SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
DOI : 10.5121/ijcsea.2012.2502 13
A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR
SINGLE MOBILE SINK IN WIRELESS SENSOR
NETWORKS
Zhi Huang1
, Sanyang Liu2
and Xiaogang Qi3
1
School of Computer Science & Technology, Xidian University, Xi’an, China
huangzhi2003@126.com
2
Department of Applied Mathematics, Xidian University, Xi’an, China
liusanyang@126.com
3
Department of Applied Mathematics, Xidian University, Xi’an, China
qixiaogang@gmail.com
ABSTRACT
Limit energy is a severe bottleneck of wireless sensor networks (WSNs), and limits network lifetime of
WSNs. To extend network lifetime, buffer zone has been proposed. Sensors send their data packets to buffer
zone. The sensors in buffer zone buffer the data packets. And then the sink visits the buffer zone to collect
the data packets. This leads to that the loads of the sensors in buffer zone are too high and the sensors die
quickly. To further extend network lifetime, an algorithm based on dynamic buffer zone has been proposed
in this paper. The algorithm divides the whole network area into some areas, and lets all areas act as the
buffer zone in turn. And the reasonable times each zone acts as the buffer zone are computed with linear
programming. The simulation results have shown that our proposed algorithm notably extends network
lifetime.
KEYWORDS
Wireless Sensor Networks, Mobile Sink, Buffer Zone, Linear Programming
1. INTRODUCTION
Wireless sensor networks is an important potential technology and can be applied to many
applications, such as industry, agriculture, military, space exploration, and so on [1-4]. Energy
resource is a severe bottleneck of wireless sensor networks because sensors are usually powered
by light weight batteries and these batteries usually can't be charged or replaced [3]. Therefore,
how to effectively utilize energy resource of sensors is an important issue of wireless sensor
networks. One important approach is sink mobility. That is, sink moves in the network area in
order to shift the burden from sensors to the sink [5].
To further extend network lifetime, another approach, deploying both mobile sink and buffer zone
in network area, has been proposed [6]. A part of network area act as buffer zone. All sensors
send their data packets to the buffer zone. Then the sensors in the buffer zone buffer these data
packets, and directly send these data packets to the sink when the sink moves into their
communication range. The sink moves back and forth in the buffer zone to collect data packets.
The approach extend network lifetime notably. However, sensors in the buffer zone forward too
many data packets, consume much energy and die quickly. This limits network lifetime.
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
14
In this paper, to further extend network lifetime, we have proposed a dynamic buffer zone based
algorithm for single mobile sink in wireless sensor networks. The algorithm divides the network
area into some sub areas. Each sub area acts as the buffer zone in turn. And the time each sub area
acts as the buffer zone are reasonably computed with linear programming.
The remainder of this paper is organized as follows:
2. RELATED WORK
Sink mobility has been widely proposed. And many algorithms for sink mobility have been
proposed.
Data Mules [7] was proposed aiming at sparse sensor network. Mobile entities, such as people,
animals, and cars, are called Data Mules. An entity moves in network area, collect and buffer data
from a sensor when the distance between them is short enough. An entity sends data to an Access
Point when they are near. The algorithm saves energy. However, it leads to tremendous latency.
Ref. [8] assumes that sensors are deployed in a circle area. It is proved that moving along the
periphery of the circle network area is optimum. Ref. [6] has studied the same network model,
and proposed an algorithm with buffer zone, which is called MADG (movement-assisted data
gathering). The algorithm deploys both mobile sink and buffer zone in network area. A ring area
acts as the buffer zone. The sensors in the buffer zone buffer all sensors' data. The sink moves
back and forth in the buffer zone, and collect data when it is near to a sensor, as shown in figure
1. The algorithm extend network lifetime notably. However, the sensors in buffer zone consume
much energy and die quickly. In this paper, we have improved the algorithm and proposed a new
algorithm.
Figure 1. MADG (Only a part of network is drawn to simplify the figure)
3. NETWORK MODEL
N sensors are randomly distributed in a circle area with the radius R and the centre O. The
communication radius of sensors is r(r<<R). The density of sensors is high. Therefore, the
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
15
network has strong connectivity [6]. Each sensor knows its own position and the position of the
centre, as well as the radius R. The sink is mobile, can move in the network area, and has limitless
power.
4. A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR SINGLE MOBILE
SINK
In MADG, all sensors' data packets are sent to and buffered by the sensors in the buffer zone.
Then a sensor in the buffer zone directly sends data to the sink when the distance between the
sensors and the sink is short enough. The topology in Figure 1 can be abstracted as Figure 2. As
seen in Figure 2, all sensors' data packets are forwarded by the sensors in the buffer zone.
Therefore, the sensors in the buffer zone forwards many data packets, consume much energy, and
die quickly. This limits network lifetime. To further extend network lifetime, we have proposed
the approach which partitions the whole network area into some sub areas, let each sub area act as
the buffer zone. The time each sub area act as the buffer zone is computed with the linear
programming in which the target function is maximizing network lifetime. Therefore, the balance
of energy consumption can be obtained and network lifetime can be extended.
Figure 2. Abstraction of the topology in Figure 1
The following notation is used in describing our algorithm:
r communication radius of sensors
