SlideShare a Scribd company logo
1 of 6
Download to read offline
MuMHR: Multi-path, Multi-hop Hierarchical
                        Routing
                             Mohammad Hammoudeh∗, Alexander Kurz† , and Elena Gaura∗
                                          ∗ CogentComputing Applied Research Centre,
                                               Department of Creative Computing
                                                      Coventry University
                                    Coventry, CV1 5FB, UK. Email: aa2792@coventry.ac.uk
                                               † Department of Computer Science

                                                     University of Leicester
                                      Leicester, LE1 7RH, UK. Email: kurz@mcs.le.ac.uk


   Abstract— This paper proposes a self-organizing, cluster based    which is examined in this paper in order to reduce set-up
protocol- Multi-path, Multi-hop Hierarchical Routing (MuMHR)         communication overhead is the use of the back-off time for
- for use in large scale, distributed Wireless Sensor Networks       advertisement messages. Also the assumption that every node
(WSN). With MuMHR, robustness is achieved by each node
learning multiple paths and election of cluster-head backup          can transmit to reach the sink is relaxed by enabling multi-
node(s). Energy expenditure is reduced by shortening the distance    hop transmissions. Finally, to add reliability to the protocol,
between the node and its cluster-head and by reducing the setup      nodes transmit over multiple paths transmissions and backup
communication overhead. This is done through incorporating           cluster-heads are elected.
the number-of-hops metric in addition to the back-off waiting           The rest of the paper is organized as follows. Section II
time. Simulation results show that MuMHR performs better
than LEACH, which is the most promising hierarchical routing         briefly describes the network model and assumptions. Section
algorithm to date; MuMHR reduces the total number of set-up          III reviews the related work. Section IV describes the simula-
messages by up to 65% and enhances the data delivery ratio by        tion tool used for the work in this paper. Section V exhibits
up to 0.83.                                                          the details of MuMHR. Section VI presents simulation results.
                                                                     Section VII concludes the paper.
                      I. I NTRODUCTION
    Hierarchical routing is one of the most popular routing                                   II. LEACH
schemes in sensor networks [4], [8], [10], [11], [14], [15], [17].     The operation of LEACH is split into two phases, the set-
It is a two or more tier routing scheme known for its scalability    up phase and the steady-state phase. To minimize overhead,
and communication efficiency. Nodes in the upper tier are             the duration of the steady-state phase is longer than the set-up
called cluster-heads and act as a routing backbone, while            phase [5]. During the set-up phase, the clusters are created
nodes in the lower tier perform the sensing tasks. Kulkarni          and cluster-heads are elected. This election is made by every
et al. [6] argue that multi-tier networks are scalable and offer     node choosing a random number between 0 and 1. The sensor
a number of advantages over single-tier networks: lower cost,        node becomes cluster-head if this random number is less than
better coverage, higher functionality, and better reliability. A     the threshold T (n) set as:
sink-based single tier network can lead to congestion at the
gateway especially in dense sensor networks. This can cause                                            1
                                                                                      P/ 1 − P × r mod P           if n ∈ G
communication delays and inadequate tracking of the sensed                 T (n) =
                                                                                      0                            otherwise
events. Moreover, some of the routing algorithms for such
architecture are commonly not scalable. To overcome these            where P is the desired percentage of cluster-heads, r is the
problems, network clustering has been proposed as a possible         current round and G is the set of nodes that have not been
solution.                                                            selected as a cluster-head in the last 1/P rounds. The desired
    Low Energy Adaptive Clustering Hierarchy (LEACH) [5]             percentage of cluster-heads was found to be 5% of the total
is one of the most promising routing algorithms for sen-             number of nodes in the network [5]. Note that 0 cluster-heads
sor networks [4], [8], [10], [11], [14], [15], [17]. However,        and 100% cluster-heads is equivalent to direct communication.
LEACH has been based on a number of assumptions which                   After cluster-heads are chosen, they broadcast an advertise-
in the authors’ opinion limit its effectiveness in a number of       ment message to the entire network declaring that they are
applications. This paper proposes modifications to LEACH              the new cluster-heads. Every node receiving the advertisement
which will improve the robustness of the algorithm and reduce        decides to which cluster they wish to belong based on the
the energy consumption in the network. The dynamic cluster-          signal strength of the received message. The sensor node sends
ing brings extra overhead, such as head changes, which may           a message to register with the cluster-head of their choice.
diminish savings in energy consumption. A possible solution          Based on a Time Division Multiple Access (TDMA) approach,
the cluster-head assigns each node registered in its cluster a      to communicate with the sink. PEGASIS has a number of
time slot to send its data. This requires that every node must      drawbacks [3]:
support TDMA. The cluster-head keeps a list of all nodes in           •   It requires dynamic adjustment of network topology to
the cluster to inform them of the TDMA schedule.                          route data, which introduces significant overhead.
   During the steady-state phase, sensor nodes can start trans-       •   It requires location information.
mitting data to their respective cluster-head. The cluster-head       •   Similar to LEACH, PEGASIS assumes that all nodes can
applies aggregation functions to compress the data before                 communicate with the sink directly.
transmission to the sink. After a predetermined period of time        •   The head of the chain can become a bottleneck and cause
spent on the steady-state phase, the network enters the set-up            excessive transmission delays.
phase again and starts a new round of creating clusters.              •   It assumes that all nodes start with the same level of
   LEACH is well-suited for applications where constant mon-              energy and consumption rates are equal.
itoring is needed and data collection occurs periodically to a
centralized location [7]. It increases network lifetime in two      Hierarchical-PEGASIS [8] extends PEGASIS by introducing
ways. First, the load is distributed to all nodes but not all at    a hierarchy in the network topology. It aims to reduce trans-
the same time. Second, there is lossless aggregation of data by     mission delays to the sink and proposes a data gathering
the cluster-heads. The protocol is powerful and simple since        scheme that balances the energy and delay cost. Although
nodes do not require global knowledge or location information       Hierarchical-PEGASIS avoids the clustering overhead, it still
to create clusters. LEACH is able to increase the network           requires dynamic topological adjustments.
lifetime and it achieves a more than 7-fold reduction in energy        Manjeshwar and Agrawal implemented the Threshold-
dissipation compared to direct communication [5].                   sensitive Energy Efficient Protocol (TEEN), that utilizes
   Despite the significant overall energy savings, however, the      a hierarchical approach along with a data centric mecha-
assumptions made by the protocol raise a number of issues:          nism [10]. The same authors also developed the AdaPtive
   1) LEACH assumes that all nodes begin with the same              Threshold-sensitive Energy Efficient sensor Network protocol
       amount of energy and that the amount of energy a             (APTEEN) [11], which enhances TEEN by capturing periodic
       cluster-head consumes is more than that of a non-            data collection and reacting to time critical events. They
       cluster node. It also assumes that the amount of energy      demonstrated that APTEEN performance is between LEACH
       consumed by cluster-heads in every cluster round is          and TEEN in terms of energy dissipation and network lifetime.
       constant. This assumption is however not realistic. Fur-     TEEN gives the best performance since it decreases the
       thermore, making adjustments for differences in energy       number of transmissions. Both TEEN and APTEEN proto-
       consumption causes LEACH to be less efficient.                cols require additional traffic control to continually update
   2) LEACH assumes that all nodes can communicate with             the threshold values and complexity of forming clusters in
       each other and are able to reach the sink. Therefore, it     multiple levels, implementing threshold-based functions and
       is only suitable for small size networks.                    dealing with attribute-based naming of queries.
   3) LEACH requires that all nodes are continuously listen-           Smaragdakis et al. [15] address the issue of heterogeneity
       ing. This is not realistic in a random distribution of the   (in terms of energy) of nodes. Their protocol, called SEP
       sensor nodes, for example, where cluster-heads would         (Stable Election Protocol), is based on random selection of
       be located at the edge of the network.                       cluster-heads weighted according to the remaining node en-
   4) LEACH assumes that all nodes have data to send and so         ergy. This approach addresses the problem of varying energy
       assign a time slot for a node even though some nodes         levels and consumption rates but still assumes that the sink
       might not have data to transmit.                             can be reached directly by all nodes.
   5) LEACH assumes that all nearby nodes have correlated              LEACH-C (LEACH Centralised) [4] uses a central algo-
       data which is not always true.                               rithm to form clusters. This algorithm is not robust since it
   6) Finally, there is no mechanism to ensure that the elected     requires location information for all sensors in the network.
       cluster-heads (P) will be uniformly distributed over the        LEACH and its derivatives have been successful in reducing
       network. Hence, there is the possibility that all cluster-   the energy per bit required by each node and the network
       heads will be concentrated in one part of the network.       as a whole to communicate from the nodes to the sink.
                                                                    Nonetheless, most are built upon the inflexible assumptions
                    III. R ELATED W ORK                             that: every node is able to communicate directly with the sink;
  A number of enhancements over LEACH have been pro-                every communication path is equally likely to succeed; and,
posed previously [4], [8], [10], [11], [14], [15], [17]. Lindsey    every node has the same starting energy level and uses energy
and Raghavendra devised a protocol called Power Efficient            at the same rate. This paper provides a protocol with the same
GAthering in Sensor Information Systems (PEGASIS) [14]              underlying benefit as LEACH and derivatives but provides for
that is an improvement over LEACH. As opposed to LEACH,             multi-hop communication, and increases robustness by using
PEGASIS has no clusters, instead it creates chains from sensor      multiple communication paths. Also, in comparison to LEACH
nodes so that each node communicates only with their closest        and most derivatives, this protocol reduces the number of set-
neighbours and only one node is selected from the chain             up messages required, and thus should extend network life.
IV. S EN S OR P LUS                              In this protocol, the “number-of-hops” metric was intro-
                                                                    duced. It indicates how far the cluster-head is from the sensing
   In order to implement the routing algorithm proposed in
                                                                    node. This allows nodes to: (1) Select the nearest cluster-head
this paper and study its properties, a new version of an in-
