SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
DOI : 10.5121/ijcsea.2012.2502 13
A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR
SINGLE MOBILE SINK IN WIRELESS SENSOR
NETWORKS
Zhi Huang1
, Sanyang Liu2
and Xiaogang Qi3
1
School of Computer Science & Technology, Xidian University, Xi’an, China
huangzhi2003@126.com
2
Department of Applied Mathematics, Xidian University, Xi’an, China
liusanyang@126.com
3
Department of Applied Mathematics, Xidian University, Xi’an, China
qixiaogang@gmail.com
ABSTRACT
Limit energy is a severe bottleneck of wireless sensor networks (WSNs), and limits network lifetime of
WSNs. To extend network lifetime, buffer zone has been proposed. Sensors send their data packets to buffer
zone. The sensors in buffer zone buffer the data packets. And then the sink visits the buffer zone to collect
the data packets. This leads to that the loads of the sensors in buffer zone are too high and the sensors die
quickly. To further extend network lifetime, an algorithm based on dynamic buffer zone has been proposed
in this paper. The algorithm divides the whole network area into some areas, and lets all areas act as the
buffer zone in turn. And the reasonable times each zone acts as the buffer zone are computed with linear
programming. The simulation results have shown that our proposed algorithm notably extends network
lifetime.
KEYWORDS
Wireless Sensor Networks, Mobile Sink, Buffer Zone, Linear Programming
1. INTRODUCTION
Wireless sensor networks is an important potential technology and can be applied to many
applications, such as industry, agriculture, military, space exploration, and so on [1-4]. Energy
resource is a severe bottleneck of wireless sensor networks because sensors are usually powered
by light weight batteries and these batteries usually can't be charged or replaced [3]. Therefore,
how to effectively utilize energy resource of sensors is an important issue of wireless sensor
networks. One important approach is sink mobility. That is, sink moves in the network area in
order to shift the burden from sensors to the sink [5].
To further extend network lifetime, another approach, deploying both mobile sink and buffer zone
in network area, has been proposed [6]. A part of network area act as buffer zone. All sensors
send their data packets to the buffer zone. Then the sensors in the buffer zone buffer these data
packets, and directly send these data packets to the sink when the sink moves into their
communication range. The sink moves back and forth in the buffer zone to collect data packets.
The approach extend network lifetime notably. However, sensors in the buffer zone forward too
many data packets, consume much energy and die quickly. This limits network lifetime.
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
14
In this paper, to further extend network lifetime, we have proposed a dynamic buffer zone based
algorithm for single mobile sink in wireless sensor networks. The algorithm divides the network
area into some sub areas. Each sub area acts as the buffer zone in turn. And the time each sub area
acts as the buffer zone are reasonably computed with linear programming.
The remainder of this paper is organized as follows:
2. RELATED WORK
Sink mobility has been widely proposed. And many algorithms for sink mobility have been
proposed.
Data Mules [7] was proposed aiming at sparse sensor network. Mobile entities, such as people,
animals, and cars, are called Data Mules. An entity moves in network area, collect and buffer data
from a sensor when the distance between them is short enough. An entity sends data to an Access
Point when they are near. The algorithm saves energy. However, it leads to tremendous latency.
Ref. [8] assumes that sensors are deployed in a circle area. It is proved that moving along the
periphery of the circle network area is optimum. Ref. [6] has studied the same network model,
and proposed an algorithm with buffer zone, which is called MADG (movement-assisted data
gathering). The algorithm deploys both mobile sink and buffer zone in network area. A ring area
acts as the buffer zone. The sensors in the buffer zone buffer all sensors' data. The sink moves
back and forth in the buffer zone, and collect data when it is near to a sensor, as shown in figure
1. The algorithm extend network lifetime notably. However, the sensors in buffer zone consume
much energy and die quickly. In this paper, we have improved the algorithm and proposed a new
algorithm.
Figure 1. MADG (Only a part of network is drawn to simplify the figure)
3. NETWORK MODEL
N sensors are randomly distributed in a circle area with the radius R and the centre O. The