e initial energy of sensors
s the number of rings
d the distance between two adjacent rings
n a sensor in network
N the set of all sensors in network
k(n) the number of the ring in which sensor n is
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
16
d(n) the distance from the centre to sensor n
nb(n) the set of all neighbor of sensor n
nb_1(n) the set of the sensors which belong to and is in the ring k(n)-1
nb_2(n) the set of the sensors which is in ring k(n) and d(x)<d(n)
nb_3(n) the set of the sensors which is in ring k(n) and d(x)>d(n)
nb_4(n) the set of the sensors which belong to and is in the ring k(n)+1
u(n) the next hop of sensor n when data is forwarded towards the centre
d(n) the next hop of sensor n when data is forwarded towards the periphery
lij the maximum load (the energy consumed in a unit time) of the ring
j(1≤j≤s) when the ring i(1≤i ≤s) acts as the buffer zone
ti the time the ring i acts as the buffer zone
4.1. Network Partitioning
The whole circle network area are evenly partitioned into s concentric rings, s=R/d(d<r), where
the centre of the rings are the centre of the circle network area. And the distance between the
rings is d, as shown in Figure 3. All rings are outward numbered as ring 1, ring 2, ..., ring s. And
the time each ring acts as the buffer zone is ti(1≤i≤s).
Figure 3. Partitioning of network
4.2. Routing
Once a network is deployed and starts, for sensor n, two sensors, d(n) and u(n) are found. When
data is transferred towards the centre of the circle network area, n transfers its data to d(n). And
when data is transferred towards the border of the circle network area, n transfers its data to u(n).
The approach to find d(n) and u(n) are described as follows.
The set of all neighbour sensors of n, nb(n), is divided into four subsets, nb_1(n), nb_2(n), nb_3(n)
and nb_4(n), as shown in figure 4. In nb_1(n), the senor with the shortest distance to the centre is
found, and its ID is assigned to u(n). If nb_1(n) is empty, then the senor with the shortest distance
to the centre is found in nb_2(n), and its ID is assigned to u(n). In nb_4(n), the senor with the
longest distance to the centre is found, and its ID is assigned to d(n). If nb_4(n) is empty, then the
senor with the shortest distance to the centre is found in nb_3(n), and its ID is assigned to d(n).
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
17
Figure 4. Partitioning of network
The algorithm to find d(n) and u(n) are described as follows.
/* The algorithm that is used by a sensor node to find its U(n) and D(n) */
1 for each n∈N do
2 find nb(n)
3 find nb_1(n),nb_2(n), nb_3(n), nb_4(n)
4 if n is not in ring 1
5 if nb_1(n) is not a empty set
6 find the node x which is in nb_1(n) and has the min d(x) in nb_1(n)
7 u(n)=x
8 end if
9 else
10 find the node x which is in nb_2(n) and has the min d(x) in nb_2(n)
11 u(n)=x
12 end if
13 if n is not in ring s
14 if nb_4(n) is not a empty set
15 find the node x which is in nb_1(n) and has the max d(x) in nb_4(n)
16 u(n)=x
17 end if
18 else
19 find the node x which is in nb_3(n) and has the max d(x) in nb_3(n)
20 u(n)=x
21 end if
22 end for
4.3. Times Each Zone Acts as the Buffer Zone
The times each zone acts as the buffer zone must be reasonably computed to extend network
lifetime. And linear programming is adopted to calculate the times, as follows.
0,...
*...*
...
*...*
.
1
11
1111
1
>
≤++
≤++
= ∑=
i
ijij
ii
s
i
i
tt
eltlt
eltlt
tS
tMaxZ
(1)
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
18
The reasonable times each zone acts as the buffer zone can be obtained with working out the
linear programming.
The maximum load of the ring j when the ring i acts as the buffer zone, lij, is difficult to be
calculated because it relates to specific network topologies and network topologies are randomly
generated. Actually, lij is determined by the following six factors: R (the radius of the network
area), r (communication radius of sensors), |N| (the number of sensors), D (network partitioning)
as well as the values of i and j. The first four factors can be curtain before the network operation.
Therefore, we can repeatedly simulates on computers, and obtain the average value as the
expectation of lij.
4.4. Implementation of the Algorithm
The algorithm is implemented as the following steps:
(1) Before a network is deployed, since we know the values of R, r, |N| and D of the network to
be deployed, computer simulations can be made with these values. And then the values of all lij
(0≤i,j≤s) can be obtained. Thereby the values of all tij (0≤i,j≤s) can bee calculated with equation
(1).
(2) After the network is deployed and starts working, ring x (the initial value of x is 1) acts as the
buffer zone for time tx. The sensors in the rings x+1~s (when x<s) transfer their data packets to
their u(n), the sensors in the rings 1~x-1 (when x>1) transfer their data packets to their d(n). The
sensors in the ring x receive data packets from other sensors. When the sink moves into their
communication ranges, the sensors in the ring x transfer the data packets they receive and their
own data packets to the sink.
(3) After the ring x acts as the buffer zone for time tx, the sink, broadcasts a message to all sensors
to inform that the ring x+1 starts acting as the buffer zone (lets x=x+1), and starts moving in ring
x+1 (when x<s). After receiving the message, the ring x+1 (when x<s) acts as the buffer zone
with the method of Steps (2).
(4) Steps (2) and (3) are repeated until the network dies. If the network does not die after the ring
s acts as the buffer zone, the ring s continues acting as the buffer zone until the network dies.
5. SIMULATION RESULTS
Physic layer and MAC layer are ignored in simulations because we mainly focus on the upper
data gathering algorithm. To simplify simulations, we assume that each sensor generates a data
packet in one unit time, and one unit energy is consumed to send a data packet. We have assumed
that a network area with the radius R=100m. 3000 sensors with the communication radius r=12m
are randomly deployed in the network. The initial energy of sensors is 5000 units. Each sensor