                                                                    node, which saves energy and reduces messaging needed to
house sensor network simulator called SenSorPlus was used.
                                                                    bridge the distance between the cluster-head and the sensor
SenSor [12] is a realistic and scalable Python based simulator
                                                                    node; (2) Allows a node to learn the shortest path to the
that provides a workbench for prototyping algorithms for
                                                                    selected cluster-head. We have also used a back-off waiting
WSN. It consists of a fixed API, with customisable internals.
                                                                    time similar to one proposed in [16] to decrease the number of
Each simulated sensor node runs in its own thread and com-
                                                                    set-up messages and aid the formation of more geographically
municates using the same protocols as its physical counterpart
                                                                    uniform clusters. During the back-off waiting time, sensor
would be. This enables experimentation with different algo-
                                                                    nodes receive advertisement messages and only consider the
rithms for managing the network topology, simulating fault
                                                                    message with the smallest number-of-hops received during that
management strategies and so on, within the same simulation.
                                                                    time. This allows blocking of the advertisement flooding at
SenSorPlus is an extension of SenSor with an added interface
                                                                    the edges of neighbouring clusters. Both the number-of-hops
between the simulation environment and different hardware
                                                                    metric and the back-off waiting time allow energy efficient
platforms, for example the Gumstix [2] platform. SenSorPlus
                                                                    cluster formation.
bridges between SenSor and the Gumstix to allow applications
                                                                       The operation of the proposed routing protocol can be split
implemented within the simulator to be ported directly on to
                                                                    into two phases: the setup phase and the data transfer phase.
the hardware. Sensors are modelled using a pool of concurrent,
communicating threads. Individual sensors are able to:              A. Set-up Phase
   1) Gather and process data from a model environment
                                                                        During the set-up phase cluster-heads are selected and
   2) Locate and communicate with their nearest neighbours
                                                                    clusters are created. We assume that a simple addressing
   3) Determine whether they are operating correctly and act        scheme is in place and the sink knows the range of addresses
accordingly to alter the network topology in case of faulty         of nodes in the network. The sink randomly selects 5% of the
nodes being detected.                                               nodes as cluster-heads and broadcasts this information. Every
   Separate interfaces gather information from the network and      node that receives the discovery message changes its state from
display it on the graph pane or the chart pane, where individual    “waiting” to “discovered” and examines the message to check
data can be plotted during the simulation. This partitioning        whether it has been selected as cluster-head or not. If yes, it
allows us to experiment with different ways of processing           starts a new cluster by broadcasting an advertisement message.
individual node data into information.                              Otherwise, it forwards the message to its neighbours. Every
                                                                    node will remember the node from which it has received the
  V. M U MHR: MuLTI - PATH , M ULTI - HOP H IERARCHICAL
                                                                    discovery message as the immediate neighbour nearest to the
                        ROUTING
                                                                    sink. This path will be used only in cluster failure situations.
   In this section, the properties of the proposed routing          Every cluster-head will create an advertisement message that
protocol, MuMHR are described. The main objective of this           has the number-of-hops parameter set to zero and broadcasts
protocol is to provide substantially energy-efficient and robust     it to its neighbours. Upon receiving an advertisement message,
communication. The energy efficiency is achieved by load             a sensor node will do the following: (a) If the node already
balancing at two levels: (1) Network level, which involves          belongs to a cluster, then it ignores the received advertisement
traffic multiplexing over multiple paths; (2) Cluster level,         message; (b) If the back-off waiting timer is still valid, then it
introducing rotation of the cluster-heads every given interval of   caches the received packet and waits for other possible adver-
time. This prevents energy depletion resulting from constantly      tisements; (c) If the received message has a better number-of-
using the same path for transmission or particular nodes being      hops metric than the stored one, the latter is deleted and the
cluster-heads for a long duration. The multi-paths aspect is not    former is retained. When the back-off waiting time expires,
only used for load balancing but also when path failures occur.     the sensor node increases the number-of-hops parameter in
When a path fails, an alternative path can be immediately used      the retained packet and broadcasts it to its neighbours. The
which allows the protocol to dynamically adapt to failures          node will remember the address of the sender, the cluster-
without delays or degradation in the quality of service. At the     head, and the node from which it received the message as the
cluster set-up time, one or more nodes are chosen as cluster-       nearest neighbour to the cluster-head. If a sensor node receives
head backup node(s). Backup cluster-head node substitute for        multiple copies of the same advertisement, it selects the one(s)
the cluster-head in some failure cases or when the current          with minimum number-of-hops parameter. Then the node uses
cluster-head decides to reduce its participation in the protocol    the available energy to calculate a value that represents its
if its energy level approaches a certain threshold value. For       desire to be a cluster-head in the next cluster set-up round.
instance, if the current cluster-head decides to hand its role to   This value is included in the registration packet that the node
the backup node, it notifies the respective node and forwards        sends back to the chosen cluster-head. The cluster-head will
to it necessary information, such as the backup nodes list, to      extract the highest value(s) and adds its corresponding sender
avoid a complete cluster set-up phase.                              to the cluster-head backup list and registers the node as a
member of the cluster. Compacting different functions into a
single multi-purpose message reduces set-up communication
overhead and thus makes the protocol more stable and energy
efficient.
   When the cluster round time is over, the current cluster-
head hands the master role to the first node in the backup
nodes list. With a single flood to cluster members only, the
new cluster-head continues its predecessors’ role without the
need of further communications. The cluster-head role will
also be handed to the backup node when a fault occurs in the
current cluster-head node. However, in the study presented
here, a limited set of faults were considered for the “hand-
over” such as internal errors and the energy level approaches
a threshold. In the case of faults, such as physical damage
                                                                                       Fig. 1.     A 100-nodes WSN with random topology
or fatal internal errors in the cluster-head, the nodes will use
an alternative path until a backup node starts the process of
creating a new cluster.
B. Data Transmission Phase
   During the data transmission phase, sensing nodes transmit
data to their cluster-head. The cluster-heads aggregates the
received data before transmission to the sink or immediately
multiplex messages over multiple lines in time critical appli-
cations. Each member node transmits data on its assigned
time slot scheduled by TDMA. Furthermore, each cluster
                                                                                                 (a)                              (b)
communicates using unique Carrier Sense Multiple Access
(CDMA) codes to avoid interference with traffic generated by
other clusters.
                 VI. S IMULATION E XPERIMENTS
   Using the SenSorPlus framework, we implemented the
proposed algorithm. A demonstration of the simulation is
available online 1 . For our simulation, we gave all the nodes
an initial supply of energy and ran the protocol until it
converged. We consider the energy-efficiency of our routing
                                                                                                 (c)                              (d)
protocol in terms of the number of set-up messages. For our
experiments, we created a 100-node network, where the nodes                            Fig. 2.     Geographically uniform cluster formation
are scattered randomly on 600×600 grid, such that no two
nodes share the same location. Figure 1 shows a random node
distribution topology of 100-nodes, where the arrows represent               five clusters (P=5). The lines indicate the borders of different
communicating neighbours. The power of the sensors radio                     clusters. In each experiment we studied how the back-off
transmitter is set to cover all nodes within a 20m radius.                   waiting time and the number-of-hops metric can help to form
The processing delay for transmitting a message is randomly                  more geographically uniform clusters.
chosen between 5s and 10s. Using this network configuration,                     Topologies (a) and (b) were generated using LEACH (the
we ran the protocol and tracked its progress in terms of                     back-off waiting time and the number-of-hops were set to
number of messages sent and delays. The simulation results                   zero), whereas (c) and (d) were generated using MuMHR
are presented in the following subsections.                                  with the back-off waiting time set to 20s and the number-of-
A. Efficiency and Robustness                                                  hops initially set to zero. Figure 3 shows the node distribution
                                                                             among clusters in the four network topologies. The graphs
  In this subsection, we study how introducing the number-
                                                                             compare the distribution of nodes among clusters formed using
of-hops metric and the advertisements back-off waiting time
                                                                             LEACH with those formed using MuMHR. In the LEACH
can affect the energy efficient cluster formation. Figure 2
                                                                             topology (a), the first and fifth clusters hosted over 65%
shows four network topologies each resulting from a different
                                                                             of the total number of nodes while the other three clusters
simulation run. In each topology, nodes are organized into
                                                                             hosted less than 35% of the total network population. In
  1 http://www.cogentcomputing.org/cds/distributing/who/sensor/hi-cluster-   the second LEACH topology (b), the fifth cluster had zero
routing.html                                                                 nodes while the percentage of nodes fluctuated among the
40
                                                                                                             900
                         35
                                                                                                             800
                         30
                                                                                                             700
       Number of Nodes