communication radius of sensors is r(r<<R). The density of sensors is high. Therefore, the
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
15
network has strong connectivity [6]. Each sensor knows its own position and the position of the
centre, as well as the radius R. The sink is mobile, can move in the network area, and has limitless
power.
4. A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR SINGLE MOBILE
SINK
In MADG, all sensors' data packets are sent to and buffered by the sensors in the buffer zone.
Then a sensor in the buffer zone directly sends data to the sink when the distance between the
sensors and the sink is short enough. The topology in Figure 1 can be abstracted as Figure 2. As
seen in Figure 2, all sensors' data packets are forwarded by the sensors in the buffer zone.
Therefore, the sensors in the buffer zone forwards many data packets, consume much energy, and
die quickly. This limits network lifetime. To further extend network lifetime, we have proposed
the approach which partitions the whole network area into some sub areas, let each sub area act as
the buffer zone. The time each sub area act as the buffer zone is computed with the linear
programming in which the target function is maximizing network lifetime. Therefore, the balance
of energy consumption can be obtained and network lifetime can be extended.
Figure 2. Abstraction of the topology in Figure 1
The following notation is used in describing our algorithm:
r communication radius of sensors
e initial energy of sensors
s the number of rings
d the distance between two adjacent rings
n a sensor in network
N the set of all sensors in network
k(n) the number of the ring in which sensor n is
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
16
d(n) the distance from the centre to sensor n
nb(n) the set of all neighbor of sensor n
nb_1(n) the set of the sensors which belong to and is in the ring k(n)-1
nb_2(n) the set of the sensors which is in ring k(n) and d(x)<d(n)
nb_3(n) the set of the sensors which is in ring k(n) and d(x)>d(n)
nb_4(n) the set of the sensors which belong to and is in the ring k(n)+1
u(n) the next hop of sensor n when data is forwarded towards the centre
d(n) the next hop of sensor n when data is forwarded towards the periphery
lij the maximum load (the energy consumed in a unit time) of the ring
j(1≤j≤s) when the ring i(1≤i ≤s) acts as the buffer zone
ti the time the ring i acts as the buffer zone
4.1. Network Partitioning
The whole circle network area are evenly partitioned into s concentric rings, s=R/d(d<r), where
the centre of the rings are the centre of the circle network area. And the distance between the
rings is d, as shown in Figure 3. All rings are outward numbered as ring 1, ring 2, ..., ring s. And
the time each ring acts as the buffer zone is ti(1≤i≤s).
Figure 3. Partitioning of network
4.2. Routing
Once a network is deployed and starts, for sensor n, two sensors, d(n) and u(n) are found. When
data is transferred towards the centre of the circle network area, n transfers its data to d(n). And
when data is transferred towards the border of the circle network area, n transfers its data to u(n).
The approach to find d(n) and u(n) are described as follows.
The set of all neighbour sensors of n, nb(n), is divided into four subsets, nb_1(n), nb_2(n), nb_3(n)
and nb_4(n), as shown in figure 4. In nb_1(n), the senor with the shortest distance to the centre is
found, and its ID is assigned to u(n). If nb_1(n) is empty, then the senor with the shortest distance
to the centre is found in nb_2(n), and its ID is assigned to u(n). In nb_4(n), the senor with the
longest distance to the centre is found, and its ID is assigned to d(n). If nb_4(n) is empty, then the
senor with the shortest distance to the centre is found in nb_3(n), and its ID is assigned to d(n).
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
17
Figure 4. Partitioning of network
The algorithm to find d(n) and u(n) are described as follows.
/* The algorithm that is used by a sensor node to find its U(n) and D(n) */
1 for each n∈N do
2 find nb(n)
3 find nb_1(n),nb_2(n), nb_3(n), nb_4(n)
4 if n is not in ring 1
5 if nb_1(n) is not a empty set
6 find the node x which is in nb_1(n) and has the min d(x) in nb_1(n)
7 u(n)=x
8 end if
9 else
10 find the node x which is in nb_2(n) and has the min d(x) in nb_2(n)
11 u(n)=x
12 end if
13 if n is not in ring s
14 if nb_4(n) is not a empty set
15 find the node x which is in nb_1(n) and has the max d(x) in nb_4(n)
16 u(n)=x
17 end if
18 else
19 find the node x which is in nb_3(n) and has the max d(x) in nb_3(n)
