Академический Документы
Профессиональный Документы
Культура Документы
MATHIBALA .V
(RR11CA2001)
COIMBATORE - 641114
INDIA
DECEMBER 2012
CERTIFICATE
thesis has not formed the basis for the award of any Degree/Diploma/Associate
I
DECLARATION
fulfillment of the requirements for the award of the Degree of Master of Philosophy in
by me under the supervision and guidance of Mrs. Seiya Susan Thomas., Assistant
II
ACKNOWLEDGEMENT
First and foremost, I would like to thank My Lord and Saviour Jesus
Christ with a humble heart, for being with me and providing me the strength to
with the best infrastructure and sponsoring me to carry out the research
meticulously.
Vice Chancellor in charge Dr. E. J. James and our Registrar, Dr. C. Joseph
Dr. R. Elijah Blessing for all his inspiration and support during this research
work.
III
I am heartily thankful to my supervisor, Mrs. Seiya Susan Thomas,
research work.
UmaMaheswari M.Tech, Mrs. Mary Suresh Mathew M.Sc for their valuable
I thank, Mrs. Lilly Puspham, Ms. A. Renuka, Ms. P. Shobana, and Ms.
Stella and Sister Mrs. V. Kavitha for their prayers and encouragement.
(MATHIBALA .V)
IV
ABSTRACT
A wireless sensor network is a network that is made of hundreds or thousands of
sensor nodes which are densely deployed in an unattended environment with the
capabilities of sensing, wireless communications and computations which collects and
disseminates environmental data. For many applications in wireless sensor networks,
users may want to continuously extract data from the networks for analysis later.
However, accurate data extraction is difficult and it is often too costly to obtain all sensor
readings, as well as not necessary in the sense that the readings themselves only represent
samples of the true state of the world.
V
CONTENTS
CERTIFICATE I
DECLARATION II
ACKNOWLEDGEMENT III
ABSTRACT V
LIST OF FIGURES IX
LIST OF TABLES IX
ABBREVATIONS X
1.Introduction 1
1.2.2. Gateways 4
2 .Literature Review 6
2.4. Clustering 8
VI
3. Methodology and System Development 14
3.1. Objective 14
3.3.3. Linux 17
3.3.4. C++ 18
VII
3.6.4. Impact of clustering protocol on energy consumption 36
5. Conclusion 50
APPENDIX 52
REFERENCES 66
VIII
LIST OF FIGURES
LIST OF TABLE
IX
ABBREVIATIONS
ARP Address Resolution Protocol
CH Cluster Head
X
RCH Radius Of This Cluster
RD Route Discovery
XI
XII
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
CHAPTER 1
INTRODUCTION
1.1WIRELESS SENSOR NETWORKS
Wireless sensor networks are typically used in highly dynamic, and hostile
environments with no human existence (unlike conventional data networks), and
therefore, they must be tolerant to the failure and loss of connectivity of individual node.
The sensor nodes should be intelligent to recover from failures with minimum human
involvement. Networks should support process of autonomous formation of connectivity,
addressing, and routing structure. Architecture of
1
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
wireless sensor network is designed taking all these factors into consideration. The
architecture consists of
a. The sensor nodes that form the sensor network. Their main objectives are
making discrete, local measurement about phenomenon surrounding these sensors,
forming a wireless network by communicating over a wireless medium, and
collect data and route data back to the user via sink (Base Station).
b. The sink (Base Station) communicates with the user via internet or satellite
communication. It is located near the sensor field or well-equipped nodes of the
sensor network. Collected data from the sensor field routed back to the sink by a
multi-hop infrastructure less architecture through the sink. The basic architecture
of Wireless sensor Network is shown in Figure1.1.
2
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Wireless sensor networks consist of individual nodes that are able to interact with
the environment by sensing or controlling physical parameters. These nodes have to
collaborate to fulfill their tasks. The nodes are interlinked together, and by using wireless
links each node is able to communicate and collaborate with each other [24].In Figure1.
2, the wireless sensor network infrastructure in shown which comprises of the standard
components like sensor nodes (used as source, sink/actuators), gateways, Internet, and
satellite link, etc.
3
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Sensor nodes are the network components that will be sensing and delivering the
data. Depending on the routing algorithms used, sensor nodes will initiate transmission
according to measures and/or a query originated from the Task Manager. According to
the system application requirements, nodes may do some computations. After
computations, it can pass its data to its neighboring nodes or simply pass the data as it is
to the Task Manager. The sensor node can act as a source or sink/actuator in the sensor
field. The definition of a source is to sense and deliver the desired information. Hence, a
source reports the state of the environment. On the other hand, a sink/actuator is a node
that is interested in some information a sensor in the network might be able to deliver.
1.2.2 Gateways
The Task Manager will connect to the gateways via some media like Internet or
satellite link [32]. Task Managers comprise of data service and client data browsing and
processing. These Task Managers can be visualized as the information retrieval and
processing platform. All information (raw, filtered, processed) data coming from sensor
4
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
nodes is stored in the task managers for analysis. Users can use any display interface (i.e.
PDA, computers) to retrieve/analyze these information locally or remotely.
5
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
CHAPTER 2
LITERATURE REVIEW
Energy conservation is a critical issue in the design of sensor networks since the
sensor nodes are battery-powered. WSN has been considered as a promising method for
reliably monitoring both civil and military environments under hazardous conditions.
Due to such condition, the power supply for sensor in the network cannot be usually
rechargeable or replaceable. The design of protocols and applications for such networks
has to be energy aware in order to prolong the lifetime of the network because it is quite
difficult to recharge node batteries. A node in WSN depends on batteries for their energy
source. However, since a battery’s lifetime is limited, the power resource is at a premium.
