Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 75-88 Performance Study of Simple Flooding and Dominant Pruning Protocol in Wireless Sensor Network via TOSSIM M. K. Nor, M. F. Sulaima, M. F. Baharom, A. F. Tuani Ibrahim, F. Idris Faculty of Electronics and Computer Engineering, Universiti Teknikal Malaysia Melaka, 76100, Hang Tuah Jaya, Malacca, Malaysia, Faculty of Electrical Engineering, Universiti Teknikal Malaysia Melaka, 76100, Hang Tuah Jaya, Malacca, Malaysia, Abstract. Energy efficiency has become one of expanding research area in wireless sensor network. Various techniques of routing protocol have been proposed by many researchers in their simulation technique. Routing protocol performance comparisons have been measured through simulation with different simulators. In this paper, two kind of broadcast routing protocols, simple flooding and dominant pruning will be compared in terms of their performance by using TinyOS Simulator (TOSSIM). The measurement on the comparison is based on its coverage for a single packet being sent from source node to its neighbors and packet delivery ratio. The objectives of this study are to compare the efficiency of both broadcast protocols in disseminating data between multiple sensor nodes. The effectiveness of the deliverability efficiency for both methods will be compared and the results are hoped to help the system engineers in choosing the best method for their routing protocols in the future. Keywords: Flooding, Pruning, Routing protocol, TOSSIM, Wireless sensor network. 1 INTRODUCTION Wireless sensor network (WSN) generally considered as one of the most important technologies for the 21stcentury. It has a large number of low-cost, Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 low-power and multifunctional WSN with sensing, wireless communications and computation capabilities [1]. These sensors widely used in various civilian, military applications, environmental monitoring, industrial process control and biomedical application have been envisioned in the near future [2, 3]. WSN has been introduced in a big size of sensors at the first of implementation which limited the variety of capable applications. An advanced evolution of 30 years in computing, communication and microelectromechanical technology have caused an important shift in WSN research and has been attracting more attention and international involvement. The new trend of WSN research, networked information processing and networking techniques suitable for resource constrained sensor nodes have been the focus. Additionally, the sensor nodes have becoming smaller in terms of sizes and cheaper price yields into many new varieties of application [3]. Due to its design based on using matured IC and MEMS which is integrated with communications, sensors and signal processing altogether in a low-cost package, it become possible for an ultra-small sensor nodes to be fabricated which is then can be scattered on measurement sites to gather useful information [4]. Since the nodes turned into small form-factor and can carry only small battery, it yields a limited energy supply in it. As a result, WSN needs to manage its power to perform the duties as long and effective as possible. Thus, a study on energy efficiency routing protocol should be done in a same condition and environment in order to obtain accurate result of measurement. 2 DATA DISSEMINATION IN WSN One of the important and basic features of WSN is the way which the data are being forwarded among the source of sensor reading or the location of the target node and the base station. Since it is costly in a single hop approach in accomplishing the data exchange directly with the base station, multi-hop packet transmission approach being introduced in order to get a significant energy savings and reduces considerably interference between sensor nodes especially in a high density WSNs deployment. www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 Figure 1. Query and data forwarding Figure 1 depicts the basic structure of a WSN’s connection from local network to the internet start from the reading in sensor nodes in the network until it being sent and process to the end of link which is ended up with remote user to monitor anything happens in the WSN’s environment or situation. In order to response to the sinks which queries specific events within coverage, data collections are sent using multi-hop paths. In a multihop WSN, participation of intermediate nodes will be essential between the destination and the source [5]. Flooding is the most basic operation in mobile ad hoc networks (MANETs)[6]. Majority of routing protocols like AODV[7], Dynamic Source Routing (DSR)[8], Location-Aided Routing (LAR)[9], depend on flooding to disseminate their route maintenance, route discovery, or topology update packets etc. Since flooding is always cited in MANETs, an efficient flooding scheme is important in process of reducing the overhead of routing protocols and enhancing the throughput of the networks. Before any actual transmission of data in WSN, an efficient broadcast route is needed so that the transmission of the data will be sent successfully along the pre-found route. In flooding schemes, it can be classified according to the information each node keeps when the process is occurring: 1) no neighbor information; 2) 1-hop neighbor information; 3) 2-hop neighbor information.