Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 5- June 2015
Analysis and Enhancement of Adaptive Packet Technique in Wireless
Sensor Network
Ritesh Kumar#
#
M.Tech, Electronics and Communication Engineering, LPU, Jalandhar, Punjab, India
Abstract- Wireless Sensor network (WSN) is an application based
and self configuring type of network. All sensor nodes in WSN work
cooperatively to serve the requests. The battery consumption,
security, packet loss etc. are some of the major challenges of
wireless sensor networks. In previous times, many techniques had
been proposed to reduce battery consumption and packet loss in the
network. The advertisement scheme is the much efficient technique
to reduce the packet loss in the network. In this paper, enhancement
in the advertisement scheme is proposed which is based on the
acknowledgement based technique. The simulations are performed
using Network Simulator (NS-2) Version 2.35 tool. The
experimental result shows that the proposed technique overcomes
the problem of advertisement request and response packet collision
in the advertisement scheme.
Keywords- WSN, LEACH, CLUSTERING, Advertisement scheme,
CSMA/CA
I.
INTRODUCTION
A wireless sensor network is the collection of nodes
organized in cooperative manner. The nodes used in the
network are the sensor nodes which are used for the
communication by using the wireless media. The wireless
media may be either radio frequency waves, infrared medium
or any other media in which there is no use of the wires is
done. The sensor nodes are arranged randomly and the nodes
may communicate with each another to establish an Ad-hoc
network [2]. In wireless sensor network the sensor nodes
monitor different conditions at different locations and
different conditions may be some kind of heat or
temperatures, stress, strain, level of noise, movement of
vehicle, the objects’ presence, the atmospheric conditions like
humidity, lightning condition etc, and any current
characteristics like the speed and direction of any object and
shape of objects [14]. The sensor nodes are automatic devices
distributed locally to cooperatively monitor any location. The
sensor nodes normally have a sensing medium, a processing
medium and a communicating medium. A sensor node
consists of a senor module, a battery, a processor and a radio
device. These nodes are generally low-power nodes and are
capable to do multiple functions, operate in an unmanned
atmosphere with the limited capability of computation and
sensing [15]. In case if a sensor node is unable to establish the
communication with any of the other node, then it means that
they are not within the range with one another. In such
situations, the data can be transmitted to the destination node
by using the inter-mediate nodes between the source node and
ISSN: 2231-5381
the destination node. This way of transmission of data is
known as multi-hoping [2].
All sensor nodes in WSN work cooperatively to serve the
requests. There is no requirement of prior established infrastructure to deploy the network. In such networks we can add
or remove the nodes as per requirement. This property is
known as the flexibility of the network. Due to this property
we have to deal with several forceful changes in the topology
of the network such as the path updation, updation of the tree
of the network etc. In a wireless sensor network the sensor
node collects data and then sends it to the sink. The data sink
may be connected to the world via internet where the
information may be required [2]. The most common problem
in using such kinds of network is their limited battery life.
This is due to the reason that a sensor node is expected to be
small in size and this results in the constraints on its
component’s size i.e. battery size, processors size, data and
information storing memory, all are required to be small.
Thus any optimization in these networks should be focused
on optimizing the energy consumption. In WSN, a lot of
sensed data and routing information has to be transmitted
that usually have some time constraints so that the
information can be utilized before any mishap happens,
e.g. industrial monitoring, machinery monitoring, etc [2]. In
data communication more energy power is consumed in
comparison to any other internal processing. So energy
conservation in WSN is needs to be addressed.
In section II, we have included the related work. In
section III, we have introduced the CSMA/CA. The section IV
includes the proposed methodology and simulations and
results are discussed in section V.
II.
RELATED WORK
Fan Xiangning and Song Yulin [1] studied the LEACH
protocol, and puts forward energy-LEACH and multi-hop
LEACH protocols. Energy-LEACH protocol improves the
selection technique of the cluster head. This protocol assigns
the task of cluster head to some node which has more residual
energy. Multi-hop LEACH protocols improve the mode of
communication from single hop to multi-hop between the sink
node and the cluster head. Simulation results show that the
energy-LEACH and multi-hop LEACH protocols have better
performance than the Low-Energy Adaptive Clustering
Hierarchy (LEACH) protocol, which is basically a clustering
based protocol used in data collection from the wireless
networks.
http://www.ijettjournal.org
Page 227
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 5- June 2015
Yunxia Chen and Qing Zhao [12] studied the integrated
design of medium accesses management protocols for
wireless device network for the maximization of network
lifespan. They identified following key parameter- the channel
state and therefore the remained energy- that have an effect on
network lifespan. They showed that maximizing time period
of the network requires adaptively commerce off CSI (channel
state information) with REI (residual energy information)
accordingly with the life period of network [12]. Specifically,
network life period-increasing protocols ought to be
additionally aggressive by providing the priorities to sensors
with higher network channels, specializing in reducing power
consuming, when the network is new.
