SlideShare a Scribd company logo
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE
FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORK
A Project Report Submitted to
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, ANANTAPURAMU
By
GUNAPATI.MUNISEKHAR
(14KB1D5802)
Under the esteemed Guidance Of
Dr. S.MaruthuPerumal, M.E., Ph.D.,
Professor& Head, Dept. of C.S.E.
Project report submitted in partial fulfillment of the
Requirements for the award of the degree of
MASTER OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
N.B.K.R INSTITUTE OF SCIENCE AND TECHNOLOGY
(AN AUTONOMOUS INSTITUTION)
VIDYANAGAR – 524 413
OCTOBER 2016
Website: www.nbkrist.org. Ph: 08624-228 247
Email : ist@nbkrist.org. Fax: 08624-228 257.
N.B.K.R. INSTITUTE OF SCIENCE & TECHNOLOGY
AUTONOMOUS INSTITUTION
(Approved by AICTE: Accredited by NBA: Affiliated to J.N.T University, Anantapuramu)
An ISO 9001:2008 Certified Institution
Vidyanagar -524 413, SPSR Nellore district, Andhra Pradesh, India.
BONAFIDE CERTIFICATE
This is to certify that the project work entitled “LAOD BALANCED CLUSTERING
WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHERING IN
WIRELESS SENSOR NETWORKS” is a bonafide record done by
Mr.GUNAPATI.MUNISEKHAR (Roll No.14KB1D5802).In the department of Computer
Science & Engineering, N.B.K.R. Institute of Science & Technology, Vidyanagar and is
submitted to Jawaharlal Nehru Technological University, Anantapuramu in the partial
fulfillment for the award of M.Techdegree in Computer Science & Engineering. This work
has been carried out under my supervision.
Dr. S.MaruthuPerumal, M.E., Ph.D., Dr. S.MaruthuPerumal, M.E., Ph.D.,
Professor& Head, Professor& Head,
Department of CSE NBKRIST, Department of CSE NBKRIST,
Vidyanagar. Vidyanagar.
Submitted for the Viva-Voce Examination held on ____________
Internal Examiner External Examiner
ACKNOWLEDGEMENT
The satisfaction that accompanies the successful completion of the project would be
incomplete without the people who made it possible. Their constant guidance and
encouragement crowned the efforts with success.
I would like to express profound sense of gratitude to the project guide
Dr. S.MaruthuPerumal, M.E., Ph.D., Professor & Head of Department, Computer
Science & Engineering, N.B.K.R.I.S.T(An Autonomous Institution and affiliated to J.N.T
University, Anantapuramu), Vidyanagar, for her masterful guidance and the constant
encouragement throughout the project. I sincerely thanks for her suggestions and unmatched
services without which this work would have been an unfulfilled dream.
I convey my special thanks to Dr. I.GOPAL REDDY respectable chairman of
N.B.K.R. Institute of Science and Technology, for providing excellent infrastructure in our
campus for the completion of the project.
I convey my special thanks to Sri N.RAM KUMAR REDDY respectable
correspondent of N.B.K.R. Institute of Science and Technology, for providing excellent
infrastructure in our campus for the completion of the project.
I would like to convey heartful thanks to Staff members, Lab technicians, our
friends, who extended their cooperation in making the project a successful one.
I would like to thank one and all who have helped me directly and indirectly to complete
the project successfully.
TABLE OF CONTENTS
Title Page No
List of Figures ii
List of Tables iii
ABSTRACT iv
CHAPTER 1: INTRODUCTION 1-16
1.1 What is Mobile Computing 1
1.2 different type of devices used for the mobile Computing 2
1.3 Applications of Mobile computing 2
1.3.1 Vehicles 2
1.3.2 Emergency 2
1.3.3 Business 3
1.4 Benefits of Mobile computing 3
1.5 Advantages of Mobile Computing 3
1.5.1 Location Flexibility 4
1.5.2 SavesTime 4
1.5.3 EnhancedProductivity 4
1.5.4 Ease of Research 4
1.5.5 Entertainment 4
1.5.6 Streamingof BusinessProcesses 5
1.6 WirelessSensorNetworks 5
1.7 Applicationsof WirelessSensorNetworks 6
1.7.1 AreaMonitoring 6
1.7.2 Environmental/EarthMonitoring 6
1.7.3 AirQualityMonitoring 6
1.7.4 InteriorMonitoring 6
1.7.5 ExportMonitoring 7
1.7.6 AirPollutionMonitoring 7
1.7.7 ForestFire Detection 7
1.7.8 Landslide Detection 7
1.7.9 WaterQualityMonitoring 7
1.7.10 Natural DisasterPrevention 8
Title Page. No
1.8 Industrial Monitoring 8
1.8.1 Machine HealthMonitoring 8
1.8.2 Data Logging 8
1.8.3 Industrial SenseandControl Application 8
1.8.4 Waste Water Monitoring 9
1.9 Agriculture Monitoring 9
1.9.1 Passive Localization and Tracking 10
1.9.2 Smart Home Monitoring 11
1.10 Characteristics 11
1.11 Platforms 12
1.11.1 Standard and Specification 12
1.11.2 Hardware 12
1.11.3 Software 13
1.11.4 Operating System 14
1.11.5 Online Collaboration Sensor Data Management Platforms 14
1.11.6 Simulation of WSNs 15
1.12 Other Concepts 15
1.12.1 Distribution Sensor Network 15
1.12.2 Data Integration and Sensor Web 16
1.12.3 In-Network Processing 16
CHAPTER 2: LITERATURE SURVEY 17-20
2.1 Introduction 17
2.2 Literature Survey 17
CHAPTER 3: EXISTING SYSTEM 21-22
3.1 Introduction 21
3.2 Existing System 21
3.3 Limitations of Existing System 22
CHAPTER 4: PROPOSED SYSTEM 23-24
4.1 Overview 23
4.2 Proposed System 23
4.3 Advantages of Proposed System 23
Title Page. No
CHAPTER 5: SYSTEM DESIGN 25-34
5.1 Proposed System Architecture 25
5.1.1 Sensor Layer 25
5.1.2 Cluster Head Layer 26
5.1.3 Sencar Layer 26
5.2 UML Diagrams 28
5.2.1 Goals 28
5.2.2 Data FlowDiagram 29
5.2.3 Use Case Diagram 31
5.2.4 ClassDiagram 32
5.2.5 Sequence Diagram 33
5.2.6 ActivityDiagram 34
CHAPTER6: IMPLEMENTATION 35-54
6.1 Overview 35
6.2 Sensor Layer 35
6.2.1. Initialization 36
6.2.2. Status Claim 37
6.2.3. Cluster Forming 39
6.2.4 Synchronization among Cluster Heads 41
6.2.5 Analysis of Load Balanced Clustering Algorithm 42
6.2.6 Examples of LBC Algorithm 43
6.3 Cluster Head Layer 45
6.3.1 Connectivity among CHGs 46
6.3.2 Inter-Cluster Communications 47
6.4 SenCar Layer 49
6.4.1 Properties of Polling Points 49
6.4.2 MU-MIMO Uploading 52
6.4.3 Data Collection with Time Constraints 53
CHAPTER 7: PERFORMANCE AND EVALUTION 55-62
7.1 Overview 55
7.2 Comparision of Energy Consumption and Latency 57
Title Page. No
7.3 Load Balanced and Energy Distribution 58
7.4 Number of Clusters and Energy Overhead 59
7.5 Impact of Maximum No. of Cluster Heads in Each Cluster 60
7.6 Data Collection with Time Constraints 61
CHAPTER 8: CONCLUSIONS AND FUTURE WORKS 63
8.1 Conclusion 63
8.2 Future Works 63
BIBILIOGRAPHY 64
References 64
List of Figures
NAME
PAGE.NO.
Figure 1 Architecture of mobile computing 1
Figure 2 Illustration of the LBC-MIMO Frameworks 25
Figure 3 Data flow Diagram 30
Figure 4 Use case Diagram 31
Figure 5 Class Diagram 32
Figure 6 Sequence Diagram 33
Figure 7 Activity Diagram 34
Figure 8 An Example of LBC Algorithm with M=2 41
Figure 9 An Example of LBC with different parameter settings 45
Figure 10 Maximum distance b/w two neighboring clusters 47
Figure 11 Distribution of polling points 51
Figure 12 Performance Comparision of different data gathering 57
Figure 13 Performance Comparision of proposed framework 60
Figure 14 Evaluation of data collection with time constraints 61
List of Tables
NAME
PAGE.NO.
Table 1 Notations 36
Table 2 Travelling cost without time constraints 62
ABSTRACT
A three-layer framework is proposed for mobile data collection in wireless sensor networks,
which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer.
The framework employs distributed load balanced clustering and dual data uploading, which
is referred to as LBC-MIMO. The objective is to achieve good scalability, long network
lifetime and low data collection latency. At the sensor layer, a distributed load balanced
clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters.
In contrast to existing clustering methods, our scheme generates multiple cluster heads in each
cluster to balance the work load and facilitate dual data uploading. At the cluster head layer,
the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the
clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-
saving inter-cluster communications. Through inter-cluster transmissions, cluster head
information is forwarded to SenCar for its moving trajectory planning. At the mobile collector
layer, SenCar is equipped with two antennas, which enables two cluster heads to
simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and
multiple-output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to
fully utilize dual data uploading capability by properly selecting polling points in each cluster.
By visiting each selected polling point, SenCar can efficiently gather data from cluster heads
and transport the data to the static data sink. Extensive simulations are conducted to evaluate
the effectiveness of the proposed LBC-MIMO scheme. The results show that when each cluster
has at most two cluster heads, LBC-MIMO achieves over 50 percent energy saving per node
and 60 percent energy saving on cluster heads comparing with data collection through multi-
hop relay to the static data sink, and 20 percent shorter data collection time compared to
traditional mobile data gathering.
CHAPTER-1
INTRODUCTION
1.1. WHAT IS MOBILE COMPUTING?
Mobile computing is the discipline for creating an information management platform, which
is free from spatial and temporal constraints. The freedom from these constraints allows its
users to access and process desired information from anywhere in the space. The state of the
user, static or mobile, does not affect the information management capability of the mobile
platform. A user can continue to access and manipulate desired data while traveling on plane,
in car, on ship, etc. Thus, the discipline creates an illusion that the desired data and sufficient
processing power are available on the spot, where as in reality they may be located far away.
Otherwise Mobile computing is a generic term used to refer to a variety of devices that allow
people to access data and information from where ever they are.
Fig.1.Architecture of mobile computing
1.2. DIFFERENT TYPES OF DEVICES USED FOR THE MOBILE
COMPUTING
1. Personal digital assistant/enterprise digital assistant
2. Smartphones
3. Tablet computers
4. Netbooks
5. Ultra-mobile PCs
6. Wearable computers
7. Palmtops/pocket computers
1.3. APPLICATIONS OF MOBILE COMPUTING
1.3.1. Vehicles
Tomorrow’s cars will comprise many wireless communication systems and mobility
aware applications. Music, news, road conditions, weather reports, and other broadcast
information are received via digital audio broadcasting (DAB) with 1.5 M-bits/s. For
personal communication, a global system for mobile communications (GSM) phone might be
available offering voice and data connectivity with 384 k-bits/s. For remote areas satellite
communication can be used, while the current position of the car is determined via global
positioning system (GPS). Additionally, cars driving in the same area build a local ad-hoc
network for fast information exchange in emergency situations or to help each other keeping
a safe distance. In case of an accident, not only will the airbag be triggered, but also an
emergency call to a service provider informing ambulance and police. Cars with this
technology are already available. Future cars will also inform other cars about accidents via
the ad hoc network to help them slowdown in time, even before a driver can recognize the
accident. Buses, trucks, and train are already transmitting maintenance and logistic
information to their home base, which helps o improve organization (fleet management), and
thus save time and money
1.3.2. Emergency
Just imagine the possibilities of an ambulance with a high quality wireless
connection to a hospital. After an accident, vital information about injured persons can be
sent to the hospital immediately. There, all necessary steps for this particular type of accident
can be prepared or further specialists can be consulted for an early diagnosis. Furthermore,
wireless networks are the only means of communication in the case of natural disasters such
as hurricanes or earthquakes.
1.3.3. Business
Today’s typical traveling salesman needs instant access to the company’s database: to
ensure that the files on his or her laptop reflect the actual state, to enable the company to keep
track of all activities of their traveling employees, to keep databases consistent etc., with
wireless access, the laptop can be turned into a true mobile office.
1.4. BENEFITS OF MOBILE COMPUTING
 Improve business productivity by streamlining interaction and taking advantage of
immediate access
 Reduce business operations costs by increasing supply chain visibility, optimizing
logistics and accelerating processes
 Strengthen customer relationships by creating more opportunities to connect, providing
information at their fingertips when they need it most
 Gain competitive advantage by creating brand differentiation and expanding customer
experience
 Increase work force effectiveness and capability by providing on-the-go access
 Improve business cycle processes by redesigning work flow to utilize mobile devices
that interface with legacy applications
1.5. ADVANTAGES OF MOBILE COMPUTING
Mobile computing has changed the complete landscape of human being life. Following are
the clear advantages of Mobile Computing.
1.5.1. Location Flexibility
This has enabled user to work from anywhere as long as there is a connection established. A
user can work without being in a fixed position. Their mobility ensures that they are able to
carry out numerous tasks at the same time perform their stated jobs.
1.5.2. Saves Time
The time consumed or wasted by travelling from different locations or to the office and back,
have been slashed. One can now access all the important documents and files over a secure
channel or portal and work as if they were on their computer. It has enhanced telecommuting
in many companies. This also reduces unnecessary expenses that might be incurred.
1.5.3. Enhanced Productivity
Productive nature has been boosted by the fact that a worker can simply work efficiently and
effectively from which ever location they see comfortable and suitable. Users are able to
work with comfortable environments.
1.5.4. Ease of research
Research has been made easier, since users will go to the field and search for facts and feed
them back to the system. It has also made it easier for field officer and researchers to collect
and feed data from wherever they without making unnecessary trip to and from the office to
the field.
1.5.5. Entertainment
Video and audio recordings can now be streamed on the go using mobile computing. It's easy
to access a wide variety of movies, educational and informative material. With the
improvement and availability of high speed data connections at considerable costs, one is
able to get all the entertainment they want as they browser the internet for streamed data. One
can be able to watch news, movies, and documentaries among other entertainment offers over
the internet. This was not such before mobile computing dawned on the computing world.
1.5.6. Streamlining Of Business Processes
Business processes are now easily available through secured connections. Basing on the
factor of security, adequate measures have been put in place to ensure authentication and
authorization of the user accessing those services.
Some business functions can be run over secure links and also the sharing of information
between business partners. Also it's worth noting that lengthy travelling has been reduced,
since there is the use of voice and video conferencing.
Meetings, seminars and other informative services can be conducted using the video and
voice conferencing. This cuts down on travel time and expenditure.
1.6. WIRELESS SENSOR NETWORK
A wireless sensornetwork (WSN) consists of spatially distributed autonomous sensors to
monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and
to cooperatively pass their data through the network to a main location. The more modern
networks are bi-directional, also enabling control of sensor activity. The development of
wireless sensor networks was motivated by military applications such as battlefield
surveillance; today such networks are used in many industrial and consumer applications,
such as industrial process monitoring and control, machine health monitoring, and so on.
The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each
node is connected to one (or sometimes several) sensors. Each such sensor network node has
typically several parts: a radio transceiver with an internal antenna or connection to an
external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and
an energy source, usually a battery or an embedded form of energy harvesting. A sensor node
might vary in size from that of a shoebox down to the size of a grain of dust, although
functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of
sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on
the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes
result in corresponding constraints on resources such as energy, memory, computational
speed and communications bandwidth. The topology of the WSNs can vary from a simple
star network to an advanced multi-hop wireless mesh network. The propagation technique
between the hops of the network can be routing or flooding.
1.7. APPLICATIONS OF WIRELESS SENSOR NETWORKS
1.7.1. Area Monitoring
Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed
over a region where some phenomenon is to be monitored. A military example is the uses of
sensors detect enemy intrusion; a civilian example is the geo-fencing of gas or oil pipelines.
1.7.2. Environmental/Earth Monitoring
The term Environmental Sensor Networks has evolved to cover many applications of WSNs
to earth science research. This includes sensing volcanoes, oceans, glaciers, forests, etc. Some
of the major areas are listed below.
1.7.3. Air Quality Monitoring
The degree of pollution in the air has to be measured frequently in order to safeguard people
and the environment from any kind of damages due to air pollution. In dangerous
surroundings, real time monitoring of harmful gases is an important process because the
weather can change rapidly changing key quality parameters.
1.7.4. Interior Monitoring
Observing the gas levels at vulnerable areas needs the usage of high-end, sophisticated
equipment, capable to satisfy industrial regulations. Wireless internal monitoring solutions
facilitate keep tabs on large areas as well as ensure the precise gas concentration degree.
1.7.5. Exterior Monitoring
External air quality monitoring needs the use of precise wireless sensors, rain & wind
resistant solutions as well as energy reaping methods to assure extensive liberty to machine
that will likely have tough access.
1.7.6. Air Pollution Monitoring
Wireless sensor networks have been deployed in several cities (Stockholm, London and
Brisbane) to monitor the concentration of dangerous gases for citizens. These can take
advantage of the ad hoc wireless links rather than wired installations, which also make them
more mobile for testing readings in different areas. There are various architectures that can be
used for such applications as well as different kinds of data analysis and data mining that can
be conducted.
1.7.7. Forest Fire Detection
A network of Sensor Nodes can be installed in a forest to detect when a fire has started. The
nodes can be equipped with sensors to measure temperature, humidity and gases which are
produced by fire in the trees or vegetation. The early detection is crucial for a successful
action of the fire fighters; thanks to Wireless Sensor Networks, the fire brigade will be able to
know when a fire is started and how it is spreading.
1.7.8. Landslide Detection
A landslide detection system makes use of a wireless sensor network to detect the slight
movements of soil and changes in various parameters that may occur before or during a
landslide. Through the data gathered it may be possible to know the occurrence of landslides
long before it actually happens.
1.7.9. Water Quality Monitoring
Water quality monitoring involves analyzing water properties in dams, rivers, lakes &
oceans, as well as underground water reserves. The use of many wireless distributed sensors
enables the creation of a more accurate map of the water status, and allows the permanent
deployment of monitoring stations in locations of difficult access, without the need of manual
data retrieval.
1.7.10. Natural DisasterPrevention
Wireless sensor networks can effectively act to prevent the consequences of natural disasters,
like floods. Wireless nodes have successfully been deployed in rivers where changes of the
water levels have to be monitored in real time.
1.8. INDUSTRIAL MONITORING
1.8.1. Machine Health Monitoring
Wireless sensor networks have been developed for machinery condition-based maintenance
(CBM) as they offer significant cost savings and enable new functionality. In wired systems,
the installation of enough sensors is often limited by the cost of wiring. Previously
inaccessible locations, rotating machinery, hazardous or restricted areas, and mobile assets
can now be reached with wireless sensors.
1.8.2. Data Logging
Wireless sensor networks are also used for the collection of data for monitoring of
environmental information; this can be as simple as the monitoring of the temperature in a
fridge to the level of water in overflow tanks in nuclear power plants. The statistical
information can then be used to show how systems have been working. The advantage of
WSNs over conventional loggers is the "live" data feed that is possible
1.8.3. Industrial Sense and Control Applications
In recent research a vast number of wireless sensor network communication protocols have
been developed. While previous research was primarily focused on power awareness, more
recent research have begun to consider a wider range of aspects, such as wireless link
reliability, real-time capabilities, or quality-of-service. These new aspects are considered as
an enabler for future applications in industrial and related wireless sense and control
applications, and partially replacing or enhancing conventional wire-based networks by WSN
techniques.
1.8.4. Water/Waste Water Monitoring
Monitoring the quality and level of water includes many activities such as checking the
quality of underground or surface water and ensuring a country’s water infrastructure for the
benefit of both human and animal. The area of water quality monitoring utilizes wireless
sensor networks and many manufacturers have launched fresh and advanced applications for
the purpose.
 Observation Of Water Quality
The whole process includes examining water properties in rivers, dams, oceans, lakes and
also in underground water resources. Wireless distributed sensors let users to make a precise
map of the water condition as well as making permanent distribution of observing stations in
areas of difficult access with no manual data recovery.
 Water Distribution Network Management
Manufacturers of water distribution network sensors concentrate on observing the water
management structures such as valve and pipes and also making remote access to water meter
readings.
 Preventing Natural Disaster
The consequences of natural perils like floods can be effectively prevented with wireless
sensor networks. Wireless nodes are distributed in rivers so that changes of the water level
can be effectively monitored.
1.9. AGRICULTURE MONITORING
Using wireless sensor networks within the agricultural industry is increasingly common;
using a wireless network frees the farmer from the maintenance of wiring in a difficult
environment. Gravity feed water systems can be monitored using pressure transmitters to
monitor water tank levels, pumps can be controlled using wireless I/O devices and water use
can be measured and wirelessly transmitted back to a central control center for billing.
Irrigation automation enables more efficient water use and reduces waste.
 Accurate Agriculture
Wireless sensor networks let users to make precise monitoring of the crop at the time of its
growth. Hence, farmers can immediately know the state of the item at all its stages which will
ease the decision process regarding the time of harvest.
 Irrigation Management
When real time data is delivered, farmers are able to achieve intelligent irrigation. Data
regarding the fields such as temperature level and soil moisture are delivered to farmers
through wireless sensor networks. When each plant is joined with a personal irrigation
system, farmers can pour the precise amount of water each plant needs and hence, reduce the
cost and improve the quality of the end product. The networks can be employed to manage
various actuators in the systems using no wired infrastructure.
 Greenhouses
Wireless sensor networks are also used to control the temperature and humidity levels inside
commercial greenhouses. When the temperature and humidity drops below specific levels,
the greenhouse manager must be notified via e-mail or cell phone text message, or host
systems can trigger misting systems, open vents, turn on fans, or control a wide variety of
system responses.
Recent research in wireless sensor networks in agriculture industry give emphasis on its use
in greenhouses, particularly for big exploitations with definite crops. Such microclimatic
ambiances need to preserve accurate weather status at all times. Moreover, using multiple
distributed sensors will better control the above process, in open surface as well as in the soil.
1.9.1. Passive Localization And Tracking
The application of WSN to the passive localization and tracking of non-cooperative targets
(i.e., people not wearing any tag) has been proposed by exploiting the pervasive and low-cost
nature of such technology and the properties of the wireless links which are established in a
meshed WSN infrastructure.
1.9.2. Smart Home Monitoring
Monitoring the activities performed in a smart home is achieved using wireless sensors
embedded within everyday objects forming a WSN. State changes to objects based on human
manipulation are captured by the wireless sensors network enabling activity-support services.
1.10. CHARACTERISTICS
 Power consumption constrains for nodes using batteries or energy harvesting.
 Ability to cope with node failures.
 Mobility of nodes.
 Communication failures.
 Heterogeneity of nodes.
 Scalability to large scale of deployment.
 Ability to withstand harsh environmental conditions.
 Ease of use.
Sensor nodes can be imagined as small computers, extremely basic in terms of their
interfaces and their components. They usually consist of a processing unit with limited
computational power and limited memory, sensors or MEMS (including specific
conditioning circuitry), a communication device (usually radio transceivers or alternatively
optical), and a power source usually in the form of a battery. Other possible inclusions are
energy harvesting modules, secondary ASICs, and possibly secondary communication
interface (e.g. RS-232 or USB).
The base stations are one or more components of the WSN with much more computational,
energy and communication resources. They act as a gateway between sensor nodes and the
end user as they typically forward data from the WSN on to a server. Other special
components in routing based networks are routers, designed to compute, calculate and
distribute the routing tables.
1.11. PLATFORMS
1.11.1. Standards And Specifications
Several standards are currently either ratified or under development by organizations
including WAVE2M for wireless sensor networks. There are a number of standardization
bodies in the field of WSNs. The IEEE focuses on the physical and MAC layers; the Internet
Engineering Task Force works on layers 3 and above. In addition to these, bodies such as the
International Society of Automation provide vertical solutions, covering all protocol layers.
Finally, there are also several non-standard, proprietary mechanisms and specifications.
Standards are used far less in WSNs than in other computing systems which makes most
systems incapable of direct communication between different systems. However predominant
standards commonly used in WSN communications include:
 ISA100.11a
 Wireless HART
 IEEE 1451
 ZigBee / 802.15.4
 ZigBee IP
 6LoWPAN
1.11.2. Hardware
One major challenge in a WSN is to produce low cost and tiny sensor nodes. There are an
increasing number of small companies producing WSN hardware and the commercial
situation can be compared to home computing in the 1970s. Many of the nodes are still in the
research and development stage, particularly their software. Also inherent to sensor network
adoption is the use of very low power methods for data acquisition.
In many applications, a WSN communicates with over a Local Area Network or Wide Area
Network through a gateway. The Gateway acts as a bridge between the WSN and the other
network. This enables data to be stored and processed by device with more resources, for
example in a remotely located Server_ (computing).
1.11.3. Software
Energy is the scarcest resource of WSN nodes, and it determines the lifetime of WSNs.
WSNs are meant to be deployed in large numbers in various environments, including remote
and hostile regions, where ad hoc communications are a key component. For this reason,
algorithms and protocols need to address the following issues:
 Lifetime maximization
 Robustness and fault tolerance
 Self-configuration
Lifetime maximization: Energy/Power Consumption of the sensing device should be
minimized and sensor nodes should be energy efficient since their limited energy resource
determines their lifetime. To conserve power the node should shut off the radio power supply
when not in use.
Some of the important topics in WSN (Wireless Sensor Networks) software research are:
 Operating systems
 Security
 Mobility
1.11.4. Operating Systems
Operating systems for wireless sensor network nodes are typically less complex than general-
purpose operating systems. They more strongly resemble embedded systems, for two reasons.
First, wireless sensor networks are typically deployed with a particular application in mind,
rather than as a general platform. Second, a need for low costs and low power leads most
wireless sensor nodes to have low-power microcontrollers ensuring that mechanisms such as
virtual memory are either unnecessary or too expensive to implement.
It is therefore possible to use embedded operating systems such as eCos or uC/OS for sensor
networks. However, such operating systems are often designed with real-time properties.
TinyOS is perhaps the first operating system specifically designed for wireless sensor
networks. TinyOS is based on an event-driven programming model instead of multithreading.
TinyOS programs are composed of event handlers and tasks with run-to-completion
semantics. When an external event occurs, such as an incoming data packet or a sensor
reading, TinyOS signals the appropriate event handler to handle the event. Event handlers can
post tasks that are scheduled by the TinyOS kernel some time later.
LiteOS is a newly developed OS for wireless sensor networks, which provides UNIX-like
abstraction and support for the C programming language.
Contiki is an OS which uses a simpler programming style in C while providing advances
such as 6LoWPAN and Protothreads.
RIOT implements a microkernel architecture. It provides multithreading with standard API
and allows for development in C/C++. RIOT supports common IoT protocols such as
6LoWPAN, IPv6, RPL, TCP, and UDP.
1.11.5. Online Collaborative Sensor Data Management Platforms
Online collaborative sensor data management platforms are on-line database services that
allow sensor owners to register and connect their devices to feed data into an online database
for storage and also allow developers to connect to the database and build their own
applications based on that data. Examples include Xively and the Wikisensing platform. Such
platforms simplify online collaboration between users over diverse data sets ranging from
energy and environment data to that collected from transport services. Other services include
allowing developers to embed real-time graphs & widgets in websites; analyse and process
historical data pulled from the data feeds; send real-time alerts from any data stream to
control scripts, devices and environments.
The architecture of the Wiki sensing system is described in [21] describes the key components
of such systems to include APIs and interfaces for online collaborators, a middleware
containing the business logic needed for the sensor data management and processing and a
storage model suitable for the efficient storage and retrieval of large volumes of data.
1.11.6. Simulation of WSNs
At present, agent-based modelling and simulation is the only paradigm which allows the
simulation of complex behaviour in the environments of wireless sensors (such as flocking).
Agent-based simulation of wireless sensor and ad hoc networks is a relatively new paradigm.
Agent-based modelling was originally based on social simulation.
Network simulators like OPNET, NetSim, NS2 and OMNeT can be used to simulate a
wireless sensor network.
1.12. OTHER CONCEPTS
1.12.1. Distributed Sensor Network
If a centralized architecture is used in a sensor network and the central node fails, then the
entire network will collapse, however the reliability of the sensor network can be increased
by using distributed control architecture. Distributed control is used in WSNs for the
following reasons:
1. Sensor nodes are prone to failure,
2. For better collection of data
3. To provide nodes with backup in case of failure of the central node
There is also no centralized body to allocate the resources and they have to be self-
organized.
1.12.2. Data Integration and Sensor Web
The data gathered from wireless sensor networks is usually saved in the form of numerical
data in a central base station. Additionally, the Open Geospatial Consortium (OGC) is
specifying standards for interoperability interfaces and metadata encodings that enable real
time integration of heterogeneous sensor webs into the Internet, allowing any individual to
monitor or control Wireless Sensor Networks through a Web Browser.
1.12.3. In-Network Processing
To reduce communication costs some algorithms remove or reduce nodes redundant sensor
information and avoid forwarding data that is of no use. As nodes can inspect the data they
forward they can measure averages or directionality for example of readings from other
nodes.
CHAPTER-2
LITERATURE SURVEY
2.1. OVERVIEW
The proliferation of the implementation for low-cost, low-power, multifunctional sensors has
made wireless sensor networks (WSNs) a prominent data collection paradigm for extracting
local measures of interests. In such applications, sensors are generally densely deployed and
randomly scattered over a sensing field and left unattended after being deployed, which
makes it difficult to recharge or replace their batteries. After sensors form into autonomous
organizations, those sensors near the data sink typically deplete their batteries much faster
than others due to more relaying traffic. When sensors around the data sink deplete their
energy, network connectivity and coverage may not be guaranteed. Due to these constraints,
it is crucial to design an energy-efficient data collection scheme that consumes energy
uniformly across the sensing field to achieve long network lifetime. Furthermore, as sensing
data in some applications are time-sensitive, data collection may be required to be performed
within a specified time frame. Therefore, an efficient, large-scale data collection scheme
should aim at good scalability, long network lifetime and low data latency.
2.2. LITERATURE SURVEY
1. W. C. Cheng, C. Chou, L. Golubchik, S. Khuller, and Y. C. Wan. We consider the
problem of collecting a large amount of data from several different hosts to a single
destination in a wide-area network. This problem is important since improvements in data
collection times in many applications such as wide-area upload applications, high-
performance computing applications, and data mining applications are crucial to performance
of those applications. Often, due to congestion conditions, the paths chosen by the network
may have poor throughput. By choosing an alternate route at the application level, we may be
able to obtain substantially faster completion time. This data collection problem is a
nontrivial one because the issue is not only to avoid congested link(s), but to devise a
coordinated transfer schedule which would afford maximum possible utilization of available
network resources. Our approach for computing coordinated data collection schedules makes
no assumptions about knowledge of the topology of the network or the capacity available on
individual links of the network. This approach provides significant performance
improvements under various degrees and types of network congestions. To show this, we
give a comprehensive comparison study of the various approaches to the data collection
problem which considers performance, robustness, and adaptation characteristics of the
different data collection methods. The adaptation to network conditions characteristics are
important as the above applications are long lasting, i.e., it is likely changes in network
conditions will occur during the data transfer process. In general, our approach can be used
for solving arbitrary data movement problems over the Internet. We use the Bistro platform
to illustrate one application of our techniques.
2. K.Xu, H.Hassanein, G.Takahara, and Q.Wang. In a heterogeneous wireless sensor
network (WSN), relay nodes (RNs) are adopted to relay data packets from sensor nodes
(SNs) to the base station (BS). The deployment of the RNs can have a significant impact on
connectivity and lifetime of a WSN system. This paper studies the effects of random
deployment strategies. We first discuss the biased energy consumption rate problem
associated with uniform random deployment. This problem leads to insufficient energy
utilization and shortened network lifetime. To overcome this problem, we propose two new
random deployment strategies, namely, the lifetime-oriented deployment and hybrid
deployment. The former solely aims at balancing the energy consumption rates of RNs across
the network, thus extending the system lifetime. However, this deployment scheme may not
provide sufficient connectivity to SNs when the given number of RNs is relatively small. The
latter reconciles the concerns of connectivity and lifetime extension. Both single-hop and
multihop communication models are considered in this paper. With a combination of
theoretical analysis and simulated evaluation, this study explores the trade-off between
connectivity and lifetime extension in the problem of RN deployment. It also provides a
guideline for efficient deployment of RNs in a large-scale heterogeneous WSN
3. O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis. Most sensor networks
are used to collect information from the physical world. Examples include sensor networks
deployed to monitor micro-climates in agriculture farms and deployments that measure
energy consumption in office or residential buildings. The nodes in these networks collect
information about the physical world using their sensors and relay the sensor readings to a
central base station or server using multi-hop wireless communication.
Collecting information reliably and efficiently from the nodes in a sensor network is a
challenging problem, particularly due to the wireless dynamics. Multihop routing in a
dynamic wireless environment requires that a protocol can adapt quickly to the changes in
the network (agility) while the energy-constrains of sensor networks dictate that such
mechanisms not require too much communication among the nodes (efficiency). CTP is a
collection routing protocol that achieves both agility and efficiency, while offering highly
reliable data delivery in sensor networks.
CTP has been used in research, teaching, and in commercial products. Experiences with CTP
have also informed the design of the IPv6 Routing Protocol for Low power and Lossy
Networks (RPL).
4. E. Lee, S. Park, F. Yu, and S.-H. Kim. Most existing geographic routing protocols on