[10] 2.1 Simple Flooding Blind flooding or pure flooding is the most basic flooding approach which is every node in the network will retransmit the flooding message to others. This simple approach assures the reachability of the flooding message. Figure 2 shows how a basic flooding method works in an ad hoc networking. www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 Figure 2. Flooding of data communication networks The algorithm of this routing however produces an excessive amount of redundant traffic which occurs due to the transmissions of flooding message from all nodes at the same time. This behavior causes network congestion and yields a lot of energy consumption for a single mobile nodes to transmit a message among them. More re-transmission will occur when more messages are transmitted by the nodes and this will finally affect the nodes as a failure in receiving the message due to the redundant rebroadcasts in the network. If a node’s neighbors are many to rebroadcast the message, contention will happen which is a severe interference between their transmissions. Collision as well happens in such situation. This phenomenon which is called as broadcast storm problem [10] will degrade the performance of this flooding protocol. To counter this situation, several approaches have been introduced. Probabilistic schemes is one of them that being classified into four types: cluster based, distance based, location based and counter based [10]. While in this project, a special identification number will be assigned on each transmitted messages to prevent repeating broadcast between the nodes and their neighbors. 2.2 Dominant Pruning In this protocol, 2-hop neighbor’s information is gathered in process of reducing the cost of the routing. For simple flooding, the cost of broadcast theoretically linear with the number of nodes but less than the costs in pure flooding which is also known as blind flooding. However, in this Dominant Pruning, 2-hop neighbor’s information gives the node more information on selecting the next forwarding node that as well will reduce the cost of transmissions in the routing [10]. In dominant pruning, the sending node selects the adjacent nodes that should relay the packet to complete flooding process. The IDs of selected www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 nearby nodes are recorded in the packet as a forward list. Nearby node which is requested to relay the packet will determine the forward list and the process will iterated until the process of flooding is completed. Figure 3. Method of dominant pruning Figure 3 shows the region that been covered by each node vi and vj. N(vi) means the neighbor of node vi which means a set of nodes within onehop distance from vi and N(N(vi)) means the neighbor of node N(vi) that also means a set of nodes within two-hop distance from vi. Each node vi and vj should determine their own forward list in order to enable them receive the packet within two-hop distance. Among these nodes, vi, vj and N(vi) have already received the packet and N(vj) will only receive the packet only after vj forwards the packet. Therefore a node vj needs to determine its forward list in order to forward the packet to all nodes in U = N(N(vj)) – N(vi) – N(vj) so that all of them receives the packet. Fig. 3 as shown below illustrates the set U. Let B(vi, vj) = N(vj) – N(vj). Then a set of nodes F = {f1, f2, f3, …fn} B(vi, vj) such that is selected. Finding a minimum F is the problem of the set cover which is NP-complete. In [11], greedy set cover algorithm has been used in determining the forward list as their approximation algorithm [12]. 2.3 TOSSIM TOSSIM is a discrete event simulator for TinyOS sensor networks and it is a short form of TinyOS simulator. In TinyOS, applications are being compiled for a mote. By using TOSSIM, the application can be compiled into its framework virtually on a PC which is allowing the user to test and analyze algorithms in a controllable environment. The main advantage is the same code can be run for a simulation as well can be compiled into the motes for a real application. [13] The main objective of TOSSIM is to prepare a high accuracy simulation for any TinyOS application. It can be manipulated in understanding the www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 causes of observed situation in the real world. Even TOSSIM itself is not modeling the real world, it provides abstractions of certain real world phenomena like bit error. It provides a radio abstraction of directed independent bit errors between two nodes in the simulation. The users can use the abstractions freely to implement what kind of models they desired. Since TOSSIM builds directly from TinyOS code, for any simulation of a protocol or any system, it is a compulsory for a user to write a TinyOS implementation of it. From one aspect, the procedures looked complicated to run a simulation in it, but if the implementation in the simulation is done, the actual implementation of the application for the real world will become easier. This gives a big advantage in implementation of wireless sensor network. 