20 u(n)=x
21 end if
22 end for
4.3. Times Each Zone Acts as the Buffer Zone
The times each zone acts as the buffer zone must be reasonably computed to extend network
lifetime. And linear programming is adopted to calculate the times, as follows.
0,...
*...*
...
*...*
.
1
11
1111
1
>
≤++
≤++
= ∑=
i
ijij
ii
s
i
i
tt
eltlt
eltlt
tS
tMaxZ
(1)
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
18
The reasonable times each zone acts as the buffer zone can be obtained with working out the
linear programming.
The maximum load of the ring j when the ring i acts as the buffer zone, lij, is difficult to be
calculated because it relates to specific network topologies and network topologies are randomly
generated. Actually, lij is determined by the following six factors: R (the radius of the network
area), r (communication radius of sensors), |N| (the number of sensors), D (network partitioning)
as well as the values of i and j. The first four factors can be curtain before the network operation.
Therefore, we can repeatedly simulates on computers, and obtain the average value as the
expectation of lij.
4.4. Implementation of the Algorithm
The algorithm is implemented as the following steps:
(1) Before a network is deployed, since we know the values of R, r, |N| and D of the network to
be deployed, computer simulations can be made with these values. And then the values of all lij
(0≤i,j≤s) can be obtained. Thereby the values of all tij (0≤i,j≤s) can bee calculated with equation
(1).
(2) After the network is deployed and starts working, ring x (the initial value of x is 1) acts as the
buffer zone for time tx. The sensors in the rings x+1~s (when x<s) transfer their data packets to
their u(n), the sensors in the rings 1~x-1 (when x>1) transfer their data packets to their d(n). The
sensors in the ring x receive data packets from other sensors. When the sink moves into their
communication ranges, the sensors in the ring x transfer the data packets they receive and their
own data packets to the sink.
(3) After the ring x acts as the buffer zone for time tx, the sink, broadcasts a message to all sensors
to inform that the ring x+1 starts acting as the buffer zone (lets x=x+1), and starts moving in ring
x+1 (when x<s). After receiving the message, the ring x+1 (when x<s) acts as the buffer zone
with the method of Steps (2).
(4) Steps (2) and (3) are repeated until the network dies. If the network does not die after the ring
s acts as the buffer zone, the ring s continues acting as the buffer zone until the network dies.
5. SIMULATION RESULTS
Physic layer and MAC layer are ignored in simulations because we mainly focus on the upper
data gathering algorithm. To simplify simulations, we assume that each sensor generates a data
packet in one unit time, and one unit energy is consumed to send a data packet. We have assumed
that a network area with the radius R=100m. 3000 sensors with the communication radius r=12m
are randomly deployed in the network. The initial energy of sensors is 5000 units. Each sensor
generates 1 data packet per time unit. 1 unit energy is consumed to transfer a data packet.
Three algorithms are compared in the simulations. The first one is static sink (short for “SS”), the
sink always stays at the centre of the network area during network operation. The second one is
MADG and the third one is proposed DBDG.
In DBDG, we let s=10. That is, the network area is evenly partitioned into 10 concentric rings.
The expectations of lij are obtained through simulations, as shown in table.
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
19
Table 1. The expectations of lij are obtained through simulations
And then the following linear programming is obtained.
Max Z= t1+ t2+ t3+ t4+ t5+ t6+ t7+ t8+ t9+ t10
S.t
1251.7* t1+1.0* t2+1.0* t3+1.0* t4+1.0* t5+1.0* t6+1.0* t7+1.0* t8+1.0* t9+1.0* t10 ≤5000
295.7* t1+296.7* t2+4.0* t3+4.0* t4+4.0* t5+4.0* t6+4.0* t7+4.0* t8+4.0* t9+4.0* t10 ≤5000
174.2* t1+174.2* t2+175.7* t3+8.4* t4+8.4* t5+8.4* t6+8.4* t7+8.4* t8+8.4* t9+8.4* t10 ≤5000
115.5* t1+115.5* t2+115.5* t3+117.1* t4+12.4* t5+12.4* t6+12.4* t7+12.4* t8+12.4* t9+12.4* t10 ≤5000 (2)
82.0* t1+82.0* t2+82.0* t3+82.0* t4+84.1* t5+20.1* t6+20.1* t7+20.1* t8+20.1* t9+20.1* t10 ≤5000
53.9* t1+53.9* t2+53.9* t3+53.9* t4+53.9* t5+56.1* t6+26.1* t7+26.1* t8+26.1* t9+26.1* t10 ≤5000
35.3* t1+35.3* t2+35.3* t3+35.3* t4+35.3* t5+35.3* t6+42.3* t7+33.0* t8+33.0* t9+33.0* t10 ≤5000
18.5* t1+18.5* t2+18.5* t3+18.5* t4+18.5* t5+18.5* t6+18.5* t7+43.7* t8+42.1* t9+42.1* t10 ≤5000
10.6* t1+10.6* t2+10.6* t3+10.6* t4+10.6* t5+10.6* t6+10.6* t7+10.6* t8+53.2* t9+50.8* t10 ≤5000