sensor networks concentrates on finding ways to guarantee data forwarding from the source
to the destination, and not many protocols have been done on gathering and aggregating data
of sources in a local and adjacent region. However, data generated from the sources in the
region are often redundant and highly correlated. Accordingly, gathering and aggregating
data from the region in the sensor networks is important and necessary to save the energy and
wireless resources of sensor nodes. We introduce the concept of a local sink to address this
issue in geographic routing. The local sink is a sensor node in the region, in which the sensor
node is temporarily selected by a global sink for gathering and aggregating data from sources
in the region and delivering the aggregated data to the global sink. We next design a Single
Local Sink Model for determining optimal location of single local sink. Because the buffer
size of a local sink is limited and the deadline of data is constrained, single local sink is
capable of carrying out many sources in a large-scale local and adjacent region. Hence, we
also extend the Single Local Sink Model to a Multiple Local Sinks Model. We next propose a
data gathering mechanism that gathers data in the region through the local sink and delivers
the aggregated data to the global sink. Simulation results show that the proposed mechanism
is more efficient in terms of the energy consumption, the data delivery ratio, and the deadline
miss ratio than the existing mechanisms.
5. Y.Wu, Z.Mao, S.Fahmy, and N.Shroff. Energy efficiency is critical for wireless sensor
networks. The data-gathering process must be carefully designed to conserve energy and
extend network lifetime. For applications where each sensor continuously monitors the
environment and periodically reports to a base station, a tree-based topology is often used to
collect data from sensor nodes. In this work, we first study the construction of a data-
gathering tree when there is a single base station in the network. The objective is to maximize
the network lifetime, which is defined as the time until the first node depletes its energy. The
problem is shown to be NP-complete. We design an algorithm that starts from an arbitrary
tree and iteratively reduces the load on bottleneck nodes (nodes likely to soon deplete their
energy due to high degree or low remaining energy). We then extend our work to the case
when there are multiple base stations and study the construction of a maximum-lifetime data-
gathering forest. We show that both the tree and forest construction algorithms terminate in
polynomial time and are provably near optimal. We then verify the efficacy of our algorithms
via numerical comparisons.
CHAPTER-3
EXISTING SYSTEM
3.1. INTRODUCTION
The proliferation of the implementation for low-cost, low-power, multifunctional sensors has
made wireless sensor networks (WSNs) a prominent data collection paradigm for extracting
local measures of interests. In such applications, sensors are generally densely deployed and
randomly scattered over a sensing field and left unattended after being deployed, which
makes it difficult to recharge or replace their batteries. After sensors form into autonomous
organizations, those sensors near the data sink typically deplete their batteries much faster
than others due to more relaying traffic. When sensors around the data sink deplete their
energy, network connectivity and coverage may not be guaranteed. Due to these constraints,
it is crucial to design an energy-efficient data collection scheme that consumes energy
uniformly across the sensing field to achieve long network lifetime. Furthermore, as sensing
data in some applications are time-sensitive, data collection may be required to be performed
within a specified time frame. Therefore, an efficient, large-scale data collection scheme
should aim at good scalability, long network lifetime and low data latency.
3.2. EXISTING SYSTEM
 Several approaches have been proposed for efficient data collection in the literature.
Based on the focus of these works, we can roughly divide them into three categories.
 The first category is the enhanced relay routing, in which data are relayed among
sensors. Besides relaying, some other factors, such as load balance, schedule pattern
and data redundancy, are also considered.
 The second category organizes sensors into clusters and allows cluster heads to take the
responsibility for forwarding data to the data sink. Clustering is particularly useful for
applications with scalability requirement and is very effective in local data aggregation
since it can reduce the collisions and balance load among sensors.
 The third category is to make use of mobile collectors to take the burden of data routing
from sensors.
3.3. LIMITATIONS OF EXISTING SYSTEM
 In relay routing schemes, minimizing energy consumption on the forwarding path
does not necessarily prolong network lifetime, since some critical sensors on the path
may run out of energy faster than others.
 In cluster-based schemes, cluster heads will inevitably consume much more energy
than other sensors due to handling intra-cluster aggregation and inter-cluster data
forwarding.
 Though using mobile collectors may alleviate non-uniform energy consumption, it
may result in unsatisfactory data collection latency.
CHAPTER-4
PROPOSED SYSTEM
4.1. OVERVIEW
Based on the above observations, we propose a three-layer mobile data collection framework,
named Load Balanced Clustering and Multiple Data Uploading (LBC-MIMO). The main
motivation is to utilize distributed clustering for scalability, to employ mobility for energy
saving and uniform energy consumption, and to exploit Multi-User Multiple-Input and
Multiple-Output (MU-MIMO) technique for concurrent data uploading to shorten latency.
4.2. PROPOSEDSYSTEM:
 First, we propose a distributed algorithm to organize sensors into clusters, where each
cluster has multiple cluster heads.
 Second, multiple cluster heads within a cluster can collaborate with each other to
perform energy efficient inter-cluster transmissions.
 Third, we deploy a mobile collector with two antennas (called Sencar in this paper) to
allow concurrent uploading from two cluster heads by using MU-MIMO
communication. The Sencar collects data from the cluster heads by visiting each cluster.
It chooses the stop locations inside each cluster and determines the sequence to visit
them, such that data collection can be done in minimum time.
4.3. ADVANTAGES OF PROPOSEDSYSTEM
 In contrast to clustering techniques proposed in previous works, our algorithm balances
the load of intra-cluster aggregation and enables dual data uploading between multiple
cluster heads and the mobile collector.
 Different from other hierarchical schemes, in our algorithm, cluster heads do not relay
data packets from other clusters, which effectively alleviate the burden of each cluster
head. Instead, forwarding paths among clusters are only used to route small-sized
identification (ID) information of cluster heads to the mobile collector for optimizing
the data collection tour.
 Our work mainly distinguishes from other mobile collection schemes in the utilization
of MUMIMO technique, which enables dual data uploading to shorten data
transmission latency. We coordinate the mobility of Sencar to fully enjoy the benefits
of dual data uploading, which ultimately leads to a data collection tour with both short
moving trajectory and short data uploading time.
CHAPTER-5
SYSTEM DESIGN
5.1. PROPOSEDSYTSTEMARCHITECTURE
An overview of LBC-MIMO Uploading framework is depicted in which consists of three
layers:
1. Sensor Layer,
2. Cluster Head Layer
3. Sencar Layer.
Fig.2. Illustration of the LBC-MIMO framework.
5.1.1. Sensor Layer
In this sensor layer is the bottom and basic layer. For generality, we do not make any
assumptions on sensor distribution or node capability, such as location-awareness. Each sensor
is assumed to be able to communicate only with its neighbours, i.e., the nodes within its
transmission range. During initialization, sensors are self-organized into clusters. Each sensor
decides to be either a cluster head or a cluster member in a distributed manner. In the end,
sensors with higher residual energy would become cluster heads and each cluster has at most
M cluster heads, where M is a system parameter. For convenience, the multiple cluster heads
within a cluster are called a cluster head group (CHG), with each cluster head being the peer
of others. The algorithm constructs clusters such that each sensor in a cluster is onehop away
from at least one cluster head. The benefit of such organization is that the intra-cluster
aggregation is limited to a single hop. In the case that a sensor may be covered by multiple
cluster heads in a CHG, it can be optionally affiliated with one cluster head for load balancing.
To avoid collisions during data aggregation, the CHG adopts time-division-multiple-access
(TDMA) based technique to coordinate communications between sensor nodes. Right after the
cluster heads are elected, the nodes synchronize their local clocks via beacon messages. For
example, all the nodes in a CHG could adjust their local clocks based on that of the node with
the highest residual energy. After local synchronization is done, an existing scheduling scheme
can be adopted to gather data from cluster members. Note that only intra-cluster
synchronization is needed here because data are collected via SenCar. In the case of imperfect
synchronization, some hybrid techniques to combine TDMA with contention-based access
protocols (Carrier Sense Multiple Access (CSMA)) that listen to the medium before
transmitting are required. For example, hybrid protocols like Z-MAC can be utilized to enhance
the strengths and offset the weaknesses of TDMA and CSMA. Uponthe arrival of Sencar, each
CHG uploads buffered data via MU-MIMO communications and synchronizes its local clocks
with the global clock on Sencar via acknowledgement messages. Finally, periodical re-
clustering is performed to rotate cluster heads among sensors with higher residual energy to
avoid draining energy from clusterheads.
5.1.2. Cluster Head Layer
The cluster head layer consists of all the cluster heads. As aforementioned, inter-cluster
forwarding is only used to send the CHG information of each cluster to Sencar, which contains
an identification list of multiple cluster heads in a CHG. Such information must be sent before
SenCar departs for its data collection tour. Upon receiving this information, SenCar utilizes it
to determine where to stop within each cluster to collect data from its CHG. To guarantee the
connectivity for inter-cluster communication, the cluster heads in a CHG can cooperatively
send out duplicated information to achieve spatial diversity, which provides reliable
transmissions and energy saving. Moreover, cluster heads can also adjust their output power
for a desirable transmission range to ensure a certain degree of connectivity among clusters.
5.1.3. Sencar Layer
The top layer is the SenCar layer, which mainly manages mobility of SenCar. There are two
issues to be addressed at this layer. First, we need to determine the positions where SenCar
would stop to communicate with cluster heads when it arrives at a cluster. In LBC-MIMO,
SenCar communicates with cluster heads via single-hop transmissions. It is equipped with two
antennas while each sensor has a single antenna and is kept as simple as possible. The traffic
pattern of data uploading in a cluster is many-to-one, where data from multiple cluster heads
converge to SenCar. Equipped with two receiving antennas, each time SenCar makes dual data
uploading whenever possible, in which two cluster heads can upload data simultaneously. By
processing the received signals with filters based on channel state information, SenCar can
successfully separate and decode the information from distinct cluster heads.
To collect data as fast as possible, SenCar should stop at positions inside a cluster that can
achieve maximum capacity. In theory, since SenCar is mobile, it has the freedom to choose
any preferred position. However, this is infeasible in practice, because it is very hard to estimate
channel conditions for all possible positions. Thus, we only consider a finite set of locations.
To mitigate the impact from dynamic channel conditions, SenCar measures channel state
information before each data collection tour to select candidate locations for data collection.
We call these possible locations SenCar can stop to perform concurrent data collections polling
points. In fact, SenCar does not have to visit all the polling points. Instead, it calculates some
polling points which are accessible and we call them selected polling points. In addition, we
need to determine the sequence for SenCar to visit these selected polling points such that data
collection latency is minimized. Since SenCar has pre-knowledge about the locations of polling
points, it can find a good trajectory by seeking the shortest route that visits each selected polling
point exactly once and then returns to the data sink.
The proposed framework aims to achieve great energy saving and shortened data collection
latency, which has the potential for different types of data services. Although traditional
designs of WSNs can support low-rate data services, more and more sensing applications
nowadays require high-definition pictures and audio/video recording, which has become an
overwhelming trend for next generation sensor designs. For example, in the scenario of military
defense, sensors deployed in reconnaissance missions need to transmit back high-definition
images to identify hostile units. Delays in gathering sensed data may not only expose sensors
or mobile collector to enemy surveillance but also depreciate the time value of gathered
intelligence. Using MU-MIMO can greatly speed up data collection time and reduce the overall
latency.
Another application scenario emerges in disaster rescue. For example, to combat forest fire,
sensor nodes are usually deployed densely to monitor the situation. These applications usually
involve hundreds of readings in a short period (a large amount of data) and are risky for human
being to manually collect sensed data. A mobile collector equipped with multiple antennas
overcomes these difficulties by reducing data collection latency and reaching hazard regions
not accessible by human being. Although employing mobility may elongate the moving time,
data collection time would become dominant or at least comparable to moving time for many
high-rate or densely deployed sensing applications. In addition, using the mobile data collector
can successfully obtain data even from disconnected regions and guarantee that all of the
generated data are collected.
5.2. UML DIAGRAMS
UML stands for Unified Modeling Language. UML is a standardized general-purpose
modeling language in the field of object-oriented software engineering. The standard is
managed, and was created by, the Object Management Group.
The goal is for UML to become a common language for creating models of object oriented
computer software. In its current form UML is comprised of two major components: a Meta-
model and a notation. In the future, some form of method or process may also be added to; or
associated with, UML.
The Unified Modeling Language is a standard language for specifying, Visualization,
Constructing and documenting the artifacts of software system, as well as for business
modeling and other non-software systems.
The UML represents a collection of best engineering practices that have proven successful in
the modeling of large and complex systems.
The UML is a very important part of developing objects oriented software and the software
development process. The UML uses mostly graphical notations to express the design of
software projects.
5.2.1. Goals
The Primary goals in the design of the UML are as follows:
1. Provide users a ready-to-use, expressive visual modeling Language so that they can
develop and exchange meaningful models.
2. Provide extendibility and specialization mechanisms to extend the core concepts.
3. Be independent of particular programming languages and development process.
4. Provide a formal basis for understanding the modeling language.
5. Encourage the growth of OO tools market.
6. Support higher level development concepts such as collaborations, frameworks, patterns
and components.
7. Integrate best practices.
5.2.2. Data Flow Diagram
1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be
used to represent a system in terms of input data to the system, various processing
carried out on this data, and the output data is generated by this system.
2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to
model the system components. These components are the system process, the data used
by the process, an external entity that interacts with the system and the information
flows in the system.
3. DFD shows how the information moves through the system and how it is modified by
a series of transformations. It is a graphical technique that depicts information flow and
the transformations that are applied as data moves from input to output.
4. DFD is also known as bubble chart. A DFD may be used to represent a system at any
level of abstraction. DFD may be partitioned into levels that represent increasing
information flow and functional detail.
Fig.3. Data Flow Diagram
5.2.3. Use Case Diagram
A use case diagram in the Unified Modelling Language (UML) is a type of behavioural
diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical
overview of the functionality provided by a system in terms of actors, their goals (represented
as use cases), and any dependencies between those use cases. The main purpose of a use case
diagram is to show what system functions are performed for which actor. Roles of the actors
in the system can be depicted.
Fig.4. Use Case Diagram
5.2.4. Class Diagram
In software engineering, a class diagram in the Unified Modelling Language (UML) is a type
of static structure diagram that describes the structure of a system by showing the system's
classes, their attributes, operations (or methods), and the relationships among the classes. It
explains which class contains information.
Fig.5. Class Diagram
5.2.5. Sequence Diagram
A sequence diagram in Unified Modelling Language (UML) is a kind of interaction diagram
that shows how processes operate with one another and in what order. It is a construct of a
Message Sequence Chart. Sequence diagrams are sometimes called event diagrams, event
scenarios, and timing diagrams.
Fig.6. Sequence Diagram
5.2.6. Activity Diagram
Activity diagrams are graphical representations of workflows of stepwise activities and
actions with support for choice, iteration and concurrency. In the Unified Modelling
Language, activity diagrams can be used to describe the business and operational step-by-step
workflows of components in a system. An activity diagram shows the overall flow of control.
Fig.7. Activity Diagram
CHAPTER-6
IMPLEMENTATION
6.1. OVERVIEW
An overview of LBC-MIMO framework which consists of three layers:
1. Sensor Layer,
2. Cluster Head Layer
3. SenCar Layer
6.2. SENSORLAYER
In this section, we present the distributed load balanced clustering algorithm at the sensor
layer. The essential operation of clustering is the selection of cluster heads. To prolong
network lifetime, we naturally expect the selected cluster heads are the ones with higher
residual energy. Hence, we use the percentage of residual energy of each sensor as the initial
clustering priority. Assume that a set of sensors, denoted by S= {s1, s2...Sn} are
homogeneous and each of them independently makes the decision on its status based on local
information. After running the LBC algorithm, each cluster will have at most M (>1) cluster
heads, which means that the size of CHG of each cluster is no more than M. Each sensor is
covered by at least one cluster head inside a cluster.
The LBC algorithm is comprised of four phases:
1. Initialization
2. Status claim
3. Cluster forming
4. Cluster head synchronization.
We describe the operation through an example in where a total of 10 sensors are labelled
with their initial priorities and the connectivity among them is shown by the links between
neighboring nodes.
6.2.1. Initialization
In the initialization phase, each sensor acquaints itself with all the neighbors in its proximity.
If a sensor is an isolated node (i.e., no neighbor exists), it claims itself to be a cluster head and
the cluster only contains itself. Otherwise, a sensor, say, si, first sets its status as “tentative”
and its initial priority by the percentage of residual energy. Then, si sorts its neighbors by their
initial priorities and picks M-1 neighbors with the highest initial priorities, which are
temporarily treated as its candidate peers. We denote the set of all the candidate peers of a
sensor by A. It implies that once si successfully claims to be a cluster head, its up-to-date
candidate peers would also automatically become the cluster heads, and all of them form the
CHG of their cluster. si sets its priority by summing up its initial priority with those of its
candidate peers. In this way, a sensor can choose its favourable peers along with its status
decision. Fig.b depicts the initialization phase of the example, where M is set to 2, which means
that each sensor would pick one neighbor with the highest initial priority as its candidate peer.
We use the out-going arrow to indicate the choice of each sensor. For instance, s8 is chosen to
be the peer of s7 since it is the one with the highest initial priority among all the neighbors of
s7. Accordingly, s7 sets its priority to the sum of the initial priorities of s7 and s8. The pseudo-
code describing the initialization phase of a sensor is given in Algorithm 1, and notations used
in the pseudo-codes are listed in Table 1 for reference.
6.2.2. Status Claim
In the second phase, each sensor determines its status by iteratively updating its local
information, refraining from promptly claiming to be a cluster head. We use the node degree
to control the maximum number of iterations for each sensor. Whether a sensor can finally
becomes a cluster head primarily depends on its priority. Specifically, we partition the priority
into three zones by two thresholds, th and tm (th > tm), which enable a sensor to declare itself
to be a cluster head or member, respectively, before reaching its maximum number of
iterations.
During the iterations, in some cases, if the priority of a sensor is greater than th or less than tm
compared with its neighbors, it can immediately decide its final status and quit from the
iteration. We denote the potential cluster heads in the neighborhood of a sensor by a set B. In
each iteration, a sensor, say, si, first tries to probabilistically include itself into si.B as a tentative
cluster head if it is not in already (Algorithm 2, lines 25). Once successful, a packet includes
its node ID and priority will be sent out and the sensors in the proximity will add si as their
potential cluster heads upon receiving the packet. Then, si checks its current potential cluster
heads. If they do exist, there are two cases for si to make the final status decision, otherwise, si
would stay in the tentative status for the next round of iteration.
The first case (Algorithm2, lines 8-11) is that si has reached its maximum number of iterations
and it prevails over others in si.B with the highest priority. Then si will claim to be a cluster
head in this case. We call this process self-driven status transition. Also, si will announce its
current candidate peers to be cluster heads by broadcasting a packet including an ID list, which
is referred to as the peer-driven status transition. Once a sensor in the neighborhood receives a
status packet, it may need to update its status to the cluster head. The detailed description of
handling received packets in each sensor can be found in Algorithm 4, Function recv_pkt
The second case (Algorithm2, lines11-12) is that si is the one with the lowest priority and there
exist some cluster heads in si.B. In this case, if the priority of si is less than or equal to tm, it is
clearly not qualified to be a cluster head. Hence, it quits the iteration and claims to be a cluster
member. It is safe for such “retirement,” since there are already some cluster heads in its
neighborhood and it can optionally affiliate with one of them at a later time. Moreover, when
si does not have any potential candidate cluster head in the current iteration and its priority is
already high enough (above th), it can immediately claim to be a cluster head (Algorithm2,
lines 15-18). Fig.c shows the result of phase II for the example with th and tm set to 1.8 and
0.6, respectively. (s1, s3) and (s8, s9) become the cluster heads while s2 is a cluster member
with the lowest priority. Different from the initialization phase, it is also shown that the
candidate peers of each sensor have been updated. For example, sensor s5 is still tentative at
the end of phase II, which initially considered s9 as its candidate peer, but later switched to s10
as its new peer when s9 reached its final status.
6.2.3. Cluster Forming
The third phase is cluster forming that decides which cluster head a sensor should be
associated with. The criteria can be described as follows: for a sensor with tentative status or
being a cluster member, it would randomly affiliate itself with a cluster head among its
candidate peers for load balance purpose. In the rare case that there is no cluster head among
the candidate peers of a sensor with tentative status, the sensor would claim itself and its
current candidate peers as the cluster heads. The details are given in Algorithm 3. Fig.d
shows the final result of clusters, where each cluster has two cluster heads and sensors are
affiliated with different cluster heads in the two clusters.
In case a cluster head is running low on battery energy, re-clustering is needed. This process
can be done by sending out a re-clustering message to all the cluster members. Cluster
members that receive this message switch to the initialization phase to perform a new round
of clustering.
6.2.4. Synchronization Among Cluster Heads
To perform data collection by TDMA techniques, intracluster time synchronization among
established cluster heads should be considered. The fourth phase is to synchronize local clocks
among cluster heads in a CHG by beacon messages. First, each cluster head will send out a
beacon message with its initial priority and local clock information to other nodes in the CHG.
Then it examines the received beacon messages to see if the priority of a beacon message is
higher. If yes, it adjusts its local clock according to the timestamp of the beacon message. In
our framework, such synchronization among cluster heads is only performed while SenCar is
collecting data. Because data collection is not very frequent in most mobile data gathering
applications, message overhead is certainly manageable within a cluster. The details of the
procedure are explained in Algorithm 5.
Fig.8. An Example Of LBC Algorithm With M =2.
6.2.5. Analysis of Load Balanced Clustering Algorithm
We have following properties about LBC algorithm.
Property 1. Among all the cluster heads in a CHG, there is only one self-driven cluster head,
and all others are peer-driven cluster heads.
Proof. In LBC, a cluster head and its up-to-date peers form the CHG of a cluster. Clearly, it is
the self-driven cluster head, and all its peers are the peer-driven cluster heads.
Property 2. Some clusters may have fewer than M cluster heads.
Proof. Based on the clustering method, it is apparent that each cluster in LBC typically has a
total of M cluster heads. However, some clusters may have fewer than M cluster heads. The
reason can be explained as follows. To circumvent the situation that the CHGs of different
clusters may share common cluster heads, sensors with tentative status always update their
candidate peers once receiving status packets. For sensor si, once its neighbors reach their final
status, if si is still tentative, it would update its candidate peers to see if they are the current
peers. If yes, they will be expurgated from si.A. We define a set X={v|v si.N.v=2si.
A.v.status=tentative}, which represents the possible new candidate peers of si. si would choose
the sensors in X with the highest initial priorities to fill the vacancy among its M-1 candidate
peers. However, in the rare case that X = Fi, si would have no replenishment for the vacancy.
Therefore, the candidate peers of si could only become fewer and fewer as the update goes on.
Later, if si happens to be a cluster head by the self-driven status transition, the size of the CHG,
which is formed by si and its update-to-date candidate peers, would be no more than M.
Property 3. In LBC, a smaller M results in more clusters.
Proof. Once a sensor si claims to be a cluster head, its current candidate peers will also be
identified to be the cluster heads immediately and their priority will be updated to the priority
of si. si and all of its peers form the CHG of the corresponding cluster. Suppose sj is one of the
candidate peers of si (i.e., sj = si.A). Without loss of generality, we assume that there exists
another sensor in tentative status, denoted by sk, in the neighbourhood of sj, but out of the
reachable range of si (i.e., sk =sj.N and sk! = sj.N). In the algorithm, if the priority of sk is less
than that of sj, sk will stay at tentative status through the end of the iterations in phase 2. This
implies that sj essentially restrains its neighbors with lower priorities from claiming to be
cluster heads. At a later time, sk may have an opportunity to affiliate itself to sj as a cluster
member in phase3. If there are more candidate peers like sj, more sensors in the similar situation
to sk will refrain from claiming to be cluster heads and alternatively join the current cluster as
members in the periphery. Hence, the size of the cluster becomes larger with a smaller M.
Property 4. The total number of status packets exchanged in LBC is O(n) where n is the
number of sensors in the network.
Proof. During the executions, each sensor generates at most two status packets. Specifically,
on one hand, each sensor may probabilistically send a packet to indicate itself as tentative
cluster head (Algorithm 2, line 4). On the other hand, each sensor will send another packet
whenever it reaches its final status, either a status packet for claiming to be a cluster head or a
joining message as a cluster member. Hence, when there are a total of n sensors in the network,
the number of status packets sent in the network is upper-bounded by 2n, i.e., with O(n)
complexity.
Property 5. The time complexity of LBC in the worst case is O(n²) for each sensor.
Proof. A sensor needs at most O(n) time in the initialization phase to discover its neighbors
and sets its priority based on the initial priorities of the neighbors. In phase II, the time cost
differs from sensor to sensor. For example, a sensor, which determines to be a cluster head with
the priority above th, only experiences one iteration and it has no potential cluster head at all.
Thus, its processing time for phase 2 is a constant, i.e., O(1). However, in the worst case, a
sensor needs to complete its maximum iterations which is determined by its node degree. And
during each iteration, it is required to examine all the potential cluster heads. In such a case,
the time complexity is O(n²). In phase3, a sensor takes O(nⁿ) time to arbitrarily affiliate itself
to a cluster head nearby. Thus, the total time complexity for a sensor in the clustering process
is O(n²) in the worst case.
6.2.6. Examples of LBC Algorithm:
We provide an example to show the impact of some parameters on the clustering result in Fig.
4. Fig. 4a shows a random arrangement of 80 sensors on a 100×100 area. The connectivity
among sensors is identified by the links between any two neighboring nodes. Fig. 4b displays
the result of LBC with M set to 2. Since the priority of a sensor is the sum of its initial priority
and those of its M -1 candidate peers, the two thresholds, th and tm, are proportionally set to
M×0.9 and M×0.3, respectively. In Fig. 4b, sensors are self-organized into 6 clusters, each
having two cluster heads shown in blue. The links between each cluster head and its members,
which are shown in grey, indicate the final association pattern of the sensors. And the links
shown in blue, represent the connectivity between the two cluster heads in a CHG. Fig. 4c
shows the initial priority of each sensor and those of the selected cluster heads are highlighted
in blue. It is observed that the final cluster heads are the ones with higher initial priorities in its
proximity, which validates the requirement that the sensors in possession of higher residual
energy are preferentially chosen to be cluster heads.
In Fig. 4d, we keep M unchanged and vary the settings of th and tm to be M×0.75 and M×0.4,
respectively. These relaxed thresholds imply that there is more opportunity for a sensor to
immediately claim itself and its candidate peers to be cluster heads, and there is also more
possibility for a sensor to quickly “retire” to be a cluster member. This helps a sensor
effectively reduce the computational iterations, however, it leads to more clusters in the
network. For instance, there are seven clusters formed in Fig. 4d, one more compared to Fig.4b
with more tightened thresholds. The reason for the newly-emerged cluster is because that s16,
which considers s31 as its candidate peer, promptly claims itself to be cluster head at the very
beginning of its iterations for status claim. On one hand, s16 opportunistically excludes itself
from joining the set of possible cluster heads in its proximity (i.e., s16.B) and there is also no
other potential cluster head available at the starting moment. On the other hand, the priority of
s16 is 1.8, which is the sum of the initial priorities of s16 and s31, surpasses th, which is set to
1.5. Hence, s16 and s31 successfully become cluster heads and quit the iterations beforehand.
Clearly, for a given number of sensors, the relaxed thresholds lead to more cluster heads and
smaller average size of clusters such that local aggregation can be beneficially shared and
balanced among more nodes. However, since more clusters make themselves to get closer to
each other, it necessitates more management on suppression of the inter-cluster collisions.
Finally, we vary M to investigate its impact on clustering. The results shown in Fig. 4e further
validate Property 3. In the example, M is reset to 4, and th and tm are still proportionally set to
M×0.9 and M×0.3, respectively. A total of five clusters is observed when M=4, less than the
result in Fig. 4b with M=2. Particularly, in Fig. 4b, s56 which is far away from cluster heads
s4 and s12 of the cluster nearby, claims itself and its candidate peer s58 to be cluster heads. In
contrast, s58, turning to be the peer of s4 in Fig. 4e, successfully prevents s56 from attempting
to be a cluster head. Thus, the two neighboring clusters in the left topmost corner in Fig. 4b
merge into a larger cluster in Fig. 4e. Fig. 4f demonstrates the initial priorities of all sensors
when M is set to 4 and those of selected final cluster heads are highlighted in blue. It reveals
that the variation of M has no impact on the feature that LBC algorithm always chooses the
sensors with higher residual energy to be the cluster heads.
Fig.9. An Example Of LBC With Different Parameter Settings.
6.3. CLUSTER HEAD LAYER
We now consider the cluster head layer. As aforementioned, the multiple cluster heads in a
CHG coordinate among cluster members and collaborate to communicate with other CHGs.
Hence, the inter-cluster communication in LBC-MIMO is essentially the communication
among CHGs. By employing the mobile collector, cluster heads in a CHG need not to forward
data packets from other clusters. Instead, the inter-cluster transmissions are only used to
forward the information of each CHG to SenCar. The CHG information will be used to
optimize the moving trajectory of SenCar, which will be discussed in the next section. For
CHG information forwarding, the main issue at the cluster head layer is the inter-cluster
organization to ensure the connectivity among CHGs.
6.3.1. Connectivity Among CHGs
The inter-cluster organization is determined by the relationship between the inter-cluster
transmission range Rt and the sensor transmission range Rs. Clearly, Rt is much larger than
Rs. It implies that in a traditional single-head cluster, each cluster head must greatly enhance
its output power to reach other cluster heads. However, in LBC-MIMO the multiple cluster
heads of a CHG can mitigate this rigid demand since they can cooperate for inter-cluster
transmission and relax the requirement on the individual output power. In the following, we
first find the condition on Rt that ensures inter-cluster connectivity, and then discuss how the
cooperation in a CHG achieves energy saving in output power.
We assume that an l×l sensor field is divided into square cells, each of which is of size c×c and
c = 2Rs. Based on the result showed that when n sensors are uniformly distributed and c2n =
kl2 ln l for some k>0, each cell contains at least one sensor. When Rt > 2(√5+1)Rs, the inter-
cluster connectivity can be guaranteed with single-head clustering. In a similar way, the
following property gives the condition to guarantee the inter-cluster connection in LBC-DDU.
Property 6. Under the assumption that each cell contains at least one sensor, for any cluster a
and its neighboring cluster b, liml→∞Pr(min(D(a,b)) < (√26+2)Rs)=1 when M >2 and
liml→∞ Pr(min(D(a,b)) < (√17+3/2)Rs) =1 when M = 2, where D(a,b) is the distance between
clusters a and b, and Pr(.) represents the corresponding probability.
Proof. Consider M >2 first. In the worst case, all other clusters are far away from cluster a.
Cluster a and its neighboring cluster b both have M cluster heads since if any CHG has fewer
cluster heads than M, the distance between the two clusters would be shorter, which can be
easily deducted from Property 3. Based on the principle of LBC, the self-driven cluster head
sₐ, and all its up-to date candidate peers form the CHG of cluster a. Since these candidate peers
are all in the neighbourhood of sₐ, all the cluster heads in the CHG of cluster a are within an
area with radius Rs and centered at sₐ. Since each cluster member should be covered by at least
one cluster head in a CHG, the maximum coverage of cluster a is a circle area with radius 2Rs
regardless of the value of M. The same is applicable to cluster b. Without loss of generality, we
assume that cluster a is centered at a cell as shown in Fig. 5a. Given that a sensor can be located
anywhere in a cell, in the worst case, sensors in cells 1≈9, the area completely or partially
covered by cluster a, are all located within the range of cluster a. Consider the sensor at the
closest cell outside of cluster a, say, sk, which is located at cell k to the right of cell 6. The
farthest position sk can be from cluster a is the position of the right topmost corner of cell k.
Then sk should be within the range of cluster b. In the worst case, it is located at the periphery
of the coverage area of cluster b. Hence, the maximum possible distance between the two
clusters is the length of the line segment between sa and sb with sa, sk and sb in an alignment.
This distance is equal to (√26+2) Rs, which implies that within this distance there must exist
at least one another cluster.
Similarly, when M =2, the distance between two cluster heads in a CHG is no more than Rs
and the maximum coverage area of a cluster is achieved when two cluster heads are Rs apart
from each other. Fig. 5b depicts such two clusters a and b, where the shadowed area is the
coverage area of each cluster. Consider cluster a. No matter where it is located and how it is
oriented, it can completely or partially cover at most six cells. The worst case is that all the