                                                                                          Number of advertisments
                         25
                                                                                                             600
                         20                                                                                  500

                         15                                                                                  400

                         10                                                                                  300

                         5                                                                                   200

                                                                                                             100
                         0
                              (a)            (b)              (c)          (d)                                      0
                                                   Topology                                                              0       10         20                60          80        100
                                                                                                                                            Back-off waiting time



                              Fig. 3.   Node distribution among clusters                                                                     (a)

                                                                                                             120

other clusters between 7% and 30%. It can be clearly seen                                                    100
that there is no unifirm distribution of node numbers amongst
the clusters, which increases both the heavy clusters manage-                                                       80




                                                                                               Convergence time
ment overhead and also the energy comsumption. Whereas                                                              60
in MuMHR topologies (c) and (d), nodes were distributed
much more fairly among clusters. The number of nodes at                                                             40

every cluster maintained a maximum of 7% difference from                                                            20
the optimal population (20%). In topologies (a) and (b), the
area covered by different clusters varies largely. These cluster                                                    0
                                                                                                                         0   5    10   15        20      25         30   40    50   60
topologies are not energy efficient because data needs to                                                                                    Back-off waiting time


traverse large number of nodes to reach the cluster-head. In                                                                                 (b)
MuMHR generated topologies (c) and (d), the area of all
clusters is almost equivalent and nodes are distributed much                     Fig. 4. (a) The number of sent messages versus the back-off waiting time.
more fairly among the five clusters than in (a) and (b) as                        (b) The convergence time versus the back-off waiting time
figure 2 shows. This demonstrates that the back-off waiting
time together with the number-of-hops metric lead to the
formation of more energy efficient clusters by shortening the                     reduced. This means, reducing the back-off waiting time to
routes. The back-off waiting time gives more time to receive                     a minimal value to capture the advantages of the back-off
a smaller number-of-hops value. This allows nodes to register                    waiting time with minimal delay to achieve efficiency.
with the closest cluster-head resulting in more geographically
uniform clusters. Furthermore, the number of advertisement                       B. Fault-Tolerance and Reliability
messages is reduced, because nodes only forward the best                            Many of the proposed protocols in the field of sensor
advertisement received during the back-off waiting time. This                    networks show poor fault-tolerance in the face of frequent
stops unnecessary flooding at the border of neighbouring                          node failures [9]. MuMHR provides fault tolerance through a
clusters.                                                                        multi-path routing strategy. The multiple paths are learned by
   In figure 4(a), the number of network setup messages                           nodes during the set-up phase through redundant messages.
versus the back-off waiting time is drawn. When the back-                        For example, the path to the cluster-head node is learnt from
off waiting time is zero the total number of sent messages                       the advertisement message sent by the cluster-head. Each node
will be similar to that in LEACH. The figure shows that                           joins the cluster for a certain period of time TnC before it re-
as the back-off waiting time becomes larger, the number of                       registers with the cluster again or registers with a new cluster.
messages will decrease until the time becomes large enough                       The cluster also has a life TC1 ; a cluster-head starts a new
to receive advertisements from all cluster-heads. It reduces the                 cluster formation round by handing the cluster-head role to the
total number of set-up messages by up to 65% over LEACH.                         backup node. In this approach, the worst time TR to recover
Therefore, the back-off waiting time is effective in reducing                    from a node failure is the time taken for a node to leave a
overall set-up energy consumption.                                               cluster or to renew registration with the same cluster-head it
   Figure 4(b), shows the network convergence time versus the                    currently belongs to. This is written as: TR = TC1 − TnC .
back-off waiting time. A linear correspondence between the                       If all paths that a sensor node has learned fail, the node
time needed to establish routes and the back-off waiting time                    will broadcast its data to its neighbours. Neighbours will then
is evident. As the back-off waiting time increases, network                      pass the message to their cluster-head. The cluster-head may
convergence time will increase proportionally. In time critical                  receive multiple copies of the same message and eliminates
applications it is important that the convergence time is                        redundancy by applying aggregation. To measure the fault-
1                                                        enable multi-hop transmissions to relax LEACH’s inflexible
                                                                                assumption that all nodes in the network can communicate
                      0.9
                                                                                with each other. The new algorithm achieves robustness and
                      0.8
                                                                                efficiency without location information and with less energy
    Number of Nodes