3.8* t1+3.8* t2+3.8* t3+3.8* t4+3.8* t5+3.8* t6+3.8* t7+3.8* t8+3.8* t9+65.9 ≤5000
t1, t2, t3, t4, t5, t6, t7, t8, t9, t10 ≥0
After resolving the linear programming, the following result is obtained.
Z=146.31
t1=0.00 t2=0.00 t3=22.54 t4=8.2 t5=2.41
t6=8.62 t7=8.11 t8=11.40 t9=13.43 t10=71.56
That is to say, the network lifetime is 146.31 time units using proposed DBDG.
10 network topologies are randomly generated. SS, MADG and DBDG run in each topology.
Two performance metrics, network lifetime, and total energy consumption are compared.
Network lifetime is defined as the time from the network starts operating to it dies. The
simulation results are shown in Figure. As shown in the figure 5, DBDG notably improve
network lifetime. Using DBDG, network lifetime is improved by 771.43% on average compared
to SS, and 133.12% on average compared to MADG.
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
20
0
20
40
60
80
100
120
140
160
180
Survivaltimeofnetworks
N1 N2 N3 N4 N5 N6 N7 N8 N9 N10
Networks
SM
MADG
DBDG
Figure 5. Comparison of network lifetime achieved by the three algorithms
Total energy consumption is the energy consumed by the whole network during its operation.
This metric can reflect the degree how sensors’ energy is utilized. The result is shown in figure 6.
The result indicates that DBDG notably improves this metric. Using DBDG, total energy
consumption is improved by 462.78% on average compared to SS, and 197.41% on average
compared to MADG.
0
500000
1000000
1500000
2000000
Totalenergy
consumed
N1 N2 N3 N4 N5 N6 N7 N8 N9 N10
Networks
SM
MADG
DBDG
Figure 6. Comparison of network lifetime achieved by the three algorithms
6. CONCLUSIONS
In this paper, we have proposed a novel algorithm for sing mobile sink based on dynamic buffer
zone. The algorithm partitions the whole network area into some areas, and let the areas act as the
buffer zone in turn. To obtain the reasonable time each area acts as the buffer zone, linear
programming is adopted. As a result, the sensors’ energy is fully utilized and network lifetime is
notably prompted.
ACKNOWLEDGEMENTS
Project supported by the National Natural Science Foundation of China (Grants No. 60703118,
60974082), the Fundamental Research Funds for the Central Universities (Grants No.
JY10000970013).
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
21
REFERENCES
[1] M. Kohvakka, J Suhonen, M Kuorilehto, V Kaseva, M Hannikainen, T. D. Hamalainen (2009). Ad
Hoc Networks, Vol. 7, No. 1, pp24-41.
[2] C.M. Liu, C.H. Lee, L. C. Wang (2007). Distributed clustering algorithms for data-gathering in
wireless mobile sensor networks, Journal of Parallel and Distributed Computing, Vol. 67, No. 11,
pp1187-1200.
[3] Akyildiz IF, Su W, Sankarasubramaniam Y, etc (2002). Wireless sensor networks : A survey,
Computer Networks, Vol. 38, No. 4, pp393-422.
[4] D. Estrin et al. (2009). Next Century Challenges: Scalable Coordination in Sensor Networks, in: The
Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks,
Seattle, Washington, August 1999.
[5] Ioannis C, Athanasios K, Sotiris N (2008). Efficient data propagation strategies in wireless sensor
networks using a single mobile sink, Computer Communications, Vol. 31, No. 5, pp896-914.
[6] Shi Gaotao, Liao Minghong (2007). Movement-Assisted Data Gathering Scheme with Load-
Balancing for Sensor Networks, Journal of Software, Vol. 18, No. 9, pp2235-2244.
[7] Roy. Sumit, Jain. Sushant, Brunette. Waylon (2003). Data MULEs: Modeling and analysis of a three-
tier architecture for sparse sensor networks, Ad Hoc Networks, Vol. 1, No. 2-3, pp215-233.
[8] Luo J, Hubaux J P (2005). Joint mobility and routing for lifetime elongation in wireless sensor
networks, proceeding of the 24th Annual Joint Conference of the IEEE Computer and
Communications Societies.
AUTHORS
Zhi Huang received M.S. degree in Information Management from Sichuan University, China in 2006.
He is currently a Ph.D. candidate of Computer Science at Xidian University. His research interest is
wireless sensor networks.
Sanyang Liu received his Ph.D. in Mathematics from Xi’an Jiaotong University, China in 1989. He is
currently a professor in the Department of Applied Mathematics at Xidian University. His research
interests include optimization, network algorithms, network reliability and wireless sensor networks.
Xiaogang Qi received his Ph.D. in Mathematics from Xidian University, China in 2005. He is currently
an associate professor in the Department of Applied Mathematics at Xidian University. His research
interests include high-performance networks and wireless sensor networks.