sensors in these six cells are in the range of cluster a. Thus, the closest sensor sk outside of
cluster a should be at the right bottommost corner of cell k, which is under cell 5. Similar to
the case of M >2, we can derive that the maximum possible distance between two neighboring
clusters (√17+3/2) Rs,.
Fig. 10. Maximum distance between two neighboring clusters when both of them have M
cluster heads.
Property7. If inter-cluster transmission range Rt ≥ (√26+2) Rs when M >2 or Rt ≥ (√17+3/2)
Rs when M=2, LBC-MIMO generates a connected graph among CHGs. This can be easily
proved by contradiction.
6.3.2. Inter-Cluster Communications
We discuss how cluster heads in a CHG collaborate for energy-efficient inter-cluster
communication. We treat cluster heads in a CHG as multiple antennas both in the transmitting
and receiving sides such that an equivalent MIMO system can be constructed. The self-driven
cluster head in a CHG can either coordinate the local information sharing at the transmitting
side or act as the destination for the cooperative reception at the receiving side. Each
collaborative cluster head as the transmitter encodes the transmission sequence according to a
specified space-time block code (STBC) to achieve spatial diversity. Compared to the single-
input single-output system, it has been shown in that a MIMO system with spatial diversity
leads to higher reliability given the same power budget. An alternative view is that for the same
receive sensitivity; MIMO systems require less transmission energy than SISO systems for the
same transmission distance. Therefore, given two connected clusters, compared with the
single-head structure, in which the inter-cluster transmission is equivalent to a SISO system,
the multi-head structure in LBC-MIMO can save energy for inter-cluster communication. In
particular, the maximum distance of two neighboring clusters is 2(√5+1) Rs in single-head
clustering. Thus, the required transmission power of a cluster head for such inter-cluster
transmission can be expressed as follows when the free space propagation model is employed.
where µ is the given receive sensitivity, α represents the small-scale fading parameter between
two cluster heads, Gt and Gr are the transmitting and receiving antenna gains, λ is the
transmission wavelength and L is a system loss factor not related to propagation. In contrast,
in LBC-MIMO, the inter-cluster communication between two CHGs is equivalent to a MIMO
transmission. Each transmitted data symbol would enjoy a diversity gain of at×ar, where at
and ar are the numbers of transmitting and receiving antennas, respectively. In the worst case,
two neighboring clusters are apart as far as possible, i.e., the size of CHGs on both sides is M,
and the maximum distance between two neighboring clusters is equal to the lower bound of Rt
given in Property 7. Hence, the output power of each cluster head in the transmitting CHG is
given by
Where αij represents the small-scale fading parameter of the channel between the ith antenna
in the transmitting CHG and the jth antenna of the receiving CHG. We assume these channels
are independent and identically distributed (i.i.d).
We further define the saving ratio pͫ as follows to evaluate the difference in the output power
of a cluster head between single-head clustering and LBC.
From the above discussion, we can see that the saving ratio of each cluster head is 5.3 when
M=2 in LBC-MIMO. This ratio becomes higher with the increase of M. Thus, for long-haul
inter-cluster transmissions in LBC-MIMO, more cluster heads in a CHG can balance the load
and save energy at each sensor.
6.4. SENCAR LAYER: TRAJECTORY PLANNING
In this section, we focus on how to optimize the trajectory of SenCar for the data collection
tour with the CHG information, which is referred to as the mobility control at the SenCar layer.
As mentioned in Section 3, SenCar would stop at some selected polling points within each
cluster to collect data from multiple cluster heads via single-hop transmissions. Thus, finding
the optimal trajectory for SenCar can be reduced to finding selected polling points for each
cluster and determining the sequence to visit them.
6.4.1. Properties of Polling Points
We consider the case that SenCar is equipped with two antennas, as it is not difficult to mount
two antennas on SenCar, while it likely becomes difficult and even infeasible to mount more
antennas due to the constraint on the distances between antennas to ensure independent fading.
Note that each cluster head has only one antenna. The multiple antennas of SenCar, which act
as the receiving antennas in data uploading, make it possible for multiple cluster heads in a
CHG to transmit distinct data simultaneously. To guarantee successful decoding when SenCar
receives the mixed streams, we need to limit the number of simultaneous data streams to no
more than the number of receiving antennas. In other words, since SenCar is equipped with
two receiving antennas, at most two cluster heads in a CHG can simultaneously send data to
SenCar in a time slot. Hence, an equivalent 2×2 MIMO system for an uplink transmission is
formed, which achieves spatial multiplexing gain for higher data rate. With such concurrent
transmissions, data uploading time can be greatly reduced. If there are always two cluster heads
that simultaneously upload their data to SenCar in each time slot, data uploading time can be
cut into half in the ideal case.
In fact, when the size of a CHG is larger than 2, we have multiple choices to schedule cluster
head pairs to communicate with SenCar. Each such a pair is called a scheduling pair. We use
P to denote all the possible scheduling options in a CHG. Without loss of generality, we assume
that M is an even number. For a given schedule π ϵ П, there are M/2 scheduling pairs. The
SenCar will choose a selected polling point for each of them. When SenCar arrives at a cluster,
it will visit each selected polling point, where it stops to simultaneously collect data from the
two cluster heads in a scheduling pair. To collect data as fast as possible in a cluster, the
following two requirements should be satisfied.
 The two cluster heads in a scheduling pair both should be covered by SenCar with the
same transmission range as a sensor, i.e., Rs, when SenCar is at the selected polling
point specific for this scheduling pair.
 By visiting the selected polling points in a cluster, SenCar should achieve maximum
sum of the uplink MIMO capacities in the cluster.
For each polling point, we assume that SenCar has the knowledge of the IDs of sensors in the
proximity within range Rs and the channel vectors between the sensors and SenCar located at
the polling point. The information can be collected prior to each data collection tour. Upon
receiving the CHG information which contains the IDs of the cluster heads in a CHG, for each
possible schedule π, SenCar can choose a set of candidate polling points for each scheduling
pair in π, each of which can cover the two cluster heads in a scheduling pair at the same time.
Specifically, let P i denote such a set of candidate polling points for scheduling pair i in a
cluster, where i=1,2,3…..M/2. Clearly, each Pi is a subset of set P that contains all the polling
points. Based on the first requirement, the selected polling point for scheduling pair i in a cluster
should be chosen from Pi. Next, we will first find the distribution condition of the polling points
to guarantee that there are always candidate polling points for choosing, and then present the
criteria for selecting the schedule and selected polling points, which are addressed by the
second requirement.
Fig.11. (a) Distribution of polling points. (b) Candidate polling points for the scheduling pair
(a, b) in a CHG should be within the shadowed area.
First, we have the following property regarding the distance between two cluster heads in a
scheduling pair.
Property 8. In a CHG with M cluster heads, for any even number M. ⱻπ ϵП , for each
scheduling pair (a,b) in π, such that da.b ≤ √3 Rs, where da.b represents the distance between
the two cluster heads a and b in the same scheduling pair.
Proof. We prove the property by induction on M. As mentioned above, in a CHG, there is only
one self-driven cluster head and a total of M-1 peer-driven cluster heads, which are denoted as
CH0, CH1... CHM-1 for clarity. All of them are with in a circle area with radius Rs andcentered
at the self-driven cluster head (i.e., CH0). First consider the case of M =2. Apparently, the
property holds since the distance between CH0 and CH1 is clearly no more than Rs. We can
pair them directly. Assume that there is a feasible schedule π for some M with pair (CH0, CHx)
ϵπ where xϵ[1,M-1]. Now we prove that schedule π for M implies a valid schedule π´ for M+2
cluster heads. Suppose we add two new cluster heads CHa and CHb. If the distance between
the two new heads da.b is no longer than √3 Rs, then there exists a valid schedule π´=πỤ(a,b).
Otherwise, we can pair (CHx, CHy) where {dx.y ≤ √3 Rs | CHy ϵ {CHa, CHb}}, and pair CH0
with the remaining new cluster head. Based on the above discussion, we can conclude that for
any even number M there exists a valid schedule satisfying da.b ≤ √3Rs for any pair (a, b)
To successfully choose the selected polling points in a cluster, there should exist at least one
possible schedule in which the sets of candidate polling points for all scheduling pairs are non-
empty at the same time, i.e., ⱻπ ϵ П such that P´≠ ɸ for all the scheduling pair i ϵ π. This
requirement imposes challenges on the distribution of polling points. We study the case that
polling points are located at the intersections of grids with each polling point apart from its
adjacent neighbors in horizontal and vertical directions in the same distance t, as plotted in Fig.
6a. We have the following property on t to satisfy the above requirement.
Property9. If polling points are uniformly distributed as depicted in Fig. 6a, for a CHG with
M cluster heads, when t ≤ √2(1-√3/2)Rs, regardless of the value of M, ⱻπ ϵ П, for each
scheduling pair(a,b) ϵ π,ƩpϵP Pr(da.p ≤ Rs,db.p ≤ Rs) ≠ 0 where P denotes the set of all polling
points, da.p and db.p are the distances between cluster heads a and b in a scheduling pair and
the polling point p, respectively.
Proof. Under the above specified distribution of polling points, regardless of the orientation of
grids, there is at least one polling point located in a circle area with radius √2/2t.For example,
in Fig.6a, there are 4 polling points distributed in such an area, which is highlighted in shadow.
Moreover, it is known from Property 8 that there exist some schedules, in which the distance
between two cluster heads in any scheduling pair is upper bounded by √3Rs. Consider the worst
case that there is a scheduling pair (a,b) with da.b =√3Rs (see Fig.6b). A candidate polling
point p for (a, b) should be within the transmission range of cluster heads a and b
simultaneously. The line shadowed area in Fig.6b, which is the intersection of transmission
areas of a and b, indicates the possible distribution region of candidate polling points for (a,b).
It is clear that when da.b is shorter; the area of the region would be larger, which corresponds
to the lower distribution density requirement on polling points. Hence, considering the case
with da,b=√3Rs is sufficient for the proof of the property. It is shown in Fig. 6b that there exists
an inscribed circle with radius (1-√3/2)Rs inside the line shadowed area. If t = √2 (1-√3/2)Rs,
substituting Rs with the expression of t, the radius of the inscribed circle in the line shadowed
area is equal to √2/2t. As mentioned earlier, there is at least one polling point located in such
an area. Thus there always exist some candidate polling points for scheduling pair (a, b), i.e.
ƩpϵP Pr (da.p ≤ Rs, da.p ≤ Rs)≠ 0.In other words, when t ≤ √2(1-√3/2)Rs, there exist some
schedules in which the set of candidate polling points for each scheduling pair is always non-
empty.
6.4.2. MU-MIMO Uploading
We jointly consider the selections of the schedule pattern and selected polling points for the
corresponding scheduling pairs, aiming at achieving the maximum sum of MIMO uplink
capacity in a cluster. We assume that SenCar utilizes the minimum mean square error receiver
with successive interference cancellation (MMSE-SIC) as the receiving structure for each
MIMO data uploading. Based on this receiver, the capacity of a 2×2 MIMO uplink between a
scheduling pair (a,b) and SenCar located at a selected polling point ∆ can be expressed as
follows.
Where ha and hb are two 2×1 channel vectors between cluster heads a and b and SenCar at ∆
respectively, Pt. is the output power of a sensor for transmission range Rs, and N0 is the
variance of the back-ground Gaussian noise. The MMSE-SIC receiver first decodes the
information from a, treating the signals of b as the interference. Then, it cancels the signal part
of a from the received signals. The remaining signal part of b only has to contend with the
background Gaussian noise.
Accordingly, the criteria for the schedule and the selected polling point for each corresponding
scheduling pair in a cluster is given by
where π is a specified schedule, scheduling pair i ϵ π consists of cluster heads a and b, ∆i and
P´i are the selected polling point and the set of candidate polling points for scheduling pair i,
respectively, and C∆(a,b) is the achieved 2×2 MIMO uplink capacity for scheduling pair i
when SenCar is positioned at ∆i.
Once the selected polling points for each cluster are chosen, SenCar can finally determine its
trajectory. The moving time on the trajectory can be reduced by a proper visiting sequence of
selected polling points. Since SenCar departs from the data sink and also needs to return the
collected data to it, the trajectory of SenCar is a route that visits each selected polling point
once. This is the well-known traveling salesman problem (TSP). Since SenCar has the
knowledge about the locations of polling points, it can utilize an approximate or heuristic
algorithm for the TSP problem to find the shortest moving trajectory among selected polling
points e.g., the nearest neighbor algorithm.
6.4.3. Data Collection With Time Constraints
We further consider the case when there are time constraints on data messages. In practice, it
is common for some emergent data messages to be delivered within a specified deadline. If the
deadline has expired and the message is yet to arrive at the destination, it would carry less value
and cause performance degradation. In, mobile data collection with dynamic deadline was
considered and an earliest deadline first algorithm was proposed. In their solution, the mobile
collector would visit the nodes with messages of the earliest deadline. Here, we extend and
adapt their solutions to the clustered network. Our method is described in the following. First,
the cluster heads collect data messages and calculate a deadline by averaging all the deadlines
from messages in the cluster. All the clusters then forward their deadline information to
SenCar. The SenCar selects the cluster with the earliest average deadline and moves to the
polling point to collect data via MU-MIMO transmissions. After SenCar finishes data
gathering, it checks to see whether collecting data from the next polling point would cause any
violations of deadline in its buffer. If yes, it immediately moves back to the data sink to upload
buffered data and resumes data collection in the same way. By prioritizing messages with
earlier deadlines, SenCar would do its best to avoid missing deadlines.
CHAPTER-7
PERFORMANCE EVALUATIONS
7.1. OVERVIEW
In this section, we evaluate the performance of our framework and compare it with other
schemes. Since the main focus of this paper is to explore different choices of data collection
schemes, for fair comparison, we assume all the schemes are implemented under the same
duty-cycling MAC strategy. The first scheme for comparison is to relay messages to a static
data sink in multi-hops and we call it Relay Routing. Since nodes with higher battery energy
provide more robustness and error immunity, sensors select the next hop neighbor with the
highest residual energy while forwarding messages to the sink. Once some nodes on a routing
path consume too much energy, an alternative route will be chosen to circumvent these
nodes. In this way, the relay routing method can provide load balance among nodes along the
routing path. The second scheme to compare is based on Collection Tree Protocol. In CTP,
the expected number of transmission (ETX) is used as a routing metric and the route with a
lower ETX takes precedence over routes with higher ETX. For simplicity, we assume ETX is
proportional to transmission distances between nodes. This assumption is reasonable since
using fixed power for longer transmission distance would cause attenuated receiving power
and potentially increase error probability and expected number of transmissions. Based on
this metric, we establish a collection tree rooted at the static data sink at the origin (0, 0).
Each node forwards messages along the path with the lowest ETX towards the sink. Any
broken links caused by nodes depleted battery energy would lead to large ETX and are
avoided in routings.
Furthermore, we introduce two schemes that organize nodes into clusters and relay messages
to the static data sink by multi-hop transmissions. The third scheme to compare is clustered
SISO in which sensors form into clusters with a single cluster head. Data messages are
converged at the cluster heads and relayed to the static data sink in multi-hops by SISO
communications. By the same token, we can extend the third scheme to clustered MIMO
which allows MIMO communications between the cluster heads according to. On the other
hand, we also include the fifth scheme called mobile SISO which is the traditional way for
mobile data gathering, where SenCar stops in each cluster for data collection and uploads
data to the sink after all the clusters have been visited. The last scheme is our proposed LBC-
DDU framework (denoted by mobile MIMO for clarity) that elects multiple cluster heads to
enable MUMIMO uploading to SenCar in each cluster.
We develop a simulator in MATLAB and discuss the parameter settings in the following. A
total of n sensors are randomly scattered in an l×l field. The static data sink is located at (0,0).
There are a total of np polling points uniformly distributed in the field. The sensor
transmission range Rs is 40m.Each sensor has installed an AA battery of 1,500 mAh. To
estimate energy consumptions for SISO, we use the model presented in, i.e., et=(e1dr+e0)lp,
where et is the energy consumption while transmitting a message of lp bits, dr is the
transmission range, e1 is the loss coefficient per bit, a is the path loss exponent and e0 is the
excessive energy consumed on sensing, coding, modulations, etc. For MIMO uploading
between cluster heads and SenCar, we utilize the results for 2×2 MIMO in. When dr=40m,
the energy consumption per bit is 0.6×10ˉ5J/bit. Each sensor holds 5,120 bytes sensing data.
Each data message is 10 bytes and each control message is 1 byte (overhead). Therefore,
energy consumptions per data message for SISO and MIMO are 1:28 and 0:48mJ,
respectively.
The circuit energy consumption of MIMO uploading itself is modelled in Since the receiver
is SenCar, we only consider energy overhead on the transmitters’ side, which are the cluster
head groups. We obtain that extra energy consumption incurred on cluster heads using
MIMO is, Pe=PDAC+Pmix+Pfilt, in which PDAC=1.95mW according to Texas
Instrument’s DAC128S085 datasheet Pmix =30.3mW and Pfilt= 2.5mW according to. We
obtained that for transmitting a data message, 0:03mJ extra power is consumed in MIMO
circuitry (5.8 percent energy overhead from the circuitry). The transmission bandwidth is
100Kbps and the speed of SenCar is 1m/s. Each performance point is the average of
theresultsin200 simulation experiments.
Fig.12. Performance comparisons of different data gathering schemes when M =2. (a)
Average energy consumptions per node. (b) Maximum energy consumption. (c) Data latency.
(d) Average energy consumption for each cluster head. (e) Energy consumption heat map of
Collection Tree scheme. (f) Energy consumption heat map of Mobile MIMO scheme. (g)
Number of clusters. (h) Average energy overhead per node.
7.2. COMPARISONOF ENERGYCONSUMPTIONS AND LATENCY
First, we compare the average energy consumption for each sensor and the maximum energy
consumption in the network. We set l=250m, np=400, and M=2 (at most two cluster heads for
each cluster) and vary n from 50 to 500. Note that when n=50, network connectivity cannot be
guaranteed all the time for multi-hop transmission with a static sink. The results here are only
the average of the connected networks in the experiments. However, the mobile schemes can
work well not only in connected networks but also in disconnected networks, since the mobile
collector acts as virtual links to connect the separated sub networks.
Fig.7a compares the average energy consumption per node. We can see that our mobile MIMO
scheme results in the least energy consumption on sensor nodes, whereas the methods that
transmit messages through multi-hop relay to the static data sink result in at least twice more
energy on each node. Fig.7b further presents the maximum energy consumption in the network.
The network lifetime usually lasts until the first node depletes its energy. It is intuitive that
schemes with lower maximum energy consumption would have longer network lifetime. Fig.
7b shows that mobile MIMO has the least maximum energy consumptions and curves for the
schemes that utilize multi-hop relaying to the static data sink (Relay Routing, Collection Tree
and Clustered SISO/MIMO) climb much faster and higher than mobile MIMO scheme. When
we increase the size of the network, network lifetime of these schemes would deteriorate
because more relayed traffic needs to traverse the congested region near the data sink.
Second, we illustrate data latency by Fig.7c. Here, we define data latency as the time duration
for the data sink to gather all the sensing data in the field. For mobile schemes, data latency is
equivalent to the time duration of a data collection tour which comprises of the moving time
and data transmission time. In Fig.7c, lower latency is achieved with clustered SISO/MIMO
compared to Relay Routing or Collection Tree methods. This is because that nodes are
organized into clusters and routing burden is decomposed into smaller tasks by different
clusters. Relay routing has the highest latency because choosing node with the highest energy
as the next hop may not lead to the shortest path. On the other hand, mobile SISO/MIMO has
a little higher latency than clustered SISO/MIMO and Collection Tree methods due to SenCar’s
moving time. However, note that when n>300, the latency of the Collection Tree method
exceeds mobile SISO/MIMO and the slopes for multi-hop relaying to the static sink are much
steeper than mobile SISO/MIMO. This is because that though mobility incurs extra moving
time, single-hop transmissions for both data aggregation and uploading save time in routing
significantly, whereas multihop traffic relay to the static sink may not scale well when the
number of nodes increases. Finally, the advantage of mobile MIMO comparing to mobile SISO
is observed by saving 20 percent time in total. This is due to the fact of simultaneous data
uploading to SenCar at the polling points in the mobile MIMO approach.
7.3. LOAD BALANCE AND ENERGYDISTRIBUTIONS
We also evaluate load balance on cluster heads in Fig.7d. Cluster heads consume more
energy than other nodes due to data aggregations and forwarding. Reducing energy
consumptions on cluster heads improves network longevity and robustness. In Fig. 7d, we
can see that first both MIMO approaches outperform SISO, and mobile MIMO achieves good
load balance among cluster heads with the lowest average energy consumption by saving
over 60 percent energy compared to the mobile SISO. In sum, the mobile scheme
outperforms multi-hop relay to the static sink because no inter-cluster data forwarding is
needed and the spatial diversity achieved by adopting MIMO further reduces energy
consumption of cluster heads.
To justify our choice of mobile data collections, we also compare the geographical energy
distribution between Collection Tree and mobile MIMO. For demonstration purposes, we set
n ¼ 200 and draw the heat map of energy consumption in Figs.7e and 7f. We observe that
more energy is consumed with the Collection Tree method especially on nodes near the data
sink represented by the bright spots in Fig.7e. These nodes may become congested
bottlenecks and jeopardize the operation of the network. Although mechanisms in Collection
Tree can find a better route by adapting to ETX metrics, congestion is inevitable due to the
physical locations of these nodes. In contrast, the mobile MIMO method results in much less
energy consumption and even distribution acrossthesensingfieldinFig.7f.
7.4. NUMBER OF CLUSTERS AND ENERGYOVERHEAD
Fig.7g shows the number of clusters generated by mobile SISO and MIMO. We can see that
the mobile MIMO typically yields fewer clusters than mobile SISO. Note that the average
energy consumptions of mobile SISO and MIMO become indistinguishable as n increases. This
is because that although fewer clusters are observed with mobile MIMO, more cluster heads
are generated for each cluster. Thus, the total number of cluster heads in the two schemes turns
to be comparable, which is actually dominant factor determining energy consumptions.
Finally, we compare the energy overhead with mobile SISO and MIMO, and illustrate the
energy consumption by MIMO uploading itself in Fig.7h.For the mobile approaches, overhead
is mainly comprised of status and synchronization messages in clustering, messages notifying
SenCar of cluster locations and circuit energy consumption if MIMO uploading is adopted.
First, the number of status messages exchanged is proved to be upper bounded by 2n in
Property 4 in Section 5, where n is the number of nodes, and synchronization messages between
cluster heads are only propagated within each cluster. Second, after clusters are formed, each
cluster needs to forward the locations of cluster heads to SenCar resided at the origin for finding
the polling points. Third, if MIMO uploading is adopted, there is excessive
energyconsumptionof0:03mJ per data message.
By considering these aspects, we plot the energy overhead in Fig.7h. First of all, it is observed
that energy overhead results in less than 6 percent over the total energy consumptions. Then,
the gap between mobile SISO and MIMO represents extra energy consumed in the MIMO
circuitry is small. It indicates that compared to the energy overhead on clustering and notifying
SenCar of cluster information, the energy consumed by MIMO circuity itself is negligible.
7.5. IMPACT OF MAXIMUM NUMBER OF CLUSTER HEADS IN
EACH CLUSTER
We evaluate the impact of the maximum number of cluster heads in each cluster, M, on
energy consumptions, latency and number of clusters in Fig.8. We plot the performance of
mobile MIMO with different M when l varies from 50 to 400m and n =200. We fix the
interval distance t between a polling point and its adjacent neighbors in horizontal and
vertical directions at about 20m, which means that np varies from 16 to 441 with different
settings of l.
Fig.13.Performance comparison of proposed framework with different M. (a) Average
energy consumption per node versus l. (b) Maximum energy consumption versus l. (c) Data
latency versus l. (d) Number of clusters versus l.
Fig.8a shows that the average energy consumption declines as l increases in all cases. This is
because that more clusters would be formed when sensors become sparsely distributed as
indicated in Fig. 8d. It is also noticed that a larger M leads to less energy consumptions. For
example, when l=200m, energy consumption with M=4 is 35percent less than the case of
M=2.This result is intuitive since cluster heads perform more transmissions than other nodes.
When M increases, there are more cluster heads in a cluster to share the workload. Fig.8b
shows the maximum energy consumption in the network. Since more cluster heads can
directly upload their data to SenCar without any relay, the case with a larger M results in a
slightly less energy consumptions. For example, when l=300m, maximum energy
consumption with M=6 is 15percent less than the case with M=2.
In Fig.8c, it is demonstrated that a larger M also leads to longer data latency. The reason is
that more selected polling points need to be visited, which leads to a longer moving
trajectory. For instance, when l=400m, the data latency in the case of M=6 and M=4 is 14
and 7 percent longer than the case of M=2, respectively. Fig.8d shows the number of clusters
formed with different M. It further validates that a larger M typically leads to fewer clusters.
However, it is also noticed that the difference becomes less evident when l becomes larger.
This is because that many clusters formed under this condition actually have fewer cluster
heads than M since sensors become sparsely distributed such that the controlling impact of M
on the cluster size is not fully extracted.
7.6. DATA COLLECTION WITH TIME CONSTRAINTS
We demonstrate our proposed framework when data messages have time constraints to be
delivered. The percentage of data messages that miss their deadlines and the impact of time
constraints on traveling cost of SenCar are shown in Fig.9.To examine the effectiveness of
the proposed algorithm we set the message deadline to be uniformly randomly distributed
over [0, X] and change X from 60 to 180mins. Therefore, the mean of deadline is from 30
to 90mins. The number of nodes n is set to 200 and the side length of sensing field l varies
from 100 to 300 with an increment of 50. In Fig.9a we can see that given a short average
deadline and a large field (l=300m, mean deadline equals 30mins), and almost all the
messages would miss their deadlines. This is because that the moving time of SenCar to
traverse all the polling points exceeds most of the deadlines. Once we relax the deadline
constraints (mean deadline equals 40-90mins), the percentage of missing deadlines drops fast.
We also observe that when l is between 100 to 200m, the algorithm is able to maintain the
percentage of missing deadlines with in 20percent for most cases.
Fig.14. Evaluation of data collection with time constraints. (a) Percentage of data messages
that miss the deadline. (b) Impact of time constraints on traveling cost of SenCar.
To meet dynamic message deadlines, extra moving cost on SenCar is observed. This is
because that the cluster with an earlier message deadline may be far from SenCar’s location.
We present the traveling cost of SenCar for different cases in Fig.9b and compare it with the
traveling cost computed by the nearest neighbor heuristic algorithm in Table 2 (no time
constraint on messages). When l=300m and mean deadline equals 90mins, the moving cost
on SenCar is over 5,000 m compared to 1,846 m without time constraints. When l=100m and
mean deadline equals 90mins, the moving cost on SenCar is 404m compared to 347m without
time constraints. The results indicate that higher cost on SenCar is needed with a larger field
size. To further reduce traveling cost on SenCar while guaranteeing to meet all the time
constraints, multiple SenCar’s are needed to partition the data collection tour and many
existing solutions for the Vehicle Routing Problems with Time Windows can be adapted to
optimize the data collection routes.
CHAPTER-8
CONCLUSIONS AND FUTURE WORKS
8.1. CONCLUSION
We have proposed the LBC-MIMO framework for mobile data collection in a WSN. It
consists of sensor layer, cluster head layer and SenCar layer. It employs distributed load
balanced clustering for sensor self-organization, adopts collaborative inter-cluster
communication for energy-efficient transmissions among CHGs, uses dual data uploading for
fast data collection, and optimizes SenCar’s mobility to fully enjoy the benefits of MU-
MIMO. Our performance study demonstrates the effectiveness of the proposed framework.
The results show that LBC-MIMO can greatly reduce energy consumptions by alleviating
routing burdens on nodes and balancing workload among cluster heads, which achieves 20
percent less data collection time compared to SISO mobile data gathering and over 60 percent
energy saving on cluster heads. We have also justified the energy overhead and explored the
results with different numbers of cluster heads in the framework.
8.2. FUTURE WORKS
Finally, we would like to point out that there are some interesting problems that may be
studied in our future work. The first problem is how to find polling points and compatible
pairs for each cluster. A discretization scheme should be developed to partition the
continuous space to locate the optimal polling point for each cluster. Then finding the
compatible pairs becomes a matching problem to achieve optimal overall spatial diversity.
The second problem is how to schedule MIMO uploading from multiple clusters. An
algorithm that adapts to the current MIMO-based transmission scheduling algorithms should
be studied in future.
REFERENCES
[1] B. Krishnamachari, Networking Wireless Sensors. Cambridge, U.K.: Cambridge Univ.
Press, Dec. 2005.
[2] R. Shorey, A. Ananda, M. C. Chan, and W. T. Ooi, Mobile, Wireless, Sensor Networks.
Piscataway, NJ, USA: IEEE Press, Mar. 2006.
[3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor
networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002.
[4] W. C. Cheng, C. Chou, L. Golubchik, S. Khuller, and Y. C. Wan, “A coordinated data
collection approach: Design, evaluation, and comparison,” IEEE J. Sel. Areas Commun., vol.
22, no. 10, pp. 2004–2018, Dec. 2004.
[5] K. Xu, H. Hassanein, G. Takahara, and Q. Wang, “Relay node deployment strategies in
heterogeneous wireless sensor networks,” IEEE Trans. Mobile Compute., vol. 9, no. 2, pp.
145–159, Feb. 2010.
[6] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,”
in Proc. 7th ACM Conf. Embedded Netw. Sensor Syst., 2009, pp. 1–14.
[7] E. Lee, S. Park, F. Yu, and S.-H. Kim, “Data gathering mechanism with local sink in
geographic routing for wireless sensor networks,” IEEE Trans. Consum. Electron., vol. 56,
no. 3, pp. 1433–1441, Aug. 2010.
[8] Y. Wu, Z. Mao, S. Fahmy, and N. Shroff, “Constructing maximum- lifetime data-
gathering forests in sensor networks,” IEEE/ ACM Trans. Netw., vol. 18, no. 5, pp. 1571–
1584, Oct. 2010.
[9] X. Tang and J. Xu, “Adaptive data collection strategies for lifetime- constrained wireless
sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 721–7314, Jun. 2008.
[10] W. R. Heinzelman, A.Chandrakasan, and H.Balakrishnan, “An application-specific
protocol architecture for wireless microsensor networks,” IEEE Trans. Wireless Commun.,
vol. 1, no. 4, pp. 660–660, Oct. 2002.
[11] O. Younis and S. Fahmy, “Distributed clustering in ad-hoc sensor networks: A hybrid,
energy-efficient approach,” in IEEE Conf. Comput. Commun., pp. 366–379, 2004.
[12] D. Gong, Y. Yang, and Z. Pan, “Energy-efficient clustering in lossy wireless sensor
networks,” J. Parallel Distrib. Comput., vol. 73, no. 9, pp. 1323–1336, Sep. 2013.
[13] A. Amis, R. Prakash, D. Huynh, and T. Vuong, “Max-min d-cluster formation in
wireless ad hoc networks,” in Proc. IEEE Conf. Comput. Commun., Mar. 2000, pp. 32–41.
[14] A. Manjeshwar and D. P. Agrawal, “Teen: A routing protocol for enhanced efficiency in
wireless sensor networks,” in Proc. 15th Int. IEEE Parallel Distrib. Process. Symp., Apr.
2001, pp. 2009–2015.
[15] Z. Zhang, M. Ma, and Y. Yang, “Energy efficient multi-hop polling in clusters of two-
layered heterogeneous sensor networks,” IEEE Trans. Comput., vol. 57. no. 2, pp. 231–245,
Feb. 2008.
[16] M. Ma and Y. Yang, “SenCar: An energy-efficient data gathering mechanism for large-
scale multihop sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 10, pp.
1476–1488, Oct. 2007.
[17] B. Gedik, L. Liu, and P. S. Yu, “ASAP: An adaptive sampling approach to data
collection in sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 12, pp. 1766–
1783, Dec. 2007.
[18] C. Liu, K. Wu, and J. Pei, “An energy-efficient data collection framework for wireless
sensor networks by exploiting spatiotemporal correlation,” IEEE Trans. Parallel Distrib.
Syst., vol. 18, no. 7, pp. 1010–1023, Jul. 2007.
[19] R. Shah, S. Roy, S. Jain, and W. Brunette, “Data MULEs: Modeling a three-tier
architecture for sparse sensor networks,” Elsevier Ad Hoc Netw. J., vol. 1, pp. 215–233, Sep.
2003.
[20] D. Jea, A. A. Somasundara, and M. B. Srivastava, “Multiple controlled mobile elements
(data mules) for data collection in sensor networks,” in Proc. IEEE/ACM Int. Conf. Distrib.
Comput. Sensor Syst., Jun. 2005, pp. 244–257.
[21] M. Ma, Y. Yang, and M. Zhao, “Tour planning for mobile data gathering mechanisms in
wireless sensor networks,” IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1472–1483, May
2013.
[22] M. Zhao and Y. Yang, “Bounded relay hop mobile data gathering in wireless sensor
networks,” IEEE Trans. Comput., vol. 61, no. 2, pp. 265–271, Feb. 2012.
[23] M. Zhao, M. Ma, and Y. Yang, “Mobile data gathering with spacedivision multiple
access in wireless sensor networks,” in Proc. IEEE Conf. Comput. Commun., 2008, pp.
1283–1291.
[24] M. Zhao, M. Ma, and Y. Yang, “Efficient data gathering with mobile collectors and
space-division multiple access technique in wireless sensor networks,” IEEE Trans. Comput.,
vol. 60, no. 3, pp. 400–417, Mar. 2011.
[25] A. A. Somasundara, A. Ramamoorthy, and M. B. Srivastava,, “Mobile element
scheduling for efficient data collection in wireless sensor networks with dynamic deadlines,”
in Proc. 25th IEEE Int. Real-Time Syst. Symp., Dec. 2004, pp. 296–305.
[26] W. Ajib and D. Haccoun, “An overview of scheduling algorithms in MIMO-based
fourth-generation wireless systems,” IEEE Netw., vol. 19, no. 5, Sep./Oct. 2005, pp. 43–48.
[27] S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-efficiency of MIMO and cooperative
MIMO techniques in sensor networks,” IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp.
1089–1098, Aug. 2004.
[28] S. Jayaweera, “Virtual MIMO-based cooperative communication for energy-constrained
wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 5, no. 5, pp. 984–989, May
2006.
[29] S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-constrained modulation optimization,”
IEEE Trans. Wireless Commun., vol. 4, no. 5, pp. 2349–2360, Sep. 2005.
[30] I. Rhee, A. Warrier, J. Min, and X. Song, “DRAND: Distributed randomized TDMA
scheduling for wireless ad-hoc networks,” in Proc. 7th ACM Int. Symp. Mobile Ad Hoc
Netw. Comput., 2006, pp. 190–201.
[31] S. C. Ergen and P. Varaiya, “TDMA scheduling algorithms for wireless sensor
networks,” Wireless Netw., vol. 16, no. 4, pp. 985– 997, May 2010.
[32] I. Rhee, A. Warrier, M. Aia, and J. Min, “Z-MAC: A hybrid MAC for wireless sensor
networks,” in Proc. 3rd ACM Int. Conf. Embedded Netw. Sensor Syst., 2005, pp. 90–101.
[33] D. M. Blough and P. Santi, “Investigating upper bounds on network lifetime extension
for cell-based energy conservation techniques in stationary ad hoc networks,” in Proc. 13th
Annu. ACM Int. Conf. Mobile Comput. Netw., 2002, pp. 183–192.
[34] F. Ye, G. Zhong, S. Lu, and L. Zhang, “PEAS: A robust energy conserving protocol for
long-lived sensor networks,” in Proc. 23rd IEEE Int. Conf. Distrib. Comput. Syst., 2003, pp.
28–37.
[35] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms.
Cambridge, MA, USA: MIT Press, 2001.
[36] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space-time block codes for orthogonal
designs,” IEEE Trans. Info. Theory, vol. 45, no. 5, pp. 1456–1467, Jul. 1999.
[37] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge, U.K.:
Cambridge Univ. Press, May 2005.
[38][Online].(2013).Available: http://www.ti.com/product/DAC128S085/technicaldocuments
[39] M. M. Solomon, “Algorithm for the vehicle routing and scheduling problems with time
window constraints,” Oper. Res., vol. 35, no. 2, pp. 254–265, 1987.
Ad