                                                                                expenditure than LEACH. Simulation results confirm the effi-
                      0.7                                                       ciency of the algorithm in terms of communication reduction,
                                                                                robustness and energy savings. This routing algorithm was
                      0.6                                                       implemented and used by Shuttleworth et al. [13] and found to
                                                                                easily support various computationally demending applications
                      0.5
                                                                                for WSNs.
                      0.4                                                                          ACKNOWLEDGMENTS
                            10           30         50          70         90
                                                         DDR
                                                                                  The authors would like to thank Sarah Mount for her help
                                                                                and support in using SenSorPlus.
                            Fig. 5.   DDR versus number of functioning nodes                                 R EFERENCES
                                                                                 [1] J. Dunn and C. Martin. Terminology for frame relay benchmarking. In
                                                                                     Internet informational RFC 3133, June 2001.
tolerance capabilities of this protocol we make some nodes                       [2] Gumstix.com. Gumstix way small computing, 2007. [Online; accessed
                                                                                     26-March-2007].
function as faulty nodes by dropping all packets that they                       [3] M. Hammoudeh. Robust and energy efficient routing in wireless sensor
receive, and hence affecting the communication paths. These                          networks. Master’s thesis, University of Leicester, 2006.
nodes will become faulty after paths are set-up and recover to                   [4] W. Heinzelman. Application-specific protocol architectures for wireless
                                                                                     networks. In PhD thesis, Massachusetts institute of technology, June
function correctly in the next cluster formation round. In the                       2000.
simulation, 10% of the nodes are forced to break down after                      [5] W. Heinzelman, A. Chandrakasan, and H. Balakrishna. Energy-efficient
paths are established. The fault tolerance capabilities of this                      communication protocol for wireless microsensor networks. Proceedings
                                                                                     of the 33rd International Conference on System Sciences, January 2000.
routing protocol are evaluated using the Data Delivery Ratio                     [6] P. Kulkarni, D. Ganesan, and Prashant Shenoy. The case for multi-
(DDR) as a metric which measures the ability of the network to                       tier camera sensor networks. Proceedings of the 13th annual ACM
deliver packets to the sink through multi-paths. This measure                        international conference on Multimedia, pages 229–238, 2005.
                                                                                 [7] S.H. Lee and T.C. Chung. Data aggregation for wireless sensor networks
is easy to obtain and free with every received packet. DDR is a                      using self-organizing map. In Artificial Intelligence and Simulation,
service level parameter that indicates the network effectiveness                     volume 3397/2005, pages 508–517. Springer Berlin / Heidelberg, 2004.
in transmitting offered data in one direction of virtual connec-                 [8] S. Lindsey, C.S. Raghavendra, and K. Sivalingam. Data gathering in
                                                                                     sensor networks using the energy*delay metric. In Proceedings of the
tion [1]. It represents the ratio of packets successfully received                   IPDPS Workshop on Issues in Wireless Networks and Mobile Computing,
to packet transmission attempts. Attempted packets transmitted                       April 2001.
are referred to as DataOffered. Successfully delivered packets                    [9] Y. Liu and W.K.G. Seah. A priority-based multi-path routing protocol for
                                                                                     sensor networks. Personal, Indoor and Mobile Radio Communications,
are referred to as DataDelivered. Then the ratio can be written                      1:216–220, Sept. 2004.
as: DDR = DataDelivered/DataOffered.                                             [10] A. Manjeshwar and D.P. Agrawal. A protocol for enhanced efficiency
   Figure 5 shows the DDR versus the number of functioning                           in wireless sensor networks. In Proceedings of the 1st International
                                                                                     Workshop on Parallel and Distributed Computing Issues in Wireless
nodes. With the same configuration described in Section VI,                           Networks and Mobile Computing, April 2001.
the DDR value for ten runs each with a different network-                       [11] A. Manjeshwar and D.P. Agrawal. Apteen: A hybrid protocol for
density were drawn. The results show that the protocol main-                         efficient routing and comprehensive information retrieval in wireless
                                                                                     sensor networks. In Proceedings of the 2nd International Workshop
tained an average delivery ratio of 0.733. This demonstrates                         on Parallel and Distributed Computing Issues in Wireless Networks and
that multi-path routing can be used to recover from path                             Mobile computing, April 2002.
failures and results in a better delivery ratio. DDR increases                  [12] S. Mount, R. Newman, and E. Gaura. A simulation tool for system
                                                                                     services in ad-hoc wireless sensor networks. NSTI Nanotechnology
slightly as the network-density increases since higher network                       Conference and Trade Show, 3:423, May 2005.
density slightly counteracts the effect of dead nodes. This                     [13] J. Shuttleworth, M. Hammoudeh, E. Gaura, and R. Newman. Experi-
algorithm increases the DDR and reduces energy consumption                           mental applications of mapping services in wireless sensor networks. In
                                                                                     Fourth International Conference on Networked Sensing Systems, June
at the same time since packet multiplexing over duplicate paths                      2007.
helps in load balancing and prevents energy depletion.                          [14] S.Lindsey and C.S. Raghavendra. Pegasis: Power efficient gathering
                                                                                     in sensor information systems. In Proceedings of the IEEE Aerospace
                                          VII. C ONCLUSION                           Conference, March 2002.
                                                                                [15] G. Smaragdakis, I. Matta, and A. Bestavros. Sep: A stable election
   In this paper, we demonstrated MuMHR, which is an im-                             protocol for clustered heterogeneous wireless sensor networks. In
provement over LEACH. MuMHR provides solutions to some                               Second International Workshop on Sensor and Actor Network Protocols
                                                                                     and Applications (SANPA 2004), August 2004.
of the limitations of LEACH. The number-of-hops parameter                       [16] L. Xia, X. Chen, and X. Guan. A new gradient-based routing protocol
and the back-off waiting time resulted in more energy efficient                       in wireless sensor networks. Springer-Verlag Berline Heidelberg, 2005.
cluster formation. The algorithm uses redundant messages                        [17] M. Ye, C. Li, G. Chen, and J. Wu. Eecs: An energy efficient clustering
                                                                                     scheme in wireless sensor networks. In Performance, Computing, and
received from different sources to build a multi-path map,                           Communications Conference, 2005. IPCCC 2005. 24th IEEE Interna-
which allows auto-adaptation to path failures. MuMHR also                            tional, pages 535– 540, April 2005.

More Related Content

What's hot

Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET) Benyamin Moadab
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...CSCJournals
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...IAEME Publication
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

What's hot (18)

Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)	Ship Ad-hoc Network (SANET)
Ship Ad-hoc Network (SANET)
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
40120130406013
4012013040601340120130406013
40120130406013
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
A046020112
A046020112A046020112
A046020112
 
94
9494
94
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
C0431320
C0431320C0431320
C0431320
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
87
8787
87
 

Viewers also liked

Desaparegut per palamós
Desaparegut per palamósDesaparegut per palamós
Desaparegut per palamóscarmeo
 
Explore Bali with Singaporewww. Tripmart.com
Explore Bali with Singaporewww. Tripmart.comExplore Bali with Singaporewww. Tripmart.com
Explore Bali with Singaporewww. Tripmart.comtripmart
 
Explore europewww. Tripmart.com
Explore europewww. Tripmart.comExplore europewww. Tripmart.com
Explore europewww. Tripmart.comtripmart
 
Startup funding options for Student Entrepreneurs
Startup funding options for Student EntrepreneursStartup funding options for Student Entrepreneurs
Startup funding options for Student EntrepreneursJohn Spindler
 
окружность круг радиус диаметр
окружность круг радиус диаметрокружность круг радиус диаметр
окружность круг радиус диаметрkillaruns
 
Total Fluid Management(TFM) Services
Total Fluid Management(TFM) ServicesTotal Fluid Management(TFM) Services
Total Fluid Management(TFM) ServicesPraveen Kumar
 
Joseph & all things semitic italian
Joseph & all things semitic italianJoseph & all things semitic italian
Joseph & all things semitic italiandearl1
 
ใบงานที่ 7 เรื่อง โครงงานประเภท
ใบงานที่ 7 เรื่อง โครงงานประเภทใบงานที่ 7 เรื่อง โครงงานประเภท
ใบงานที่ 7 เรื่อง โครงงานประเภทJustice MengKing
 
решение уравнений
решение уравненийрешение уравнений
решение уравненийkillaruns
 
L'aparició
L'aparicióL'aparició
L'apariciócarmeo
 
Creating Brand Advocates
Creating Brand AdvocatesCreating Brand Advocates
Creating Brand AdvocatesJoe Orlando
 
Course 2 week 6 lesson 10
Course 2 week 6 lesson 10Course 2 week 6 lesson 10
Course 2 week 6 lesson 10Joe Mellin
 