Bilal Abu Bakr and Leszek Lilie [5], proposed the
LEACH-SM protocol. This LEACH-SM protocol modifies
the renowned LEACH protocol by providing an optimal
energy saving spare management, together with the spare
selection. LEACH-SM includes the spare selection phase to
LEACH protocol. This paper presented a quantitative
comparison of the energy consumption and wireless sensor
network lifetime for both the protocols.
Nikodem M. et al. [13], focused on the theoretical
aspects of clustering in the wireless sensor networks, as a
mean to enhance the lifetime of the network. They
investigated whether the clustering itself (without data
aggregation) can enhance the network lifetime in a specific
application when compared to non-clustered networks. Their
result showed that the clustering itself cannot enhance the
lifetime of network, therefore the additional techniques and
means are needed to be utilized in action with clustering.
F.J. Atero et al. [3], proposed a new architecture called
HARP (Hierarchical Adaptive and Reliable Routing Protocol).
It is a clustering algorithm that builds the inter-cluster and
intra-cluster hierarchic trees that are reformed to save lots of
power. This architectural design is scalable and might be
utilized in both homogeneous as well as heterogeneous
wireless sensor networks. Also a new cluster heads election
formulation and its associated data gathering protocol (sHARP) was proposed in this paper. This protocol results in
optimizing and balancing the consumption of energy within
the network.
Dahlila P. Dahnil, et al. [4], presented a relative study of
clustering techniques and cluster quality of a single criterion
cluster heads formation in wireless sensor network. They
simulated the Hybrid Energy Efficient Distributed (HEED)
[11], Low Energy Adaptive Clustering Hierarchy (LEACH)
and Energy-based LEACH protocols and compared their
performances in terms of the number of cluster head
generated, size of the cluster, and distribution of cluster head,
coverage, and scalability. The results of these protocols were
presented to point out that how the cluster formation helps in
enhancement of the lifetime network. We investigated
scalability aspects in the presence of advanced nodes in the
network and its effect on the network lifetime.
ISSN: 2231-5381
III.
CSMA/CA (CARRIER SENSE MULTIPLE
ACCESS WITH COLLISION AVOIDANCE)
In wireless networks there is the need to avoid the
collisions because it is not possible to detect those always. So
the technique known as carrier-sense multiple accesses with
collision avoidance (CSMA-CA) was discovered for this type
of network. The CSMA/CA is a protocol which is basically
designed by making modifications in the carrier sense
multiple access method. The carrier-sense multiple accesses
with collision avoidance are used for making the
improvements over carrier-sense multiple accesses method. It
is basically used for the carrier transmission in the 802.11
wireless networking. The carrier-sense multiple accesses with
collision avoid is the scheme which is applied to prevent the
collisions before they take place. In the carrier-sense multiple
accesses with collision avoid technique; whenever a node or a
station receives a packet that is to be transmitted, it firstly
checks to make it sure that the channel is not busy means there
is not any other node which is transferring data packet at that
particular instant of time. When the station finds that the
channel is idle, then only the packet is transferred. In any
condition if the channel is busy, then the node or station has to
wait for a random instant of time, and then checks again to see
that the channel is clear or not. This time period is known as
the back-off factor or back-off period, and this back-off period
is count down by the back-off counters [8]. When the back off
counters reaches to zero, then if the channel is obtained clear
then only the node transfers the packets. If the channel is
unclear or busy when the back- off counter reaches to zero,
the back- off factor is set again, and the same process is
revised again.
