 15 th International Parallel and Distributed Processing Symposium, pp. 2001-08, April 2001. [4] R. Osso, Handbook of Emerging Communications Technologies: The Next Decade, 1 st edition, CRC, August 1999, ISBN: 0849395941. [5] A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication, 1 st edition, Prentice Hall, April 1995, ISBN: 0201633744. [6] N. Meghanathan, An Algorithm to Determine Energy-aware Connected Dominating Set and Data Gathering Tree for Wireless Sensor Networks, Proceedings of the International Conference on Volume 4 Number 5 Page28 www.ubicc.org

Wireless Networks, Las Vegas, USA, July 2009. [7] N. Meghanathan, Grid Block Energy based Data Gathering Algorithm for Lower Energy*Delay and Longer Lifetime in Wireless Sensor Networks, Proceedings of the ISCA First International Conference on Sensor Networks and Applications, San Francisco, USA, November 2009. [8] T. S. Rappaport, Wireless Communications: Principles and Practice, 2 nd edition, Prentice Hall, January 2002, ISBN: 0130422323. Volume 4 Number 5 Page 29 www.ubicc.org