2.4 Previous work on energy efficient WSN Comparison on basic wireless MAC protocol on energy efficiency by using IEEE 802.15.4 based package equipment has been done in [14]. The power level has been observed in the transmitted node can be reduced by using multi-channeling technology. For future work, it is recommended if modification on source code of routing protocol can be done in process of improving the performance of WSN which is better way in this research area. 2.5 Application model To verify the routing in TinyOS code, a simple linear topology needed to be created in TOSSIM. In this case, three units of node with straight line created in TOSSIM. When TOSSIM is started, no node can communicate with each other. In order to enable them to communicate is by specifying a network topology. TOSSIM default radio model is based on signal-strength. TOSSIM simulates RF noise and interference a node hears, both from others and outside sources which uses Closest Pattern Matching (CPM) algorithm. To configure CPM, a noise trace needed to be feed. This can be achieved by calling addNoiseTraceReading on a Mote object. These are the first 10 lines of the noise.txt which is the noise trace file. 1 -98 2 -98 3 -98 www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 4 -98 5 -98 6 -98 7 -98 8 -98 9 10 -98 -98 This piece of codes is written down to give a node a noise model from a node trace file. noise = open(“noise.txt”, “r”) lines = noise.readlines() for line in lines: str = line.strip() if(str != “”): val = int(str) for i in range(1, num_node+1): t.getNode(i).addNoiseTraceReading(val) It works for nodes num_node+1 which is depending on the number nodes set in the configuration. As for verification of routing protocol this time, the num_node has been set as four shown below. The simulation ends at 15 seconds for one packet being sent from the source (node 1) and received at the destination (node 3).The topology is as illustrated in Figure 4 below. Figure 4. Straight line nodes illustration To get this configuration of topology in the simulation, the radio connectivity graph can be scripted, and the topologies can be stored as a file and then loaded in the simulation. The topology is saved as topology.txt file in the same folder, and the script will read such file. www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 2.6 Measurement There are only four nodes being used to test the connection of each protocol in verification part. In this project, comparison on the efficiency of both protocols in disseminating messages or packets in multi-hop will be observed. By using TOSSIM’s topology.txt features, the network of the nodes expanded from 6 nodes to 15 nodes. Each increment of nodes number, the transmission numbers, received packets, average delay of the transmission and delivery ratio will be recorded. After the desired data have been recorded, the number of nodes will be increased one by one until it reaches 15 nodes overall. The increment was adjusted in topology.txt file to be compiled in TOSSIM. Compiled debugging statements presented by using Python as a text file. Generated debug statements then analyzed to extract the information of transmissions and receptions occurred in the network. Figure 5. Measurement network topology 3 RESULT AND DISCUSSION 3.1 Coverage Coverage in this measurement refers to how many nodes have received a single packet within the node numbers available. This shows the www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 deliverability of every routing protocol in broadcasting the packets. By measuring this, the capability of routing protocols in delivering message to how many nodes can be discovered. The results obtained by observing the received number of a single packet within the node numbers available. Table 1 shows two different situations between dominant pruning and simple flooding protocols. By comparing the numbers, for each number nodes available, dominant pruning gives a perfect number of coverage against simple flooding can provide. With the number which is only one less than available nodes, dominant pruning covers all nodes. The coverage in simple flooding is not enough stable. Table 1. Covered node numbers in both protocols Nodes Dominant Pruning Simple Flooding 6 7 8 9 10 11 12 13 14 15 5 6 7 8 9 10 11 12 13 15 4 6 4 5 9 4 11 11 12 12 This phenomenon gives a proof that through the process of selecting forward nodes by dominant pruning assures the delivery to all nodes available in the measured area. Whereas simple flooding only broadcast message which is not being broadcasted yet gives a sign that it only forward all message without being able to assure the needing node to get the message nearby. www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 