Course 2 week 6 lesson 10
Course 2 week 6 lesson 10Course 2 week 6 lesson 10
Course 2 week 6 lesson 10Joe Mellin
 
Introduction to Cassandra
Introduction to CassandraIntroduction to Cassandra
Introduction to Cassandrashimi_k
 

Viewers also liked (20)

Desaparegut per palamós
Desaparegut per palamósDesaparegut per palamós
Desaparegut per palamós
 
Explore Bali with Singaporewww. Tripmart.com
Explore Bali with Singaporewww. Tripmart.comExplore Bali with Singaporewww. Tripmart.com
Explore Bali with Singaporewww. Tripmart.com
 
Explore europewww. Tripmart.com
Explore europewww. Tripmart.comExplore europewww. Tripmart.com
Explore europewww. Tripmart.com
 
Tabla paciente
Tabla pacienteTabla paciente
Tabla paciente
 
Startup funding options for Student Entrepreneurs
Startup funding options for Student EntrepreneursStartup funding options for Student Entrepreneurs
Startup funding options for Student Entrepreneurs
 
UCSF 6 1
UCSF 6 1UCSF 6 1
UCSF 6 1
 
окружность круг радиус диаметр
окружность круг радиус диаметрокружность круг радиус диаметр
окружность круг радиус диаметр
 
Total Fluid Management(TFM) Services
Total Fluid Management(TFM) ServicesTotal Fluid Management(TFM) Services
Total Fluid Management(TFM) Services
 
Amit kumar mishra
Amit kumar mishraAmit kumar mishra
Amit kumar mishra
 
Thanchanok Jina-1
Thanchanok Jina-1Thanchanok Jina-1
Thanchanok Jina-1
 
Joseph & all things semitic italian
Joseph & all things semitic italianJoseph & all things semitic italian
Joseph & all things semitic italian
 
ปิรามิด .2 (6)
ปิรามิด .2 (6)ปิรามิด .2 (6)
ปิรามิด .2 (6)
 
ใบงานที่ 7 เรื่อง โครงงานประเภท
ใบงานที่ 7 เรื่อง โครงงานประเภทใบงานที่ 7 เรื่อง โครงงานประเภท
ใบงานที่ 7 เรื่อง โครงงานประเภท
 
решение уравнений
решение уравненийрешение уравнений
решение уравнений
 
L'aparició
L'aparicióL'aparició
L'aparició
 
semantik
semantiksemantik
semantik
 
Creating Brand Advocates
Creating Brand AdvocatesCreating Brand Advocates
Creating Brand Advocates
 
Course 2 week 6 lesson 10
Course 2 week 6 lesson 10Course 2 week 6 lesson 10
Course 2 week 6 lesson 10
 
Course 2 week 6 lesson 10
Course 2 week 6 lesson 10Course 2 week 6 lesson 10
Course 2 week 6 lesson 10
 
Introduction to Cassandra
Introduction to CassandraIntroduction to Cassandra
Introduction to Cassandra
 

Similar to MuMHR: Multi-path, Multi-hop Hierarchical Routing

Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringIJCNCJournal
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACHEditor IJCATR
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...IOSR Journals
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...M H
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 

Similar to MuMHR: Multi-path, Multi-hop Hierarchical Routing (20)

Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)A novel routing technique for mobile ad hoc networks (manet)
A novel routing technique for mobile ad hoc networks (manet)
 
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on ClusteringEnergy Consumption Reduction in Wireless Sensor Network Based on Clustering
Energy Consumption Reduction in Wireless Sensor Network Based on Clustering
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
C04501027035
C04501027035C04501027035
C04501027035
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...Multicast Routing Protocol with Group-Level Congestion  Prediction and Perman...
Multicast Routing Protocol with Group-Level Congestion Prediction and Perman...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 

More from M H

Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...M H
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveyM H
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
Building Programming Abstractions for Wireless Sensor Networks Using Watershe...
Building Programming Abstractions for Wireless Sensor Networks Using Watershe...Building Programming Abstractions for Wireless Sensor Networks Using Watershe...
Building Programming Abstractions for Wireless Sensor Networks Using Watershe...M H
 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesM H
 
An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...M H
 
Experimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor NetworksExperimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor NetworksM H
 
CSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and JythonCSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and JythonM H
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...M H
 
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...M H
 
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...M H
 
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...M H
 
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksAn Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksM H
 
Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...
Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...
Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...M H
 

More from M H (16)

Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
 
Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
 
Simulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A Survey
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
Building Programming Abstractions for Wireless Sensor Networks Using Watershe...
Building Programming Abstractions for Wireless Sensor Networks Using Watershe...Building Programming Abstractions for Wireless Sensor Networks Using Watershe...
Building Programming Abstractions for Wireless Sensor Networks Using Watershe...
 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and Approaches
 
An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...An Overview and Classification of Approaches to Information Extraction in Wir...
An Overview and Classification of Approaches to Information Extraction in Wir...
 
Experimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor NetworksExperimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor Networks
 
CSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and JythonCSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and Jython
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
 
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
An Integrated Inductive-Deductive Framework for Data Mapping in Wireless Sens...
 
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge ...
 
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
Pennies from Heaven: a retrospective on the use of wireless sensor networks f...
 
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor NetworksAn Approach to Data Extraction and Visualisation for Wireless Sensor Networks
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks
 
Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...
Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...
Enhancing Student Learning Experience and Satisfaction Using Virtual Learning...
 

