You are on page 1of 7

Power Efficient Gathering in Sensor Information System (PEGASIS Protocol)

Indu Shukla

Abstract In this paper we have discussed PEGASIS protocol and possible improvements for data collection. Sensor nodes are deployed in harsh physical environment to collect data. Sensor nodes have very limited computation capability because they are limited by the battery power. It has been a challenge to maximize the use of energy of these sensor nodes to extend the network lifetime. Therefore, sensor nodes collect their data, fuse it together and send it to the sink where the data is analyzed. In some situations not only the data is important but minimum delay is also desired. 1. Introduction Wireless sensor network is web of tiny irreplaceable power units or rechargeable source. These sensors are deployed to collect useful information such as environment and agricultural monitoring, security monitoring, industrial control and monitoring, home automation and defense. It is also used to collect information from remote places which are hard to reach where each deployed sensor nodes collect information and sends back information to base station (BS) [6]. When placed in harsh physical environment it is impossible to charge or replace the sensor nodes. Therefore it is desirable to design communication network protocol such that energy source is used efficiently to maximize the lifetime of the network. Another crucial issue the data delivery time by sensor nodes is also important, specially in battle field, medical, or security monitoring system where minimum delay is desirable [6]. Simple approach to collect data from sensor nodes is direct approach where each sensor nodes transmit the data directly to the base station (BS) which is located far away. Cost to transmit data from each sensor node to BS is very high, thus nodes die quickly and hence reducing the lifetime of the network. Therefore to utilize energy efficiently goal is to use as few transmissions as possible. LEACH Protocol is designed where sensor nodes are organized to form local cluster with one node in cluster selected as cluster head. Sensor nodes from one cluster send data to its cluster head where data is aggregated and fused data is transmitted to BS. Cluster heads are chosen randomly and achieve a factor of 8 improvements compared to direct approach. Although LEACH protocol reduces energy consumption by factor 8, energy is consumed is forming cluster. In LEACH 5% of the nodes are the head nodes at the same time that also amounts to energy consumption [1]. This paper consists of following sections. In the Section 2, PEGASIS protocol is discussed. Sections 3 and 4 discuss advantages and drawbacks of PEGASIS protocol. Section 5 describes the PEGASIS protocol using CDMA nodes. Concentric clustering scheme is discussed in Section 6 while Section 7 describes Diamond-Shaped Routing Method for Data Transmission. Chain Oriented Sensor Network for Efficient Data Collection is discussed in Section 8. Section 9 describes the sensor Protocols for Information via Negotiation and Section 10 concludes the paper.

2. PEGASIS (Power-Efficient Gathering in Sensor Information System) PEGASIS is the improved protocol where only one node is chosen a head node which sends the fused data to the BS per round. This achieves factor of 2 improvement compared to LEACH protocol [1]. PEGASIS protocol requires formation of chain which is achieved in two steps: 2.1 Chain construction: To construct the chain we start from the furthest node from the BS and then greedy approach is used to construct the chain.

Figure-1 (This graph shows construction of chain in PEGASIS using Greedy approach) (Extracted from [4])

Figure-2 (Describes data fusion at the head node and transmitting it to BS) (Extracted from [4])

In figure 2, node 1 lies furthest from the base station so the chain construction starts from node 1 which connects to node 2, node 2 connects to node 3, node 3 connects to node 5, and node 4 connects to node 5. Each node also adjusts its signal strength so that only node to which it has to communicate receives the message [4]. 2.2 Gathering data: Leader of each round is selected randomly. If N is number of nodes i mod N node is selected as head node for i round. Randomly selecting head node also provides benefit as it is more likely for nodes to die at random locations thus providing robust network. When a node dies chain is reconstructed to bypass the dead node [1]. After the leader is selected it passes token to initiate data gathering process. Passing token also requires energy consumption but cost of passing token is very small because token size is very small. In figure 1 node 5 is selected as head node for particular round. Node 5 passes the token along the chain to node 1. Node 1 initiates transmitting its data to node 2, data is fused at node 2 along with the data of node 1 and transmitted to node 3. Each node waits until it

receives data from the previous node in the chain before transmitting its own data. This process is repeated until all the data is received at the head node. Head node receives all the fused data and sends to the BS [1]. Therefore in PEGASIS, in network of 100 nodes each node is selected at least once to function as head node and each node transmits and receives one packet in each round [1]. 3. Advantages of PEGASIS over LEACH Compare to LEACH transmitting distance for most of the node reduces in PEGASIS [1]. Messages received by each head node are at most 2 in PEGASIS is less compared to LEACH [1]. Experimental results show that PEGASIS provides improvement by factor 2 compared to LEACH protocol for 50m * 50m network and improvement by factor 3 for 100m * 100m network [1]. Since each node gets selected once, energy dissipation is balanced among sensor nodes [1].

