Abstract
We considered the usefulness of regular deployments of WSNs, and it is time now to quantify some of the specific parameters and compare how they perform as compared to a random scheme. An obvious reason to use regular scheme is that a desired area can be covered by fewer SNs and some underlying characteristics are shown in Table 15.1.
Access provided by CONRICYT-eBooks. Download chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
1 Introduction
We considered the usefulness of regular deployments of WSNs, and it is time now to quantify some of the specific parameters and compare how they perform as compared to a random scheme. An obvious reason to use regular scheme is that a desired area can be covered by fewer SNs and some underlying characteristics are shown in Table 15.1.
2 Routing in Regular Topologies
In a 2-D mesh network shown in Fig. 15.1a, routing is very simple as x and y coordinates of each SN can be used to determine a route from a source SN to a destination and can be easily extended to 3-D mesh networks. The location of BS is critical as all SNs need to transmit their sensed data to it. So, a natural choice is at the center of WSN as SN (0, 0). If you decided to have 4 BSs, then an intuitive solution of placing each of four BS1 is the four corners. But a better solution is BS2 as WSN can be divided in four parts as shown by a vertical and a horizontal dotted line such that the area of SNs reporting to different BSs can also be identified and each BS is in the center of their assigned area. That way, the distance from SNs to corresponding BS can be equalized among SNs. In a rhombus topology shown in Fig. 15.1b, routing can be done in a similar way to 2-D mesh .
SN addressing in 2-D hexagonal network is shown in Fig. 15.2a which is simple, but difficult to use for routing among SNs. An alternate addressing in 2-D hexagonal network is shown in Fig. 15.2b by dividing hexagon to equilateral triangles [1] and assigning address of each SN using 3 digits of (x, y, z) as illustrated in Fig. 15.2c [2]. In this scheme,
and
As the addressing is not unique, it may be possible that
Optimal Routing in a hexagonal network is obtained by calculating difference between destination D and source S addresses as follows:
Optimal routing in a hexagonal network can be done by following Fig. 15.3c and calculating distance between S and D [3].
Addressing in 2-D triangular network can be done similar to a hexagonal network described earlier and is shown in Fig. 15.4a. So, routing can also follow hexagonal networks. Such a network has been simulated following a transmission schedule [4] of up to H transmissions are scheduled during every time slot using spatial reuse and Fig. 15.4b shows cumulative distribution of distance between receiver SNs and other sender SNs for networks of size H = 5 (90 SNs), H = 10 (330 SNs) and H = 20 (1260 SNs), with more than 2 hop separation between SNs. A slow divergence of synchronization is observed in Fig. 15.4c. A rhombus topology can be obtained by combining two triangles (Fig. 15.5a), and thus, the same routing scheme can be utilized (Fig. 15.5b).
In WSNs, absolute address of each SN is not required and in fact relative address within the area is considered adequate. For relative location, some SNs are selected as reference points and are called anchor nodes . Selection of appropriate anchors is critical as they ought to be well-distributed inside the area where WSN has been deployed. Anchor placement in 2-D mesh network is done [1] by first determining virtual coordinates (VCs) of each SN that represents minimum hop distances with respect to a set of anchor nodes. Having two corner SNs at the bottom of a 2-D mesh makes all SNs to have unique VCs while their random placement leads to the same coordinates for several SNs. The effect of placing anchors at bottom two corners is shown in Fig. 15.6a, with all SNs have a unique VC. Random location of anchor modes (Fig. 15.6b) leads to several SNs with the same VC.