MuMHR: Multi-path, Multi-hop Hierarchical Routing

  • 1. MuMHR: Multi-path, Multi-hop Hierarchical Routing Mohammad Hammoudeh∗, Alexander Kurz† , and Elena Gaura∗ ∗ CogentComputing Applied Research Centre, Department of Creative Computing Coventry University Coventry, CV1 5FB, UK. Email: aa2792@coventry.ac.uk † Department of Computer Science University of Leicester Leicester, LE1 7RH, UK. Email: kurz@mcs.le.ac.uk Abstract— This paper proposes a self-organizing, cluster based which is examined in this paper in order to reduce set-up protocol- Multi-path, Multi-hop Hierarchical Routing (MuMHR) communication overhead is the use of the back-off time for - for use in large scale, distributed Wireless Sensor Networks advertisement messages. Also the assumption that every node (WSN). With MuMHR, robustness is achieved by each node learning multiple paths and election of cluster-head backup can transmit to reach the sink is relaxed by enabling multi- node(s). Energy expenditure is reduced by shortening the distance hop transmissions. Finally, to add reliability to the protocol, between the node and its cluster-head and by reducing the setup nodes transmit over multiple paths transmissions and backup communication overhead. This is done through incorporating cluster-heads are elected. the number-of-hops metric in addition to the back-off waiting The rest of the paper is organized as follows. Section II time. Simulation results show that MuMHR performs better than LEACH, which is the most promising hierarchical routing briefly describes the network model and assumptions. Section algorithm to date; MuMHR reduces the total number of set-up III reviews the related work. Section IV describes the simula- messages by up to 65% and enhances the data delivery ratio by tion tool used for the work in this paper. Section V exhibits up to 0.83. the details of MuMHR. Section VI presents simulation results. Section VII concludes the paper. I. I NTRODUCTION Hierarchical routing is one of the most popular routing II. LEACH schemes in sensor networks [4], [8], [10], [11], [14], [15], [17]. The operation of LEACH is split into two phases, the set- It is a two or more tier routing scheme known for its scalability up phase and the steady-state phase. To minimize overhead, and communication efficiency. Nodes in the upper tier are the duration of the steady-state phase is longer than the set-up called cluster-heads and act as a routing backbone, while phase [5]. During the set-up phase, the clusters are created nodes in the lower tier perform the sensing tasks. Kulkarni and cluster-heads are elected. This election is made by every et al. [6] argue that multi-tier networks are scalable and offer node choosing a random number between 0 and 1. The sensor a number of advantages over single-tier networks: lower cost, node becomes cluster-head if this random number is less than better coverage, higher functionality, and better reliability. A the threshold T (n) set as: sink-based single tier network can lead to congestion at the gateway especially in dense sensor networks. This can cause 1 P/ 1 − P × r mod P if n ∈ G communication delays and inadequate tracking of the sensed T (n) = 0 otherwise events. Moreover, some of the routing algorithms for such architecture are commonly not scalable. To overcome these where P is the desired percentage of cluster-heads, r is the problems, network clustering has been proposed as a possible current round and G is the set of nodes that have not been solution. selected as a cluster-head in the last 1/P rounds. The desired Low Energy Adaptive Clustering Hierarchy (LEACH) [5] percentage of cluster-heads was found to be 5% of the total is one of the most promising routing algorithms for sen- number of nodes in the network [5]. Note that 0 cluster-heads sor networks [4], [8], [10], [11], [14], [15], [17]. However, and 100% cluster-heads is equivalent to direct communication. LEACH has been based on a number of assumptions which After cluster-heads are chosen, they broadcast an advertise- in the authors’ opinion limit its effectiveness in a number of ment message to the entire network declaring that they are applications. This paper proposes modifications to LEACH the new cluster-heads. Every node receiving the advertisement which will improve the robustness of the algorithm and reduce decides to which cluster they wish to belong based on the the energy consumption in the network. The dynamic cluster- signal strength of the received message. The sensor node sends ing brings extra overhead, such as head changes, which may a message to register with the cluster-head of their choice. diminish savings in energy consumption. A possible solution Based on a Time Division Multiple Access (TDMA) approach,
  • 2. the cluster-head assigns each node registered in its cluster a to communicate with the sink. PEGASIS has a number of time slot to send its data. This requires that every node must drawbacks [3]: support TDMA. The cluster-head keeps a list of all nodes in • It requires dynamic adjustment of network topology to the cluster to inform them of the TDMA schedule. route data, which introduces significant overhead. During the steady-state phase, sensor nodes can start trans- • It requires location information. mitting data to their respective cluster-head. The cluster-head • Similar to LEACH, PEGASIS assumes that all nodes can applies aggregation functions to compress the data before communicate with the sink directly. transmission to the sink. After a predetermined period of time • The head of the chain can become a bottleneck and cause spent on the steady-state phase, the network enters the set-up excessive transmission delays. phase again and starts a new round of creating clusters. • It assumes that all nodes start with the same level of LEACH is well-suited for applications where constant mon- energy and consumption rates are equal. itoring is needed and data collection occurs periodically to a centralized location [7]. It increases network lifetime in two Hierarchical-PEGASIS [8] extends PEGASIS by introducing ways. First, the load is distributed to all nodes but not all at a hierarchy in the network topology. It aims to reduce trans- the same time. Second, there is lossless aggregation of data by mission delays to the sink and proposes a data gathering the cluster-heads. The protocol is powerful and simple since scheme that balances the energy and delay cost. Although nodes do not require global knowledge or location information Hierarchical-PEGASIS avoids the clustering overhead, it still to create clusters. LEACH is able to increase the network requires dynamic topological adjustments. lifetime and it achieves a more than 7-fold reduction in energy Manjeshwar and Agrawal implemented the Threshold- dissipation compared to direct communication [5]. sensitive Energy Efficient Protocol (TEEN), that utilizes Despite the significant overall energy savings, however, the a hierarchical approach along with a data centric mecha- assumptions made by the protocol raise a number of issues: nism [10]. The same authors also developed the AdaPtive 1) LEACH assumes that all nodes begin with the same Threshold-sensitive Energy Efficient sensor Network protocol amount of energy and that the amount of energy a (APTEEN) [11], which enhances TEEN by capturing periodic cluster-head consumes is more than that of a non- data collection and reacting to time critical events. They cluster node. It also assumes that the amount of energy demonstrated that APTEEN performance is between LEACH consumed by cluster-heads in every cluster round is and TEEN in terms of energy dissipation and network lifetime. constant. This assumption is however not realistic. Fur- TEEN gives the best performance since it decreases the thermore, making adjustments for differences in energy number of transmissions. Both TEEN and APTEEN proto- consumption causes LEACH to be less efficient. cols require additional traffic control to continually update 2) LEACH assumes that all nodes can communicate with the threshold values and complexity of forming clusters in each other and are able to reach the sink. Therefore, it multiple levels, implementing threshold-based functions and is only suitable for small size networks. dealing with attribute-based naming of queries. 3) LEACH requires that all nodes are continuously listen- Smaragdakis et al. [15] address the issue of heterogeneity ing. This is not realistic in a random distribution of the (in terms of energy) of nodes. Their protocol, called SEP sensor nodes, for example, where cluster-heads would (Stable Election Protocol), is based on random selection of be located at the edge of the network. cluster-heads weighted according to the remaining node en- 4) LEACH assumes that all nodes have data to send and so ergy. This approach addresses the problem of varying energy assign a time slot for a node even though some nodes levels and consumption rates but still assumes that the sink might not have data to transmit. can be reached directly by all nodes. 5) LEACH assumes that all nearby nodes have correlated LEACH-C (LEACH Centralised) [4] uses a central algo- data which is not always true. rithm to form clusters. This algorithm is not robust since it 6) Finally, there is no mechanism to ensure that the elected requires location information for all sensors in the network. cluster-heads (P) will be uniformly distributed over the LEACH and its derivatives have been successful in reducing network. Hence, there is the possibility that all cluster- the energy per bit required by each node and the network heads will be concentrated in one part of the network. as a whole to communicate from the nodes to the sink. Nonetheless, most are built upon the inflexible assumptions III. R ELATED W ORK that: every node is able to communicate directly with the sink; A number of enhancements over LEACH have been pro- every communication path is equally likely to succeed; and, posed previously [4], [8], [10], [11], [14], [15], [17]. Lindsey every node has the same starting energy level and uses energy and Raghavendra devised a protocol called Power Efficient at the same rate. This paper provides a protocol with the same GAthering in Sensor Information Systems (PEGASIS) [14] underlying benefit as LEACH and derivatives but provides for that is an improvement over LEACH. As opposed to LEACH, multi-hop communication, and increases robustness by using PEGASIS has no clusters, instead it creates chains from sensor multiple communication paths. Also, in comparison to LEACH nodes so that each node communicates only with their closest and most derivatives, this protocol reduces the number of set- neighbours and only one node is selected from the chain up messages required, and thus should extend network life.