But wireless signal transmission, reception, retransmission, and beaconing operations all
consume battery power. Energy efficiency in mobile nodes can be achieved through
6
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
7
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Predictor is one of the important techniques, which uses the past input values from
the sensors in order to perform the prediction operations. The existence of such prediction
capability implies that the sensors do not need to transmit the data values if they differ
from a predicted value by less than a certain prespecified threshold, or error bound. A
simple approach to developing a predictor in sensor networks is simply to transmit the
data from all sensors to the base station (i.e., the sink), which has been realized in many
previous studies [22], [34], and [10]. Predictor training and prediction operations are
carried out by the base station only, but not the sensor nodes, despite their increasing
computing capacity.
This solution while practical has many disadvantages, such as a high energy
consumption incurred by transmitting the raw data to the base station, the need for
wireless link bandwidth, and potential high latency.
2.4. Clustering
Cluster can be formed by the set of sensor nodes in a geographical area, where
data locality exists among the sensor nodes, and clusters are dynamically split/merged to
maintain good locality within each cluster. All sensor nodes in a cluster are called cluster
members, including one elected cluster head. The cluster head collects and aggregates
information from sensors in its own cluster and passes on information to the Base Station.
Cluster head performs data aggregation and BS receives compressed data. By rotating the
cluster-head randomly, energy consumption is expected to be uniformly distributed. The
clustering based localized prediction can be used to reduce energy consumption incurred
by transmitting the raw data to the base station.
A cluster head also a sensor node maintains a set of history data of each sensor
node within a cluster. Clustering based local prediction in sensor networks faces a couple
of new challenges. First, since the cost of training a predictor is nontrivial, trade-off
between communication and computation has to be carefully investigated. To support
8
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Sensor nodes typically use irreplaceable power with the limited capacity, the
node’s capacity of computing, communicating, and storage is very limited, which
requires WSN protocols need to conserve energy as the main objective of maximizing the
network lifetime. A number of protocols have been proposed to reduce useful energy
consumption. These protocols can be classified into three classes. Protocols in the first
class control the transmission power level at each node to increase network capacity
while keeping the network connected [18], [25]. Protocols in the second class make
routing decisions based on power optimization goals, e.g., [15], [20], [9], [11]. Protocols
in the third class control the network topology by determining which nodes should
participate in the network operation (be awake) and which should not (remain asleep) [5],
[38], [6]. Nodes in this case, however, require knowledge of their locations via GPS-
capable antennae or via message exchange. Hierarchical (clustering) techniques can aid
in reducing useful energy consumption [11]. Clustering is particularly useful for
applications that require scalability to hundreds or thousands of nodes. Scalability in this
9
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
context implies the need for load balancing, efficient resource utilization, and data
aggregation. Protocols like leach and heed are introduced to achieve energy efficiency
due to clustering.
The selection of cluster head node in LEACH [25] has some deficiencies such as,
10
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Some very big clusters and very small clusters may exist in the network at the
same time.
Unreasonable cluster head selection while the nodes have different energy.
Cluster member nodes deplete energy after cluster head was dead.
The algorithm does not take into account the location of nodes.
Ignores residual energy, geographic location and other information, which may
easily
Suggesting different strategies of cluster head selection and its role rotation.
in communicating with the base station is shared by all sensor nodes in the sensor
network. It is shown that LEACH is scalable and achieves high energy efficiency for all
the sensor nodes. However, a key assumption is that all the nodes can communicate with
the base station directly, which can be restrictive for some sensor network configurations.
Compared with LEACH, to approach achieves higher scalability with the introduction of
a hierarchical structure, thus allowing the sensors that are multiple hops away from the
base station to successfully transmit the packets along the constructed topology tree. The
key features of LEACH are:
- Randomized rotation of the cluster "base stations" or "cluster heads" and the
corresponding clusters.
In LEACH, the operation is separated into fixed-length rounds, where each round starts
with a setup phase followed by a steady-state phase. The duration of a round is
determined priori.
Although, LEACH has shown good features to sensor networks, it suffers from the
following drawbacks:
- The nodes on the route a hot spot to the sink could drain their power fast. This problem
is known as "hot spot" problem.
12
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Therefore, for Autonomic wireless sensor networks with stable and fixed homogeneous
nodes the LEACH protocol will give good performance. For a Autonomic Sensor
Network with stationary, battery powered nodes it would be effective to use clustered
based protocol like LEACH, the most obvious reason is, its advantages such as reduced
control messages, bandwidth reusability, enhanced resource allocation, improved power
control and lest wastage of energy.
HEED was designed to select different cluster heads in a field according to the
amount of energy that is distributed in relation to a neighboring node.
Goals of HEED
13
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
CHAPTER 3
3.1. OBJECTIVE
14
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Localized prediction techniques are highly energy efficient due to the reduced
length of routing path for transmitting sensor data. Prediction operation can be
enabled/disabled to achieve energy efficiency. If the sensor nodes are disabled, the
prediction problem is reduced to estimating data distribution parameters. The framework
for clustering-based data collection consists of two Phases:
1) Clustering: Sensor nodes form clusters and cluster heads collect and maintain
data values.
1. Topology formation
1. Topology formation
This module describes the topology Control Problems can be further divided into two
15
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
This module is to predict the data values and based on the predicted value data is
sent to the base station this prediction operation can be enabled/disabled.
The nodes use a period of sleep/awake interval based on the prediction and
provide effective energy conservation.
To develop this system with IBM compatible personal computer with Pentium IV
processor was used.
Protocol : C++
3.3.3. Linux
Linux is a Unix-like computer operating system family that uses the Linux kernel .