More Related Content

What's hot (20)

z transforms
z transformsz transforms
z transforms
Shahbaz Goshtasebi
 
Documentacion de Codeigniter en español
Documentacion de Codeigniter en españolDocumentacion de Codeigniter en español
Documentacion de Codeigniter en español
Franklin W. Vasquez Obregon
 
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier AnalysisDSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
Amr E. Mohamed
 
EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)
EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)
EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)
MorarjiEr
 
Networks, Deep Learning (and COVID-19)
Networks, Deep Learning (and COVID-19)Networks, Deep Learning (and COVID-19)
Networks, Deep Learning (and COVID-19)
tm1966
 
ENE3263_Transmission and Distribution of Energy class exercise1.pptx
ENE3263_Transmission and Distribution of Energy class exercise1.pptxENE3263_Transmission and Distribution of Energy class exercise1.pptx
ENE3263_Transmission and Distribution of Energy class exercise1.pptx
JoseeMusabyimana
 
Pulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulationPulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulation
Vishal kakade
 
VLSI lab report using Cadence tool
VLSI lab report using Cadence toolVLSI lab report using Cadence tool
VLSI lab report using Cadence tool
Maharaja Institute of Technology Mysore
 
Digital filter design using VHDL
Digital filter design using VHDLDigital filter design using VHDL
Digital filter design using VHDL
Arko Das
 
Du binary signalling
Du binary signallingDu binary signalling
Du binary signalling
srkrishna341
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
Sehrish Rafiq
 
Z transfrm ppt
Z transfrm pptZ transfrm ppt
Z transfrm ppt
SWATI MISHRA
 
Flying ad hoc network
Flying ad hoc network Flying ad hoc network
Flying ad hoc network
Binayakreddy
 
Arithmetic and Logic instructions in Embedded C
Arithmetic and Logic instructions in Embedded CArithmetic and Logic instructions in Embedded C
Arithmetic and Logic instructions in Embedded C
Vikas Dongre
 
digital signal-processing-lab-manual
digital signal-processing-lab-manualdigital signal-processing-lab-manual
digital signal-processing-lab-manual
Ahmed Alshomi
 
Stft vs. mfcc
Stft vs. mfccStft vs. mfcc
Stft vs. mfcc
Muhammad Rizwan
 
Coherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASKCoherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASK
naimish12
 
Soho wireless network applications
Soho wireless network applicationsSoho wireless network applications
Soho wireless network applications
Mohamed Alrshah
 
To find transfer function from state space representation
To find transfer function from state space representationTo find transfer function from state space representation
To find transfer function from state space representation
Sajid Sheikh
 