Más contenido relacionado

La actualidad más candente

Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Editor IJMTER
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkEditor IJMTER
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijcseit
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes forijistjournal
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksScenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksIJCNCJournal
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Journals
 

La actualidad más candente (16)

I04503075078
I04503075078I04503075078
I04503075078
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor Network
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes for
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksScenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
D031202018023
D031202018023D031202018023
D031202018023
 

Similar a 2512ijcsea02

Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxpraveena06
 
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...ijdmtaiir
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Messch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsnMessch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsneSAT Journals
 
Optimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkOptimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkIRJET Journal
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 

Similar a 2512ijcsea02 (20)

Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docx
 
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Messch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsnMessch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsn
 
Optimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkOptimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor Network
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 

Último

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Último (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

2512ijcsea02

  • 1. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 DOI : 10.5121/ijcsea.2012.2502 13 A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR SINGLE MOBILE SINK IN WIRELESS SENSOR NETWORKS Zhi Huang1 , Sanyang Liu2 and Xiaogang Qi3 1 School of Computer Science & Technology, Xidian University, Xi’an, China huangzhi2003@126.com 2 Department of Applied Mathematics, Xidian University, Xi’an, China liusanyang@126.com 3 Department of Applied Mathematics, Xidian University, Xi’an, China qixiaogang@gmail.com ABSTRACT Limit energy is a severe bottleneck of wireless sensor networks (WSNs), and limits network lifetime of WSNs. To extend network lifetime, buffer zone has been proposed. Sensors send their data packets to buffer zone. The sensors in buffer zone buffer the data packets. And then the sink visits the buffer zone to collect the data packets. This leads to that the loads of the sensors in buffer zone are too high and the sensors die quickly. To further extend network lifetime, an algorithm based on dynamic buffer zone has been proposed in this paper. The algorithm divides the whole network area into some areas, and lets all areas act as the buffer zone in turn. And the reasonable times each zone acts as the buffer zone are computed with linear programming. The simulation results have shown that our proposed algorithm notably extends network lifetime. KEYWORDS Wireless Sensor Networks, Mobile Sink, Buffer Zone, Linear Programming 1. INTRODUCTION Wireless sensor networks is an important potential technology and can be applied to many applications, such as industry, agriculture, military, space exploration, and so on [1-4]. Energy resource is a severe bottleneck of wireless sensor networks because sensors are usually powered by light weight batteries and these batteries usually can't be charged or replaced [3]. Therefore, how to effectively utilize energy resource of sensors is an important issue of wireless sensor networks. One important approach is sink mobility. That is, sink moves in the network area in order to shift the burden from sensors to the sink [5]. To further extend network lifetime, another approach, deploying both mobile sink and buffer zone in network area, has been proposed [6]. A part of network area act as buffer zone. All sensors send their data packets to the buffer zone. Then the sensors in the buffer zone buffer these data packets, and directly send these data packets to the sink when the sink moves into their communication range. The sink moves back and forth in the buffer zone to collect data packets. The approach extend network lifetime notably. However, sensors in the buffer zone forward too many data packets, consume much energy and die quickly. This limits network lifetime.