Figure 15.7 shows placement of anchor nodes in a triangular topology . Figure 15.7a has distance between two anchors of 6 hops following a zigzag path while anchors are placed on a straight line in Fig. 15.7b. Figure 15.8a indicates unique VCs in a triangular network if anchors are placed on straight edge and in Fig. 15.8b the dotted lines show region of identical VCs. Figure 15.9 identifies SNs region in triangular network using VCs. Dominating set in triangular topology is given Fig. 15.10a with density of 1/3 and Fig. 15.10b with density of 6/19 [5]. Figure 15.11 shows SNs deployed in hexagonal grid with dotted region shows SNs with identical VCs due to anchors placed on zigzag line in (a) and (b) illustrates different regions when anchors are placed on straight line. Identification of SNs region using VCs for hexagonal network [4] is shown in Fig. 15.12a while Fig. 15.12b shows spanning tree with a maximum distance of 3 to BS [6]. Figure 15.13a shows 1-to-all message broadcast in a hexagonal network, and all-to-all communication is given in Fig. 15.13b.
3 Processing in Regular Topologies
Collaborative processing is another challenging area in WSNs and Power-Efficient Gathering in Sensor Information Systems (PEGASIS ) [7] of Fig. 9.8 can be applied to regular WSN topologies without much difficulty. This can be done chaining all SNs together so that each SN receives only one message and transmits one till the message reaches the destination or the BS. Figure 15.14 shows examples of 2-D mesh and triangular topologies. Tree formation in a 2-D mesh is given in Fig. 15.15a and broadcasting in 2-D mesh is shown in Fig. 15.15b, c.
Clustering of SNs can be done using SNs 1 hop or 2 hops away from CH and is shown for 2-D mesh, hexagonal, and triangular topologies in Fig. 15.16. Clustering of a large triangular WSN is shown in Fig. 15.17. In a WSN, if it is densely deployed, a set of sensors can be allowed to go to sleep mode while another set monitors the area. 4 sets of sleep–awake cycles in WSN are shown in Fig. 15.18 for three topologies. Figure 15.19 gives 4 sets of sleep–awake cycles in large WSNs with 4 BSs. The CH can define schedule for each SN so that collision from adjacent SNs can be eliminated. Figure 15.20 illustrates one such TDMA schedule in clustered WSNs.
4 Mobile Opportunistic Concept for Regular WSN Topologies
Most commonly, SNs forward their data to BS in multi-hop fashion so as to conserve energy. This increases delay in reaching BS while consumes energy in every transmission and reception . Another class of WSN concept is to use opportunistic network (MON) concept where randomly moving mobile relay nodes (RNs) pick up data from SN once within its communication range and RN eventually delivers data to BS. As mobile RNs are randomly moving and WSN has no control over the mobility of RNs, the connectivity between RN and SN as well as between RN and BS are intermittent (Fig. 15.21).
If T is the intercontact time, then the estimated time to deliver data to BS is E(T) = N. As the size on the WSN N→ ∞, then P(T > n) ~ constant/n 1/2, for large n where n is the number of SNs, a RN can contact in one transmission. Delivery times required in 2-D mesh of different sizes are given in Fig. 15.22. The RNs used for ferries have completely predictable routes through the geographic area. One example is an ideal spiral search process in a WSN [8] where, unlike address–centric routing in which the source node searches for a route to the destination node, the BS looks for a particular data object stored in an unknown subset of SNs. Such spiral is intended for data-centric routing as the routing problem is actually a query problem—the routing algorithm must search for the route to a SN with the desired data and then data can be transmitted along the discovered route to the BS. Spiral reduces the communication overhead and the energy consumption for both route discovery and subsequent communication. One such spiral search in a triangular WSN is shown in Fig. 15.23a and the corresponding performance is shown in Fig. 15.23b, c. Spiral’s total cost for 40 packets communication is only 72% to flooding, 81% of ERS (Expanding Ring Search), 74% of random walk , and 73% of DFS (Depth-First Search ). In flood-based algorithms , the data query has to be flooded into entire WSN. The SNs with desired data transfer data using discovered the routes.