Smart Grid - Concept to Reality 21.09.22.pptx
Smart Grid - Concept to Reality  21.09.22.pptxSmart Grid - Concept to Reality  21.09.22.pptx
Smart Grid - Concept to Reality 21.09.22.pptx
shivarajCSRaj
 
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier AnalysisDSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
Amr E. Mohamed
 
EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)
EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)
EC8452-ELECTRONIC CIRCUITS II (Handwritten Notes)
MorarjiEr
 
Networks, Deep Learning (and COVID-19)
Networks, Deep Learning (and COVID-19)Networks, Deep Learning (and COVID-19)
Networks, Deep Learning (and COVID-19)
tm1966
 
ENE3263_Transmission and Distribution of Energy class exercise1.pptx
ENE3263_Transmission and Distribution of Energy class exercise1.pptxENE3263_Transmission and Distribution of Energy class exercise1.pptx
ENE3263_Transmission and Distribution of Energy class exercise1.pptx
JoseeMusabyimana
 
Pulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulationPulse amplitude modulation & demodulation
Pulse amplitude modulation & demodulation
Vishal kakade
 
Digital filter design using VHDL
Digital filter design using VHDLDigital filter design using VHDL
Digital filter design using VHDL
Arko Das
 
Du binary signalling
Du binary signallingDu binary signalling
Du binary signalling
srkrishna341
 
Flying ad hoc network
Flying ad hoc network Flying ad hoc network
Flying ad hoc network
Binayakreddy
 
Arithmetic and Logic instructions in Embedded C
Arithmetic and Logic instructions in Embedded CArithmetic and Logic instructions in Embedded C
Arithmetic and Logic instructions in Embedded C
Vikas Dongre
 
digital signal-processing-lab-manual
digital signal-processing-lab-manualdigital signal-processing-lab-manual
digital signal-processing-lab-manual
Ahmed Alshomi
 
Coherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASKCoherent and Non-coherent detection of ASK, FSK AND QASK
Coherent and Non-coherent detection of ASK, FSK AND QASK
naimish12
 
Soho wireless network applications
Soho wireless network applicationsSoho wireless network applications
Soho wireless network applications
Mohamed Alrshah
 
To find transfer function from state space representation
To find transfer function from state space representationTo find transfer function from state space representation
To find transfer function from state space representation
Sajid Sheikh
 
Smart Grid - Concept to Reality 21.09.22.pptx
Smart Grid - Concept to Reality  21.09.22.pptxSmart Grid - Concept to Reality  21.09.22.pptx
Smart Grid - Concept to Reality 21.09.22.pptx
shivarajCSRaj
 

Viewers also liked (20)

Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Rutvik Pensionwar
 
Load balanced clustering with mimo uploading technique for mobile data gather...
Load balanced clustering with mimo uploading technique for mobile data gather...Load balanced clustering with mimo uploading technique for mobile data gather...
Load balanced clustering with mimo uploading technique for mobile data gather...
Munisekhar Gunapati
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
phbhagwat
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
9914814928
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
Sambit Dutta
 
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
Urvashi Khandelwal
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Software Sizing
Software SizingSoftware Sizing
Software Sizing
Noman Aftab
 
02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list
02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list
02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list
ncctstudentprojects
 
Leach
LeachLeach
Leach
Akanksha Upadhyay
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
Mahmuda Rahman
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor Network
Myo Naung Lwin
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 
Wireless Sensor Networking in Railways
Wireless Sensor Networking in RailwaysWireless Sensor Networking in Railways
Wireless Sensor Networking in Railways
Hari Wiz
 
System development life cycle (sdlc)
System development life cycle (sdlc)System development life cycle (sdlc)
System development life cycle (sdlc)
Mukund Trivedi
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 
UNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKSUNDERWATER SENSORS NETWORKS
UNDERWATER SENSORS NETWORKS
Alessandro Gonella
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
frestoadi
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Rutvik Pensionwar
 
Load balanced clustering with mimo uploading technique for mobile data gather...
Load balanced clustering with mimo uploading technique for mobile data gather...Load balanced clustering with mimo uploading technique for mobile data gather...
Load balanced clustering with mimo uploading technique for mobile data gather...
Munisekhar Gunapati
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
phbhagwat
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
9914814928
 
Discovery and verification Documentation
Discovery and verification DocumentationDiscovery and verification Documentation
Discovery and verification Documentation
Sambit Dutta
 
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
Urvashi Khandelwal
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list
02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list
02 2012-11 ieee embedded system project titles, ncct ieee 2012-11 project list
ncctstudentprojects
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor Network
Myo Naung Lwin
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
Wireless Sensor Networking in Railways
Wireless Sensor Networking in RailwaysWireless Sensor Networking in Railways
Wireless Sensor Networking in Railways
Hari Wiz
 
System development life cycle (sdlc)
System development life cycle (sdlc)System development life cycle (sdlc)
System development life cycle (sdlc)
Mukund Trivedi
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
frestoadi
 
Ad

Similar to LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORK (20)

Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
 
Embedded system for traffic light control
Embedded system for traffic light controlEmbedded system for traffic light control
Embedded system for traffic light control
Madhu Prasad
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
Interference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor NetworksInterference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor Networks
Rakesh Behera
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
Prof Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report FormatProf Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C
 
Eee projects
Eee projectsEee projects
Eee projects
aliaKhan71
 
SEDRP
SEDRPSEDRP
SEDRP
Manoj Mithun
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET Journal
 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
IRJET Journal
 
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET-  	  LEACH Protocol for Wireless Sensor NetworkIRJET-  	  LEACH Protocol for Wireless Sensor Network
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET Journal
 
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing ProtocolVHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
IOSR Journals
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Swapnil Jagtap
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
cscpconf
 
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
csijjournal
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
csijjournal
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
csijjournal
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
csijjournal
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
 
Embedded system for traffic light control
Embedded system for traffic light controlEmbedded system for traffic light control
Embedded system for traffic light control
Madhu Prasad
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...
IJCNCJournal
 
Interference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor NetworksInterference Aware Multi-path Routing in Wireless Sensor Networks
Interference Aware Multi-path Routing in Wireless Sensor Networks
Rakesh Behera
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
Prof Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report FormatProf Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C, Final year Project Report Format
Prof Chethan Raj C
 
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET -  	  Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...
IRJET Journal
 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
IRJET Journal
 
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET-  	  LEACH Protocol for Wireless Sensor NetworkIRJET-  	  LEACH Protocol for Wireless Sensor Network
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET Journal
 
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing ProtocolVHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
IOSR Journals
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Swapnil Jagtap
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
cscpconf
 
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
A Flexible Software/Hardware Adaptive Network for Embedded Distributed Archit...
csijjournal
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
csijjournal
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
csijjournal
 
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
A FLEXIBLE SOFTWARE/HARDWARE ADAPTIVE NETWORK FOR EMBEDDED DISTRIBUTED ARCHIT...
csijjournal
 
Ad

Recently uploaded (20)

fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Resistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff modelResistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff model
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxbMain cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
SunilSingh610661
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptxLidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
Lidar for Autonomous Driving, LiDAR Mapping for Driverless Cars.pptx
RishavKumar530754
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
How to use nRF24L01 module with Arduino
How to use nRF24L01 module with ArduinoHow to use nRF24L01 module with Arduino
How to use nRF24L01 module with Arduino
CircuitDigest
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Oil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdfOil-gas_Unconventional oil and gass_reseviours.pdf
Oil-gas_Unconventional oil and gass_reseviours.pdf
M7md3li2
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxbMain cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
Main cotrol jdbjbdcnxbjbjzjjjcjicbjxbcjcxbjcxb
SunilSingh610661
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 

LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORK

  • 1. LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORK A Project Report Submitted to JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, ANANTAPURAMU By GUNAPATI.MUNISEKHAR (14KB1D5802) Under the esteemed Guidance Of Dr. S.MaruthuPerumal, M.E., Ph.D., Professor& Head, Dept. of C.S.E. Project report submitted in partial fulfillment of the Requirements for the award of the degree of MASTER OF TECHNOLOGY IN COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING N.B.K.R INSTITUTE OF SCIENCE AND TECHNOLOGY (AN AUTONOMOUS INSTITUTION) VIDYANAGAR – 524 413 OCTOBER 2016
  • 2. Website: www.nbkrist.org. Ph: 08624-228 247 Email : [email protected]. Fax: 08624-228 257. N.B.K.R. INSTITUTE OF SCIENCE & TECHNOLOGY AUTONOMOUS INSTITUTION (Approved by AICTE: Accredited by NBA: Affiliated to J.N.T University, Anantapuramu) An ISO 9001:2008 Certified Institution Vidyanagar -524 413, SPSR Nellore district, Andhra Pradesh, India. BONAFIDE CERTIFICATE This is to certify that the project work entitled “LAOD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHERING IN WIRELESS SENSOR NETWORKS” is a bonafide record done by Mr.GUNAPATI.MUNISEKHAR (Roll No.14KB1D5802).In the department of Computer Science & Engineering, N.B.K.R. Institute of Science & Technology, Vidyanagar and is submitted to Jawaharlal Nehru Technological University, Anantapuramu in the partial fulfillment for the award of M.Techdegree in Computer Science & Engineering. This work has been carried out under my supervision. Dr. S.MaruthuPerumal, M.E., Ph.D., Dr. S.MaruthuPerumal, M.E., Ph.D., Professor& Head, Professor& Head, Department of CSE NBKRIST, Department of CSE NBKRIST, Vidyanagar. Vidyanagar. Submitted for the Viva-Voce Examination held on ____________ Internal Examiner External Examiner
  • 3. ACKNOWLEDGEMENT The satisfaction that accompanies the successful completion of the project would be incomplete without the people who made it possible. Their constant guidance and encouragement crowned the efforts with success. I would like to express profound sense of gratitude to the project guide Dr. S.MaruthuPerumal, M.E., Ph.D., Professor & Head of Department, Computer Science & Engineering, N.B.K.R.I.S.T(An Autonomous Institution and affiliated to J.N.T University, Anantapuramu), Vidyanagar, for her masterful guidance and the constant encouragement throughout the project. I sincerely thanks for her suggestions and unmatched services without which this work would have been an unfulfilled dream. I convey my special thanks to Dr. I.GOPAL REDDY respectable chairman of N.B.K.R. Institute of Science and Technology, for providing excellent infrastructure in our campus for the completion of the project. I convey my special thanks to Sri N.RAM KUMAR REDDY respectable correspondent of N.B.K.R. Institute of Science and Technology, for providing excellent infrastructure in our campus for the completion of the project. I would like to convey heartful thanks to Staff members, Lab technicians, our friends, who extended their cooperation in making the project a successful one. I would like to thank one and all who have helped me directly and indirectly to complete the project successfully.
  • 4. TABLE OF CONTENTS Title Page No List of Figures ii List of Tables iii ABSTRACT iv CHAPTER 1: INTRODUCTION 1-16 1.1 What is Mobile Computing 1 1.2 different type of devices used for the mobile Computing 2 1.3 Applications of Mobile computing 2 1.3.1 Vehicles 2 1.3.2 Emergency 2 1.3.3 Business 3 1.4 Benefits of Mobile computing 3 1.5 Advantages of Mobile Computing 3 1.5.1 Location Flexibility 4 1.5.2 SavesTime 4 1.5.3 EnhancedProductivity 4 1.5.4 Ease of Research 4 1.5.5 Entertainment 4 1.5.6 Streamingof BusinessProcesses 5 1.6 WirelessSensorNetworks 5 1.7 Applicationsof WirelessSensorNetworks 6 1.7.1 AreaMonitoring 6
  • 5. 1.7.2 Environmental/EarthMonitoring 6 1.7.3 AirQualityMonitoring 6 1.7.4 InteriorMonitoring 6 1.7.5 ExportMonitoring 7 1.7.6 AirPollutionMonitoring 7 1.7.7 ForestFire Detection 7 1.7.8 Landslide Detection 7 1.7.9 WaterQualityMonitoring 7 1.7.10 Natural DisasterPrevention 8 Title Page. No 1.8 Industrial Monitoring 8 1.8.1 Machine HealthMonitoring 8 1.8.2 Data Logging 8 1.8.3 Industrial SenseandControl Application 8 1.8.4 Waste Water Monitoring 9 1.9 Agriculture Monitoring 9 1.9.1 Passive Localization and Tracking 10 1.9.2 Smart Home Monitoring 11 1.10 Characteristics 11 1.11 Platforms 12 1.11.1 Standard and Specification 12 1.11.2 Hardware 12 1.11.3 Software 13
  • 6. 1.11.4 Operating System 14 1.11.5 Online Collaboration Sensor Data Management Platforms 14 1.11.6 Simulation of WSNs 15 1.12 Other Concepts 15 1.12.1 Distribution Sensor Network 15 1.12.2 Data Integration and Sensor Web 16 1.12.3 In-Network Processing 16 CHAPTER 2: LITERATURE SURVEY 17-20 2.1 Introduction 17 2.2 Literature Survey 17 CHAPTER 3: EXISTING SYSTEM 21-22 3.1 Introduction 21 3.2 Existing System 21 3.3 Limitations of Existing System 22 CHAPTER 4: PROPOSED SYSTEM 23-24 4.1 Overview 23 4.2 Proposed System 23 4.3 Advantages of Proposed System 23 Title Page. No CHAPTER 5: SYSTEM DESIGN 25-34 5.1 Proposed System Architecture 25 5.1.1 Sensor Layer 25 5.1.2 Cluster Head Layer 26
  • 7. 5.1.3 Sencar Layer 26 5.2 UML Diagrams 28 5.2.1 Goals 28 5.2.2 Data FlowDiagram 29 5.2.3 Use Case Diagram 31 5.2.4 ClassDiagram 32 5.2.5 Sequence Diagram 33 5.2.6 ActivityDiagram 34 CHAPTER6: IMPLEMENTATION 35-54 6.1 Overview 35 6.2 Sensor Layer 35 6.2.1. Initialization 36 6.2.2. Status Claim 37 6.2.3. Cluster Forming 39 6.2.4 Synchronization among Cluster Heads 41 6.2.5 Analysis of Load Balanced Clustering Algorithm 42 6.2.6 Examples of LBC Algorithm 43 6.3 Cluster Head Layer 45 6.3.1 Connectivity among CHGs 46 6.3.2 Inter-Cluster Communications 47 6.4 SenCar Layer 49 6.4.1 Properties of Polling Points 49 6.4.2 MU-MIMO Uploading 52 6.4.3 Data Collection with Time Constraints 53 CHAPTER 7: PERFORMANCE AND EVALUTION 55-62 7.1 Overview 55 7.2 Comparision of Energy Consumption and Latency 57 Title Page. No 7.3 Load Balanced and Energy Distribution 58
  • 8. 7.4 Number of Clusters and Energy Overhead 59 7.5 Impact of Maximum No. of Cluster Heads in Each Cluster 60 7.6 Data Collection with Time Constraints 61 CHAPTER 8: CONCLUSIONS AND FUTURE WORKS 63 8.1 Conclusion 63 8.2 Future Works 63 BIBILIOGRAPHY 64 References 64 List of Figures NAME PAGE.NO. Figure 1 Architecture of mobile computing 1 Figure 2 Illustration of the LBC-MIMO Frameworks 25 Figure 3 Data flow Diagram 30 Figure 4 Use case Diagram 31 Figure 5 Class Diagram 32 Figure 6 Sequence Diagram 33 Figure 7 Activity Diagram 34 Figure 8 An Example of LBC Algorithm with M=2 41 Figure 9 An Example of LBC with different parameter settings 45 Figure 10 Maximum distance b/w two neighboring clusters 47 Figure 11 Distribution of polling points 51 Figure 12 Performance Comparision of different data gathering 57 Figure 13 Performance Comparision of proposed framework 60 Figure 14 Evaluation of data collection with time constraints 61
  • 9. List of Tables NAME PAGE.NO. Table 1 Notations 36 Table 2 Travelling cost without time constraints 62 ABSTRACT A three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-MIMO. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy- saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, SenCar can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC-MIMO scheme. The results show that when each cluster has at most two cluster heads, LBC-MIMO achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi- hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering.
  • 10. CHAPTER-1 INTRODUCTION 1.1. WHAT IS MOBILE COMPUTING? Mobile computing is the discipline for creating an information management platform, which is free from spatial and temporal constraints. The freedom from these constraints allows its users to access and process desired information from anywhere in the space. The state of the user, static or mobile, does not affect the information management capability of the mobile platform. A user can continue to access and manipulate desired data while traveling on plane, in car, on ship, etc. Thus, the discipline creates an illusion that the desired data and sufficient processing power are available on the spot, where as in reality they may be located far away. Otherwise Mobile computing is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are. Fig.1.Architecture of mobile computing 1.2. DIFFERENT TYPES OF DEVICES USED FOR THE MOBILE COMPUTING 1. Personal digital assistant/enterprise digital assistant 2. Smartphones 3. Tablet computers 4. Netbooks 5. Ultra-mobile PCs
  • 11. 6. Wearable computers 7. Palmtops/pocket computers 1.3. APPLICATIONS OF MOBILE COMPUTING 1.3.1. Vehicles Tomorrow’s cars will comprise many wireless communication systems and mobility aware applications. Music, news, road conditions, weather reports, and other broadcast information are received via digital audio broadcasting (DAB) with 1.5 M-bits/s. For personal communication, a global system for mobile communications (GSM) phone might be available offering voice and data connectivity with 384 k-bits/s. For remote areas satellite communication can be used, while the current position of the car is determined via global positioning system (GPS). Additionally, cars driving in the same area build a local ad-hoc network for fast information exchange in emergency situations or to help each other keeping a safe distance. In case of an accident, not only will the airbag be triggered, but also an emergency call to a service provider informing ambulance and police. Cars with this technology are already available. Future cars will also inform other cars about accidents via the ad hoc network to help them slowdown in time, even before a driver can recognize the accident. Buses, trucks, and train are already transmitting maintenance and logistic information to their home base, which helps o improve organization (fleet management), and thus save time and money 1.3.2. Emergency Just imagine the possibilities of an ambulance with a high quality wireless connection to a hospital. After an accident, vital information about injured persons can be sent to the hospital immediately. There, all necessary steps for this particular type of accident can be prepared or further specialists can be consulted for an early diagnosis. Furthermore, wireless networks are the only means of communication in the case of natural disasters such as hurricanes or earthquakes. 1.3.3. Business Today’s typical traveling salesman needs instant access to the company’s database: to ensure that the files on his or her laptop reflect the actual state, to enable the company to keep track of all activities of their traveling employees, to keep databases consistent etc., with wireless access, the laptop can be turned into a true mobile office. 1.4. BENEFITS OF MOBILE COMPUTING  Improve business productivity by streamlining interaction and taking advantage of immediate access  Reduce business operations costs by increasing supply chain visibility, optimizing logistics and accelerating processes
  • 12.  Strengthen customer relationships by creating more opportunities to connect, providing information at their fingertips when they need it most  Gain competitive advantage by creating brand differentiation and expanding customer experience  Increase work force effectiveness and capability by providing on-the-go access  Improve business cycle processes by redesigning work flow to utilize mobile devices that interface with legacy applications 1.5. ADVANTAGES OF MOBILE COMPUTING Mobile computing has changed the complete landscape of human being life. Following are the clear advantages of Mobile Computing. 1.5.1. Location Flexibility This has enabled user to work from anywhere as long as there is a connection established. A user can work without being in a fixed position. Their mobility ensures that they are able to carry out numerous tasks at the same time perform their stated jobs. 1.5.2. Saves Time The time consumed or wasted by travelling from different locations or to the office and back, have been slashed. One can now access all the important documents and files over a secure channel or portal and work as if they were on their computer. It has enhanced telecommuting in many companies. This also reduces unnecessary expenses that might be incurred. 1.5.3. Enhanced Productivity Productive nature has been boosted by the fact that a worker can simply work efficiently and effectively from which ever location they see comfortable and suitable. Users are able to work with comfortable environments. 1.5.4. Ease of research Research has been made easier, since users will go to the field and search for facts and feed them back to the system. It has also made it easier for field officer and researchers to collect and feed data from wherever they without making unnecessary trip to and from the office to the field. 1.5.5. Entertainment Video and audio recordings can now be streamed on the go using mobile computing. It's easy to access a wide variety of movies, educational and informative material. With the improvement and availability of high speed data connections at considerable costs, one is able to get all the entertainment they want as they browser the internet for streamed data. One
  • 13. can be able to watch news, movies, and documentaries among other entertainment offers over the internet. This was not such before mobile computing dawned on the computing world. 1.5.6. Streamlining Of Business Processes Business processes are now easily available through secured connections. Basing on the factor of security, adequate measures have been put in place to ensure authentication and authorization of the user accessing those services. Some business functions can be run over secure links and also the sharing of information between business partners. Also it's worth noting that lengthy travelling has been reduced, since there is the use of voice and video conferencing. Meetings, seminars and other informative services can be conducted using the video and voice conferencing. This cuts down on travel time and expenditure. 1.6. WIRELESS SENSOR NETWORK A wireless sensornetwork (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. The WSN is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding. 1.7. APPLICATIONS OF WIRELESS SENSOR NETWORKS 1.7.1. Area Monitoring
  • 14. Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed over a region where some phenomenon is to be monitored. A military example is the uses of sensors detect enemy intrusion; a civilian example is the geo-fencing of gas or oil pipelines. 1.7.2. Environmental/Earth Monitoring The term Environmental Sensor Networks has evolved to cover many applications of WSNs to earth science research. This includes sensing volcanoes, oceans, glaciers, forests, etc. Some of the major areas are listed below. 1.7.3. Air Quality Monitoring The degree of pollution in the air has to be measured frequently in order to safeguard people and the environment from any kind of damages due to air pollution. In dangerous surroundings, real time monitoring of harmful gases is an important process because the weather can change rapidly changing key quality parameters. 1.7.4. Interior Monitoring Observing the gas levels at vulnerable areas needs the usage of high-end, sophisticated equipment, capable to satisfy industrial regulations. Wireless internal monitoring solutions facilitate keep tabs on large areas as well as ensure the precise gas concentration degree. 1.7.5. Exterior Monitoring External air quality monitoring needs the use of precise wireless sensors, rain & wind resistant solutions as well as energy reaping methods to assure extensive liberty to machine that will likely have tough access. 1.7.6. Air Pollution Monitoring Wireless sensor networks have been deployed in several cities (Stockholm, London and Brisbane) to monitor the concentration of dangerous gases for citizens. These can take advantage of the ad hoc wireless links rather than wired installations, which also make them more mobile for testing readings in different areas. There are various architectures that can be used for such applications as well as different kinds of data analysis and data mining that can be conducted. 1.7.7. Forest Fire Detection A network of Sensor Nodes can be installed in a forest to detect when a fire has started. The nodes can be equipped with sensors to measure temperature, humidity and gases which are produced by fire in the trees or vegetation. The early detection is crucial for a successful action of the fire fighters; thanks to Wireless Sensor Networks, the fire brigade will be able to know when a fire is started and how it is spreading. 1.7.8. Landslide Detection
  • 15. A landslide detection system makes use of a wireless sensor network to detect the slight movements of soil and changes in various parameters that may occur before or during a landslide. Through the data gathered it may be possible to know the occurrence of landslides long before it actually happens. 1.7.9. Water Quality Monitoring Water quality monitoring involves analyzing water properties in dams, rivers, lakes & oceans, as well as underground water reserves. The use of many wireless distributed sensors enables the creation of a more accurate map of the water status, and allows the permanent deployment of monitoring stations in locations of difficult access, without the need of manual data retrieval. 1.7.10. Natural DisasterPrevention Wireless sensor networks can effectively act to prevent the consequences of natural disasters, like floods. Wireless nodes have successfully been deployed in rivers where changes of the water levels have to be monitored in real time. 1.8. INDUSTRIAL MONITORING 1.8.1. Machine Health Monitoring Wireless sensor networks have been developed for machinery condition-based maintenance (CBM) as they offer significant cost savings and enable new functionality. In wired systems, the installation of enough sensors is often limited by the cost of wiring. Previously inaccessible locations, rotating machinery, hazardous or restricted areas, and mobile assets can now be reached with wireless sensors. 1.8.2. Data Logging Wireless sensor networks are also used for the collection of data for monitoring of environmental information; this can be as simple as the monitoring of the temperature in a fridge to the level of water in overflow tanks in nuclear power plants. The statistical information can then be used to show how systems have been working. The advantage of WSNs over conventional loggers is the "live" data feed that is possible 1.8.3. Industrial Sense and Control Applications In recent research a vast number of wireless sensor network communication protocols have been developed. While previous research was primarily focused on power awareness, more recent research have begun to consider a wider range of aspects, such as wireless link reliability, real-time capabilities, or quality-of-service. These new aspects are considered as an enabler for future applications in industrial and related wireless sense and control applications, and partially replacing or enhancing conventional wire-based networks by WSN techniques. 1.8.4. Water/Waste Water Monitoring
  • 16. Monitoring the quality and level of water includes many activities such as checking the quality of underground or surface water and ensuring a country’s water infrastructure for the benefit of both human and animal. The area of water quality monitoring utilizes wireless sensor networks and many manufacturers have launched fresh and advanced applications for the purpose.  Observation Of Water Quality The whole process includes examining water properties in rivers, dams, oceans, lakes and also in underground water resources. Wireless distributed sensors let users to make a precise map of the water condition as well as making permanent distribution of observing stations in areas of difficult access with no manual data recovery.  Water Distribution Network Management Manufacturers of water distribution network sensors concentrate on observing the water management structures such as valve and pipes and also making remote access to water meter readings.  Preventing Natural Disaster The consequences of natural perils like floods can be effectively prevented with wireless sensor networks. Wireless nodes are distributed in rivers so that changes of the water level can be effectively monitored. 1.9. AGRICULTURE MONITORING Using wireless sensor networks within the agricultural industry is increasingly common; using a wireless network frees the farmer from the maintenance of wiring in a difficult environment. Gravity feed water systems can be monitored using pressure transmitters to monitor water tank levels, pumps can be controlled using wireless I/O devices and water use can be measured and wirelessly transmitted back to a central control center for billing. Irrigation automation enables more efficient water use and reduces waste.  Accurate Agriculture Wireless sensor networks let users to make precise monitoring of the crop at the time of its growth. Hence, farmers can immediately know the state of the item at all its stages which will ease the decision process regarding the time of harvest.  Irrigation Management When real time data is delivered, farmers are able to achieve intelligent irrigation. Data regarding the fields such as temperature level and soil moisture are delivered to farmers
  • 17. through wireless sensor networks. When each plant is joined with a personal irrigation system, farmers can pour the precise amount of water each plant needs and hence, reduce the cost and improve the quality of the end product. The networks can be employed to manage various actuators in the systems using no wired infrastructure.  Greenhouses Wireless sensor networks are also used to control the temperature and humidity levels inside commercial greenhouses. When the temperature and humidity drops below specific levels, the greenhouse manager must be notified via e-mail or cell phone text message, or host systems can trigger misting systems, open vents, turn on fans, or control a wide variety of system responses. Recent research in wireless sensor networks in agriculture industry give emphasis on its use in greenhouses, particularly for big exploitations with definite crops. Such microclimatic ambiances need to preserve accurate weather status at all times. Moreover, using multiple distributed sensors will better control the above process, in open surface as well as in the soil. 1.9.1. Passive Localization And Tracking The application of WSN to the passive localization and tracking of non-cooperative targets (i.e., people not wearing any tag) has been proposed by exploiting the pervasive and low-cost nature of such technology and the properties of the wireless links which are established in a meshed WSN infrastructure. 1.9.2. Smart Home Monitoring Monitoring the activities performed in a smart home is achieved using wireless sensors embedded within everyday objects forming a WSN. State changes to objects based on human manipulation are captured by the wireless sensors network enabling activity-support services. 1.10. CHARACTERISTICS  Power consumption constrains for nodes using batteries or energy harvesting.  Ability to cope with node failures.  Mobility of nodes.  Communication failures.  Heterogeneity of nodes.  Scalability to large scale of deployment.
  • 18.  Ability to withstand harsh environmental conditions.  Ease of use. Sensor nodes can be imagined as small computers, extremely basic in terms of their interfaces and their components. They usually consist of a processing unit with limited computational power and limited memory, sensors or MEMS (including specific conditioning circuitry), a communication device (usually radio transceivers or alternatively optical), and a power source usually in the form of a battery. Other possible inclusions are energy harvesting modules, secondary ASICs, and possibly secondary communication interface (e.g. RS-232 or USB). The base stations are one or more components of the WSN with much more computational, energy and communication resources. They act as a gateway between sensor nodes and the end user as they typically forward data from the WSN on to a server. Other special components in routing based networks are routers, designed to compute, calculate and distribute the routing tables. 1.11. PLATFORMS 1.11.1. Standards And Specifications Several standards are currently either ratified or under development by organizations including WAVE2M for wireless sensor networks. There are a number of standardization bodies in the field of WSNs. The IEEE focuses on the physical and MAC layers; the Internet Engineering Task Force works on layers 3 and above. In addition to these, bodies such as the International Society of Automation provide vertical solutions, covering all protocol layers. Finally, there are also several non-standard, proprietary mechanisms and specifications. Standards are used far less in WSNs than in other computing systems which makes most systems incapable of direct communication between different systems. However predominant standards commonly used in WSN communications include:  ISA100.11a  Wireless HART  IEEE 1451  ZigBee / 802.15.4  ZigBee IP  6LoWPAN
  • 19. 1.11.2. Hardware One major challenge in a WSN is to produce low cost and tiny sensor nodes. There are an increasing number of small companies producing WSN hardware and the commercial situation can be compared to home computing in the 1970s. Many of the nodes are still in the research and development stage, particularly their software. Also inherent to sensor network adoption is the use of very low power methods for data acquisition. In many applications, a WSN communicates with over a Local Area Network or Wide Area Network through a gateway. The Gateway acts as a bridge between the WSN and the other network. This enables data to be stored and processed by device with more resources, for example in a remotely located Server_ (computing). 1.11.3. Software Energy is the scarcest resource of WSN nodes, and it determines the lifetime of WSNs. WSNs are meant to be deployed in large numbers in various environments, including remote and hostile regions, where ad hoc communications are a key component. For this reason, algorithms and protocols need to address the following issues:  Lifetime maximization  Robustness and fault tolerance  Self-configuration Lifetime maximization: Energy/Power Consumption of the sensing device should be minimized and sensor nodes should be energy efficient since their limited energy resource determines their lifetime. To conserve power the node should shut off the radio power supply when not in use. Some of the important topics in WSN (Wireless Sensor Networks) software research are:  Operating systems  Security  Mobility 1.11.4. Operating Systems Operating systems for wireless sensor network nodes are typically less complex than general- purpose operating systems. They more strongly resemble embedded systems, for two reasons. First, wireless sensor networks are typically deployed with a particular application in mind, rather than as a general platform. Second, a need for low costs and low power leads most
  • 20. wireless sensor nodes to have low-power microcontrollers ensuring that mechanisms such as virtual memory are either unnecessary or too expensive to implement. It is therefore possible to use embedded operating systems such as eCos or uC/OS for sensor networks. However, such operating systems are often designed with real-time properties. TinyOS is perhaps the first operating system specifically designed for wireless sensor networks. TinyOS is based on an event-driven programming model instead of multithreading. TinyOS programs are composed of event handlers and tasks with run-to-completion semantics. When an external event occurs, such as an incoming data packet or a sensor reading, TinyOS signals the appropriate event handler to handle the event. Event handlers can post tasks that are scheduled by the TinyOS kernel some time later. LiteOS is a newly developed OS for wireless sensor networks, which provides UNIX-like abstraction and support for the C programming language. Contiki is an OS which uses a simpler programming style in C while providing advances such as 6LoWPAN and Protothreads. RIOT implements a microkernel architecture. It provides multithreading with standard API and allows for development in C/C++. RIOT supports common IoT protocols such as 6LoWPAN, IPv6, RPL, TCP, and UDP. 1.11.5. Online Collaborative Sensor Data Management Platforms Online collaborative sensor data management platforms are on-line database services that allow sensor owners to register and connect their devices to feed data into an online database for storage and also allow developers to connect to the database and build their own applications based on that data. Examples include Xively and the Wikisensing platform. Such platforms simplify online collaboration between users over diverse data sets ranging from energy and environment data to that collected from transport services. Other services include allowing developers to embed real-time graphs & widgets in websites; analyse and process historical data pulled from the data feeds; send real-time alerts from any data stream to control scripts, devices and environments. The architecture of the Wiki sensing system is described in [21] describes the key components of such systems to include APIs and interfaces for online collaborators, a middleware containing the business logic needed for the sensor data management and processing and a storage model suitable for the efficient storage and retrieval of large volumes of data. 1.11.6. Simulation of WSNs At present, agent-based modelling and simulation is the only paradigm which allows the simulation of complex behaviour in the environments of wireless sensors (such as flocking). Agent-based simulation of wireless sensor and ad hoc networks is a relatively new paradigm. Agent-based modelling was originally based on social simulation.
  • 21. Network simulators like OPNET, NetSim, NS2 and OMNeT can be used to simulate a wireless sensor network. 1.12. OTHER CONCEPTS 1.12.1. Distributed Sensor Network If a centralized architecture is used in a sensor network and the central node fails, then the entire network will collapse, however the reliability of the sensor network can be increased by using distributed control architecture. Distributed control is used in WSNs for the following reasons: 1. Sensor nodes are prone to failure, 2. For better collection of data 3. To provide nodes with backup in case of failure of the central node There is also no centralized body to allocate the resources and they have to be self- organized. 1.12.2. Data Integration and Sensor Web The data gathered from wireless sensor networks is usually saved in the form of numerical data in a central base station. Additionally, the Open Geospatial Consortium (OGC) is specifying standards for interoperability interfaces and metadata encodings that enable real time integration of heterogeneous sensor webs into the Internet, allowing any individual to monitor or control Wireless Sensor Networks through a Web Browser. 1.12.3. In-Network Processing To reduce communication costs some algorithms remove or reduce nodes redundant sensor information and avoid forwarding data that is of no use. As nodes can inspect the data they forward they can measure averages or directionality for example of readings from other nodes. CHAPTER-2 LITERATURE SURVEY 2.1. OVERVIEW The proliferation of the implementation for low-cost, low-power, multifunctional sensors has made wireless sensor networks (WSNs) a prominent data collection paradigm for extracting local measures of interests. In such applications, sensors are generally densely deployed and
  • 22. randomly scattered over a sensing field and left unattended after being deployed, which makes it difficult to recharge or replace their batteries. After sensors form into autonomous organizations, those sensors near the data sink typically deplete their batteries much faster than others due to more relaying traffic. When sensors around the data sink deplete their energy, network connectivity and coverage may not be guaranteed. Due to these constraints, it is crucial to design an energy-efficient data collection scheme that consumes energy uniformly across the sensing field to achieve long network lifetime. Furthermore, as sensing data in some applications are time-sensitive, data collection may be required to be performed within a specified time frame. Therefore, an efficient, large-scale data collection scheme should aim at good scalability, long network lifetime and low data latency. 2.2. LITERATURE SURVEY 1. W. C. Cheng, C. Chou, L. Golubchik, S. Khuller, and Y. C. Wan. We consider the problem of collecting a large amount of data from several different hosts to a single destination in a wide-area network. This problem is important since improvements in data collection times in many applications such as wide-area upload applications, high- performance computing applications, and data mining applications are crucial to performance of those applications. Often, due to congestion conditions, the paths chosen by the network may have poor throughput. By choosing an alternate route at the application level, we may be able to obtain substantially faster completion time. This data collection problem is a nontrivial one because the issue is not only to avoid congested link(s), but to devise a coordinated transfer schedule which would afford maximum possible utilization of available network resources. Our approach for computing coordinated data collection schedules makes no assumptions about knowledge of the topology of the network or the capacity available on individual links of the network. This approach provides significant performance improvements under various degrees and types of network congestions. To show this, we give a comprehensive comparison study of the various approaches to the data collection problem which considers performance, robustness, and adaptation characteristics of the different data collection methods. The adaptation to network conditions characteristics are important as the above applications are long lasting, i.e., it is likely changes in network conditions will occur during the data transfer process. In general, our approach can be used for solving arbitrary data movement problems over the Internet. We use the Bistro platform to illustrate one application of our techniques. 2. K.Xu, H.Hassanein, G.Takahara, and Q.Wang. In a heterogeneous wireless sensor network (WSN), relay nodes (RNs) are adopted to relay data packets from sensor nodes (SNs) to the base station (BS). The deployment of the RNs can have a significant impact on connectivity and lifetime of a WSN system. This paper studies the effects of random deployment strategies. We first discuss the biased energy consumption rate problem associated with uniform random deployment. This problem leads to insufficient energy utilization and shortened network lifetime. To overcome this problem, we propose two new random deployment strategies, namely, the lifetime-oriented deployment and hybrid deployment. The former solely aims at balancing the energy consumption rates of RNs across the network, thus extending the system lifetime. However, this deployment scheme may not
  • 23. provide sufficient connectivity to SNs when the given number of RNs is relatively small. The latter reconciles the concerns of connectivity and lifetime extension. Both single-hop and multihop communication models are considered in this paper. With a combination of theoretical analysis and simulated evaluation, this study explores the trade-off between connectivity and lifetime extension in the problem of RN deployment. It also provides a guideline for efficient deployment of RNs in a large-scale heterogeneous WSN 3. O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis. Most sensor networks are used to collect information from the physical world. Examples include sensor networks deployed to monitor micro-climates in agriculture farms and deployments that measure energy consumption in office or residential buildings. The nodes in these networks collect information about the physical world using their sensors and relay the sensor readings to a central base station or server using multi-hop wireless communication. Collecting information reliably and efficiently from the nodes in a sensor network is a challenging problem, particularly due to the wireless dynamics. Multihop routing in a dynamic wireless environment requires that a protocol can adapt quickly to the changes in the network (agility) while the energy-constrains of sensor networks dictate that such mechanisms not require too much communication among the nodes (efficiency). CTP is a collection routing protocol that achieves both agility and efficiency, while offering highly reliable data delivery in sensor networks. CTP has been used in research, teaching, and in commercial products. Experiences with CTP have also informed the design of the IPv6 Routing Protocol for Low power and Lossy Networks (RPL). 4. E. Lee, S. Park, F. Yu, and S.-H. Kim. Most existing geographic routing protocols on sensor networks concentrates on finding ways to guarantee data forwarding from the source to the destination, and not many protocols have been done on gathering and aggregating data of sources in a local and adjacent region. However, data generated from the sources in the region are often redundant and highly correlated. Accordingly, gathering and aggregating data from the region in the sensor networks is important and necessary to save the energy and wireless resources of sensor nodes. We introduce the concept of a local sink to address this issue in geographic routing. The local sink is a sensor node in the region, in which the sensor node is temporarily selected by a global sink for gathering and aggregating data from sources in the region and delivering the aggregated data to the global sink. We next design a Single Local Sink Model for determining optimal location of single local sink. Because the buffer size of a local sink is limited and the deadline of data is constrained, single local sink is capable of carrying out many sources in a large-scale local and adjacent region. Hence, we also extend the Single Local Sink Model to a Multiple Local Sinks Model. We next propose a data gathering mechanism that gathers data in the region through the local sink and delivers the aggregated data to the global sink. Simulation results show that the proposed mechanism is more efficient in terms of the energy consumption, the data delivery ratio, and the deadline miss ratio than the existing mechanisms.