generates 1 data packet per time unit. 1 unit energy is consumed to transfer a data packet.
Three algorithms are compared in the simulations. The first one is static sink (short for “SS”), the
sink always stays at the centre of the network area during network operation. The second one is
MADG and the third one is proposed DBDG.
In DBDG, we let s=10. That is, the network area is evenly partitioned into 10 concentric rings.
The expectations of lij are obtained through simulations, as shown in table.
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
19
Table 1. The expectations of lij are obtained through simulations
And then the following linear programming is obtained.
Max Z= t1+ t2+ t3+ t4+ t5+ t6+ t7+ t8+ t9+ t10
S.t
1251.7* t1+1.0* t2+1.0* t3+1.0* t4+1.0* t5+1.0* t6+1.0* t7+1.0* t8+1.0* t9+1.0* t10 ≤5000
295.7* t1+296.7* t2+4.0* t3+4.0* t4+4.0* t5+4.0* t6+4.0* t7+4.0* t8+4.0* t9+4.0* t10 ≤5000
174.2* t1+174.2* t2+175.7* t3+8.4* t4+8.4* t5+8.4* t6+8.4* t7+8.4* t8+8.4* t9+8.4* t10 ≤5000
115.5* t1+115.5* t2+115.5* t3+117.1* t4+12.4* t5+12.4* t6+12.4* t7+12.4* t8+12.4* t9+12.4* t10 ≤5000 (2)
82.0* t1+82.0* t2+82.0* t3+82.0* t4+84.1* t5+20.1* t6+20.1* t7+20.1* t8+20.1* t9+20.1* t10 ≤5000
53.9* t1+53.9* t2+53.9* t3+53.9* t4+53.9* t5+56.1* t6+26.1* t7+26.1* t8+26.1* t9+26.1* t10 ≤5000
35.3* t1+35.3* t2+35.3* t3+35.3* t4+35.3* t5+35.3* t6+42.3* t7+33.0* t8+33.0* t9+33.0* t10 ≤5000
18.5* t1+18.5* t2+18.5* t3+18.5* t4+18.5* t5+18.5* t6+18.5* t7+43.7* t8+42.1* t9+42.1* t10 ≤5000
10.6* t1+10.6* t2+10.6* t3+10.6* t4+10.6* t5+10.6* t6+10.6* t7+10.6* t8+53.2* t9+50.8* t10 ≤5000
3.8* t1+3.8* t2+3.8* t3+3.8* t4+3.8* t5+3.8* t6+3.8* t7+3.8* t8+3.8* t9+65.9 ≤5000
t1, t2, t3, t4, t5, t6, t7, t8, t9, t10 ≥0
After resolving the linear programming, the following result is obtained.
Z=146.31
t1=0.00 t2=0.00 t3=22.54 t4=8.2 t5=2.41
t6=8.62 t7=8.11 t8=11.40 t9=13.43 t10=71.56
That is to say, the network lifetime is 146.31 time units using proposed DBDG.
10 network topologies are randomly generated. SS, MADG and DBDG run in each topology.
Two performance metrics, network lifetime, and total energy consumption are compared.
Network lifetime is defined as the time from the network starts operating to it dies. The
simulation results are shown in Figure. As shown in the figure 5, DBDG notably improve
network lifetime. Using DBDG, network lifetime is improved by 771.43% on average compared
to SS, and 133.12% on average compared to MADG.
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
20
0
20
40
60
80
100
120
140
160
180
Survivaltimeofnetworks
N1 N2 N3 N4 N5 N6 N7 N8 N9 N10
Networks
SM
MADG
DBDG
Figure 5. Comparison of network lifetime achieved by the three algorithms
Total energy consumption is the energy consumed by the whole network during its operation.
This metric can reflect the degree how sensors’ energy is utilized. The result is shown in figure 6.
The result indicates that DBDG notably improves this metric. Using DBDG, total energy
consumption is improved by 462.78% on average compared to SS, and 197.41% on average
compared to MADG.
0
500000
1000000
1500000
2000000
Totalenergy
consumed
N1 N2 N3 N4 N5 N6 N7 N8 N9 N10
Networks
SM
MADG
DBDG
Figure 6. Comparison of network lifetime achieved by the three algorithms
6. CONCLUSIONS
In this paper, we have proposed a novel algorithm for sing mobile sink based on dynamic buffer
zone. The algorithm partitions the whole network area into some areas, and let the areas act as the
buffer zone in turn. To obtain the reasonable time each area acts as the buffer zone, linear
programming is adopted. As a result, the sensors’ energy is fully utilized and network lifetime is
notably prompted.
ACKNOWLEDGEMENTS
Project supported by the National Natural Science Foundation of China (Grants No. 60703118,
60974082), the Fundamental Research Funds for the Central Universities (Grants No.
JY10000970013).
International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012
21
REFERENCES
[1] M. Kohvakka, J Suhonen, M Kuorilehto, V Kaseva, M Hannikainen, T. D. Hamalainen (2009). Ad
Hoc Networks, Vol. 7, No. 1, pp24-41.
[2] C.M. Liu, C.H. Lee, L. C. Wang (2007). Distributed clustering algorithms for data-gathering in
wireless mobile sensor networks, Journal of Parallel and Distributed Computing, Vol. 67, No. 11,
pp1187-1200.
[3] Akyildiz IF, Su W, Sankarasubramaniam Y, etc (2002). Wireless sensor networks : A survey,
Computer Networks, Vol. 38, No. 4, pp393-422.
[4] D. Estrin et al. (2009). Next Century Challenges: Scalable Coordination in Sensor Networks, in: The
Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks,
Seattle, Washington, August 1999.
[5] Ioannis C, Athanasios K, Sotiris N (2008). Efficient data propagation strategies in wireless sensor
networks using a single mobile sink, Computer Communications, Vol. 31, No. 5, pp896-914.
[6] Shi Gaotao, Liao Minghong (2007). Movement-Assisted Data Gathering Scheme with Load-
Balancing for Sensor Networks, Journal of Software, Vol. 18, No. 9, pp2235-2244.
[7] Roy. Sumit, Jain. Sushant, Brunette. Waylon (2003). Data MULEs: Modeling and analysis of a three-
tier architecture for sparse sensor networks, Ad Hoc Networks, Vol. 1, No. 2-3, pp215-233.
[8] Luo J, Hubaux J P (2005). Joint mobility and routing for lifetime elongation in wireless sensor
networks, proceeding of the 24th Annual Joint Conference of the IEEE Computer and
Communications Societies.
AUTHORS
Zhi Huang received M.S. degree in Information Management from Sichuan University, China in 2006.
He is currently a Ph.D. candidate of Computer Science at Xidian University. His research interest is
wireless sensor networks.
Sanyang Liu received his Ph.D. in Mathematics from Xi’an Jiaotong University, China in 1989. He is
currently a professor in the Department of Applied Mathematics at Xidian University. His research
interests include optimization, network algorithms, network reliability and wireless sensor networks.
Xiaogang Qi received his Ph.D. in Mathematics from Xidian University, China in 2005. He is currently
an associate professor in the Department of Applied Mathematics at Xidian University. His research
interests include high-performance networks and wireless sensor networks.