  • 3. IV. S EN S OR P LUS In this protocol, the “number-of-hops” metric was intro- duced. It indicates how far the cluster-head is from the sensing In order to implement the routing algorithm proposed in node. This allows nodes to: (1) Select the nearest cluster-head this paper and study its properties, a new version of an in- node, which saves energy and reduces messaging needed to house sensor network simulator called SenSorPlus was used. bridge the distance between the cluster-head and the sensor SenSor [12] is a realistic and scalable Python based simulator node; (2) Allows a node to learn the shortest path to the that provides a workbench for prototyping algorithms for selected cluster-head. We have also used a back-off waiting WSN. It consists of a fixed API, with customisable internals. time similar to one proposed in [16] to decrease the number of Each simulated sensor node runs in its own thread and com- set-up messages and aid the formation of more geographically municates using the same protocols as its physical counterpart uniform clusters. During the back-off waiting time, sensor would be. This enables experimentation with different algo- nodes receive advertisement messages and only consider the rithms for managing the network topology, simulating fault message with the smallest number-of-hops received during that management strategies and so on, within the same simulation. time. This allows blocking of the advertisement flooding at SenSorPlus is an extension of SenSor with an added interface the edges of neighbouring clusters. Both the number-of-hops between the simulation environment and different hardware metric and the back-off waiting time allow energy efficient platforms, for example the Gumstix [2] platform. SenSorPlus cluster formation. bridges between SenSor and the Gumstix to allow applications The operation of the proposed routing protocol can be split implemented within the simulator to be ported directly on to into two phases: the setup phase and the data transfer phase. the hardware. Sensors are modelled using a pool of concurrent, communicating threads. Individual sensors are able to: A. Set-up Phase 1) Gather and process data from a model environment During the set-up phase cluster-heads are selected and 2) Locate and communicate with their nearest neighbours clusters are created. We assume that a simple addressing 3) Determine whether they are operating correctly and act scheme is in place and the sink knows the range of addresses accordingly to alter the network topology in case of faulty of nodes in the network. The sink randomly selects 5% of the nodes being detected. nodes as cluster-heads and broadcasts this information. Every Separate interfaces gather information from the network and node that receives the discovery message changes its state from display it on the graph pane or the chart pane, where individual “waiting” to “discovered” and examines the message to check data can be plotted during the simulation. This partitioning whether it has been selected as cluster-head or not. If yes, it allows us to experiment with different ways of processing starts a new cluster by broadcasting an advertisement message. individual node data into information. Otherwise, it forwards the message to its neighbours. Every node will remember the node from which it has received the V. M U MHR: MuLTI - PATH , M ULTI - HOP H IERARCHICAL discovery message as the immediate neighbour nearest to the ROUTING sink. This path will be used only in cluster failure situations. In this section, the properties of the proposed routing Every cluster-head will create an advertisement message that protocol, MuMHR are described. The main objective of this has the number-of-hops parameter set to zero and broadcasts protocol is to provide substantially energy-efficient and robust it to its neighbours. Upon receiving an advertisement message, communication. The energy efficiency is achieved by load a sensor node will do the following: (a) If the node already balancing at two levels: (1) Network level, which involves belongs to a cluster, then it ignores the received advertisement traffic multiplexing over multiple paths; (2) Cluster level, message; (b) If the back-off waiting timer is still valid, then it introducing rotation of the cluster-heads every given interval of caches the received packet and waits for other possible adver- time. This prevents energy depletion resulting from constantly tisements; (c) If the received message has a better number-of- using the same path for transmission or particular nodes being hops metric than the stored one, the latter is deleted and the cluster-heads for a long duration. The multi-paths aspect is not former is retained. When the back-off waiting time expires, only used for load balancing but also when path failures occur. the sensor node increases the number-of-hops parameter in When a path fails, an alternative path can be immediately used the retained packet and broadcasts it to its neighbours. The which allows the protocol to dynamically adapt to failures node will remember the address of the sender, the cluster- without delays or degradation in the quality of service. At the head, and the node from which it received the message as the cluster set-up time, one or more nodes are chosen as cluster- nearest neighbour to the cluster-head. If a sensor node receives head backup node(s). Backup cluster-head node substitute for multiple copies of the same advertisement, it selects the one(s) the cluster-head in some failure cases or when the current with minimum number-of-hops parameter. Then the node uses cluster-head decides to reduce its participation in the protocol the available energy to calculate a value that represents its if its energy level approaches a certain threshold value. For desire to be a cluster-head in the next cluster set-up round. instance, if the current cluster-head decides to hand its role to This value is included in the registration packet that the node the backup node, it notifies the respective node and forwards sends back to the chosen cluster-head. The cluster-head will to it necessary information, such as the backup nodes list, to extract the highest value(s) and adds its corresponding sender avoid a complete cluster set-up phase. to the cluster-head backup list and registers the node as a
  • 4. member of the cluster. Compacting different functions into a single multi-purpose message reduces set-up communication overhead and thus makes the protocol more stable and energy efficient. When the cluster round time is over, the current cluster- head hands the master role to the first node in the backup nodes list. With a single flood to cluster members only, the new cluster-head continues its predecessors’ role without the need of further communications. The cluster-head role will also be handed to the backup node when a fault occurs in the current cluster-head node. However, in the study presented here, a limited set of faults were considered for the “hand- over” such as internal errors and the energy level approaches a threshold. In the case of faults, such as physical damage Fig. 1. A 100-nodes WSN with random topology or fatal internal errors in the cluster-head, the nodes will use an alternative path until a backup node starts the process of creating a new cluster. B. Data Transmission Phase During the data transmission phase, sensing nodes transmit data to their cluster-head. The cluster-heads aggregates the received data before transmission to the sink or immediately multiplex messages over multiple lines in time critical appli- cations. Each member node transmits data on its assigned time slot scheduled by TDMA. Furthermore, each cluster (a) (b) communicates using unique Carrier Sense Multiple Access (CDMA) codes to avoid interference with traffic generated by other clusters. VI. S IMULATION E XPERIMENTS Using the SenSorPlus framework, we implemented the proposed algorithm. A demonstration of the simulation is available online 1 . For our simulation, we gave all the nodes an initial supply of energy and ran the protocol until it converged. We consider the energy-efficiency of our routing (c) (d) protocol in terms of the number of set-up messages. For our experiments, we created a 100-node network, where the nodes Fig. 2. Geographically uniform cluster formation are scattered randomly on 600×600 grid, such that no two nodes share the same location. Figure 1 shows a random node distribution topology of 100-nodes, where the arrows represent five clusters (P=5). The lines indicate the borders of different communicating neighbours. The power of the sensors radio clusters. In each experiment we studied how the back-off transmitter is set to cover all nodes within a 20m radius. waiting time and the number-of-hops metric can help to form The processing delay for transmitting a message is randomly more geographically uniform clusters. chosen between 5s and 10s. Using this network configuration, Topologies (a) and (b) were generated using LEACH (the we ran the protocol and tracked its progress in terms of back-off waiting time and the number-of-hops were set to number of messages sent and delays. The simulation results zero), whereas (c) and (d) were generated using MuMHR are presented in the following subsections. with the back-off waiting time set to 20s and the number-of- A. Efficiency and Robustness hops initially set to zero. Figure 3 shows the node distribution among clusters in the four network topologies. The graphs In this subsection, we study how introducing the number- compare the distribution of nodes among clusters formed using of-hops metric and the advertisements back-off waiting time LEACH with those formed using MuMHR. In the LEACH can affect the energy efficient cluster formation. Figure 2 topology (a), the first and fifth clusters hosted over 65% shows four network topologies each resulting from a different of the total number of nodes while the other three clusters simulation run. In each topology, nodes are organized into hosted less than 35% of the total network population. In 1 http://www.cogentcomputing.org/cds/distributing/who/sensor/hi-cluster- the second LEACH topology (b), the fifth cluster had zero routing.html nodes while the percentage of nodes fluctuated among the