A Linux system which includes system utilities and libraries from the GNU Project is
16
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
sometimes referred to as GNU/Linux. Most development from 1984 to 1991 was done by
the GNU project. After 1991, the Linux kernel developers began working on it as well as
other enthusiasts. From the late-90s onward Linux also gained the support of corporations
such as IBM, Sun Microsystems, Hewlett-Packard, and Novell. Linux is a prominent
example of free software and of open source development. Since Linux source code is
available as an open source code it can be used, modify, and also redistribute it at free of
cost. Also the entire Linux operating system in some instances is available as free or open
source software.
In 1991, work on the Linux kernel was began by Linux Thorvaldsen. It was he
who created the Linux kernel as a replacement for the non-free Linux kernel originally.
Initially Linux was dependent on Minx user space. Later the Linux kernel developers and
the GNU project developers allowed Linux to work with GNU components also. At last
Linux operating system filled the major gap in running a complete and full fledged
functional operating system built from free software. In recent days Linux is used in
various domains like, from the embedded systems to supercomputers, and has gained a
stronghold in server installations. Thorvaldsen continues with his research development
of the Linux kernel. There was a need for development of third party components, which
were later developed by individuals and other corporations. Those third party components
comprises a vast body of work which may include both the kernel modules and as well as
the user-land applications and the related libraries. Linux vendors combine and distribute
the kernel, GNU components, and non-GNU components with additional package
management software in the form of Linux distributions.
3.3.4. C++
Nam is a Tcl /TK based animation tool for viewing network simulation traces and
real world packet trace data [26]. Basic idea behind the theory and design of NAM was
to create an animator which gives an output picture of the programmed concept. This
reads the large animation data set and uses in different network visualization situations.
NAM can also read simple animation event commands from a large trace file.
Main use of NAM file is to generate the trace file. The generated trace file
contains of the entire topology information like, for e.g., nodes, links, tracing the packet
movements etc. During an NS simulation user can produce topology configurations,
layout information, and packet traces using tracing events in NS. Once the simulation is
executed, the trace file is generated which intern is used by the NAM file for animation
purpose.
18
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
One of the advantages of this split-language program approach is that it allows for
fast generation of large scenarios. To simply use the simulator, it is sufficient to know
OTcl. On the other hand, one disadvantage is that modifying and extending the simulator
requires programming and debugging in both languages.
19
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Simulation -
C++ Libraries
This increases the confidence in it. Versions are available for FreeBSD, Linux,
Solaris, Windows and Mac OS X.
20
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
NS2 is built using object oriented methods in C++ and OTCL (object oriented
variant of TCL.
Can see in Fig 3.2, NS2 interprets the simulation scripts written in OTCL. A user has to
set the different components (e.g. event scheduler objects, network components libraries
and setup module libraries) up in the simulation environment. The user writes his
simulation as a OTCL script, plumbs the network components together to the complete
simulation. If they need new network components, it is free to implement them and to
set them up in his simulation as well. The event scheduler as the other major component
besides network components triggers the events of the simulation (e.g. sends packets,
starts and stops tracing). Some parts of NS2 are written in C++ for efficiency reasons.
The data path (written in C++) is separated from the control path (written in OTCL). Data
path object are compiled and then made available to the OTCL interpreter through an
OTCL linkage which maps methods and member variables of the C++ object to methods
and variables of the linked OTCL object. The C++ objects are controlled by OTCL
objects. It is possible to add methods and member variables to a C++ linked OTCL
object.
21
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
– Transport protocols: TCP and UDP for uni-cast and SRM for multicast.
– Traffic sources: web, ftp, telnet, cbr (constant bit rate), stochastic, real audio.
– Emulation.
– Ad hoc routing with different protocols, e.g. AODV, DSR, DSDV, TORA
– Wired-cum-wireless networks
– Mobile IP
– Directed diffusion
– Satellite
– Sensor-MAC
– Energy models
• Tracing
• Visualization
– Trace Graph
• Utilities
This section describes the wireless model that was originally ported as CMU’s
Monarch group’s mobility extension to NS2. The first section covers the original
mobility model ported from CMU/Monarch group. In this section, cover the internals of a
mobile node, routing mechanisms and network components that are used to construct the
network stack for a mobile node. The components that are covered briefly are Channel,
Network interface, Radio propagation model, MAC protocols, Interface Queue, Link
layer and Address resolution protocol model (ARP). CMU trace support and Generation
of node movement and traffic scenario files are also covered in this section. The original
CMU model allows simulation of pure wireless LANs or multi-hop ad-hoc networks.
Further extensions were made to this model to allow combined simulation of wired and
wireless networks. Mobile IP was also extended to the wireless model.
The wireless model essentially consists of the Mobile Node at the core, with
additional supporting features that allows simulations of multi-hop ad-hoc networks,
wireless LANs etc. The Mobile Node object is a split object. The C++ class Mobile Node
is derived from parent class Node. A Mobile Node thus is the basic Node object with
added functionalities of a wireless and mobile node like ability to move within a given
topology, ability to receive and transmit signals to and from a wireless channel etc. A
major difference between them, though, is that a Mobile Node is not connected by means
of Links to other nodes or mobile nodes. In this section we shall describe the internals of
Mobile Node, its routing mechanisms, the routing protocols DSDV, AODV, TORA and
DSR, creation of network stack allowing channel access in Mobile Node, brief
description of each stack component, trace support and movement/traffic scenario
generation for wireless simulations. The point to consider is whether prediction is really
energy efficient or not. To solve this problem, a localized prediction model is developed
first. Very complex models are not practical in application due to the limited
computational capacity of sensor nodes. Fortunately, simple linear predictors are
24
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
sufficient to capture the temporal correlation of realistic sensor data [23, 7]. If the
destination is found, node transmits data in the same way as in destination sequenced
distance vector (DSDV). If not, it start Route Discovery mechanism: Source node
broadcast the Route Request packet to its neighbor nodes, which in turns rebroadcast this
request to their neighbor nodes until finding possible way to the destination.