More Related Content

What's hot

Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensorIJCNCJournal
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Editor IJMTER
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkEditor IJMTER
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijcseit
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes forijistjournal
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksScenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksIJCNCJournal
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Journals
 

What's hot (16)

I04503075078
I04503075078I04503075078
I04503075078
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Localization for wireless sensor
Localization for wireless sensorLocalization for wireless sensor
Localization for wireless sensor
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
Estimation of Robust Standard by using Compression Sensing Data in Wireless S...
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor Network
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes for
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc NetworksScenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
Scenarios of Lifetime Extension Algorithms for Wireless Ad Hoc Networks
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
D031202018023
D031202018023D031202018023
D031202018023
 

Similar to 2512ijcsea02

Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsidescitation
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxpraveena06
 
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...ijdmtaiir
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...ijcseit
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ijcseit
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Messch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsnMessch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsneSAT Journals
 
Optimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkOptimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkIRJET Journal
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...ijceronline
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 

Similar to 2512ijcsea02 (20)

Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
V1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docxV1_I2_2012_Paper5.docx
V1_I2_2012_Paper5.docx
 
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
Anchor Positioning using Sensor Transmission Range Based Clustering for Mobil...
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...Energy efficient approach based on evolutionary algorithm for coverage contro...
Energy efficient approach based on evolutionary algorithm for coverage contro...
 