  • 2. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 14 In this paper, to further extend network lifetime, we have proposed a dynamic buffer zone based algorithm for single mobile sink in wireless sensor networks. The algorithm divides the network area into some sub areas. Each sub area acts as the buffer zone in turn. And the time each sub area acts as the buffer zone are reasonably computed with linear programming. The remainder of this paper is organized as follows: 2. RELATED WORK Sink mobility has been widely proposed. And many algorithms for sink mobility have been proposed. Data Mules [7] was proposed aiming at sparse sensor network. Mobile entities, such as people, animals, and cars, are called Data Mules. An entity moves in network area, collect and buffer data from a sensor when the distance between them is short enough. An entity sends data to an Access Point when they are near. The algorithm saves energy. However, it leads to tremendous latency. Ref. [8] assumes that sensors are deployed in a circle area. It is proved that moving along the periphery of the circle network area is optimum. Ref. [6] has studied the same network model, and proposed an algorithm with buffer zone, which is called MADG (movement-assisted data gathering). The algorithm deploys both mobile sink and buffer zone in network area. A ring area acts as the buffer zone. The sensors in the buffer zone buffer all sensors' data. The sink moves back and forth in the buffer zone, and collect data when it is near to a sensor, as shown in figure 1. The algorithm extend network lifetime notably. However, the sensors in buffer zone consume much energy and die quickly. In this paper, we have improved the algorithm and proposed a new algorithm. Figure 1. MADG (Only a part of network is drawn to simplify the figure) 3. NETWORK MODEL N sensors are randomly distributed in a circle area with the radius R and the centre O. The communication radius of sensors is r(r<<R). The density of sensors is high. Therefore, the
  • 3. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 15 network has strong connectivity [6]. Each sensor knows its own position and the position of the centre, as well as the radius R. The sink is mobile, can move in the network area, and has limitless power. 4. A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR SINGLE MOBILE SINK In MADG, all sensors' data packets are sent to and buffered by the sensors in the buffer zone. Then a sensor in the buffer zone directly sends data to the sink when the distance between the sensors and the sink is short enough. The topology in Figure 1 can be abstracted as Figure 2. As seen in Figure 2, all sensors' data packets are forwarded by the sensors in the buffer zone. Therefore, the sensors in the buffer zone forwards many data packets, consume much energy, and die quickly. This limits network lifetime. To further extend network lifetime, we have proposed the approach which partitions the whole network area into some sub areas, let each sub area act as the buffer zone. The time each sub area act as the buffer zone is computed with the linear programming in which the target function is maximizing network lifetime. Therefore, the balance of energy consumption can be obtained and network lifetime can be extended. Figure 2. Abstraction of the topology in Figure 1 The following notation is used in describing our algorithm: r communication radius of sensors e initial energy of sensors s the number of rings d the distance between two adjacent rings n a sensor in network N the set of all sensors in network k(n) the number of the ring in which sensor n is
  • 4. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 16 d(n) the distance from the centre to sensor n nb(n) the set of all neighbor of sensor n nb_1(n) the set of the sensors which belong to and is in the ring k(n)-1 nb_2(n) the set of the sensors which is in ring k(n) and d(x)<d(n) nb_3(n) the set of the sensors which is in ring k(n) and d(x)>d(n) nb_4(n) the set of the sensors which belong to and is in the ring k(n)+1 u(n) the next hop of sensor n when data is forwarded towards the centre d(n) the next hop of sensor n when data is forwarded towards the periphery lij the maximum load (the energy consumed in a unit time) of the ring j(1≤j≤s) when the ring i(1≤i ≤s) acts as the buffer zone ti the time the ring i acts as the buffer zone 4.1. Network Partitioning The whole circle network area are evenly partitioned into s concentric rings, s=R/d(d<r), where the centre of the rings are the centre of the circle network area. And the distance between the rings is d, as shown in Figure 3. All rings are outward numbered as ring 1, ring 2, ..., ring s. And the time each ring acts as the buffer zone is ti(1≤i≤s). Figure 3. Partitioning of network 4.2. Routing Once a network is deployed and starts, for sensor n, two sensors, d(n) and u(n) are found. When data is transferred towards the centre of the circle network area, n transfers its data to d(n). And when data is transferred towards the border of the circle network area, n transfers its data to u(n). The approach to find d(n) and u(n) are described as follows. The set of all neighbour sensors of n, nb(n), is divided into four subsets, nb_1(n), nb_2(n), nb_3(n) and nb_4(n), as shown in figure 4. In nb_1(n), the senor with the shortest distance to the centre is found, and its ID is assigned to u(n). If nb_1(n) is empty, then the senor with the shortest distance to the centre is found in nb_2(n), and its ID is assigned to u(n). In nb_4(n), the senor with the longest distance to the centre is found, and its ID is assigned to d(n). If nb_4(n) is empty, then the senor with the shortest distance to the centre is found in nb_3(n), and its ID is assigned to d(n).