A MON basically elongates lifetime of WSNs as compared to traditional WSN. It provides constant throughput when number of SN approaches infinity and requires smaller number of SNs and practically no maintenance. The associated disadvantage is potentially long message delay due to intermittent connectivity as mobility of RNs is not controllable. If you have several RNs, you do not know which one SN should give a copy of data. This can be addressed satisfactorily if you know the mobility pattern of RNs. This may be a difficult proposition as SN may know in which direction RN is currently moving. The probability of randomly selecting a path depends on number of paths at a given SN (Fig. 15.24a, b). So, to select an appropriate RN, just use moving direction to determine the bias of each RN and select RN that is moving toward the BS. Thus, by slightly increasing the bias level of the message, forward data to RN with better bias toward the location of the BS. If there is a provision, SN could send many copies of the same data to multiple RNs (Fig. 15.25a). Select RNs such a way that will help to reduce the latency to BS. You could consider complex movement of the data (RN) relative to location of the BS. Latency of a single copy message forwarding algorithms as a biased random walking of message (RN) is shown in Fig. 11.25b, c.
So, there is a need to model a general random walking model that could possess both random walk and random waypoint walk which is difficult to do. So, an approximated formula of average message delivery time as a function of message bias level is feasible as there is a close relationship between mobility and bias. If RNs are independently moving randomly and delivering single copy to the BS via RNs, then that would lead to an optimal relay strategy. So, a basic scheme is to select a random destination point. Define a bias level between zero and one; once the destination is reached, it selects another arbitrary destination (and bias level) and repeats these three steps. Normalized visiting frequency along x-axis is shown in Fig. 15.26a and various 1-, 2-, 3-, and 4-hop neighbors in a 2-D mesh from the BS are shown in Fig. 15.26b. If bias level—>0, the schemes become equivalent to a regular random walk; while bias level—>1, the scheme is equivalent to random waypoint walk without pausing time. We can represent mixture of different random walkers by selecting different bias levels appropriately [9, 10] by modeling as a Markov chain in the case of unbiased walk (a = 0). The time taken by a message in reaching BS is given by
where (D + 1) is maximum distance of a SN from the BS along shortest path and d is the starting state of the random walk . The expected latency under this model is equivalent to generally known hitting time of a random walk in a grid and given by (n is the number of nodes in the grid):
Suppose we have a 2-D mesh like topology, where destination BS is at the center of an area. In a biased random walk, with a bias level \( 0 \le \alpha \le 1 \), the expected length of random walk path starting at d hops away from the BS follows the following bound:
where x is the current distance of the node from the BS during the random walk , α x is the bias level at node, and d is the state from where random walk starts. This leads to relay time in 2-D mesh as shown in Fig. 15.27a and simplified to 1-D graph as Fig. 15.27b. The corresponding Markov model is obtained as shown in Fig. 15.28. This gives results of Fig. 15.29 for one RN. When the number of RNs is increased, the results obtained are summarized in Fig. 15.30. The expected delay of biased random walk reduces quickly as bias level is increased from 0 to 0.1 and the delay becomes almost linear when bias level is 0.3. So, a small bias for far away nodes works effectively in a 2-D mesh WSN.
5 Conclusions
Regular topologies offer many advantages such as no need for neighbor discovery, easy clustering and CH selection, and underlying TDMA schedule to eliminate any potential collisions. The use of regular topologies ought to be stressed further in civilian applications. Further reduction in energy consumption is possible if relay nodes (RNs) are deployed to collect data from SN in one hop and ultimately deliver to BS. The use of multiple RNs could prove to be very useful.
6 Questions
-
Q.15.1.
How can you define a cluster in a regular WSN?
-
Q.15.2.
What kind of clustering is possible in the following WSNs?
-
Q.15.3.
Can you use sleep–awake cycles for Problem 15.2?
-
Q.15.4.
Can you determine a TDMA schedule for these examples?
-
Q.15.5.
4 RN will consume more power than 1 RN. What is the main advantage of using 4 RNs as compared to only 1 RN?
-
Q.15.6.