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
ENERGY EFFICIENT APPROACH BASED ON EVOLUTIONARY ALGORITHM FOR COVERAGE CONTRO...
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Messch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsnMessch protocol an energy efficient routing protocol for wsn
Messch protocol an energy efficient routing protocol for wsn
 
Optimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor NetworkOptimizing the Data Collection in Wireless Sensor Network
Optimizing the Data Collection in Wireless Sensor Network
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
A Survey on Rendezvous Based Techniques for Power Conservation in Wireless Se...
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

2512ijcsea02

  • 1. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 DOI : 10.5121/ijcsea.2012.2502 13 A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR SINGLE MOBILE SINK IN WIRELESS SENSOR NETWORKS Zhi Huang1 , Sanyang Liu2 and Xiaogang Qi3 1 School of Computer Science & Technology, Xidian University, Xi’an, China huangzhi2003@126.com 2 Department of Applied Mathematics, Xidian University, Xi’an, China liusanyang@126.com 3 Department of Applied Mathematics, Xidian University, Xi’an, China qixiaogang@gmail.com ABSTRACT Limit energy is a severe bottleneck of wireless sensor networks (WSNs), and limits network lifetime of WSNs. To extend network lifetime, buffer zone has been proposed. Sensors send their data packets to buffer zone. The sensors in buffer zone buffer the data packets. And then the sink visits the buffer zone to collect the data packets. This leads to that the loads of the sensors in buffer zone are too high and the sensors die quickly. To further extend network lifetime, an algorithm based on dynamic buffer zone has been proposed in this paper. The algorithm divides the whole network area into some areas, and lets all areas act as the buffer zone in turn. And the reasonable times each zone acts as the buffer zone are computed with linear programming. The simulation results have shown that our proposed algorithm notably extends network lifetime. KEYWORDS Wireless Sensor Networks, Mobile Sink, Buffer Zone, Linear Programming 1. INTRODUCTION Wireless sensor networks is an important potential technology and can be applied to many applications, such as industry, agriculture, military, space exploration, and so on [1-4]. Energy resource is a severe bottleneck of wireless sensor networks because sensors are usually powered by light weight batteries and these batteries usually can't be charged or replaced [3]. Therefore, how to effectively utilize energy resource of sensors is an important issue of wireless sensor networks. One important approach is sink mobility. That is, sink moves in the network area in order to shift the burden from sensors to the sink [5]. To further extend network lifetime, another approach, deploying both mobile sink and buffer zone in network area, has been proposed [6]. A part of network area act as buffer zone. All sensors send their data packets to the buffer zone. Then the sensors in the buffer zone buffer these data packets, and directly send these data packets to the sink when the sink moves into their communication range. The sink moves back and forth in the buffer zone to collect data packets. The approach extend network lifetime notably. However, sensors in the buffer zone forward too many data packets, consume much energy and die quickly. This limits network lifetime.
  • 2. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 14 In this paper, to further extend network lifetime, we have proposed a dynamic buffer zone based algorithm for single mobile sink in wireless sensor networks. The algorithm divides the network area into some sub areas. Each sub area acts as the buffer zone in turn. And the time each sub area acts as the buffer zone are reasonably computed with linear programming. The remainder of this paper is organized as follows: 2. RELATED WORK Sink mobility has been widely proposed. And many algorithms for sink mobility have been proposed. Data Mules [7] was proposed aiming at sparse sensor network. Mobile entities, such as people, animals, and cars, are called Data Mules. An entity moves in network area, collect and buffer data from a sensor when the distance between them is short enough. An entity sends data to an Access Point when they are near. The algorithm saves energy. However, it leads to tremendous latency. Ref. [8] assumes that sensors are deployed in a circle area. It is proved that moving along the periphery of the circle network area is optimum. Ref. [6] has studied the same network model, and proposed an algorithm with buffer zone, which is called MADG (movement-assisted data gathering). The algorithm deploys both mobile sink and buffer zone in network area. A ring area acts as the buffer zone. The sensors in the buffer zone buffer all sensors' data. The sink moves back and forth in the buffer zone, and collect data when it is near to a sensor, as shown in figure 1. The algorithm extend network lifetime notably. However, the sensors in buffer zone consume much energy and die quickly. In this paper, we have improved the algorithm and proposed a new algorithm. Figure 1. MADG (Only a part of network is drawn to simplify the figure) 3. NETWORK MODEL N sensors are randomly distributed in a circle area with the radius R and the centre O. The communication radius of sensors is r(r<<R). The density of sensors is high. Therefore, the