  • 5. 40 900 35 800 30 700 Number of Nodes Number of advertisments 25 600 20 500 15 400 10 300 5 200 100 0 (a) (b) (c) (d) 0 Topology 0 10 20 60 80 100 Back-off waiting time Fig. 3. Node distribution among clusters (a) 120 other clusters between 7% and 30%. It can be clearly seen 100 that there is no unifirm distribution of node numbers amongst the clusters, which increases both the heavy clusters manage- 80 Convergence time ment overhead and also the energy comsumption. Whereas 60 in MuMHR topologies (c) and (d), nodes were distributed much more fairly among clusters. The number of nodes at 40 every cluster maintained a maximum of 7% difference from 20 the optimal population (20%). In topologies (a) and (b), the area covered by different clusters varies largely. These cluster 0 0 5 10 15 20 25 30 40 50 60 topologies are not energy efficient because data needs to Back-off waiting time traverse large number of nodes to reach the cluster-head. In (b) MuMHR generated topologies (c) and (d), the area of all clusters is almost equivalent and nodes are distributed much Fig. 4. (a) The number of sent messages versus the back-off waiting time. more fairly among the five clusters than in (a) and (b) as (b) The convergence time versus the back-off waiting time figure 2 shows. This demonstrates that the back-off waiting time together with the number-of-hops metric lead to the formation of more energy efficient clusters by shortening the reduced. This means, reducing the back-off waiting time to routes. The back-off waiting time gives more time to receive a minimal value to capture the advantages of the back-off a smaller number-of-hops value. This allows nodes to register waiting time with minimal delay to achieve efficiency. with the closest cluster-head resulting in more geographically uniform clusters. Furthermore, the number of advertisement B. Fault-Tolerance and Reliability messages is reduced, because nodes only forward the best Many of the proposed protocols in the field of sensor advertisement received during the back-off waiting time. This networks show poor fault-tolerance in the face of frequent stops unnecessary flooding at the border of neighbouring node failures [9]. MuMHR provides fault tolerance through a clusters. multi-path routing strategy. The multiple paths are learned by In figure 4(a), the number of network setup messages nodes during the set-up phase through redundant messages. versus the back-off waiting time is drawn. When the back- For example, the path to the cluster-head node is learnt from off waiting time is zero the total number of sent messages the advertisement message sent by the cluster-head. Each node will be similar to that in LEACH. The figure shows that joins the cluster for a certain period of time TnC before it re- as the back-off waiting time becomes larger, the number of registers with the cluster again or registers with a new cluster. messages will decrease until the time becomes large enough The cluster also has a life TC1 ; a cluster-head starts a new to receive advertisements from all cluster-heads. It reduces the cluster formation round by handing the cluster-head role to the total number of set-up messages by up to 65% over LEACH. backup node. In this approach, the worst time TR to recover Therefore, the back-off waiting time is effective in reducing from a node failure is the time taken for a node to leave a overall set-up energy consumption. cluster or to renew registration with the same cluster-head it Figure 4(b), shows the network convergence time versus the currently belongs to. This is written as: TR = TC1 − TnC . back-off waiting time. A linear correspondence between the If all paths that a sensor node has learned fail, the node time needed to establish routes and the back-off waiting time will broadcast its data to its neighbours. Neighbours will then is evident. As the back-off waiting time increases, network pass the message to their cluster-head. The cluster-head may convergence time will increase proportionally. In time critical receive multiple copies of the same message and eliminates applications it is important that the convergence time is redundancy by applying aggregation. To measure the fault-
  • 6. 1 enable multi-hop transmissions to relax LEACH’s inflexible assumption that all nodes in the network can communicate 0.9 with each other. The new algorithm achieves robustness and 0.8 efficiency without location information and with less energy Number of Nodes expenditure than LEACH. Simulation results confirm the effi- 0.7 ciency of the algorithm in terms of communication reduction, robustness and energy savings. This routing algorithm was 0.6 implemented and used by Shuttleworth et al. [13] and found to easily support various computationally demending applications 0.5 for WSNs. 0.4 ACKNOWLEDGMENTS 10 30 50 70 90 DDR The authors would like to thank Sarah Mount for her help and support in using SenSorPlus. Fig. 5. DDR versus number of functioning nodes R EFERENCES [1] J. Dunn and C. Martin. Terminology for frame relay benchmarking. In Internet informational RFC 3133, June 2001. tolerance capabilities of this protocol we make some nodes [2] Gumstix.com. Gumstix way small computing, 2007. [Online; accessed 26-March-2007]. function as faulty nodes by dropping all packets that they [3] M. Hammoudeh. Robust and energy efficient routing in wireless sensor receive, and hence affecting the communication paths. These networks. Master’s thesis, University of Leicester, 2006. nodes will become faulty after paths are set-up and recover to [4] W. Heinzelman. Application-specific protocol architectures for wireless networks. In PhD thesis, Massachusetts institute of technology, June function correctly in the next cluster formation round. In the 2000. simulation, 10% of the nodes are forced to break down after [5] W. Heinzelman, A. Chandrakasan, and H. Balakrishna. Energy-efficient paths are established. The fault tolerance capabilities of this communication protocol for wireless microsensor networks. Proceedings of the 33rd International Conference on System Sciences, January 2000. routing protocol are evaluated using the Data Delivery Ratio [6] P. Kulkarni, D. Ganesan, and Prashant Shenoy. The case for multi- (DDR) as a metric which measures the ability of the network to tier camera sensor networks. Proceedings of the 13th annual ACM deliver packets to the sink through multi-paths. This measure international conference on Multimedia, pages 229–238, 2005. [7] S.H. Lee and T.C. Chung. Data aggregation for wireless sensor networks is easy to obtain and free with every received packet. DDR is a using self-organizing map. In Artificial Intelligence and Simulation, service level parameter that indicates the network effectiveness volume 3397/2005, pages 508–517. Springer Berlin / Heidelberg, 2004. in transmitting offered data in one direction of virtual connec- [8] S. Lindsey, C.S. Raghavendra, and K. Sivalingam. Data gathering in sensor networks using the energy*delay metric. In Proceedings of the tion [1]. It represents the ratio of packets successfully received IPDPS Workshop on Issues in Wireless Networks and Mobile Computing, to packet transmission attempts. Attempted packets transmitted April 2001. are referred to as DataOffered. Successfully delivered packets [9] Y. Liu and W.K.G. Seah. A priority-based multi-path routing protocol for sensor networks. Personal, Indoor and Mobile Radio Communications, are referred to as DataDelivered. Then the ratio can be written 1:216–220, Sept. 2004. as: DDR = DataDelivered/DataOffered. [10] A. Manjeshwar and D.P. Agrawal. A protocol for enhanced efficiency Figure 5 shows the DDR versus the number of functioning in wireless sensor networks. In Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless nodes. With the same configuration described in Section VI, Networks and Mobile Computing, April 2001. the DDR value for ten runs each with a different network- [11] A. Manjeshwar and D.P. Agrawal. Apteen: A hybrid protocol for density were drawn. The results show that the protocol main- efficient routing and comprehensive information retrieval in wireless sensor networks. In Proceedings of the 2nd International Workshop tained an average delivery ratio of 0.733. This demonstrates on Parallel and Distributed Computing Issues in Wireless Networks and that multi-path routing can be used to recover from path Mobile computing, April 2002. failures and results in a better delivery ratio. DDR increases [12] S. Mount, R. Newman, and E. Gaura. A simulation tool for system services in ad-hoc wireless sensor networks. NSTI Nanotechnology slightly as the network-density increases since higher network Conference and Trade Show, 3:423, May 2005. density slightly counteracts the effect of dead nodes. This [13] J. Shuttleworth, M. Hammoudeh, E. Gaura, and R. Newman. Experi- algorithm increases the DDR and reduces energy consumption mental applications of mapping services in wireless sensor networks. In Fourth International Conference on Networked Sensing Systems, June at the same time since packet multiplexing over duplicate paths 2007. helps in load balancing and prevents energy depletion. [14] S.Lindsey and C.S. Raghavendra. Pegasis: Power efficient gathering in sensor information systems. In Proceedings of the IEEE Aerospace VII. C ONCLUSION Conference, March 2002. [15] G. Smaragdakis, I. Matta, and A. Bestavros. Sep: A stable election In this paper, we demonstrated MuMHR, which is an im- protocol for clustered heterogeneous wireless sensor networks. In provement over LEACH. MuMHR provides solutions to some Second International Workshop on Sensor and Actor Network Protocols and Applications (SANPA 2004), August 2004. of the limitations of LEACH. The number-of-hops parameter [16] L. Xia, X. Chen, and X. Guan. A new gradient-based routing protocol and the back-off waiting time resulted in more energy efficient in wireless sensor networks. Springer-Verlag Berline Heidelberg, 2005. cluster formation. The algorithm uses redundant messages [17] M. Ye, C. Li, G. Chen, and J. Wu. Eecs: An energy efficient clustering scheme in wireless sensor networks. In Performance, Computing, and received from different sources to build a multi-path map, Communications Conference, 2005. IPCCC 2005. 24th IEEE Interna- which allows auto-adaptation to path failures. MuMHR also tional, pages 535– 540, April 2005.