4. Drawbacks of the PEGASIS protocol When a head node is selected, there is consideration how far the BS is located from the head node [4]. When a head node is selected its energy level is not considered [4]. Since there is only one node head, it may be the bottle neck of the network causing delay [4]. Redundant transmission of data as only one head node is selected [4]. 5. PEGASIS with CDMA nodes In PEGASIS linear chain based scheme, as transmission is sequential average delay per round is still high thus simultaneous transmission is desired. If the nodes are CDMA capable, then binary scheme can be used to perform parallel communication to reduce overall delay [2]. In Chain-based Binary Approach using CDMA, to minimize delay data is combined using as many as pairs as possible in each level. At the lowest level chain is constructed in the same way as was done in the PEGASIS. For data gathering round each node each node transmits the data to its nearest neighbor in given level of hierarchy. Nodes that receive data at lower level rise at the next level [2].

Figure-3 (This Graph shows Chain Based Binary approach using CDMA Nodes) (Extracted from [2])

Chain based binary scheme is improvement over LEACH by a factor of 3 since here at lower

level nodes transmit at less distance compared to nodes transmitting to cluster heads [2]. 6. Concentric Clustering Scheme In concentric clustering scheme network is divided in the form of concentric shaped clusters. This protocol consists of four processes: 1. Level Assignment: Each node in the network is assigned a level based on the grouping of concentric clusters [4]. 2. Chain Construction: At level area, chain is constructed, which is same as PEGASIS protocol [4]. 3. Head Node Assignment: One of the nodes at each level is selected as a head node. If there are N nodes in a level then for ith round i mode N is selected as a head node. After the head node is selected at each level it informs the head nodes of one higher level and one lower level [4]. 4. Data Transmission: All the nodes at a level transmit their data to the head node of their level. Head node after receiving their data fuses their data and send it lower level clusters head node. Head node nearest the BS collect data from all higher level head nodes and transmits to BS. Another way is to send data directly to BS. If the head node at the lower level forms acute angle with respect to BS and head node at higher level, data is sent directly to the BS [4].

Figure-4 (Concentric Clustering Scheme, showing level assignment and construction of chain at each cluster level) (Extracted from [4])

Experimental results conclude that concentric clustering scheme provides about 35% less energy consumption compared to the PEGASIS protocol [4].

7. Diamond-Shaped (D-S) Routing Method for Reliable Data Transmission Diamond shaped PEGASIS is improvement over Concentric Clustering Scheme to transmit data reliably. This protocol is very close to concentric clustering scheme except each alternate concentric cluster level has 2 head nodes instead of one. Levels with two head node collect data and send to the lower level cluster consisting of one head node. Levels consisting one head node send their data to next level cluster consisting of 2 head nodes. So both the nodes receive the

same copy of data [5].

Figure-5 (Formation of diamond shapes in D-S PEGASIS) (Extracted from [5])