  • 5. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 17 Figure 4. Partitioning of network The algorithm to find d(n) and u(n) are described as follows. /* The algorithm that is used by a sensor node to find its U(n) and D(n) */ 1 for each n∈N do 2 find nb(n) 3 find nb_1(n),nb_2(n), nb_3(n), nb_4(n) 4 if n is not in ring 1 5 if nb_1(n) is not a empty set 6 find the node x which is in nb_1(n) and has the min d(x) in nb_1(n) 7 u(n)=x 8 end if 9 else 10 find the node x which is in nb_2(n) and has the min d(x) in nb_2(n) 11 u(n)=x 12 end if 13 if n is not in ring s 14 if nb_4(n) is not a empty set 15 find the node x which is in nb_1(n) and has the max d(x) in nb_4(n) 16 u(n)=x 17 end if 18 else 19 find the node x which is in nb_3(n) and has the max d(x) in nb_3(n) 20 u(n)=x 21 end if 22 end for 4.3. Times Each Zone Acts as the Buffer Zone The times each zone acts as the buffer zone must be reasonably computed to extend network lifetime. And linear programming is adopted to calculate the times, as follows. 0,... *...* ... *...* . 1 11 1111 1 > ≤++ ≤++ = ∑= i ijij ii s i i tt eltlt eltlt tS tMaxZ (1)
  • 6. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 18 The reasonable times each zone acts as the buffer zone can be obtained with working out the linear programming. The maximum load of the ring j when the ring i acts as the buffer zone, lij, is difficult to be calculated because it relates to specific network topologies and network topologies are randomly generated. Actually, lij is determined by the following six factors: R (the radius of the network area), r (communication radius of sensors), |N| (the number of sensors), D (network partitioning) as well as the values of i and j. The first four factors can be curtain before the network operation. Therefore, we can repeatedly simulates on computers, and obtain the average value as the expectation of lij. 4.4. Implementation of the Algorithm The algorithm is implemented as the following steps: (1) Before a network is deployed, since we know the values of R, r, |N| and D of the network to be deployed, computer simulations can be made with these values. And then the values of all lij (0≤i,j≤s) can be obtained. Thereby the values of all tij (0≤i,j≤s) can bee calculated with equation (1). (2) After the network is deployed and starts working, ring x (the initial value of x is 1) acts as the buffer zone for time tx. The sensors in the rings x+1~s (when x<s) transfer their data packets to their u(n), the sensors in the rings 1~x-1 (when x>1) transfer their data packets to their d(n). The sensors in the ring x receive data packets from other sensors. When the sink moves into their communication ranges, the sensors in the ring x transfer the data packets they receive and their own data packets to the sink. (3) After the ring x acts as the buffer zone for time tx, the sink, broadcasts a message to all sensors to inform that the ring x+1 starts acting as the buffer zone (lets x=x+1), and starts moving in ring x+1 (when x<s). After receiving the message, the ring x+1 (when x<s) acts as the buffer zone with the method of Steps (2). (4) Steps (2) and (3) are repeated until the network dies. If the network does not die after the ring s acts as the buffer zone, the ring s continues acting as the buffer zone until the network dies. 5. SIMULATION RESULTS Physic layer and MAC layer are ignored in simulations because we mainly focus on the upper data gathering algorithm. To simplify simulations, we assume that each sensor generates a data packet in one unit time, and one unit energy is consumed to send a data packet. We have assumed that a network area with the radius R=100m. 3000 sensors with the communication radius r=12m are randomly deployed in the network. The initial energy of sensors is 5000 units. Each sensor generates 1 data packet per time unit. 1 unit energy is consumed to transfer a data packet. Three algorithms are compared in the simulations. The first one is static sink (short for “SS”), the sink always stays at the centre of the network area during network operation. The second one is MADG and the third one is proposed DBDG. In DBDG, we let s=10. That is, the network area is evenly partitioned into 10 concentric rings. The expectations of lij are obtained through simulations, as shown in table.