When intermediate node receives a Route Request (RREQ), it updates the route to
previous node and checks whether it satisfies the two conditions: (i) there is an available
entry which has the same destination with RREQ (ii) its sequence number is greater or
equal to sequence number of RREQ. If not, it rebroadcast RREQ. If yes, it generates a
RREP message to the source node. When Route Reply (RREP) is routed back, node in
the reverse path updates their routing table with the added next hop information. If a node
receives a RREQ that it has seen before (checked by the sequence number), it discards
the RREQ for preventing loop. If source node receives more than one RREP, the one
with greater sequence number will be chosen. For two RREPs with the same sequence
number, the one will less number of hops to destination will be chosen. When a route is
found, it is maintained by Route Maintenance mechanism: Each node periodically send
Hello packet to its neighbors for proving its availability. When Hello packet is not
received from a node in a time, link to that node is considered to be broken. The node
which does not receive Hello message will invalidate all of its related routes to the failed
node and inform other neighbor using this node by Route Error packet. The source if still
want to transmit data to the destination should restart Route Discovery to get a new path.
AODV has advantages of decreasing the overhead control messages, low processing,
quick adapt to net work topology change, more scalable up to 10000 mobile nodes.
However, the disadvantages are that AODV the packets. Also there is always a small
time delay at the begin of a new connection because the initiator must first find the route
to the target.
Mobile Node is the basic ns Node object with added functionalities like
movement, ability to transmit and receive on a channel that allows it to be used to create
mobile, wireless simulation environments. The class Mobile Node is derived from the
base class Node. Mobile Node is a split object. The mobility features including node
movement, periodic position updates, maintaining topology boundary etc are
implemented in C++ while plumbing of network components within Mobile Node itself
(like classifiers, DMUX , LL, Mac, Channel etc) have been implemented in OTCL. The
functions and procedures described in this subsection can be found in ~ns/mobile
node.{cc,h}, ~ns/TCL/lib/ns-mobilenode.tcl, ~ns/TCL/mobility/dsdv.tcl,
~ns/TCL/mobility/dsr.tcl, ~ns/TCL/mobility/tora.tcl. Example scripts can be found in
~ns/TCL/ex/wireless-test.tcl and ~ns/TCL/ex/wireless.tcl. While the first example uses a
small topology of 3 nodes, the second example runs over a topology of 50 nodes. These
scripts can be run simply by typing.
The five ad-hoc routing protocols that are currently supported are Destination
Sequence Distance Vector (DSDV), Dynamic Source Routing (DSR), Temporally
ordered Routing Algorithm (TORA), Ad hoc On-demand Distance Vector (AODV) and
Protocol for Unified Multicasting Through Announcements (PUMA). The primitive to
create a mobile node is described below. Please note that the old APIs for creating a
mobile node depended on which routing protocol was used, like
where
$opt(rp)
26
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
defines "dsdv", "aodv", "tora", "dsr" or "puma" and id is the index for the mobile node.
But the old API's use is being deprecated and the new API is described as follows.
-llType $opt(ll)
-macType $opt(mac)
-ifqType $opt(ifq)
-ifqLen $opt(ifqlen)
-antType $opt(ant)
-phyType $opt(netif)
-topoInstance $topo
-wiredRouting OFF
-agentTrace ON
-routerTrace ON
-macTrace ON
The above API configures for a mobile node with all the given values of ad hoc-
routing protocol, network stack, channel, topography, propagation model, with wired
routing turned on or off (required for wired-cum-wireless scenarios) and tracing turned
on or off at different levels (router, mac, agent). Incase hierarchical addressing is being
27
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
used, the heir address of the node needs to be passed as well. For more info about this
command (part of new node APIs) see chapter titled "Restructuring ns node and new
Node APIs" in ns Notes and Documentation.
All node instances created after a given node-configuration command will have
the same property unless a part or all of the nodeconfig command is executed with
different parameter values. And all parameter values remain unchanged unless they are
explicitly changed. So after creation of the AODV base-station and mobile nodes, if we
want to create simple nodes, we will use the following node-configuration command.
This will set all parameter values to their default setting which basically defines
configuration of a simple node. Currently, this type of node configuration is oriented
towards wireless and satellite nodes. Table 3.1 lists the available options for these kinds
of nodes.
28
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
29
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
30
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
The root of the hierarchy is the TCL Object class that is the super class of all
OTCL library objects (scheduler, network components, timers and the other objects
including NAM related ones). As an ancestor class of TCL Object, NS Object class is the
super class of all basic network component objects that handle packets, which may
compose compound network objects such as nodes and links. The basic network
components are further divided into two subclasses, Connector and Classifier, based on
the number of the possible output DATA paths. The basic network and objects that have
only one output DATA path are under the Connector class, and switching objects that
have possible multiple output DATA paths are under the Classifier class.
32
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
string to the interpreter that then evaluates the string in a global context. These methods
will return to the caller if the interpreter returns TCL_OK. On the other hand, if the
interpreter returns TCL_ERROR, the methods will call tkerror {}. The user can overload
this procedure to selectively disregard certain types of errors.
1. Passing Results to/from the Interpreter; When the interpreter invokes a C++
method, it expects the result back in the private member variable, tcl-> result.