Carrier sense multiple access with collision avoidance in
the computer networking, is a network multiple access method
in which carrier sensing is used, but nodes try to avoid the
collisions by transmitting only when the channel is found to
be in "idle" position [9]. The key idea behind the carrier sense
multiple-access with collision detection (CSMA/CD)
technique is that a station must have to be able to receive
while transmitting to detect a collision. When the collision is
not present there, the station only receives one signal i.e. its
own signal. When the collision is present there, the station
receives two different signals in which one is its own signal
and the second is the signal transmitted by a second station
[10]. To differentiate these two cases, the received signals in
both the cases must be considerably different. In the case of a
wired network, the received signal and the sent signal has
almost the same energy because either the length of the cable
is short or the repeaters are present there in order to amplify
the energy between the sender and the receiver. This employs
that in a collision, the detected energy becomes almost double.
In case of a wireless network, much amount of the transmitted
energy is wasted in the transmission. Thus in the received
signal there is very little energy. Thus, a collision may add up
to 5 to 10 percent additional energy. This technique is not
useful for effective detection of collisions. Thus we need to
avoid the collisions on a wireless network because they cannot
http://www.ijettjournal.org
Page 228
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 5- June 2015
be detected. Thus the carrier sense multiple access with
collision avoidance technique was invented for this network.
In carrier sensing multiple accesses with collision
avoidance, the collisions are avoided with the help of three
strategies of CSMA/CA – the interframe space, the contention
window, and the last one is the acknowledgements. In case of
wireless sensor networks there are some problems or some
issues known as – hidden terminal problem, and exposed
terminal problem. In case of controlled access methods, the
stations or nodes make consultation with one another to
confirm that which particular node or station has the rights to
transmit. A node can’t transmit until it is licensed or
authorized by the other nodes. Three popular controlledaccess methods: First is the reservation method, second is the
polling method and third is the token passing method. Studies
show that under ideal propagation conditions (simulations),
the Direct Sequence Spread Spectrum (DSSS) modulation
technique provides the highest throughput for all nodes on a
network when used in collaboration with CSMA/CA and the
IEEE 802.11 RTS/CTS exchange when the network load is
light. The Frequency Hopping Spread Spectrum (FHSS)
modulation technique follows distantly behind directsequence spread spectrum technique with regard to throughput
with a greater throughput when the network load becomes
actually heavy. However, under the real world conditions, the
throughput is generally the same due to the radio propagation
factors.
IV.
period time, sink again sends an advertisement respond packet
to requesting cluster head.
V.
SIMULATIONS AND RESULTS
The simulations of proposed methodology are performed
and results are analyzed using network simulator (NS-2)
version 2.35 tool.
TABLE 1
NETWORK PARAMETERS
Number of Nodes
20
Antenna Type
Omni-directional
Queue
Pri-queue
Number of Channels
10
Propagation Model
Two Ray Propagation Model
Physical Medium
Wireless Medium
The simulation parameters used are given in table 1.
PROPOSED METHODOLOGY
The battery consumption is the major issue in the wireless
sensor network. To reduce the battery consumption of the
sensor nodes many techniques are proposed so far, among all
the techniques clustering is much efficient technique. In
technique of clustering whole network is divided into fixed
size clusters and in each cluster, cluster heads are chosen. The
data is transmitted from one cluster head to another. The
routes between source and destination will be selected with
reactive routing protocols. In this routing scheme, the slotted
ALOHA is used for channel sensing. The Slotted ALOHA
will not work efficiently due to the self configuring nature of
wireless sensor network and it cause packet collision in the
network. To increase efficiency of the network, advertisement
scheme had been proposed to take channel access. In
advertisement scheme, the advertisement request and response
packet can collide in specific conditions which reduce the
network efficiency. The enhancement is been proposed in
advertisement scheme to remove advertisement request and
response packet collisions. The proposed enhancement is
based on the acknowledgement scheme. The cluster head
which is requesting for the channel access will send an
advertisement request packet to sink and sink will respond
back with the advertisement respond back, if the channel is
free. When the cluster head receives advertisement respond
packet, it will send an acknowledgment packet to sink. If the
sink will not receive acknowledgment packet in threshold
ISSN: 2231-5381
Fig. 1 Packet loss graph
As illustrated in the figure 1, the green line shows the
packet loss in the old scenario and red line shows the packet
loss in the new scenario. The packet loss in the old scenario is
more due to advertisement request and response packet
collisions. The proposed methodology has implemented in the
new scenario and it shows that it reduce packet loss in the
network and increase network reliability, throughput and
lifetime.
http://www.ijettjournal.org
Page 229
International Journal of Engineering Trends and Technology (IJETT) – Volume 24 Number 5- June 2015
VI.