Can you use RN just to collect data from CHs in place of all SNs? What are the advantages?
-
Q.15.7.
In Q.15.6, can you aggregate data at CH before transferring to a RN? What is its impact?
-
Q.15.8.
In a triangular topology, assume clusters have been defined such that SNs in a cluster are at the most 3 hops away. Can you determine how each cluster looks like?
-
Q.15.9.
In Q.15.8, how do you compare this scheme if aggregation is done for the whole network at BS? What are the advantages and disadvantages of the two approaches?
-
Q.15.10.
Does data gathering from CHs in opportunistic wireless sensor network having 4 RNs depend on the size of the cluster?
-
Q.15.11.
Can you repeat Q.15.8 for hexagonal topology?
-
Q.15.12.
Can you repeat Q.15.8 for rectangular topology for 6 hops away? A RN monitors these CH. Define one way of traversing the WSN so as to minimize visiting time?
-
Q.15.13.
Repeat Q.15.10 when 2 and 4 RNs are used.
-
Q.15.14.
How do you compare data gathering in opportunistic wireless sensor network having 1 RN with a CH-based scheme?
References
K. Shashi Prabh, Chinmay Deshmukh, and Shikhar Sachan, “A Distributed Algorithm for Hexagonal Topology Formation in Wireless Sensor Networks,” Proceeding of ETFA’09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation, pp. 675–681.
F. G. Nocetti, I. Stomenovic, and J. Zhang, “Addressing and routing in Hexagonal Networks with applications for tracking mobile users and connection, rerouting in Cellular Networks, IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 9, Sept. 2002, pp. 963–971.
Ignasi Sau and Janez Zerovnik, “An Optimal Permutation Routing Algorithm on Full-Duplex Hexagonal Networks,” Discrete Mathematics and Theoretical Computer Science DMTCS vol. 10, no. 3, 2008, April 1–3, 2014, pp. 49–62.
K. Shashi Prabh and Tarek F. Abdelzaher, “On Scheduling and Real-Time Capacity of HexagonalWireless Sensor Networks,” www.cs.virginia.edu/~ksp2q/…/PA07_hexnet.pdf.
Rex Kincaid, Allison Oldham, and Gexin Yu, “Optimal open-locating-dominating sets in infinite Triangular Grids,” http://de.arxiv.org/pdf/1403.7061.
Bader Albader, Bella Bose, Mary Flahive, “Efficient communication algorithms in hexagonal mesh interconnection networks,” Journal of Latex Class Files, vol. 6, no. 1, Jan. 2007, pp. 1–10.
Stephanie Lindsey and Cauligi S. Raghavendra, “PEGASIS: Power-Efficient Gathering in Sensor Information Systems,” http://ceng.usc.edu/~raghu/pegasisrev.pdf.
Huilong Huang, John H. Hartman, and Terril N. Hurst, “Data-Centric Routing in Sensor Networks using Biased Walk,” www.cs.arizona.edu/~jhh/papers/secon06.pdf.
Jung Hyun (Peter) Jun, W. Fu, and Dharma P. Agrawal, “Impact of Biased Random Walk on the Average Delay of Opportunistic Single Copy Delivery in Manhattan Area,” Ad Hoc & Sensor Wireless Networks, pp. 195–222, 2011.
Pritam Shah, “Virtual Coordinate based technique for Wireless Sensor Networks: A simulation tool and localization & planarization algorithms,” MS Thesis, Colorado State University, Fort Collins, Colorado, Summer 2013.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Agrawal, D.P. (2017). Routing and Performance of Regular WSNs. In: Embedded Sensor Systems. Springer, Singapore. https://doi.org/10.1007/978-981-10-3038-3_15
Download citation
DOI: https://doi.org/10.1007/978-981-10-3038-3_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3037-6
Online ISBN: 978-981-10-3038-3
eBook Packages: EngineeringEngineering (R0)