2. Error Reporting and Exit; This method provides a uniform way to report errors
in the compiled code.
3.6. Design and Development
3.6.1. PHASE 1. Topology formation
Topology formation is important issue in WSN. Performance parameters such as
energy consumption, network life time data delivery delay, sensor field coverage depends
on network topology control Problems. This module describes the basic operation i.e.;
deployment of sensor nodes and neighbor node calculation and selection of cluster head
in WSN. To achieve a lasting and scalable WSN design, the following aspects have been
carefully taken into account in the design stage:
• Energy conservation.
• Limited bandwidth.
• Unstructured and time-varying network topology.
• Low-quality communications.
• Operation in hostile environments.
• Data processing.
• Scalability.
The network topology in WSNs can be changed by varying the nodes’ transmitting
range and adjusting the sleep/awake schedule of all nodes. Therefore, further energy can
be saved if the network topology can be maintained in an optimal manner.
33
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Topology controls problem can be divided into two categories: Sensor Coverage
topology and sensor connectivity topology. The coverage topology describes the
topology of sensor coverage and is concerned about how to maximize liable sensing area
while consuming less power. The connectivity topology on the other hand is more
concerned about network connectivity and emphasizes the message retrieve and delivery
in the network. Two kinds of mechanisms have been utilized to maintain an efficient
sensor connectivity topology: Power Control Mechanisms and Power Management
Mechanisms. The former controls the radio power level to achieve optimized
connectivity topology and the later maintains a good sleep/ awake schedule.
3.6.2. Power Control Mechanisms
0.9n. This means that a considerable amount of energy is spent to connect relatively few
nodes.
Non-homogeneous networks are more challenging because nodes are allowed to
have different transmitting ranges. The problem of assigning a transmitting range to
nodes in such a way that the resulting communication graph is strongly connected and the
energy cost is minimum is called the Range Assignment (RA) problem [29]. The
computational complexity of RA has been analyzed in [35, 36]. It is shown to be NP-hard
in the case of 2D and 3D networks. However the optimal solution can be approximated
within a factor of 2 using the range assignment generated in [19]. An important variant of
RA has been recently studied is based on the concept of symmetry of the communication
graph. Due to the high overhead [21]needed to handle unidirectional links in routing
protocols or MAC protocols which are naturally designed to work under the symmetric
assumption, Symmetric Range Assignment (SRA) shows more practical significance.
However, show that SRA remains NP-hard in 2D and 3D networks, and it even incurs a
considerable additional energy cost over RA [3]. Thus SRA can be refined to WSRA
(Weakly Symmetric Range Assignment) which weakens the requirement that the
communication graph contains only bidirectional links by allowing the existence of the
unidirectional links but requiring the symmetric sub graph of the communication graph
resulting from RA connected. In the released WSRA problem, only marginal effect on
the energy cost has been induced while the desired symmetry property has been kept.
Two polynomial approximation algorithms for WSRA [32] propose a lot of power
control approaches have been trying to design simple and practical protocols that build
and maintain a reasonably good topology [29]. A present a distributed power control
algorithm is presented that can leverages on location information to build a topology that
is proven to minimize the energy required to communicate with a given master node [28,
29]. Consider a two tired Wireless Sensor Network (WSN) consisting of sensor clusters
deployed around strategic locations and base-stations (BSs) whose locations are relatively
flexible.
35
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
needs large amount of power must be distributed for energy-efficient networks. Fig. 3.5
and 3.6 show intra-cluster and inter-cluster range.
Another parameter which affects the energy efficient network is time interval between
FND (time the first node died) and LND (time the last node died). Consequently
minimum time interval between FND and LND generates greatest energy efficient
network.
37
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
send it to sink. Performing aggregation function over cluster-head still causes significant
energy wastage. In case of homogeneous sensor network cluster-head will soon die out
and again re-clustering has to be done which again cause energy consumption.
predicted representative data value to approximate the true data. The intuition of this
choice is that if a value is close to the predicted value there is not much benefit by
reporting it. If the value is much different from the predicted value, it is important to
consider it for computing the data distribution. To solve this problem, first develop a
localized prediction model. Very complex models are not practical in the application due
to the limited computational capacity of sensor nodes. Fortunately, simple linear
predictors are sufficient to capture the temporal correlation of realistic sensor data as [7,
23]. A history based linear predictor is one of popular approaches to predicting the future
based on past n measurement xˆ p( x t 1 , x t 2 ,...., x t n) . In particular, it has the properties: 1)
kxˆt p(kx ,kx ,..., kx ) and 2) p'x (.) c, where c is constant, and n p'x (.) 1
t 1 t 2 t n t i i 1
t i
39
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
model denoted by R p is written as where ,..., are the parameters of the model.
1
Here, c is a constant always presumed to be zero and w is a white noise process with zero
t
equations [28] or using the least square method. The parameters are often updated on
every measurement and the estimation is carried out by both the cluster header and 2
cluster members to achieve synchronization. If the error tolerant and correlation
coefficient x ( j ) satisfy
k 1
m x 1 (1) the
1 j 1 j x ( j )
p
2k
scheme with local prediction is more energy efficient, where the parameters are given as
in table (3.2). Equation (1) gives the error bound condition. This result says, if the
correlation coefficient is too small, prediction will not be accurate. As a result, sensor
data values are often not within the error bound and will still be transmitted to the cluster
head. Meanwhile, if the error bound is small, the condition is not easily satisfied either
and transmissions are still required. Together, this corollary tells that algorithm selection
should be determined based on both the desired error bound and the predictability of the
sensor data and from experimental results the effect on the parameter m is not
deterministic. While a large value of ‘m’ often leads to the condition of (1) hardly
satisfied and there by the prediction scheme at the node is prone to being disabled, it can
reduce the energy consumption as a long term predictor when the condition is satisfied.