  • 3. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 15 network has strong connectivity [6]. Each sensor knows its own position and the position of the centre, as well as the radius R. The sink is mobile, can move in the network area, and has limitless power. 4. A DYNAMIC BUFFER ZONE BASED ALGORITHM FOR SINGLE MOBILE SINK In MADG, all sensors' data packets are sent to and buffered by the sensors in the buffer zone. Then a sensor in the buffer zone directly sends data to the sink when the distance between the sensors and the sink is short enough. The topology in Figure 1 can be abstracted as Figure 2. As seen in Figure 2, all sensors' data packets are forwarded by the sensors in the buffer zone. Therefore, the sensors in the buffer zone forwards many data packets, consume much energy, and die quickly. This limits network lifetime. To further extend network lifetime, we have proposed the approach which partitions the whole network area into some sub areas, let each sub area act as the buffer zone. The time each sub area act as the buffer zone is computed with the linear programming in which the target function is maximizing network lifetime. Therefore, the balance of energy consumption can be obtained and network lifetime can be extended. Figure 2. Abstraction of the topology in Figure 1 The following notation is used in describing our algorithm: r communication radius of sensors e initial energy of sensors s the number of rings d the distance between two adjacent rings n a sensor in network N the set of all sensors in network k(n) the number of the ring in which sensor n is
  • 4. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 16 d(n) the distance from the centre to sensor n nb(n) the set of all neighbor of sensor n nb_1(n) the set of the sensors which belong to and is in the ring k(n)-1 nb_2(n) the set of the sensors which is in ring k(n) and d(x)<d(n) nb_3(n) the set of the sensors which is in ring k(n) and d(x)>d(n) nb_4(n) the set of the sensors which belong to and is in the ring k(n)+1 u(n) the next hop of sensor n when data is forwarded towards the centre d(n) the next hop of sensor n when data is forwarded towards the periphery lij the maximum load (the energy consumed in a unit time) of the ring j(1≤j≤s) when the ring i(1≤i ≤s) acts as the buffer zone ti the time the ring i acts as the buffer zone 4.1. Network Partitioning The whole circle network area are evenly partitioned into s concentric rings, s=R/d(d<r), where the centre of the rings are the centre of the circle network area. And the distance between the rings is d, as shown in Figure 3. All rings are outward numbered as ring 1, ring 2, ..., ring s. And the time each ring acts as the buffer zone is ti(1≤i≤s). Figure 3. Partitioning of network 4.2. Routing Once a network is deployed and starts, for sensor n, two sensors, d(n) and u(n) are found. When data is transferred towards the centre of the circle network area, n transfers its data to d(n). And when data is transferred towards the border of the circle network area, n transfers its data to u(n). The approach to find d(n) and u(n) are described as follows. The set of all neighbour sensors of n, nb(n), is divided into four subsets, nb_1(n), nb_2(n), nb_3(n) and nb_4(n), as shown in figure 4. In nb_1(n), the senor with the shortest distance to the centre is found, and its ID is assigned to u(n). If nb_1(n) is empty, then the senor with the shortest distance to the centre is found in nb_2(n), and its ID is assigned to u(n). In nb_4(n), the senor with the longest distance to the centre is found, and its ID is assigned to d(n). If nb_4(n) is empty, then the senor with the shortest distance to the centre is found in nb_3(n), and its ID is assigned to d(n).