Figure 6. Coverage vs Node numbers 3.2 Delivery Ratio Delivery ratio is the ratio of the number of delivered data packet to the destination. This illustrates the level of delivered data to the destination. Below is the calculation equation. ∑ Number of packet receive / ∑ Number of packet send Higher delivery ratio is desired in any telecommunication network. Higher delivery ratio means less loss in data transmission and vice versa. The result shown in Table 2 shows that simple flooding provides higher delivery ratio compare with what dominant pruning can gives. However, when the nodes come to 15, delivery ratio of dominant pruning suddenly became high. This should be an error in data gathering. Table 2. Delivery ratio of both routing protocols Nodes Dominant Pruning Simple Flooding 6 7 8 9 10 11 12 13 14 15 0.8000 0.5714 0.8000 0.6667 0.4000 0.8000 0.3333 0.3333 0.3077 0.3077 0.0183 0.0183 0.0245 0.0211 0.0227 0.0098 0.0162 0.0171 0.0158 1.2500 www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 Simple flooding has bigger delivery ratio due to its low transmission numbers and high delivery numbers. Dominant pruning is difference because its high number of transmissions yields a low delivery ratio. However, this does not mean that simple flooding can deliver message or packet to all available nodes compare with dominant pruning. Since the energy of packet transmission is hundred times of task processing, the delivery ratio of simple flooding provides gives big ratio compare with dominant pruning capable with. Simple flooding promises less energy consumption in its networking. However, this does not mean it is better than dominant pruning can provide. Simple flooding with its simple algorithm cannot assure the deliverability of the message or packet to all nodes available. It might be useful in a measuring environment which is does not need a continuous perfect messaging system. Its simple features promising the longevity of battery usage. Figure 7. Delivery ratio vs Node numbers Dominant pruning assures its message to be delivered to the destination. It provides a perfect condition of delivering messages to all nodes. Even it consumes a lot of energy due to its massive number of transmission numbers, it still important for a monitoring that needs a fully detail important information from what being measured. www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 4 CONCLUSION In this study, there are only 15 nodes being used for the measurement. Besides, TOSSIM should be explored more so then more routing protocols can be measured its efficiencies. In addition, TOSSIM could give easier way to implement the network in the real life application. Thus, in the future the implementation of simulated protocols should be realized into real time application. ACKNOWLEDGE This research was supported by grant from Universiti Teknikal Malaysia Melaka. REFERENCES 1. D. K. S. 3 Shio Kumar Singh 1, M P Singh 2, “Routing Protocols in Wireless Sensor Networks – A Survey.pdf.” International Journal of Computer Science & Engineering Survey (IJCSES) Vol.1, No.2, p. 21, 2010. 2. J. Zheng and A. Jamalipour, Wireless Sensor Network : A Networking. A JOHN WILEY & SONS, INC., PUBLICATION, 2009. 3. Q. (Dept. of E. and T. Wang, N. U. of S. and T. Norway), and I. N. U. of S. and T. Balasingham, “Wireless Sensor Networks - An Introduction,” no. 187857, 2010. 4. S. Nikolidakis, D. Kandris, D. Vergados, and C. Douligeris, “Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering,” Algorithms, vol. 6, no. 1, pp. 29–42, Jan. 2013. 5. K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks - Technology, Protocols & Applications. A JOHN WILEY & SONS, INC., PUBLICATION, 2007, p. 326. 6. W. Bassam M.S., M. A. Borhanuddin, K. Sabira, and M. Roslina, “Hybrid low Cost Flooding Scheme for On-demand Routing Protocols in Manets.pdf.” 2014. 7. S. B. S. D. (University of C. C. Perkins (Nokia Research Center) , E. BeldingRoyer (University of California), “Ad hoc On-Demand Distance Vector (AODV) Routing.” 2003. 8. A. O. A. Salem, G. Samara, and T. Alhmiedat, “Performance Analysis of Dynamic Source Routing Protocol,” J. Comput., vol. 5, no. 2, pp. 97–100, 2014. 9. Y. Ko and N. H. Vaidya, “Location-Aided Routing ( LAR ) in mobile ad hoc networks,” Wirel. Networks, vol. 6, no. 4, pp. 307–321, 2000. www.joetsite.com Journal of Engineering Technology Volume. 2, Jan. 2014, Pages 85-97 10.H. Zeng, M. Li, H. Liu, X. Jia, M. Ad, and H. Networks, “Efficient Flooding in Mobile Ad Hoc Networks,” in Ad Hoc Networks: New Research, J. N. Turner and C. S. Boyer, Eds. Nova Publishers, 2009, pp. 53–74. 11. S. Agathos and E. Papapetrou, “On the Set Cover Problem for Broadcasting in Wireless Ad Hoc Networks,” vol. 17, no. 11, pp. 2192–2195, 2013. 12. N. E. Young, “Greedy Set-Cover Algorithms,” Computer Science, Encyclopedia of Algorithms. pp. 379–381, 1979. 13. P. Levis and N. Lee, TOSSIM : A Simulator for TinyOS Networks. 2003, pp. 1– 17. 14. A. A. S. Basahel, “A Study on Energy Efficiency in Wireless Sensor Network,” University of Malaya, 2010. www.joetsite.com
© Copyright 2024 Paperzz