40
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Algorithm 3.1 shows the pseudo code description of the algorithms at the cluster
head the cluster head maintains a set (a circular array) of history data for each cluster
member. The algorithm shows the cluster head will continuously receive data values
from each cluster member to update the set of history data or when no data values are
received will use the predicted value instead for update. The cluster head also runs a
periodic process, to determine algorithm selection, with or without local prediction. The
decision is broadcast to all cluster members.
Process at the cluster members
if prediction is disabled or xi xˆ i
41
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Algorithm 3.2 is the pseudo code description at each cluster node. Each cluster
member maintains a set of history data of its own. If “no local prediction”, is selected it
simply transmits the data values. If local prediction is turned on, the cluster member will
perform prediction on each data value. If the data value is not within the error bound, it
will be sent to the cluster head too. Meanwhile, the local set of history data should be
updated as well. In particular, if local prediction is enabled and the data value is within
the error bound, the predicted value not the actual value will be included in the set of
history data. The purpose is to maintain the consistency between local and the cluster
head.
3.6.7. PHASE 3: Including Sleep/Awake Algorithm
Variety of sleep/awake scheduling protocols has been proposed in the literature.
Most of them use a period sleep/awake interval and provide effective energy conservation
at the cost of delay and throughput. For example, for a source node to transmit data, it has
to know the sleep/awake schedule of the neighbor node and has to wait for the neighbor
to come into the active state. The same is repeated until the data reaches the final
destination thus resulting in unprecedented delays. This increase in delay is equal to the
product of the number of intermediate forwarders times the length of the wakeup
interval [34]. Such increase in end-to-end delay incurred due to latency energy trade off
has the potential to become major problem in many emerging delay-sensitive WSN
applications, which require fast response and real-time control.
Secondly, because of the multi-hop communication paradigm of WSNs, a node's
role in routing is important. Based on topology different nodes have different significance
in the network. For instance, a scenario where there is only one node acting as a bridge
between two distinct parts of the networks will have to forward all the traffic of one part
of the network. Thus, delay can be minimized by allocating sleep/awake schedule to the
nodes according to the traffic load determined by the node's importance in connectivity.
Giving a higher wake interval to heavily loaded nodes to ensure their availability when
42
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
they are needed and giving a lower wake interval to lightly loaded nodes to save their
energy.
not easily satisfied either and transmissions are still required. Together, this corollary tells
that algorithm selection should be determined based on both the desired error bound and
the predictability of the sensor data. While a large value of m often leads to the condition
of hardly satisfied and thereby the prediction scheme at the nodes are prone to being
disabled, it can reduce the energy consumption as a long term predictor when the
condition is satisfied.
Algorithms at the cluster head
while member i is awake
if timeout after m seconds
if condition (2) holds
let member i power off for m f seconds
awake member i
Algorithm 3.3 Sleep/awake scheduling
Sleep/Awake scheduling is based on the following observation. For some
applications, the approximation may not be strictly required. The applications may
tolerate few, if any, missing data values not within the error bound. If the confidence is
very high, e.g., above a specified threshold, say threshold , the cluster members may never
report data values to the cluster head. Therefore, there is no paramount need for the
cluster members to stay awake to obtain data values, most of which will be discarded
anyway to allow sleep/wake scheduling for the cluster members equation (2) shows the
pseudo code description of the algorithms at the cluster head. The cluster head maintains
a set of history data for each cluster member. When a cluster member is awake, the
cluster head checks if the member’s data values are within the error bound with high
probability. If yes, the cluster head will send a message to power off the member. The
condition should be the confidence level m is higher than the threshold threshold i .e,
44
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
(2)
2
m 1 thre shold
1 j 1 j x ( j )
p
x
However, when the cluster members sleep, the cluster head will not receive any data
values and hence it is impossible to perform accurate prediction. For this reason, periodic
but infrequent collection of data from the cluster members is still necessary. The
frequency of this infrequent data collection is due optimization problem. If the frequency
is high, the cost of collecting data can also be high but if the frequency is low, the
prediction can be inaccurate and result in erroneous sleeping decisions. Let be the time
interval between two consecutive reporting by a member. They set the duration of a sleep
period to m f and when a cluster member wakes up; it will continuously perform data
reading for the next m time. Initially, m f is set to m . It can be increased if condition
Error bound
ˆ
x t The predicted data value of x t
Confidence level
45
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
CHAPTER 4
IMPLEMENTATION AND SIMULATION RESULTS
46
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
The nodes send data to the respective cluster-heads, which in turn compresses the
aggregated data and transmits it to the base station. For a WSN the following
assumptions are made:
• The base station is located far from the sensor nodes and is immobile.
• Nodes have location information that they send to the base station with respective
energy levels during set up phase.
47
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
48
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
49
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
CHAPTER 5
CONCLUSION
A Framework for clustering based data collection with prediction for wireless
sensor network has been described. The detailed analysis and description of its two main
components, adaptive scheme to enable/disable prediction and integration of sleep/awake
algorithms for nodes is presented. An energy-aware predictor is used to find the trade-off
between communication and prediction cost. By using sleep/awake Algorithm energy
consumption is reduced and network life time is increased.
The usefulness of the framework is demonstrated by accommodating moving
object into the area. Via performance evaluation, it has been shown that it achieves
energy efficiency when sensor data is spatially and temporally correlated. To summarize,
the framework demonstrates that it is viable framework to facilitate data collection in
large-scale wireless sensor networks.