  • 24. 5. Y.Wu, Z.Mao, S.Fahmy, and N.Shroff. Energy efficiency is critical for wireless sensor networks. The data-gathering process must be carefully designed to conserve energy and extend network lifetime. For applications where each sensor continuously monitors the environment and periodically reports to a base station, a tree-based topology is often used to collect data from sensor nodes. In this work, we first study the construction of a data- gathering tree when there is a single base station in the network. The objective is to maximize the network lifetime, which is defined as the time until the first node depletes its energy. The problem is shown to be NP-complete. We design an algorithm that starts from an arbitrary tree and iteratively reduces the load on bottleneck nodes (nodes likely to soon deplete their energy due to high degree or low remaining energy). We then extend our work to the case when there are multiple base stations and study the construction of a maximum-lifetime data- gathering forest. We show that both the tree and forest construction algorithms terminate in polynomial time and are provably near optimal. We then verify the efficacy of our algorithms via numerical comparisons. CHAPTER-3 EXISTING SYSTEM 3.1. INTRODUCTION The proliferation of the implementation for low-cost, low-power, multifunctional sensors has made wireless sensor networks (WSNs) a prominent data collection paradigm for extracting local measures of interests. In such applications, sensors are generally densely deployed and randomly scattered over a sensing field and left unattended after being deployed, which makes it difficult to recharge or replace their batteries. After sensors form into autonomous organizations, those sensors near the data sink typically deplete their batteries much faster than others due to more relaying traffic. When sensors around the data sink deplete their energy, network connectivity and coverage may not be guaranteed. Due to these constraints, it is crucial to design an energy-efficient data collection scheme that consumes energy uniformly across the sensing field to achieve long network lifetime. Furthermore, as sensing data in some applications are time-sensitive, data collection may be required to be performed within a specified time frame. Therefore, an efficient, large-scale data collection scheme should aim at good scalability, long network lifetime and low data latency. 3.2. EXISTING SYSTEM  Several approaches have been proposed for efficient data collection in the literature. Based on the focus of these works, we can roughly divide them into three categories.  The first category is the enhanced relay routing, in which data are relayed among sensors. Besides relaying, some other factors, such as load balance, schedule pattern and data redundancy, are also considered.
  • 25.  The second category organizes sensors into clusters and allows cluster heads to take the responsibility for forwarding data to the data sink. Clustering is particularly useful for applications with scalability requirement and is very effective in local data aggregation since it can reduce the collisions and balance load among sensors.  The third category is to make use of mobile collectors to take the burden of data routing from sensors. 3.3. LIMITATIONS OF EXISTING SYSTEM  In relay routing schemes, minimizing energy consumption on the forwarding path does not necessarily prolong network lifetime, since some critical sensors on the path may run out of energy faster than others.  In cluster-based schemes, cluster heads will inevitably consume much more energy than other sensors due to handling intra-cluster aggregation and inter-cluster data forwarding.  Though using mobile collectors may alleviate non-uniform energy consumption, it may result in unsatisfactory data collection latency. CHAPTER-4 PROPOSED SYSTEM 4.1. OVERVIEW Based on the above observations, we propose a three-layer mobile data collection framework, named Load Balanced Clustering and Multiple Data Uploading (LBC-MIMO). The main motivation is to utilize distributed clustering for scalability, to employ mobility for energy saving and uniform energy consumption, and to exploit Multi-User Multiple-Input and Multiple-Output (MU-MIMO) technique for concurrent data uploading to shorten latency. 4.2. PROPOSEDSYSTEM:  First, we propose a distributed algorithm to organize sensors into clusters, where each cluster has multiple cluster heads.  Second, multiple cluster heads within a cluster can collaborate with each other to perform energy efficient inter-cluster transmissions.  Third, we deploy a mobile collector with two antennas (called Sencar in this paper) to allow concurrent uploading from two cluster heads by using MU-MIMO communication. The Sencar collects data from the cluster heads by visiting each cluster.
  • 26. It chooses the stop locations inside each cluster and determines the sequence to visit them, such that data collection can be done in minimum time. 4.3. ADVANTAGES OF PROPOSEDSYSTEM  In contrast to clustering techniques proposed in previous works, our algorithm balances the load of intra-cluster aggregation and enables dual data uploading between multiple cluster heads and the mobile collector.  Different from other hierarchical schemes, in our algorithm, cluster heads do not relay data packets from other clusters, which effectively alleviate the burden of each cluster head. Instead, forwarding paths among clusters are only used to route small-sized identification (ID) information of cluster heads to the mobile collector for optimizing the data collection tour.  Our work mainly distinguishes from other mobile collection schemes in the utilization of MUMIMO technique, which enables dual data uploading to shorten data transmission latency. We coordinate the mobility of Sencar to fully enjoy the benefits of dual data uploading, which ultimately leads to a data collection tour with both short moving trajectory and short data uploading time. CHAPTER-5 SYSTEM DESIGN 5.1. PROPOSEDSYTSTEMARCHITECTURE An overview of LBC-MIMO Uploading framework is depicted in which consists of three layers: 1. Sensor Layer, 2. Cluster Head Layer 3. Sencar Layer.
  • 27. Fig.2. Illustration of the LBC-MIMO framework. 5.1.1. Sensor Layer In this sensor layer is the bottom and basic layer. For generality, we do not make any assumptions on sensor distribution or node capability, such as location-awareness. Each sensor is assumed to be able to communicate only with its neighbours, i.e., the nodes within its transmission range. During initialization, sensors are self-organized into clusters. Each sensor decides to be either a cluster head or a cluster member in a distributed manner. In the end, sensors with higher residual energy would become cluster heads and each cluster has at most M cluster heads, where M is a system parameter. For convenience, the multiple cluster heads within a cluster are called a cluster head group (CHG), with each cluster head being the peer of others. The algorithm constructs clusters such that each sensor in a cluster is onehop away from at least one cluster head. The benefit of such organization is that the intra-cluster aggregation is limited to a single hop. In the case that a sensor may be covered by multiple cluster heads in a CHG, it can be optionally affiliated with one cluster head for load balancing. To avoid collisions during data aggregation, the CHG adopts time-division-multiple-access (TDMA) based technique to coordinate communications between sensor nodes. Right after the cluster heads are elected, the nodes synchronize their local clocks via beacon messages. For example, all the nodes in a CHG could adjust their local clocks based on that of the node with the highest residual energy. After local synchronization is done, an existing scheduling scheme can be adopted to gather data from cluster members. Note that only intra-cluster synchronization is needed here because data are collected via SenCar. In the case of imperfect
  • 28. synchronization, some hybrid techniques to combine TDMA with contention-based access protocols (Carrier Sense Multiple Access (CSMA)) that listen to the medium before transmitting are required. For example, hybrid protocols like Z-MAC can be utilized to enhance the strengths and offset the weaknesses of TDMA and CSMA. Uponthe arrival of Sencar, each CHG uploads buffered data via MU-MIMO communications and synchronizes its local clocks with the global clock on Sencar via acknowledgement messages. Finally, periodical re- clustering is performed to rotate cluster heads among sensors with higher residual energy to avoid draining energy from clusterheads. 5.1.2. Cluster Head Layer The cluster head layer consists of all the cluster heads. As aforementioned, inter-cluster forwarding is only used to send the CHG information of each cluster to Sencar, which contains an identification list of multiple cluster heads in a CHG. Such information must be sent before SenCar departs for its data collection tour. Upon receiving this information, SenCar utilizes it to determine where to stop within each cluster to collect data from its CHG. To guarantee the connectivity for inter-cluster communication, the cluster heads in a CHG can cooperatively send out duplicated information to achieve spatial diversity, which provides reliable transmissions and energy saving. Moreover, cluster heads can also adjust their output power for a desirable transmission range to ensure a certain degree of connectivity among clusters. 5.1.3. Sencar Layer The top layer is the SenCar layer, which mainly manages mobility of SenCar. There are two issues to be addressed at this layer. First, we need to determine the positions where SenCar would stop to communicate with cluster heads when it arrives at a cluster. In LBC-MIMO, SenCar communicates with cluster heads via single-hop transmissions. It is equipped with two antennas while each sensor has a single antenna and is kept as simple as possible. The traffic pattern of data uploading in a cluster is many-to-one, where data from multiple cluster heads converge to SenCar. Equipped with two receiving antennas, each time SenCar makes dual data uploading whenever possible, in which two cluster heads can upload data simultaneously. By processing the received signals with filters based on channel state information, SenCar can successfully separate and decode the information from distinct cluster heads. To collect data as fast as possible, SenCar should stop at positions inside a cluster that can achieve maximum capacity. In theory, since SenCar is mobile, it has the freedom to choose any preferred position. However, this is infeasible in practice, because it is very hard to estimate
  • 29. channel conditions for all possible positions. Thus, we only consider a finite set of locations. To mitigate the impact from dynamic channel conditions, SenCar measures channel state information before each data collection tour to select candidate locations for data collection. We call these possible locations SenCar can stop to perform concurrent data collections polling points. In fact, SenCar does not have to visit all the polling points. Instead, it calculates some polling points which are accessible and we call them selected polling points. In addition, we need to determine the sequence for SenCar to visit these selected polling points such that data collection latency is minimized. Since SenCar has pre-knowledge about the locations of polling points, it can find a good trajectory by seeking the shortest route that visits each selected polling point exactly once and then returns to the data sink. The proposed framework aims to achieve great energy saving and shortened data collection latency, which has the potential for different types of data services. Although traditional designs of WSNs can support low-rate data services, more and more sensing applications nowadays require high-definition pictures and audio/video recording, which has become an overwhelming trend for next generation sensor designs. For example, in the scenario of military defense, sensors deployed in reconnaissance missions need to transmit back high-definition images to identify hostile units. Delays in gathering sensed data may not only expose sensors or mobile collector to enemy surveillance but also depreciate the time value of gathered intelligence. Using MU-MIMO can greatly speed up data collection time and reduce the overall latency. Another application scenario emerges in disaster rescue. For example, to combat forest fire, sensor nodes are usually deployed densely to monitor the situation. These applications usually involve hundreds of readings in a short period (a large amount of data) and are risky for human being to manually collect sensed data. A mobile collector equipped with multiple antennas overcomes these difficulties by reducing data collection latency and reaching hazard regions not accessible by human being. Although employing mobility may elongate the moving time, data collection time would become dominant or at least comparable to moving time for many high-rate or densely deployed sensing applications. In addition, using the mobile data collector can successfully obtain data even from disconnected regions and guarantee that all of the generated data are collected. 5.2. UML DIAGRAMS
  • 30. UML stands for Unified Modeling Language. UML is a standardized general-purpose modeling language in the field of object-oriented software engineering. The standard is managed, and was created by, the Object Management Group. The goal is for UML to become a common language for creating models of object oriented computer software. In its current form UML is comprised of two major components: a Meta- model and a notation. In the future, some form of method or process may also be added to; or associated with, UML. The Unified Modeling Language is a standard language for specifying, Visualization, Constructing and documenting the artifacts of software system, as well as for business modeling and other non-software systems. The UML represents a collection of best engineering practices that have proven successful in the modeling of large and complex systems. The UML is a very important part of developing objects oriented software and the software development process. The UML uses mostly graphical notations to express the design of software projects. 5.2.1. Goals The Primary goals in the design of the UML are as follows: 1. Provide users a ready-to-use, expressive visual modeling Language so that they can develop and exchange meaningful models. 2. Provide extendibility and specialization mechanisms to extend the core concepts. 3. Be independent of particular programming languages and development process. 4. Provide a formal basis for understanding the modeling language. 5. Encourage the growth of OO tools market. 6. Support higher level development concepts such as collaborations, frameworks, patterns and components. 7. Integrate best practices. 5.2.2. Data Flow Diagram 1. The DFD is also called as bubble chart. It is a simple graphical formalism that can be used to represent a system in terms of input data to the system, various processing carried out on this data, and the output data is generated by this system.
  • 31. 2. The data flow diagram (DFD) is one of the most important modeling tools. It is used to model the system components. These components are the system process, the data used by the process, an external entity that interacts with the system and the information flows in the system. 3. DFD shows how the information moves through the system and how it is modified by a series of transformations. It is a graphical technique that depicts information flow and the transformations that are applied as data moves from input to output. 4. DFD is also known as bubble chart. A DFD may be used to represent a system at any level of abstraction. DFD may be partitioned into levels that represent increasing information flow and functional detail.
  • 32. Fig.3. Data Flow Diagram 5.2.3. Use Case Diagram A use case diagram in the Unified Modelling Language (UML) is a type of behavioural diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals (represented as use cases), and any dependencies between those use cases. The main purpose of a use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted.
  • 33. Fig.4. Use Case Diagram 5.2.4. Class Diagram In software engineering, a class diagram in the Unified Modelling Language (UML) is a type of static structure diagram that describes the structure of a system by showing the system's classes, their attributes, operations (or methods), and the relationships among the classes. It explains which class contains information.
  • 34. Fig.5. Class Diagram 5.2.5. Sequence Diagram A sequence diagram in Unified Modelling Language (UML) is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart. Sequence diagrams are sometimes called event diagrams, event scenarios, and timing diagrams.
  • 35. Fig.6. Sequence Diagram 5.2.6. Activity Diagram Activity diagrams are graphical representations of workflows of stepwise activities and actions with support for choice, iteration and concurrency. In the Unified Modelling Language, activity diagrams can be used to describe the business and operational step-by-step workflows of components in a system. An activity diagram shows the overall flow of control.
  • 37. CHAPTER-6 IMPLEMENTATION 6.1. OVERVIEW An overview of LBC-MIMO framework which consists of three layers: 1. Sensor Layer, 2. Cluster Head Layer 3. SenCar Layer 6.2. SENSORLAYER In this section, we present the distributed load balanced clustering algorithm at the sensor layer. The essential operation of clustering is the selection of cluster heads. To prolong network lifetime, we naturally expect the selected cluster heads are the ones with higher residual energy. Hence, we use the percentage of residual energy of each sensor as the initial clustering priority. Assume that a set of sensors, denoted by S= {s1, s2...Sn} are homogeneous and each of them independently makes the decision on its status based on local information. After running the LBC algorithm, each cluster will have at most M (>1) cluster heads, which means that the size of CHG of each cluster is no more than M. Each sensor is covered by at least one cluster head inside a cluster. The LBC algorithm is comprised of four phases: 1. Initialization 2. Status claim 3. Cluster forming 4. Cluster head synchronization. We describe the operation through an example in where a total of 10 sensors are labelled with their initial priorities and the connectivity among them is shown by the links between neighboring nodes.
  • 38. 6.2.1. Initialization In the initialization phase, each sensor acquaints itself with all the neighbors in its proximity. If a sensor is an isolated node (i.e., no neighbor exists), it claims itself to be a cluster head and the cluster only contains itself. Otherwise, a sensor, say, si, first sets its status as “tentative” and its initial priority by the percentage of residual energy. Then, si sorts its neighbors by their initial priorities and picks M-1 neighbors with the highest initial priorities, which are temporarily treated as its candidate peers. We denote the set of all the candidate peers of a sensor by A. It implies that once si successfully claims to be a cluster head, its up-to-date candidate peers would also automatically become the cluster heads, and all of them form the CHG of their cluster. si sets its priority by summing up its initial priority with those of its candidate peers. In this way, a sensor can choose its favourable peers along with its status decision. Fig.b depicts the initialization phase of the example, where M is set to 2, which means that each sensor would pick one neighbor with the highest initial priority as its candidate peer.
  • 39. We use the out-going arrow to indicate the choice of each sensor. For instance, s8 is chosen to be the peer of s7 since it is the one with the highest initial priority among all the neighbors of s7. Accordingly, s7 sets its priority to the sum of the initial priorities of s7 and s8. The pseudo- code describing the initialization phase of a sensor is given in Algorithm 1, and notations used in the pseudo-codes are listed in Table 1 for reference. 6.2.2. Status Claim In the second phase, each sensor determines its status by iteratively updating its local information, refraining from promptly claiming to be a cluster head. We use the node degree to control the maximum number of iterations for each sensor. Whether a sensor can finally becomes a cluster head primarily depends on its priority. Specifically, we partition the priority into three zones by two thresholds, th and tm (th > tm), which enable a sensor to declare itself to be a cluster head or member, respectively, before reaching its maximum number of iterations. During the iterations, in some cases, if the priority of a sensor is greater than th or less than tm compared with its neighbors, it can immediately decide its final status and quit from the iteration. We denote the potential cluster heads in the neighborhood of a sensor by a set B. In each iteration, a sensor, say, si, first tries to probabilistically include itself into si.B as a tentative cluster head if it is not in already (Algorithm 2, lines 25). Once successful, a packet includes its node ID and priority will be sent out and the sensors in the proximity will add si as their potential cluster heads upon receiving the packet. Then, si checks its current potential cluster
  • 40. heads. If they do exist, there are two cases for si to make the final status decision, otherwise, si would stay in the tentative status for the next round of iteration. The first case (Algorithm2, lines 8-11) is that si has reached its maximum number of iterations and it prevails over others in si.B with the highest priority. Then si will claim to be a cluster head in this case. We call this process self-driven status transition. Also, si will announce its current candidate peers to be cluster heads by broadcasting a packet including an ID list, which is referred to as the peer-driven status transition. Once a sensor in the neighborhood receives a status packet, it may need to update its status to the cluster head. The detailed description of handling received packets in each sensor can be found in Algorithm 4, Function recv_pkt The second case (Algorithm2, lines11-12) is that si is the one with the lowest priority and there exist some cluster heads in si.B. In this case, if the priority of si is less than or equal to tm, it is clearly not qualified to be a cluster head. Hence, it quits the iteration and claims to be a cluster
  • 41. member. It is safe for such “retirement,” since there are already some cluster heads in its neighborhood and it can optionally affiliate with one of them at a later time. Moreover, when si does not have any potential candidate cluster head in the current iteration and its priority is already high enough (above th), it can immediately claim to be a cluster head (Algorithm2, lines 15-18). Fig.c shows the result of phase II for the example with th and tm set to 1.8 and 0.6, respectively. (s1, s3) and (s8, s9) become the cluster heads while s2 is a cluster member with the lowest priority. Different from the initialization phase, it is also shown that the candidate peers of each sensor have been updated. For example, sensor s5 is still tentative at the end of phase II, which initially considered s9 as its candidate peer, but later switched to s10 as its new peer when s9 reached its final status. 6.2.3. Cluster Forming The third phase is cluster forming that decides which cluster head a sensor should be associated with. The criteria can be described as follows: for a sensor with tentative status or being a cluster member, it would randomly affiliate itself with a cluster head among its candidate peers for load balance purpose. In the rare case that there is no cluster head among the candidate peers of a sensor with tentative status, the sensor would claim itself and its current candidate peers as the cluster heads. The details are given in Algorithm 3. Fig.d shows the final result of clusters, where each cluster has two cluster heads and sensors are affiliated with different cluster heads in the two clusters. In case a cluster head is running low on battery energy, re-clustering is needed. This process can be done by sending out a re-clustering message to all the cluster members. Cluster
  • 42. members that receive this message switch to the initialization phase to perform a new round of clustering. 6.2.4. Synchronization Among Cluster Heads
  • 43. To perform data collection by TDMA techniques, intracluster time synchronization among established cluster heads should be considered. The fourth phase is to synchronize local clocks among cluster heads in a CHG by beacon messages. First, each cluster head will send out a beacon message with its initial priority and local clock information to other nodes in the CHG. Then it examines the received beacon messages to see if the priority of a beacon message is higher. If yes, it adjusts its local clock according to the timestamp of the beacon message. In our framework, such synchronization among cluster heads is only performed while SenCar is collecting data. Because data collection is not very frequent in most mobile data gathering applications, message overhead is certainly manageable within a cluster. The details of the procedure are explained in Algorithm 5. Fig.8. An Example Of LBC Algorithm With M =2. 6.2.5. Analysis of Load Balanced Clustering Algorithm We have following properties about LBC algorithm. Property 1. Among all the cluster heads in a CHG, there is only one self-driven cluster head, and all others are peer-driven cluster heads.
  • 44. Proof. In LBC, a cluster head and its up-to-date peers form the CHG of a cluster. Clearly, it is the self-driven cluster head, and all its peers are the peer-driven cluster heads. Property 2. Some clusters may have fewer than M cluster heads. Proof. Based on the clustering method, it is apparent that each cluster in LBC typically has a total of M cluster heads. However, some clusters may have fewer than M cluster heads. The reason can be explained as follows. To circumvent the situation that the CHGs of different clusters may share common cluster heads, sensors with tentative status always update their candidate peers once receiving status packets. For sensor si, once its neighbors reach their final status, if si is still tentative, it would update its candidate peers to see if they are the current peers. If yes, they will be expurgated from si.A. We define a set X={v|v si.N.v=2si. A.v.status=tentative}, which represents the possible new candidate peers of si. si would choose the sensors in X with the highest initial priorities to fill the vacancy among its M-1 candidate peers. However, in the rare case that X = Fi, si would have no replenishment for the vacancy. Therefore, the candidate peers of si could only become fewer and fewer as the update goes on. Later, if si happens to be a cluster head by the self-driven status transition, the size of the CHG, which is formed by si and its update-to-date candidate peers, would be no more than M. Property 3. In LBC, a smaller M results in more clusters. Proof. Once a sensor si claims to be a cluster head, its current candidate peers will also be identified to be the cluster heads immediately and their priority will be updated to the priority of si. si and all of its peers form the CHG of the corresponding cluster. Suppose sj is one of the candidate peers of si (i.e., sj = si.A). Without loss of generality, we assume that there exists another sensor in tentative status, denoted by sk, in the neighbourhood of sj, but out of the reachable range of si (i.e., sk =sj.N and sk! = sj.N). In the algorithm, if the priority of sk is less than that of sj, sk will stay at tentative status through the end of the iterations in phase 2. This implies that sj essentially restrains its neighbors with lower priorities from claiming to be cluster heads. At a later time, sk may have an opportunity to affiliate itself to sj as a cluster member in phase3. If there are more candidate peers like sj, more sensors in the similar situation to sk will refrain from claiming to be cluster heads and alternatively join the current cluster as members in the periphery. Hence, the size of the cluster becomes larger with a smaller M. Property 4. The total number of status packets exchanged in LBC is O(n) where n is the number of sensors in the network. Proof. During the executions, each sensor generates at most two status packets. Specifically, on one hand, each sensor may probabilistically send a packet to indicate itself as tentative cluster head (Algorithm 2, line 4). On the other hand, each sensor will send another packet whenever it reaches its final status, either a status packet for claiming to be a cluster head or a joining message as a cluster member. Hence, when there are a total of n sensors in the network, the number of status packets sent in the network is upper-bounded by 2n, i.e., with O(n) complexity. Property 5. The time complexity of LBC in the worst case is O(n²) for each sensor.
  • 45. Proof. A sensor needs at most O(n) time in the initialization phase to discover its neighbors and sets its priority based on the initial priorities of the neighbors. In phase II, the time cost differs from sensor to sensor. For example, a sensor, which determines to be a cluster head with the priority above th, only experiences one iteration and it has no potential cluster head at all. Thus, its processing time for phase 2 is a constant, i.e., O(1). However, in the worst case, a sensor needs to complete its maximum iterations which is determined by its node degree. And during each iteration, it is required to examine all the potential cluster heads. In such a case, the time complexity is O(n²). In phase3, a sensor takes O(nⁿ) time to arbitrarily affiliate itself to a cluster head nearby. Thus, the total time complexity for a sensor in the clustering process is O(n²) in the worst case. 6.2.6. Examples of LBC Algorithm: We provide an example to show the impact of some parameters on the clustering result in Fig. 4. Fig. 4a shows a random arrangement of 80 sensors on a 100×100 area. The connectivity among sensors is identified by the links between any two neighboring nodes. Fig. 4b displays the result of LBC with M set to 2. Since the priority of a sensor is the sum of its initial priority and those of its M -1 candidate peers, the two thresholds, th and tm, are proportionally set to M×0.9 and M×0.3, respectively. In Fig. 4b, sensors are self-organized into 6 clusters, each having two cluster heads shown in blue. The links between each cluster head and its members, which are shown in grey, indicate the final association pattern of the sensors. And the links shown in blue, represent the connectivity between the two cluster heads in a CHG. Fig. 4c shows the initial priority of each sensor and those of the selected cluster heads are highlighted in blue. It is observed that the final cluster heads are the ones with higher initial priorities in its proximity, which validates the requirement that the sensors in possession of higher residual energy are preferentially chosen to be cluster heads. In Fig. 4d, we keep M unchanged and vary the settings of th and tm to be M×0.75 and M×0.4, respectively. These relaxed thresholds imply that there is more opportunity for a sensor to immediately claim itself and its candidate peers to be cluster heads, and there is also more possibility for a sensor to quickly “retire” to be a cluster member. This helps a sensor effectively reduce the computational iterations, however, it leads to more clusters in the network. For instance, there are seven clusters formed in Fig. 4d, one more compared to Fig.4b with more tightened thresholds. The reason for the newly-emerged cluster is because that s16, which considers s31 as its candidate peer, promptly claims itself to be cluster head at the very beginning of its iterations for status claim. On one hand, s16 opportunistically excludes itself from joining the set of possible cluster heads in its proximity (i.e., s16.B) and there is also no other potential cluster head available at the starting moment. On the other hand, the priority of s16 is 1.8, which is the sum of the initial priorities of s16 and s31, surpasses th, which is set to 1.5. Hence, s16 and s31 successfully become cluster heads and quit the iterations beforehand. Clearly, for a given number of sensors, the relaxed thresholds lead to more cluster heads and smaller average size of clusters such that local aggregation can be beneficially shared and balanced among more nodes. However, since more clusters make themselves to get closer to each other, it necessitates more management on suppression of the inter-cluster collisions.
  • 46. Finally, we vary M to investigate its impact on clustering. The results shown in Fig. 4e further validate Property 3. In the example, M is reset to 4, and th and tm are still proportionally set to M×0.9 and M×0.3, respectively. A total of five clusters is observed when M=4, less than the result in Fig. 4b with M=2. Particularly, in Fig. 4b, s56 which is far away from cluster heads s4 and s12 of the cluster nearby, claims itself and its candidate peer s58 to be cluster heads. In contrast, s58, turning to be the peer of s4 in Fig. 4e, successfully prevents s56 from attempting to be a cluster head. Thus, the two neighboring clusters in the left topmost corner in Fig. 4b merge into a larger cluster in Fig. 4e. Fig. 4f demonstrates the initial priorities of all sensors when M is set to 4 and those of selected final cluster heads are highlighted in blue. It reveals that the variation of M has no impact on the feature that LBC algorithm always chooses the sensors with higher residual energy to be the cluster heads. Fig.9. An Example Of LBC With Different Parameter Settings. 6.3. CLUSTER HEAD LAYER
  • 47. We now consider the cluster head layer. As aforementioned, the multiple cluster heads in a CHG coordinate among cluster members and collaborate to communicate with other CHGs. Hence, the inter-cluster communication in LBC-MIMO is essentially the communication among CHGs. By employing the mobile collector, cluster heads in a CHG need not to forward data packets from other clusters. Instead, the inter-cluster transmissions are only used to forward the information of each CHG to SenCar. The CHG information will be used to optimize the moving trajectory of SenCar, which will be discussed in the next section. For CHG information forwarding, the main issue at the cluster head layer is the inter-cluster organization to ensure the connectivity among CHGs. 6.3.1. Connectivity Among CHGs The inter-cluster organization is determined by the relationship between the inter-cluster transmission range Rt and the sensor transmission range Rs. Clearly, Rt is much larger than Rs. It implies that in a traditional single-head cluster, each cluster head must greatly enhance its output power to reach other cluster heads. However, in LBC-MIMO the multiple cluster heads of a CHG can mitigate this rigid demand since they can cooperate for inter-cluster transmission and relax the requirement on the individual output power. In the following, we first find the condition on Rt that ensures inter-cluster connectivity, and then discuss how the cooperation in a CHG achieves energy saving in output power. We assume that an l×l sensor field is divided into square cells, each of which is of size c×c and c = 2Rs. Based on the result showed that when n sensors are uniformly distributed and c2n = kl2 ln l for some k>0, each cell contains at least one sensor. When Rt > 2(√5+1)Rs, the inter- cluster connectivity can be guaranteed with single-head clustering. In a similar way, the following property gives the condition to guarantee the inter-cluster connection in LBC-DDU. Property 6. Under the assumption that each cell contains at least one sensor, for any cluster a and its neighboring cluster b, liml→∞Pr(min(D(a,b)) < (√26+2)Rs)=1 when M >2 and liml→∞ Pr(min(D(a,b)) < (√17+3/2)Rs) =1 when M = 2, where D(a,b) is the distance between clusters a and b, and Pr(.) represents the corresponding probability. Proof. Consider M >2 first. In the worst case, all other clusters are far away from cluster a. Cluster a and its neighboring cluster b both have M cluster heads since if any CHG has fewer cluster heads than M, the distance between the two clusters would be shorter, which can be easily deducted from Property 3. Based on the principle of LBC, the self-driven cluster head sₐ, and all its up-to date candidate peers form the CHG of cluster a. Since these candidate peers are all in the neighbourhood of sₐ, all the cluster heads in the CHG of cluster a are within an area with radius Rs and centered at sₐ. Since each cluster member should be covered by at least one cluster head in a CHG, the maximum coverage of cluster a is a circle area with radius 2Rs regardless of the value of M. The same is applicable to cluster b. Without loss of generality, we assume that cluster a is centered at a cell as shown in Fig. 5a. Given that a sensor can be located anywhere in a cell, in the worst case, sensors in cells 1≈9, the area completely or partially covered by cluster a, are all located within the range of cluster a. Consider the sensor at the closest cell outside of cluster a, say, sk, which is located at cell k to the right of cell 6. The
  • 48. farthest position sk can be from cluster a is the position of the right topmost corner of cell k. Then sk should be within the range of cluster b. In the worst case, it is located at the periphery of the coverage area of cluster b. Hence, the maximum possible distance between the two clusters is the length of the line segment between sa and sb with sa, sk and sb in an alignment. This distance is equal to (√26+2) Rs, which implies that within this distance there must exist at least one another cluster. Similarly, when M =2, the distance between two cluster heads in a CHG is no more than Rs and the maximum coverage area of a cluster is achieved when two cluster heads are Rs apart from each other. Fig. 5b depicts such two clusters a and b, where the shadowed area is the coverage area of each cluster. Consider cluster a. No matter where it is located and how it is oriented, it can completely or partially cover at most six cells. The worst case is that all the sensors in these six cells are in the range of cluster a. Thus, the closest sensor sk outside of cluster a should be at the right bottommost corner of cell k, which is under cell 5. Similar to the case of M >2, we can derive that the maximum possible distance between two neighboring clusters (√17+3/2) Rs,. Fig. 10. Maximum distance between two neighboring clusters when both of them have M cluster heads. Property7. If inter-cluster transmission range Rt ≥ (√26+2) Rs when M >2 or Rt ≥ (√17+3/2) Rs when M=2, LBC-MIMO generates a connected graph among CHGs. This can be easily proved by contradiction. 6.3.2. Inter-Cluster Communications We discuss how cluster heads in a CHG collaborate for energy-efficient inter-cluster communication. We treat cluster heads in a CHG as multiple antennas both in the transmitting and receiving sides such that an equivalent MIMO system can be constructed. The self-driven cluster head in a CHG can either coordinate the local information sharing at the transmitting side or act as the destination for the cooperative reception at the receiving side. Each collaborative cluster head as the transmitter encodes the transmission sequence according to a specified space-time block code (STBC) to achieve spatial diversity. Compared to the single- input single-output system, it has been shown in that a MIMO system with spatial diversity leads to higher reliability given the same power budget. An alternative view is that for the same