  • 7. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 19 Table 1. The expectations of lij are obtained through simulations And then the following linear programming is obtained. Max Z= t1+ t2+ t3+ t4+ t5+ t6+ t7+ t8+ t9+ t10 S.t 1251.7* t1+1.0* t2+1.0* t3+1.0* t4+1.0* t5+1.0* t6+1.0* t7+1.0* t8+1.0* t9+1.0* t10 ≤5000 295.7* t1+296.7* t2+4.0* t3+4.0* t4+4.0* t5+4.0* t6+4.0* t7+4.0* t8+4.0* t9+4.0* t10 ≤5000 174.2* t1+174.2* t2+175.7* t3+8.4* t4+8.4* t5+8.4* t6+8.4* t7+8.4* t8+8.4* t9+8.4* t10 ≤5000 115.5* t1+115.5* t2+115.5* t3+117.1* t4+12.4* t5+12.4* t6+12.4* t7+12.4* t8+12.4* t9+12.4* t10 ≤5000 (2) 82.0* t1+82.0* t2+82.0* t3+82.0* t4+84.1* t5+20.1* t6+20.1* t7+20.1* t8+20.1* t9+20.1* t10 ≤5000 53.9* t1+53.9* t2+53.9* t3+53.9* t4+53.9* t5+56.1* t6+26.1* t7+26.1* t8+26.1* t9+26.1* t10 ≤5000 35.3* t1+35.3* t2+35.3* t3+35.3* t4+35.3* t5+35.3* t6+42.3* t7+33.0* t8+33.0* t9+33.0* t10 ≤5000 18.5* t1+18.5* t2+18.5* t3+18.5* t4+18.5* t5+18.5* t6+18.5* t7+43.7* t8+42.1* t9+42.1* t10 ≤5000 10.6* t1+10.6* t2+10.6* t3+10.6* t4+10.6* t5+10.6* t6+10.6* t7+10.6* t8+53.2* t9+50.8* t10 ≤5000 3.8* t1+3.8* t2+3.8* t3+3.8* t4+3.8* t5+3.8* t6+3.8* t7+3.8* t8+3.8* t9+65.9 ≤5000 t1, t2, t3, t4, t5, t6, t7, t8, t9, t10 ≥0 After resolving the linear programming, the following result is obtained. Z=146.31 t1=0.00 t2=0.00 t3=22.54 t4=8.2 t5=2.41 t6=8.62 t7=8.11 t8=11.40 t9=13.43 t10=71.56 That is to say, the network lifetime is 146.31 time units using proposed DBDG. 10 network topologies are randomly generated. SS, MADG and DBDG run in each topology. Two performance metrics, network lifetime, and total energy consumption are compared. Network lifetime is defined as the time from the network starts operating to it dies. The simulation results are shown in Figure. As shown in the figure 5, DBDG notably improve network lifetime. Using DBDG, network lifetime is improved by 771.43% on average compared to SS, and 133.12% on average compared to MADG.
  • 8. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 20 0 20 40 60 80 100 120 140 160 180 Survivaltimeofnetworks N1 N2 N3 N4 N5 N6 N7 N8 N9 N10 Networks SM MADG DBDG Figure 5. Comparison of network lifetime achieved by the three algorithms Total energy consumption is the energy consumed by the whole network during its operation. This metric can reflect the degree how sensors’ energy is utilized. The result is shown in figure 6. The result indicates that DBDG notably improves this metric. Using DBDG, total energy consumption is improved by 462.78% on average compared to SS, and 197.41% on average compared to MADG. 0 500000 1000000 1500000 2000000 Totalenergy consumed N1 N2 N3 N4 N5 N6 N7 N8 N9 N10 Networks SM MADG DBDG Figure 6. Comparison of network lifetime achieved by the three algorithms 6. CONCLUSIONS In this paper, we have proposed a novel algorithm for sing mobile sink based on dynamic buffer zone. The algorithm partitions the whole network area into some areas, and let the areas act as the buffer zone in turn. To obtain the reasonable time each area acts as the buffer zone, linear programming is adopted. As a result, the sensors’ energy is fully utilized and network lifetime is notably prompted. ACKNOWLEDGEMENTS Project supported by the National Natural Science Foundation of China (Grants No. 60703118, 60974082), the Fundamental Research Funds for the Central Universities (Grants No. JY10000970013).
  • 9. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 21 REFERENCES [1] M. Kohvakka, J Suhonen, M Kuorilehto, V Kaseva, M Hannikainen, T. D. Hamalainen (2009). Ad Hoc Networks, Vol. 7, No. 1, pp24-41. [2] C.M. Liu, C.H. Lee, L. C. Wang (2007). Distributed clustering algorithms for data-gathering in wireless mobile sensor networks, Journal of Parallel and Distributed Computing, Vol. 67, No. 11, pp1187-1200. [3] Akyildiz IF, Su W, Sankarasubramaniam Y, etc (2002). Wireless sensor networks : A survey, Computer Networks, Vol. 38, No. 4, pp393-422. [4] D. Estrin et al. (2009). Next Century Challenges: Scalable Coordination in Sensor Networks, in: The Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks, Seattle, Washington, August 1999. [5] Ioannis C, Athanasios K, Sotiris N (2008). Efficient data propagation strategies in wireless sensor networks using a single mobile sink, Computer Communications, Vol. 31, No. 5, pp896-914. [6] Shi Gaotao, Liao Minghong (2007). Movement-Assisted Data Gathering Scheme with Load- Balancing for Sensor Networks, Journal of Software, Vol. 18, No. 9, pp2235-2244. [7] Roy. Sumit, Jain. Sushant, Brunette. Waylon (2003). Data MULEs: Modeling and analysis of a three- tier architecture for sparse sensor networks, Ad Hoc Networks, Vol. 1, No. 2-3, pp215-233. [8] Luo J, Hubaux J P (2005). Joint mobility and routing for lifetime elongation in wireless sensor networks, proceeding of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. AUTHORS Zhi Huang received M.S. degree in Information Management from Sichuan University, China in 2006. He is currently a Ph.D. candidate of Computer Science at Xidian University. His research interest is wireless sensor networks. Sanyang Liu received his Ph.D. in Mathematics from Xi’an Jiaotong University, China in 1989. He is currently a professor in the Department of Applied Mathematics at Xidian University. His research interests include optimization, network algorithms, network reliability and wireless sensor networks. Xiaogang Qi received his Ph.D. in Mathematics from Xidian University, China in 2005. He is currently an associate professor in the Department of Applied Mathematics at Xidian University. His research interests include high-performance networks and wireless sensor networks.