50
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
CHAPTER 6
SCOPE FOR ENHANCEMENTS
The current layout was designed to bring out protocol based on a constant power
assumed to every node in the network initially. So as a future work the design of the
protocol can be worked with new ideas as per the need of the networking, moreover the
basics may be same but design can be modified to achieve the network needs.
Developing the project further involves performing experiments with the sets of
parameters as the time has to realize, and possibly other sets according to the results of
the experiments and the interrogations they raise. Even the existing results should be
confirmed with longer and larger experiments for a better reliability. The experiments
could also involve other evaluations characteristics such as performance, scalability and
mobility handling.
There are several other future directions. First, there should be real testing in real
sensor networks. Second the possibility of using more efficient algorithms to reduce the
computational prediction and aggregation techniques. Third to include mobile nodes with
spilt/merge algorithms used for clustering. Fourth is to further improve the framework in
order to facilitate applications such as object tracking. It is believed that this work has
achieved its goals, still there are a lot of possibilities to develop it and work on.
51
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
APPENDIX I:
SCREEN SHOTS
Broadcasting Of Nodes:
52
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Cluster Formation
53
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
54
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
55
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
APPENDIX II
SAMPLE SOURCE CODE
BROADCAST .TCL
BEGIN {
p=0
Pks=64
Itv=0.5
}
{
If (FILENAME=="btemp") {
Stnd=$1
Ednd=$2
Tm=$3
itval=$4
Src=$5
}
If (FILENAME=="NNode.tr”) {
If ($1>=0 && $1<=100) {
n [p, 1] =$1
n [p, 2]=$2
n[p,3]=$5
p++
}
}
}
END {
# Acending order
for(x=0;x<p;x++)
{
56
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
for(y=x+1; y<p;y++)
{
temp2=n[x,2]
n[x,2]=n[y,2]
n[y,2]=temp2
}
}
}
for(x=0;x<p;x++)
{
print n[x,1]" - " n[x,2]" - " n[x,3]
}
x=0
y=0
a[0]=src
57
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
{
f=1
if(src==n[j,1])
{
for(s1=0;s1<=x;s1++) #check chain format
{
if(a[s1]==n[j,2])
f=0
}
if(f==1)
{
m[x,1]=n[j,1]
m[x,2]=n[j,2]
a[x+1]=n[j,2]
x++
}
}
}
}
58
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
Print "$ns_ at "tm" \"$node_ ("m [i, 1]") color blue\"" > "S_broadcast.tcl"
Print "$ns_ at "tm+itval" \"$node_ ("m [i, 2]") color purple\"" > "S_broadcast.tcl"
If (m [i, 1] ==0)
Print "$ns_ at "tm+itval" \"$node_ ("m [i, 1]") color blue\"" > "S_broadcast.tcl"
Else
Print "$ns_ at "tm+itval" \"$node_ ("m [i, 1]") color purple\"" > "S_broadcast.tcl"
print ("$ns_ at "tm+0.025" \"$ns_ trace-annotate \\\"Node - "m[i,1]" send the Broadcast
message to its neighbor - "m[i,2]" \\\"\"") > "S_broadcast.tcl"
Y++
Tm=tm+0.035
}
}
CLUSTER.TCL
BEGIN {
p=0
Pks=64
Itv=0.05
}
{
if (FILENAME=="atemp") {
Stnd=$1
ednd=$2
tm=$3
itval=$4
Src=$5
flg=$6
}
59
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
if (FILENAME=="NNode.tr”) {
if($1>=0 && $1<=100) {
n[p,1]=$1
n [p,2]=$2
n [p, 3] =$5
n [p, 4] =$3
n [p, 5] =$4
P++
}
}
}
END {
# Acending order
for(x=0;x<p;x++)
{
for(y=x+1;y<p;y++)
{
60
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
temp2=n[x,3]
n[x,3]=n[y,3]
n[y,3]=temp2
temp3=n[x,4]
n[x,4]=n[y,4]
n[y,4]=temp3
temp4=n[x,5]
n[x,5]=n[y,5]
n[y,5]=temp4
}
}
}
61
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
if(flg==1)
{
print "$ns_ at "tm" \"$ns_ trace-annotate \\\"All Cluster Head Using Adaptive Scheme for
Enable/Disable Prediction Operations \\\"\"" > "cluster.tcl"
#for(x=0;x<w;x++)
# print "----------"mb[x]
for(x=0;x<w;x++)
{
62
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
for(y=0;y<p;y++)
{
if(n[y,1]==mb[x])
{
print "set inf"y" [attach-CBR-traffic $node_("mb[x]") $sink("n[y,2]") "pks" "itv"]" >
"cluster.tcl"
print "$ns_ at "tm" \"$inf"y" start\"" > "cluster.tcl"
print "$ns_ at "tm+itval" \"$inf"y" stop\"" > "cluster.tcl"
if(flg==0)
print ("$ns_ at "tm+0.025" \"$ns_ trace-annotate \\\"Node - "mb[x]" send the CHADV
message to its neighbor - "n[y,2]" \\\"\"") > "cluster.tcl"
if(flg==1)
print ("$ns_ at "tm+0.025" \"$ns_ trace-annotate \\\"Node - "mb[x]" send the Adaptive
Scheme message to its neighbor - "n[y,2]" \\\"\"") > "cluster.tcl"
tm=tm+0.035
}
}
}
if(flg==1)
{
63
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
{
agg[kl++]=nn[x,2]
agg[kl++]=nn[x+2,2]
agg[kl++]=nn[x+5,2]
agg[kl++]=nn[x+7,2]
break
}
#for(y=0;y<kl;y++)
# print agg[y]
for(y=0;y<kl;y++)
if(nn[x,1]==agg[y])
pos=0
if(pos==1)
fin[p1++]=nn[x,1]
pos=1
}
#----remove Duplicate nodes --------
w=0
64
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
for(x=0;x<p1-1;x++)
{
temp=fin[x]
pos=1
for(y=x+1;y<p1-1;y++)
{
if(temp==fin[y])
pos=0
}
if(pos==1)
fnode[w++]=temp
}
for(x=0;x<w;x++)
{
if(fnode[x]!=0)
print "$ns_ at "tm" \"$node_("fnode[x]") color white\"" > "cluster.tcl"
}
}
65
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
REFERENCES
[2] Bjarne Stroustrup(January1982) Classes: “An Abstract Data Type Facility for the
C Language,”ACM SIGPLAN Notices.Revised version of [Stroustrup 1980].