  • 5. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 17 Figure 4. Partitioning of network The algorithm to find d(n) and u(n) are described as follows. /* The algorithm that is used by a sensor node to find its U(n) and D(n) */ 1 for each n∈N do 2 find nb(n) 3 find nb_1(n),nb_2(n), nb_3(n), nb_4(n) 4 if n is not in ring 1 5 if nb_1(n) is not a empty set 6 find the node x which is in nb_1(n) and has the min d(x) in nb_1(n) 7 u(n)=x 8 end if 9 else 10 find the node x which is in nb_2(n) and has the min d(x) in nb_2(n) 11 u(n)=x 12 end if 13 if n is not in ring s 14 if nb_4(n) is not a empty set 15 find the node x which is in nb_1(n) and has the max d(x) in nb_4(n) 16 u(n)=x 17 end if 18 else 19 find the node x which is in nb_3(n) and has the max d(x) in nb_3(n) 20 u(n)=x 21 end if 22 end for 4.3. Times Each Zone Acts as the Buffer Zone The times each zone acts as the buffer zone must be reasonably computed to extend network lifetime. And linear programming is adopted to calculate the times, as follows. 0,... *...* ... *...* . 1 11 1111 1 > ≤++ ≤++ = ∑= i ijij ii s i i tt eltlt eltlt tS tMaxZ (1)
  • 6. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 18 The reasonable times each zone acts as the buffer zone can be obtained with working out the linear programming. The maximum load of the ring j when the ring i acts as the buffer zone, lij, is difficult to be calculated because it relates to specific network topologies and network topologies are randomly generated. Actually, lij is determined by the following six factors: R (the radius of the network area), r (communication radius of sensors), |N| (the number of sensors), D (network partitioning) as well as the values of i and j. The first four factors can be curtain before the network operation. Therefore, we can repeatedly simulates on computers, and obtain the average value as the expectation of lij. 4.4. Implementation of the Algorithm The algorithm is implemented as the following steps: (1) Before a network is deployed, since we know the values of R, r, |N| and D of the network to be deployed, computer simulations can be made with these values. And then the values of all lij (0≤i,j≤s) can be obtained. Thereby the values of all tij (0≤i,j≤s) can bee calculated with equation (1). (2) After the network is deployed and starts working, ring x (the initial value of x is 1) acts as the buffer zone for time tx. The sensors in the rings x+1~s (when x<s) transfer their data packets to their u(n), the sensors in the rings 1~x-1 (when x>1) transfer their data packets to their d(n). The sensors in the ring x receive data packets from other sensors. When the sink moves into their communication ranges, the sensors in the ring x transfer the data packets they receive and their own data packets to the sink. (3) After the ring x acts as the buffer zone for time tx, the sink, broadcasts a message to all sensors to inform that the ring x+1 starts acting as the buffer zone (lets x=x+1), and starts moving in ring x+1 (when x<s). After receiving the message, the ring x+1 (when x<s) acts as the buffer zone with the method of Steps (2). (4) Steps (2) and (3) are repeated until the network dies. If the network does not die after the ring s acts as the buffer zone, the ring s continues acting as the buffer zone until the network dies. 5. SIMULATION RESULTS Physic layer and MAC layer are ignored in simulations because we mainly focus on the upper data gathering algorithm. To simplify simulations, we assume that each sensor generates a data packet in one unit time, and one unit energy is consumed to send a data packet. We have assumed that a network area with the radius R=100m. 3000 sensors with the communication radius r=12m are randomly deployed in the network. The initial energy of sensors is 5000 units. Each sensor generates 1 data packet per time unit. 1 unit energy is consumed to transfer a data packet. Three algorithms are compared in the simulations. The first one is static sink (short for “SS”), the sink always stays at the centre of the network area during network operation. The second one is MADG and the third one is proposed DBDG. In DBDG, we let s=10. That is, the network area is evenly partitioned into 10 concentric rings. The expectations of lij are obtained through simulations, as shown in table.
  • 7. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 19 Table 1. The expectations of lij are obtained through simulations And then the following linear programming is obtained. Max Z= t1+ t2+ t3+ t4+ t5+ t6+ t7+ t8+ t9+ t10 S.t 1251.7* t1+1.0* t2+1.0* t3+1.0* t4+1.0* t5+1.0* t6+1.0* t7+1.0* t8+1.0* t9+1.0* t10 ≤5000 295.7* t1+296.7* t2+4.0* t3+4.0* t4+4.0* t5+4.0* t6+4.0* t7+4.0* t8+4.0* t9+4.0* t10 ≤5000 174.2* t1+174.2* t2+175.7* t3+8.4* t4+8.4* t5+8.4* t6+8.4* t7+8.4* t8+8.4* t9+8.4* t10 ≤5000 115.5* t1+115.5* t2+115.5* t3+117.1* t4+12.4* t5+12.4* t6+12.4* t7+12.4* t8+12.4* t9+12.4* t10 ≤5000 (2) 82.0* t1+82.0* t2+82.0* t3+82.0* t4+84.1* t5+20.1* t6+20.1* t7+20.1* t8+20.1* t9+20.1* t10 ≤5000 53.9* t1+53.9* t2+53.9* t3+53.9* t4+53.9* t5+56.1* t6+26.1* t7+26.1* t8+26.1* t9+26.1* t10 ≤5000 35.3* t1+35.3* t2+35.3* t3+35.3* t4+35.3* t5+35.3* t6+42.3* t7+33.0* t8+33.0* t9+33.0* t10 ≤5000 18.5* t1+18.5* t2+18.5* t3+18.5* t4+18.5* t5+18.5* t6+18.5* t7+43.7* t8+42.1* t9+42.1* t10 ≤5000 10.6* t1+10.6* t2+10.6* t3+10.6* t4+10.6* t5+10.6* t6+10.6* t7+10.6* t8+53.2* t9+50.8* t10 ≤5000 3.8* t1+3.8* t2+3.8* t3+3.8* t4+3.8* t5+3.8* t6+3.8* t7+3.8* t8+3.8* t9+65.9 ≤5000 t1, t2, t3, t4, t5, t6, t7, t8, t9, t10 ≥0 After resolving the linear programming, the following result is obtained. Z=146.31 t1=0.00 t2=0.00 t3=22.54 t4=8.2 t5=2.41 t6=8.62 t7=8.11 t8=11.40 t9=13.43 t10=71.56 That is to say, the network lifetime is 146.31 time units using proposed DBDG. 10 network topologies are randomly generated. SS, MADG and DBDG run in each topology. Two performance metrics, network lifetime, and total energy consumption are compared. Network lifetime is defined as the time from the network starts operating to it dies. The simulation results are shown in Figure. As shown in the figure 5, DBDG notably improve network lifetime. Using DBDG, network lifetime is improved by 771.43% on average compared to SS, and 133.12% on average compared to MADG.
  • 8. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 20 0 20 40 60 80 100 120 140 160 180 Survivaltimeofnetworks N1 N2 N3 N4 N5 N6 N7 N8 N9 N10 Networks SM MADG DBDG Figure 5. Comparison of network lifetime achieved by the three algorithms Total energy consumption is the energy consumed by the whole network during its operation. This metric can reflect the degree how sensors’ energy is utilized. The result is shown in figure 6. The result indicates that DBDG notably improves this metric. Using DBDG, total energy consumption is improved by 462.78% on average compared to SS, and 197.41% on average compared to MADG. 0 500000 1000000 1500000 2000000 Totalenergy consumed N1 N2 N3 N4 N5 N6 N7 N8 N9 N10 Networks SM MADG DBDG Figure 6. Comparison of network lifetime achieved by the three algorithms 6. CONCLUSIONS In this paper, we have proposed a novel algorithm for sing mobile sink based on dynamic buffer zone. The algorithm partitions the whole network area into some areas, and let the areas act as the buffer zone in turn. To obtain the reasonable time each area acts as the buffer zone, linear programming is adopted. As a result, the sensors’ energy is fully utilized and network lifetime is notably prompted. ACKNOWLEDGEMENTS Project supported by the National Natural Science Foundation of China (Grants No. 60703118, 60974082), the Fundamental Research Funds for the Central Universities (Grants No. JY10000970013).
  • 9. International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, No.5, October 2012 21 REFERENCES [1] M. Kohvakka, J Suhonen, M Kuorilehto, V Kaseva, M Hannikainen, T. D. Hamalainen (2009). Ad Hoc Networks, Vol. 7, No. 1, pp24-41. [2] C.M. Liu, C.H. Lee, L. C. Wang (2007). Distributed clustering algorithms for data-gathering in wireless mobile sensor networks, Journal of Parallel and Distributed Computing, Vol. 67, No. 11, pp1187-1200. [3] Akyildiz IF, Su W, Sankarasubramaniam Y, etc (2002). Wireless sensor networks : A survey, Computer Networks, Vol. 38, No. 4, pp393-422. [4] D. Estrin et al. (2009). Next Century Challenges: Scalable Coordination in Sensor Networks, in: The Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks, Seattle, Washington, August 1999. [5] Ioannis C, Athanasios K, Sotiris N (2008). Efficient data propagation strategies in wireless sensor networks using a single mobile sink, Computer Communications, Vol. 31, No. 5, pp896-914. [6] Shi Gaotao, Liao Minghong (2007). Movement-Assisted Data Gathering Scheme with Load- Balancing for Sensor Networks, Journal of Software, Vol. 18, No. 9, pp2235-2244. [7] Roy. Sumit, Jain. Sushant, Brunette. Waylon (2003). Data MULEs: Modeling and analysis of a three- tier architecture for sparse sensor networks, Ad Hoc Networks, Vol. 1, No. 2-3, pp215-233. [8] Luo J, Hubaux J P (2005). Joint mobility and routing for lifetime elongation in wireless sensor networks, proceeding of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. AUTHORS Zhi Huang received M.S. degree in Information Management from Sichuan University, China in 2006. He is currently a Ph.D. candidate of Computer Science at Xidian University. His research interest is wireless sensor networks. Sanyang Liu received his Ph.D. in Mathematics from Xi’an Jiaotong University, China in 1989. He is currently a professor in the Department of Applied Mathematics at Xidian University. His research interests include optimization, network algorithms, network reliability and wireless sensor networks. Xiaogang Qi received his Ph.D. in Mathematics from Xidian University, China in 2005. He is currently an associate professor in the Department of Applied Mathematics at Xidian University. His research interests include high-performance networks and wireless sensor networks.