CONCLUSION
In this work, we conclude that packet loss is the major [15]
issue in the wireless sensor network due to its self configuring
nature. The packet loss in the network can lead to increase in
energy consumption of the wireless sensor nodes. To reduce
packet loss in the network advertisement scheme had been
proposed in the past year. In advertisement scheme,
advertisement request and response packet collision can
happen which reduce network throughput and increase battery
consumption. To overcome this problem, enhancement in
advertisement scheme is proposed in this paper which is based
on the acknowledgment technique. The experimental results
show that proposed enhancement is much efficient and
reliable than existing technique.
Advanced Research in Computer Science and Software Engineering,
Volume 2, Issue 11, November 2012, pp. 56-60.
K. Ramesh and Dr. K. Somasundaram, “A Comparative Study of
Cluster-Head Selection Algorithms in Wireless Sensor Networks”,
International Journal of Computer Science and Engineering Survey,
Volume 2, November 2011, pp. 153-164.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
Fan Xiangning, Song Yulin “Improvement on LEACH Protocol
of Wireless Sensor Network”, International Conference on Sensor
Technologies and Applications, pp. 260-264, IEEE, 2007.
Sudhanshu Pant, Naveen Chauhan, Prashant Kumar, “Effective Cache
based Policies in Wireless Sensor Networks: A Survey”, International
Journal of Computer Applications (0975 – 8887), Volume 11, No. 10,
Dec 2010.
F.J. Atero, J.J. Vinagre, E. Morgado, M.R. Wilby “A Low Energy and
Adaptive Architecture for Efficient Routing and Robust Mobility
Management in Wireless Sensor Networks”, 31st International
Conference on Distributed Computing Systems Workshops pp. 172-181,
2011, IEEE.
Dahlila P. Dahnil, Yaswant P. Singh, Chin Kuan Ho, “EnergyEfficient Cluster Formation in Heterogeneous Wireless Sensor
Networks: A Comparative Study”, ICACT, Feb 2011.
Bilal Abu Bakr, Leszek Lilie, “A Quantitative Comparison of
Energy Consumption and WSN Lifetime for LEACH and LEACHSM”, International Conference on Distributed Computing Systems
Workshops, 2011, IEEE.
Archana Bharathidasan, Vijay Anand Sai Ponduru, “Sensor Networks:
An Overview”, Department of Computer Science, University of
California, Volume 2, Issue 2, March 2002.
Arun K. Somani, Shubha Kher, Paul Speck, and Jinran Chen,
“Distributed Dynamic Clustering Algorithm in Uneven Distributed
Wireless Sensor Network”, 2004.
Basilis Mamalis, Damianos Gavalas, Charalampos Konstantopoulos,
and Grammati Pantziou, “Clustering in Wireless Sensor Networks”,
RFID and Sensor Networks, pp. 323, june 2009.
Tamer M.S. Khattab, Mahmoud T. El-Hadidi and Hebat-Allah M.
Mourad, “Analysis of Wireless CSMA/CA Network Using Single
Station Superposition”, International Journal of Electronics and
Communications, pp. 71-81, 2002.
Daniele Puccinelli and Martin Haenggi, “Sensor Networks:
Applications and Challenges of Ubiquitous Sensing”, IEEE circuits
and Systems Magazine, Volume 5, Issue 3, pp. 19-31, 2005, IEEE.
Ossama Younis and Sonia Fahmy, “HEED: A Hybrid, Energy-Efficient,
Distributed Clustering Approach for Ad-hoc Sensor Networks”,
Department of Computer Sciences, Purdue University, Volume 3, Issue
4, pp. 366-379, 2004 IEEE.
Yunxia Chen and Qing Zhao, “An Integrated Approach to EnergyAware Medium Access for Wireless Sensor Networks”, IEEE, July
2007, Volume 55, No.7, pp. 3429-3444.
Nikodem, M., Wojciechowski, B., “Upper Bounds on Network Lifetime
for Clustered Wireless Sensor Networks”, 4th IFIP International
Conference on New Technologies, Mobility and Security (NTMS), pp.
1-6. IEEE, 2011.
Ms. Sunita, Jyoti Malik, Suman Mor, “Comprehensive Study of
Applications of Wireless Sensor Network”, International Journal of
ISSN: 2231-5381
http://www.ijettjournal.org
Page 230
Download