[3] Blough . D. Leoncin. M i. Resta. G and Santi . P (2002), “On the Symmetric
Range Assignment Problem in Wireless Ad Hoc Networks,” In proceedings of
the2nd international IFIP Conference on Theoretical Computer Science pp 71-82.
[4] Calinescu .G, Mandoiu.I and Zelikov sky.A, (2002) “Symmetric Connectivity
with Minimum Power Consumption in Radio Networks,” in proceedings of the2nd
IFIP international Conference on Theoretical Computer Science.
kluwer,Dordrecht.IFIP conference proceedings, vol 223, pp.119-130
[5] Cerpa .A and Estrin .D, (2004) “ASCENT: Adaptive Self-Configuring Sensor
Networks topologies,” in Proceedings of IEEE Transcations on Mobile
Computing, pp272-285.
66
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
[7] Chu . D, Deshpande. A, Hellerstein. J. and Hong .W, (2006) “Approximate Data
Collection in Sensor Networks Using Probabilistic Models,” Proc. IEEE
International Conference. Data Eng. (ICDE),pp48-59.
[8] Clementi . A, Penna . P and Silvestre . R, (2000) “Hardness Results forth Power
Range Assignment Problem in Packet Radio Networks,” in proceedings of the
17thAnnual Symposium on Theoretical Aspects of Computer Science (STACS),
pages 651–660.
[9] Chang J.-H and L. Tassiulas, (Mar. 2000) “Energy conserving routing in wireless
ad-hoc networks,” in Proceedings of IEEE INFOCOM, Tel Aviv, Israel. pp 22-31.
[11] Heinzelman .W. Chandrakasan .A, and Balakrishnan . H, ( October 2002) “An
Application-Specific Protocol Architecture for Wireless Micro sensor Networks,”
IEEE Transactions on Wireless Communications, Vol. 1, no. 4, pp. 660–670.
67
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
[16] Jamal-dean Abdulla, (April 2009) “Probabilistic Route Discovery for Wireless
Mobile Ad Hoc Networks (MANETs),” Phd thesis, University of
Glasgowhttp://eleanor.lib,gla.ac.uk/record=b2663808.http://theses.gla.ac.uk./id/ep
rint/719.
[17] Jiang Et Al Hongbo, Shudong Jin, Chonggang Wang, (June 2011), Prediction or
Not? “An Energy-Efficient Framework for Clustering Based Data Collection in
Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed
Systems, Vol. 22, No. 6.
[18] Kawadia. V and Kumar. P. R., (April 2003) “Power Control and Clustering in Ad
Hoc Networks,” In Proceedings of IEEE INFOCOM.vol-1 pp 459-469.
[21] Mahesh K. Marina and Samir Ranjan Das. S.R, (June 2002)In Proceedings of
the 3rd ACM International Symposium on “Mobile Ad Hoc Networking and
Computing, ”Mobile Ad-Hoc, Lausanne, Switzerland Source: DBLP ISBN 1-
58113-501-7, pp. 12-23.
[22] McConnell .S.M. and Skilli corn. D.B. (2005) “A Distributed Approach for
Prediction in procedding of 1st international workshop ondata mining in Sensor
68
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
[24] Miguel Angel Erazo Villegas, Seok Yee Tang ,Yi Qian. “Wireless Sensor
Network Communication Architecture for Wide-Area Large Scale Soil Moisture
Estimation and Wetlands Monitoring Alsip,” Research Project, Technical Report,
Tr-Ncig-0501.
[27] Osama Younis and Sonia Fahmy. (2004). “HEED: A Hybrid Energy Efficient ,
Distributed Clustering Approach for Ad-hoc Sensor Networks,” IEEE
Transactions on Mobile Computing, volume 4, issue 4, pp. 366-379.
[28] Pourahmadi. M, (2001) “provides a foundation for times series analysis and
prediction theory for researchers and advanced students.” SciTech Book News,
John Wiley & Sons .Vol. 25, No. 4.
69
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
[30] Santi. P. and D. M. Blough. ( 2003) “The Critical Transmitting Range for
Connectivity in Sparse Wireless Ad Hoc Networks,” IEEE Trans. Mobile
Computing, vol. 2, no. 1, pp. 25-39.
[33] Toh C-K (2007), “Ad Hoc Mobile Wireless Networks-Protocols and Systems,
Pearson Education,” Edition-, ISBN- 978-8-1317-1510-9.
70
IMPLEMENTATION OF AN ENERGY EFFICIENT CLUSTERING BASED DATA COLLECTION IN WSN
[39] Xu . Y. and W.-C. Lee, (2003) “ On Localized Prediction for Power Efficient
Object Tracking in Sensor Networks,” International Conference of Distributed
Computing Systems Workshop, pp. 434-439.
71