Error rate in packet delivery was reduced as more copies of data are received and network extends lifetime [5]. 8. A Chain Oriented Sensor Network for Efficient Data Collection (COSEN) COSEN operate in two steps: 8.1 Chain formation stage: In chain formation stage several lower level and higher level chains are formed. Each level chain has head node. Each chain is fixed length. If there are N nodes in the network, C nodes make up a chain then N/C number of chains exists in the network. During chain formation phase if a chain exceeds C nodes then new chain formation starts. Unlike PEGASIS head node is selected on the basis of the highest energy nodes. To avoid too much communication, and to avoid the time to choose leader every round, COSEN protocols dont change the leader very often. Every N/C round new leader node is picked. Once the leader for lower level chain selected, higher level chain is formed and higher level leader is selected. For higher level leader, distance from BS, energy of the nodes and nodes which have not been chosen leader for last N/C round. When 20% of the node dies chain is reconstructed again [6]. 8.2 Data collection phase: Leader node starts the initiation of data collection by passing a token to the end node in the chain. Each node starts collecting data and passes it to next node. Head node collects the data and transmits the data to the leader node at the chain of higher level. When higher level leader gets the information it collects the information and sends the data to the BS [6]. Experimental result shows that in network of N nodes PEGASIS protocol delay is (N-1)t, where t is time to transmit from one node to next node. In COSEN, (C-1)t units of delay is at lower level chain and extra (N/C-1)t delay at higher level chain, thus total delay is (N/C-1)t + (C1)t which less than compared to PEGASIS while achieving the same energy saving. But it spends the energy in distributed way thus increasing the lifetime of the network [6].

9. Sensor Protocols for Information via Negotiation (SPIN) In simple approach of data transfer, three problems have been noticed: 1. Implosion: flooding problem where same data is send over and over from different nodes. Therefore energy of sensor nodes is not used efficiently [3]. 2. Overlap: Nodes can cover overlapping geographical areas therefore and pass overlap

piece of information to their neighbors. This causes wastage of energy and reduction of bandwidth [3]. 3. Resource Blindness: Nodes are not aware how much energy is left and nodes do not modify their activities based on energy left [3].

Figure-6 (Extracted from [3])

Figure-7

Figure-6 graph is an example of flooding problem where node A sends data to both of its neighbors B and C, which is finally sent to D. System wastes energy and bandwidth by passing extra copies. Figure-7 describes overlapping problem where two sensor nodes share same geographical area and hence same data marked as r [3]. In SPIN protocol nodes negotiate with each other, nodes also describes the name and the kind of data they observe to overcome the implosion and overlapping problem. To overcome the resource blindness problem, each node has its own resource manager that keeps the track of energy consumption therefore extending the lifetime of the network [3]. 9.1 SPIN-1: A 3-Stage Handshake Protocol When a spin node has data to share, it sends ADV message to the neighbor. When ADV is received by the neighboring node it checks whether it has already received the data or requested the data. If it has not already received the data, it sends REQ message back to sender and request for the missing data. DATA message is send to the neighboring node which requested for the data [3].

Figure-8 (Graph shows the exchange of ADV-REQ-DATA Messages) (Extracted from [3])

9.2 SPIN-2 SPIN-2 nodes, when they have enough energy they communicate with other using the SPIN-1 protocol. But as the energy level reduces to threshold, a SPIN-2 node reduces its participation, by not sending out the REQ message as a reply for ADV message [3]. 10. Conclusion In this paper we examined LEACH protocol provides 8 times efficient energy consumption than the direct approach. PEGASIS protocol is 2 times more energy efficient than LEACH protocol. Concentric clustering scheme provides 35% more efficiency than PEGASIS. Chain Based Binary scheme provides improvement of factor 8 over PEGASIS. COSEN protocol is easy to implement and better in energy consumption and network delay than both PEGASIS and LEACH. References [1] Stephanie Lindsey, Cauligi S. Raghvendra, PEGASIS: Power-Efficient Gathering in Sensor Information System. [2] Stephanie Lindsey, Cauligi Raghavendra and Krishna Sivalingam, Data Gathering in Sensor Networks using Energy*Delay Metric. [3] Wendi Rabiner Heinzelman, Joanna Kulik, and Hari Balakrishnan, Adaptive Protocols for Information Dissemination in Wireless Sensor Networks. [4] Sung-Min Jung, Young-Ju Han, Tai-Myoung Chung, The Concentric Clustering Scheme for Efficient Energy Consumption in the Pegasis. [5] Jung-Eun Lee, Keecheon Kim, Diamond-Shaped Routing Method for Reliable Data Transmission in Wireless Sensor Networks, IEEE Computer Society. [6] Nahdia Tabassum, Quazi Ehsanul Kabir Mamun and Yoshiyori Urano, COSEN: A Chain Oriented Sensor Network for Efficient Data Collection, IEEE Computer Society.

You might also like