  • 49. receive sensitivity; MIMO systems require less transmission energy than SISO systems for the same transmission distance. Therefore, given two connected clusters, compared with the single-head structure, in which the inter-cluster transmission is equivalent to a SISO system, the multi-head structure in LBC-MIMO can save energy for inter-cluster communication. In particular, the maximum distance of two neighboring clusters is 2(√5+1) Rs in single-head clustering. Thus, the required transmission power of a cluster head for such inter-cluster transmission can be expressed as follows when the free space propagation model is employed. where µ is the given receive sensitivity, α represents the small-scale fading parameter between two cluster heads, Gt and Gr are the transmitting and receiving antenna gains, λ is the transmission wavelength and L is a system loss factor not related to propagation. In contrast, in LBC-MIMO, the inter-cluster communication between two CHGs is equivalent to a MIMO transmission. Each transmitted data symbol would enjoy a diversity gain of at×ar, where at and ar are the numbers of transmitting and receiving antennas, respectively. In the worst case, two neighboring clusters are apart as far as possible, i.e., the size of CHGs on both sides is M, and the maximum distance between two neighboring clusters is equal to the lower bound of Rt given in Property 7. Hence, the output power of each cluster head in the transmitting CHG is given by Where αij represents the small-scale fading parameter of the channel between the ith antenna in the transmitting CHG and the jth antenna of the receiving CHG. We assume these channels are independent and identically distributed (i.i.d). We further define the saving ratio pͫ as follows to evaluate the difference in the output power of a cluster head between single-head clustering and LBC. From the above discussion, we can see that the saving ratio of each cluster head is 5.3 when M=2 in LBC-MIMO. This ratio becomes higher with the increase of M. Thus, for long-haul
  • 50. inter-cluster transmissions in LBC-MIMO, more cluster heads in a CHG can balance the load and save energy at each sensor. 6.4. SENCAR LAYER: TRAJECTORY PLANNING In this section, we focus on how to optimize the trajectory of SenCar for the data collection tour with the CHG information, which is referred to as the mobility control at the SenCar layer. As mentioned in Section 3, SenCar would stop at some selected polling points within each cluster to collect data from multiple cluster heads via single-hop transmissions. Thus, finding the optimal trajectory for SenCar can be reduced to finding selected polling points for each cluster and determining the sequence to visit them. 6.4.1. Properties of Polling Points We consider the case that SenCar is equipped with two antennas, as it is not difficult to mount two antennas on SenCar, while it likely becomes difficult and even infeasible to mount more antennas due to the constraint on the distances between antennas to ensure independent fading. Note that each cluster head has only one antenna. The multiple antennas of SenCar, which act as the receiving antennas in data uploading, make it possible for multiple cluster heads in a CHG to transmit distinct data simultaneously. To guarantee successful decoding when SenCar receives the mixed streams, we need to limit the number of simultaneous data streams to no more than the number of receiving antennas. In other words, since SenCar is equipped with two receiving antennas, at most two cluster heads in a CHG can simultaneously send data to SenCar in a time slot. Hence, an equivalent 2×2 MIMO system for an uplink transmission is formed, which achieves spatial multiplexing gain for higher data rate. With such concurrent transmissions, data uploading time can be greatly reduced. If there are always two cluster heads that simultaneously upload their data to SenCar in each time slot, data uploading time can be cut into half in the ideal case. In fact, when the size of a CHG is larger than 2, we have multiple choices to schedule cluster head pairs to communicate with SenCar. Each such a pair is called a scheduling pair. We use P to denote all the possible scheduling options in a CHG. Without loss of generality, we assume that M is an even number. For a given schedule π ϵ П, there are M/2 scheduling pairs. The SenCar will choose a selected polling point for each of them. When SenCar arrives at a cluster, it will visit each selected polling point, where it stops to simultaneously collect data from the two cluster heads in a scheduling pair. To collect data as fast as possible in a cluster, the following two requirements should be satisfied.
  • 51.  The two cluster heads in a scheduling pair both should be covered by SenCar with the same transmission range as a sensor, i.e., Rs, when SenCar is at the selected polling point specific for this scheduling pair.  By visiting the selected polling points in a cluster, SenCar should achieve maximum sum of the uplink MIMO capacities in the cluster. For each polling point, we assume that SenCar has the knowledge of the IDs of sensors in the proximity within range Rs and the channel vectors between the sensors and SenCar located at the polling point. The information can be collected prior to each data collection tour. Upon receiving the CHG information which contains the IDs of the cluster heads in a CHG, for each possible schedule π, SenCar can choose a set of candidate polling points for each scheduling pair in π, each of which can cover the two cluster heads in a scheduling pair at the same time. Specifically, let P i denote such a set of candidate polling points for scheduling pair i in a cluster, where i=1,2,3…..M/2. Clearly, each Pi is a subset of set P that contains all the polling points. Based on the first requirement, the selected polling point for scheduling pair i in a cluster should be chosen from Pi. Next, we will first find the distribution condition of the polling points to guarantee that there are always candidate polling points for choosing, and then present the criteria for selecting the schedule and selected polling points, which are addressed by the second requirement. Fig.11. (a) Distribution of polling points. (b) Candidate polling points for the scheduling pair (a, b) in a CHG should be within the shadowed area. First, we have the following property regarding the distance between two cluster heads in a scheduling pair. Property 8. In a CHG with M cluster heads, for any even number M. ⱻπ ϵП , for each scheduling pair (a,b) in π, such that da.b ≤ √3 Rs, where da.b represents the distance between the two cluster heads a and b in the same scheduling pair. Proof. We prove the property by induction on M. As mentioned above, in a CHG, there is only one self-driven cluster head and a total of M-1 peer-driven cluster heads, which are denoted as CH0, CH1... CHM-1 for clarity. All of them are with in a circle area with radius Rs andcentered at the self-driven cluster head (i.e., CH0). First consider the case of M =2. Apparently, the property holds since the distance between CH0 and CH1 is clearly no more than Rs. We can pair them directly. Assume that there is a feasible schedule π for some M with pair (CH0, CHx)
  • 52. ϵπ where xϵ[1,M-1]. Now we prove that schedule π for M implies a valid schedule π´ for M+2 cluster heads. Suppose we add two new cluster heads CHa and CHb. If the distance between the two new heads da.b is no longer than √3 Rs, then there exists a valid schedule π´=πỤ(a,b). Otherwise, we can pair (CHx, CHy) where {dx.y ≤ √3 Rs | CHy ϵ {CHa, CHb}}, and pair CH0 with the remaining new cluster head. Based on the above discussion, we can conclude that for any even number M there exists a valid schedule satisfying da.b ≤ √3Rs for any pair (a, b) To successfully choose the selected polling points in a cluster, there should exist at least one possible schedule in which the sets of candidate polling points for all scheduling pairs are non- empty at the same time, i.e., ⱻπ ϵ П such that P´≠ ɸ for all the scheduling pair i ϵ π. This requirement imposes challenges on the distribution of polling points. We study the case that polling points are located at the intersections of grids with each polling point apart from its adjacent neighbors in horizontal and vertical directions in the same distance t, as plotted in Fig. 6a. We have the following property on t to satisfy the above requirement. Property9. If polling points are uniformly distributed as depicted in Fig. 6a, for a CHG with M cluster heads, when t ≤ √2(1-√3/2)Rs, regardless of the value of M, ⱻπ ϵ П, for each scheduling pair(a,b) ϵ π,ƩpϵP Pr(da.p ≤ Rs,db.p ≤ Rs) ≠ 0 where P denotes the set of all polling points, da.p and db.p are the distances between cluster heads a and b in a scheduling pair and the polling point p, respectively. Proof. Under the above specified distribution of polling points, regardless of the orientation of grids, there is at least one polling point located in a circle area with radius √2/2t.For example, in Fig.6a, there are 4 polling points distributed in such an area, which is highlighted in shadow. Moreover, it is known from Property 8 that there exist some schedules, in which the distance between two cluster heads in any scheduling pair is upper bounded by √3Rs. Consider the worst case that there is a scheduling pair (a,b) with da.b =√3Rs (see Fig.6b). A candidate polling point p for (a, b) should be within the transmission range of cluster heads a and b simultaneously. The line shadowed area in Fig.6b, which is the intersection of transmission areas of a and b, indicates the possible distribution region of candidate polling points for (a,b). It is clear that when da.b is shorter; the area of the region would be larger, which corresponds to the lower distribution density requirement on polling points. Hence, considering the case with da,b=√3Rs is sufficient for the proof of the property. It is shown in Fig. 6b that there exists an inscribed circle with radius (1-√3/2)Rs inside the line shadowed area. If t = √2 (1-√3/2)Rs, substituting Rs with the expression of t, the radius of the inscribed circle in the line shadowed area is equal to √2/2t. As mentioned earlier, there is at least one polling point located in such an area. Thus there always exist some candidate polling points for scheduling pair (a, b), i.e. ƩpϵP Pr (da.p ≤ Rs, da.p ≤ Rs)≠ 0.In other words, when t ≤ √2(1-√3/2)Rs, there exist some schedules in which the set of candidate polling points for each scheduling pair is always non- empty. 6.4.2. MU-MIMO Uploading We jointly consider the selections of the schedule pattern and selected polling points for the corresponding scheduling pairs, aiming at achieving the maximum sum of MIMO uplink
  • 53. capacity in a cluster. We assume that SenCar utilizes the minimum mean square error receiver with successive interference cancellation (MMSE-SIC) as the receiving structure for each MIMO data uploading. Based on this receiver, the capacity of a 2×2 MIMO uplink between a scheduling pair (a,b) and SenCar located at a selected polling point ∆ can be expressed as follows. Where ha and hb are two 2×1 channel vectors between cluster heads a and b and SenCar at ∆ respectively, Pt. is the output power of a sensor for transmission range Rs, and N0 is the variance of the back-ground Gaussian noise. The MMSE-SIC receiver first decodes the information from a, treating the signals of b as the interference. Then, it cancels the signal part of a from the received signals. The remaining signal part of b only has to contend with the background Gaussian noise. Accordingly, the criteria for the schedule and the selected polling point for each corresponding scheduling pair in a cluster is given by where π is a specified schedule, scheduling pair i ϵ π consists of cluster heads a and b, ∆i and P´i are the selected polling point and the set of candidate polling points for scheduling pair i, respectively, and C∆(a,b) is the achieved 2×2 MIMO uplink capacity for scheduling pair i when SenCar is positioned at ∆i. Once the selected polling points for each cluster are chosen, SenCar can finally determine its trajectory. The moving time on the trajectory can be reduced by a proper visiting sequence of selected polling points. Since SenCar departs from the data sink and also needs to return the collected data to it, the trajectory of SenCar is a route that visits each selected polling point once. This is the well-known traveling salesman problem (TSP). Since SenCar has the knowledge about the locations of polling points, it can utilize an approximate or heuristic algorithm for the TSP problem to find the shortest moving trajectory among selected polling points e.g., the nearest neighbor algorithm. 6.4.3. Data Collection With Time Constraints
  • 54. We further consider the case when there are time constraints on data messages. In practice, it is common for some emergent data messages to be delivered within a specified deadline. If the deadline has expired and the message is yet to arrive at the destination, it would carry less value and cause performance degradation. In, mobile data collection with dynamic deadline was considered and an earliest deadline first algorithm was proposed. In their solution, the mobile collector would visit the nodes with messages of the earliest deadline. Here, we extend and adapt their solutions to the clustered network. Our method is described in the following. First, the cluster heads collect data messages and calculate a deadline by averaging all the deadlines from messages in the cluster. All the clusters then forward their deadline information to SenCar. The SenCar selects the cluster with the earliest average deadline and moves to the polling point to collect data via MU-MIMO transmissions. After SenCar finishes data gathering, it checks to see whether collecting data from the next polling point would cause any violations of deadline in its buffer. If yes, it immediately moves back to the data sink to upload buffered data and resumes data collection in the same way. By prioritizing messages with earlier deadlines, SenCar would do its best to avoid missing deadlines. CHAPTER-7 PERFORMANCE EVALUATIONS 7.1. OVERVIEW In this section, we evaluate the performance of our framework and compare it with other schemes. Since the main focus of this paper is to explore different choices of data collection schemes, for fair comparison, we assume all the schemes are implemented under the same duty-cycling MAC strategy. The first scheme for comparison is to relay messages to a static data sink in multi-hops and we call it Relay Routing. Since nodes with higher battery energy provide more robustness and error immunity, sensors select the next hop neighbor with the highest residual energy while forwarding messages to the sink. Once some nodes on a routing path consume too much energy, an alternative route will be chosen to circumvent these nodes. In this way, the relay routing method can provide load balance among nodes along the routing path. The second scheme to compare is based on Collection Tree Protocol. In CTP, the expected number of transmission (ETX) is used as a routing metric and the route with a lower ETX takes precedence over routes with higher ETX. For simplicity, we assume ETX is proportional to transmission distances between nodes. This assumption is reasonable since using fixed power for longer transmission distance would cause attenuated receiving power and potentially increase error probability and expected number of transmissions. Based on this metric, we establish a collection tree rooted at the static data sink at the origin (0, 0). Each node forwards messages along the path with the lowest ETX towards the sink. Any broken links caused by nodes depleted battery energy would lead to large ETX and are avoided in routings.
  • 55. Furthermore, we introduce two schemes that organize nodes into clusters and relay messages to the static data sink by multi-hop transmissions. The third scheme to compare is clustered SISO in which sensors form into clusters with a single cluster head. Data messages are converged at the cluster heads and relayed to the static data sink in multi-hops by SISO communications. By the same token, we can extend the third scheme to clustered MIMO which allows MIMO communications between the cluster heads according to. On the other hand, we also include the fifth scheme called mobile SISO which is the traditional way for mobile data gathering, where SenCar stops in each cluster for data collection and uploads data to the sink after all the clusters have been visited. The last scheme is our proposed LBC- DDU framework (denoted by mobile MIMO for clarity) that elects multiple cluster heads to enable MUMIMO uploading to SenCar in each cluster. We develop a simulator in MATLAB and discuss the parameter settings in the following. A total of n sensors are randomly scattered in an l×l field. The static data sink is located at (0,0). There are a total of np polling points uniformly distributed in the field. The sensor transmission range Rs is 40m.Each sensor has installed an AA battery of 1,500 mAh. To estimate energy consumptions for SISO, we use the model presented in, i.e., et=(e1dr+e0)lp, where et is the energy consumption while transmitting a message of lp bits, dr is the transmission range, e1 is the loss coefficient per bit, a is the path loss exponent and e0 is the excessive energy consumed on sensing, coding, modulations, etc. For MIMO uploading between cluster heads and SenCar, we utilize the results for 2×2 MIMO in. When dr=40m, the energy consumption per bit is 0.6×10ˉ5J/bit. Each sensor holds 5,120 bytes sensing data. Each data message is 10 bytes and each control message is 1 byte (overhead). Therefore, energy consumptions per data message for SISO and MIMO are 1:28 and 0:48mJ, respectively. The circuit energy consumption of MIMO uploading itself is modelled in Since the receiver is SenCar, we only consider energy overhead on the transmitters’ side, which are the cluster head groups. We obtain that extra energy consumption incurred on cluster heads using MIMO is, Pe=PDAC+Pmix+Pfilt, in which PDAC=1.95mW according to Texas Instrument’s DAC128S085 datasheet Pmix =30.3mW and Pfilt= 2.5mW according to. We obtained that for transmitting a data message, 0:03mJ extra power is consumed in MIMO circuitry (5.8 percent energy overhead from the circuitry). The transmission bandwidth is 100Kbps and the speed of SenCar is 1m/s. Each performance point is the average of theresultsin200 simulation experiments.
  • 56. Fig.12. Performance comparisons of different data gathering schemes when M =2. (a) Average energy consumptions per node. (b) Maximum energy consumption. (c) Data latency. (d) Average energy consumption for each cluster head. (e) Energy consumption heat map of Collection Tree scheme. (f) Energy consumption heat map of Mobile MIMO scheme. (g) Number of clusters. (h) Average energy overhead per node. 7.2. COMPARISONOF ENERGYCONSUMPTIONS AND LATENCY First, we compare the average energy consumption for each sensor and the maximum energy consumption in the network. We set l=250m, np=400, and M=2 (at most two cluster heads for each cluster) and vary n from 50 to 500. Note that when n=50, network connectivity cannot be guaranteed all the time for multi-hop transmission with a static sink. The results here are only the average of the connected networks in the experiments. However, the mobile schemes can work well not only in connected networks but also in disconnected networks, since the mobile collector acts as virtual links to connect the separated sub networks. Fig.7a compares the average energy consumption per node. We can see that our mobile MIMO scheme results in the least energy consumption on sensor nodes, whereas the methods that transmit messages through multi-hop relay to the static data sink result in at least twice more energy on each node. Fig.7b further presents the maximum energy consumption in the network. The network lifetime usually lasts until the first node depletes its energy. It is intuitive that
  • 57. schemes with lower maximum energy consumption would have longer network lifetime. Fig. 7b shows that mobile MIMO has the least maximum energy consumptions and curves for the schemes that utilize multi-hop relaying to the static data sink (Relay Routing, Collection Tree and Clustered SISO/MIMO) climb much faster and higher than mobile MIMO scheme. When we increase the size of the network, network lifetime of these schemes would deteriorate because more relayed traffic needs to traverse the congested region near the data sink. Second, we illustrate data latency by Fig.7c. Here, we define data latency as the time duration for the data sink to gather all the sensing data in the field. For mobile schemes, data latency is equivalent to the time duration of a data collection tour which comprises of the moving time and data transmission time. In Fig.7c, lower latency is achieved with clustered SISO/MIMO compared to Relay Routing or Collection Tree methods. This is because that nodes are organized into clusters and routing burden is decomposed into smaller tasks by different clusters. Relay routing has the highest latency because choosing node with the highest energy as the next hop may not lead to the shortest path. On the other hand, mobile SISO/MIMO has a little higher latency than clustered SISO/MIMO and Collection Tree methods due to SenCar’s moving time. However, note that when n>300, the latency of the Collection Tree method exceeds mobile SISO/MIMO and the slopes for multi-hop relaying to the static sink are much steeper than mobile SISO/MIMO. This is because that though mobility incurs extra moving time, single-hop transmissions for both data aggregation and uploading save time in routing significantly, whereas multihop traffic relay to the static sink may not scale well when the number of nodes increases. Finally, the advantage of mobile MIMO comparing to mobile SISO is observed by saving 20 percent time in total. This is due to the fact of simultaneous data uploading to SenCar at the polling points in the mobile MIMO approach. 7.3. LOAD BALANCE AND ENERGYDISTRIBUTIONS We also evaluate load balance on cluster heads in Fig.7d. Cluster heads consume more energy than other nodes due to data aggregations and forwarding. Reducing energy consumptions on cluster heads improves network longevity and robustness. In Fig. 7d, we can see that first both MIMO approaches outperform SISO, and mobile MIMO achieves good load balance among cluster heads with the lowest average energy consumption by saving over 60 percent energy compared to the mobile SISO. In sum, the mobile scheme outperforms multi-hop relay to the static sink because no inter-cluster data forwarding is needed and the spatial diversity achieved by adopting MIMO further reduces energy consumption of cluster heads. To justify our choice of mobile data collections, we also compare the geographical energy distribution between Collection Tree and mobile MIMO. For demonstration purposes, we set
  • 58. n ¼ 200 and draw the heat map of energy consumption in Figs.7e and 7f. We observe that more energy is consumed with the Collection Tree method especially on nodes near the data sink represented by the bright spots in Fig.7e. These nodes may become congested bottlenecks and jeopardize the operation of the network. Although mechanisms in Collection Tree can find a better route by adapting to ETX metrics, congestion is inevitable due to the physical locations of these nodes. In contrast, the mobile MIMO method results in much less energy consumption and even distribution acrossthesensingfieldinFig.7f. 7.4. NUMBER OF CLUSTERS AND ENERGYOVERHEAD Fig.7g shows the number of clusters generated by mobile SISO and MIMO. We can see that the mobile MIMO typically yields fewer clusters than mobile SISO. Note that the average energy consumptions of mobile SISO and MIMO become indistinguishable as n increases. This is because that although fewer clusters are observed with mobile MIMO, more cluster heads are generated for each cluster. Thus, the total number of cluster heads in the two schemes turns to be comparable, which is actually dominant factor determining energy consumptions. Finally, we compare the energy overhead with mobile SISO and MIMO, and illustrate the energy consumption by MIMO uploading itself in Fig.7h.For the mobile approaches, overhead is mainly comprised of status and synchronization messages in clustering, messages notifying SenCar of cluster locations and circuit energy consumption if MIMO uploading is adopted. First, the number of status messages exchanged is proved to be upper bounded by 2n in Property 4 in Section 5, where n is the number of nodes, and synchronization messages between cluster heads are only propagated within each cluster. Second, after clusters are formed, each cluster needs to forward the locations of cluster heads to SenCar resided at the origin for finding the polling points. Third, if MIMO uploading is adopted, there is excessive energyconsumptionof0:03mJ per data message. By considering these aspects, we plot the energy overhead in Fig.7h. First of all, it is observed that energy overhead results in less than 6 percent over the total energy consumptions. Then, the gap between mobile SISO and MIMO represents extra energy consumed in the MIMO circuitry is small. It indicates that compared to the energy overhead on clustering and notifying SenCar of cluster information, the energy consumed by MIMO circuity itself is negligible. 7.5. IMPACT OF MAXIMUM NUMBER OF CLUSTER HEADS IN EACH CLUSTER We evaluate the impact of the maximum number of cluster heads in each cluster, M, on energy consumptions, latency and number of clusters in Fig.8. We plot the performance of mobile MIMO with different M when l varies from 50 to 400m and n =200. We fix the interval distance t between a polling point and its adjacent neighbors in horizontal and
  • 59. vertical directions at about 20m, which means that np varies from 16 to 441 with different settings of l. Fig.13.Performance comparison of proposed framework with different M. (a) Average energy consumption per node versus l. (b) Maximum energy consumption versus l. (c) Data latency versus l. (d) Number of clusters versus l. Fig.8a shows that the average energy consumption declines as l increases in all cases. This is because that more clusters would be formed when sensors become sparsely distributed as indicated in Fig. 8d. It is also noticed that a larger M leads to less energy consumptions. For example, when l=200m, energy consumption with M=4 is 35percent less than the case of M=2.This result is intuitive since cluster heads perform more transmissions than other nodes. When M increases, there are more cluster heads in a cluster to share the workload. Fig.8b shows the maximum energy consumption in the network. Since more cluster heads can directly upload their data to SenCar without any relay, the case with a larger M results in a slightly less energy consumptions. For example, when l=300m, maximum energy consumption with M=6 is 15percent less than the case with M=2. In Fig.8c, it is demonstrated that a larger M also leads to longer data latency. The reason is that more selected polling points need to be visited, which leads to a longer moving trajectory. For instance, when l=400m, the data latency in the case of M=6 and M=4 is 14 and 7 percent longer than the case of M=2, respectively. Fig.8d shows the number of clusters formed with different M. It further validates that a larger M typically leads to fewer clusters. However, it is also noticed that the difference becomes less evident when l becomes larger. This is because that many clusters formed under this condition actually have fewer cluster heads than M since sensors become sparsely distributed such that the controlling impact of M on the cluster size is not fully extracted. 7.6. DATA COLLECTION WITH TIME CONSTRAINTS We demonstrate our proposed framework when data messages have time constraints to be delivered. The percentage of data messages that miss their deadlines and the impact of time constraints on traveling cost of SenCar are shown in Fig.9.To examine the effectiveness of
  • 60. the proposed algorithm we set the message deadline to be uniformly randomly distributed over [0, X] and change X from 60 to 180mins. Therefore, the mean of deadline is from 30 to 90mins. The number of nodes n is set to 200 and the side length of sensing field l varies from 100 to 300 with an increment of 50. In Fig.9a we can see that given a short average deadline and a large field (l=300m, mean deadline equals 30mins), and almost all the messages would miss their deadlines. This is because that the moving time of SenCar to traverse all the polling points exceeds most of the deadlines. Once we relax the deadline constraints (mean deadline equals 40-90mins), the percentage of missing deadlines drops fast. We also observe that when l is between 100 to 200m, the algorithm is able to maintain the percentage of missing deadlines with in 20percent for most cases. Fig.14. Evaluation of data collection with time constraints. (a) Percentage of data messages that miss the deadline. (b) Impact of time constraints on traveling cost of SenCar. To meet dynamic message deadlines, extra moving cost on SenCar is observed. This is because that the cluster with an earlier message deadline may be far from SenCar’s location. We present the traveling cost of SenCar for different cases in Fig.9b and compare it with the traveling cost computed by the nearest neighbor heuristic algorithm in Table 2 (no time constraint on messages). When l=300m and mean deadline equals 90mins, the moving cost on SenCar is over 5,000 m compared to 1,846 m without time constraints. When l=100m and mean deadline equals 90mins, the moving cost on SenCar is 404m compared to 347m without time constraints. The results indicate that higher cost on SenCar is needed with a larger field size. To further reduce traveling cost on SenCar while guaranteeing to meet all the time constraints, multiple SenCar’s are needed to partition the data collection tour and many existing solutions for the Vehicle Routing Problems with Time Windows can be adapted to optimize the data collection routes.
  • 61. CHAPTER-8 CONCLUSIONS AND FUTURE WORKS 8.1. CONCLUSION We have proposed the LBC-MIMO framework for mobile data collection in a WSN. It consists of sensor layer, cluster head layer and SenCar layer. It employs distributed load balanced clustering for sensor self-organization, adopts collaborative inter-cluster communication for energy-efficient transmissions among CHGs, uses dual data uploading for fast data collection, and optimizes SenCar’s mobility to fully enjoy the benefits of MU- MIMO. Our performance study demonstrates the effectiveness of the proposed framework. The results show that LBC-MIMO can greatly reduce energy consumptions by alleviating routing burdens on nodes and balancing workload among cluster heads, which achieves 20 percent less data collection time compared to SISO mobile data gathering and over 60 percent energy saving on cluster heads. We have also justified the energy overhead and explored the results with different numbers of cluster heads in the framework. 8.2. FUTURE WORKS Finally, we would like to point out that there are some interesting problems that may be studied in our future work. The first problem is how to find polling points and compatible pairs for each cluster. A discretization scheme should be developed to partition the continuous space to locate the optimal polling point for each cluster. Then finding the compatible pairs becomes a matching problem to achieve optimal overall spatial diversity. The second problem is how to schedule MIMO uploading from multiple clusters. An algorithm that adapts to the current MIMO-based transmission scheduling algorithms should be studied in future. REFERENCES [1] B. Krishnamachari, Networking Wireless Sensors. Cambridge, U.K.: Cambridge Univ. Press, Dec. 2005. [2] R. Shorey, A. Ananda, M. C. Chan, and W. T. Ooi, Mobile, Wireless, Sensor Networks. Piscataway, NJ, USA: IEEE Press, Mar. 2006. [3] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Commun. Mag., vol. 40, no. 8, pp. 102–114, Aug. 2002. [4] W. C. Cheng, C. Chou, L. Golubchik, S. Khuller, and Y. C. Wan, “A coordinated data collection approach: Design, evaluation, and comparison,” IEEE J. Sel. Areas Commun., vol. 22, no. 10, pp. 2004–2018, Dec. 2004. [5] K. Xu, H. Hassanein, G. Takahara, and Q. Wang, “Relay node deployment strategies in heterogeneous wireless sensor networks,” IEEE Trans. Mobile Compute., vol. 9, no. 2, pp. 145–159, Feb. 2010.
  • 62. [6] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, “Collection tree protocol,” in Proc. 7th ACM Conf. Embedded Netw. Sensor Syst., 2009, pp. 1–14. [7] E. Lee, S. Park, F. Yu, and S.-H. Kim, “Data gathering mechanism with local sink in geographic routing for wireless sensor networks,” IEEE Trans. Consum. Electron., vol. 56, no. 3, pp. 1433–1441, Aug. 2010. [8] Y. Wu, Z. Mao, S. Fahmy, and N. Shroff, “Constructing maximum- lifetime data- gathering forests in sensor networks,” IEEE/ ACM Trans. Netw., vol. 18, no. 5, pp. 1571– 1584, Oct. 2010. [9] X. Tang and J. Xu, “Adaptive data collection strategies for lifetime- constrained wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 6, pp. 721–7314, Jun. 2008. [10] W. R. Heinzelman, A.Chandrakasan, and H.Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–660, Oct. 2002. [11] O. Younis and S. Fahmy, “Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach,” in IEEE Conf. Comput. Commun., pp. 366–379, 2004. [12] D. Gong, Y. Yang, and Z. Pan, “Energy-efficient clustering in lossy wireless sensor networks,” J. Parallel Distrib. Comput., vol. 73, no. 9, pp. 1323–1336, Sep. 2013. [13] A. Amis, R. Prakash, D. Huynh, and T. Vuong, “Max-min d-cluster formation in wireless ad hoc networks,” in Proc. IEEE Conf. Comput. Commun., Mar. 2000, pp. 32–41. [14] A. Manjeshwar and D. P. Agrawal, “Teen: A routing protocol for enhanced efficiency in wireless sensor networks,” in Proc. 15th Int. IEEE Parallel Distrib. Process. Symp., Apr. 2001, pp. 2009–2015. [15] Z. Zhang, M. Ma, and Y. Yang, “Energy efficient multi-hop polling in clusters of two- layered heterogeneous sensor networks,” IEEE Trans. Comput., vol. 57. no. 2, pp. 231–245, Feb. 2008. [16] M. Ma and Y. Yang, “SenCar: An energy-efficient data gathering mechanism for large- scale multihop sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 10, pp. 1476–1488, Oct. 2007. [17] B. Gedik, L. Liu, and P. S. Yu, “ASAP: An adaptive sampling approach to data collection in sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 12, pp. 1766– 1783, Dec. 2007. [18] C. Liu, K. Wu, and J. Pei, “An energy-efficient data collection framework for wireless sensor networks by exploiting spatiotemporal correlation,” IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 7, pp. 1010–1023, Jul. 2007. [19] R. Shah, S. Roy, S. Jain, and W. Brunette, “Data MULEs: Modeling a three-tier architecture for sparse sensor networks,” Elsevier Ad Hoc Netw. J., vol. 1, pp. 215–233, Sep. 2003. [20] D. Jea, A. A. Somasundara, and M. B. Srivastava, “Multiple controlled mobile elements (data mules) for data collection in sensor networks,” in Proc. IEEE/ACM Int. Conf. Distrib. Comput. Sensor Syst., Jun. 2005, pp. 244–257. [21] M. Ma, Y. Yang, and M. Zhao, “Tour planning for mobile data gathering mechanisms in wireless sensor networks,” IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1472–1483, May 2013.
  • 63. [22] M. Zhao and Y. Yang, “Bounded relay hop mobile data gathering in wireless sensor networks,” IEEE Trans. Comput., vol. 61, no. 2, pp. 265–271, Feb. 2012. [23] M. Zhao, M. Ma, and Y. Yang, “Mobile data gathering with spacedivision multiple access in wireless sensor networks,” in Proc. IEEE Conf. Comput. Commun., 2008, pp. 1283–1291. [24] M. Zhao, M. Ma, and Y. Yang, “Efficient data gathering with mobile collectors and space-division multiple access technique in wireless sensor networks,” IEEE Trans. Comput., vol. 60, no. 3, pp. 400–417, Mar. 2011. [25] A. A. Somasundara, A. Ramamoorthy, and M. B. Srivastava,, “Mobile element scheduling for efficient data collection in wireless sensor networks with dynamic deadlines,” in Proc. 25th IEEE Int. Real-Time Syst. Symp., Dec. 2004, pp. 296–305. [26] W. Ajib and D. Haccoun, “An overview of scheduling algorithms in MIMO-based fourth-generation wireless systems,” IEEE Netw., vol. 19, no. 5, Sep./Oct. 2005, pp. 43–48. [27] S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks,” IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1089–1098, Aug. 2004. [28] S. Jayaweera, “Virtual MIMO-based cooperative communication for energy-constrained wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 5, no. 5, pp. 984–989, May 2006. [29] S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-constrained modulation optimization,” IEEE Trans. Wireless Commun., vol. 4, no. 5, pp. 2349–2360, Sep. 2005. [30] I. Rhee, A. Warrier, J. Min, and X. Song, “DRAND: Distributed randomized TDMA scheduling for wireless ad-hoc networks,” in Proc. 7th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2006, pp. 190–201. [31] S. C. Ergen and P. Varaiya, “TDMA scheduling algorithms for wireless sensor networks,” Wireless Netw., vol. 16, no. 4, pp. 985– 997, May 2010. [32] I. Rhee, A. Warrier, M. Aia, and J. Min, “Z-MAC: A hybrid MAC for wireless sensor networks,” in Proc. 3rd ACM Int. Conf. Embedded Netw. Sensor Syst., 2005, pp. 90–101. [33] D. M. Blough and P. Santi, “Investigating upper bounds on network lifetime extension for cell-based energy conservation techniques in stationary ad hoc networks,” in Proc. 13th Annu. ACM Int. Conf. Mobile Comput. Netw., 2002, pp. 183–192. [34] F. Ye, G. Zhong, S. Lu, and L. Zhang, “PEAS: A robust energy conserving protocol for long-lived sensor networks,” in Proc. 23rd IEEE Int. Conf. Distrib. Comput. Syst., 2003, pp. 28–37. [35] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms. Cambridge, MA, USA: MIT Press, 2001. [36] V. Tarokh, H. Jafarkhani, and A. R. Calderbank, “Space-time block codes for orthogonal designs,” IEEE Trans. Info. Theory, vol. 45, no. 5, pp. 1456–1467, Jul. 1999. [37] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge, U.K.: Cambridge Univ. Press, May 2005. [38][Online].(2013).Available: http://www.ti.com/product/DAC128S085/technicaldocuments [39] M. M. Solomon, “Algorithm for the vehicle routing and scheduling problems with time window constraints,” Oper. Res., vol. 35, no. 2, pp. 254–265, 1987.