Distributed Algorithms for Multiple Path Backbone Discovery in Thick Linear Sensor Networks
<p>Illustration of a thick linear sensor network. Sample parameter values: L = 10,000 m, W = 500 m, and range = 100 m.</p> "> Figure 2
<p>Propagation of an LD message in the LBD algorithm [<a href="#B39-jsan-10-00049" class="html-bibr">39</a>].</p> "> Figure 3
<p>Propagation of the NBD message in the NBND algorithm [<a href="#B39-jsan-10-00049" class="html-bibr">39</a>].</p> "> Figure 4
<p>Flowchart showing the sequence of execution and relationship of the various algorithms.</p> "> Figure 5
<p>LBD with larger LSNs [<a href="#B39-jsan-10-00049" class="html-bibr">39</a>]. (<b>a</b>) Time of Discovery (<b>b</b>) Number of LD + SF messages (<b>c</b>) Number of NBD messages.</p> "> Figure 6
<p>Performance results of the LBD and LBD2 algorithms as the number of sensor nodes increases, with the communication range fixed at 100 [<a href="#B39-jsan-10-00049" class="html-bibr">39</a>]. (<b>a</b>) Time of Discovery (<b>b</b>) Number of LD + SF messages (<b>c</b>) Number of NBD messages.</p> "> Figure 7
<p>Performance results of the LBD and LBD2 algorithms as the communication range increased with the number of sensor nodes fixed at 1000. (<b>a</b>) Time of Discovery (<b>b</b>) Number of LD + SF messages (<b>c</b>) Number of NBD messages.</p> "> Figure 8
<p>Visual examples of the discovered backbones for LBD, LBD2, LBD3, and LBD4, with L = 2500, W = 500, range = 200, and N = 300. (<b>a</b>) LBD (<b>b</b>) LBD2 (A1 = (L/2,W/4), A2 = (L/2,3W/4)) (<b>c</b>) LBN3 (A1 = (L/2,W/4), A2 = (L/2,W/2), A3 = (L/2,3W/4)) (<b>d</b>) LBN4 (A1 = (L/4,3W/4), A2 = (L/4,W/4), A3 = (3L/4,3W/4), A4 = (L/4,W/4)).</p> "> Figure 9
<p>Comparison of the average number of hops for LBD, LBD2, LBD3, and LBD4 as the number of nodes increased.</p> "> Figure 10
<p>The number of message forwardings versus the number of normal data messages for LBD and LBD2.</p> ">
Abstract
:1. Introduction
- Offer new backbone discovery algorithms for thick linear sensor networks. The algorithms take advantage of the linearity of the topology in order to increase their efficiency and lower the overhead of the exchanged control messages.
- The discovered backbone can be used for the transmission of data messages to the nearest sink, which is located at the end of the LSN.
- We studied the performance of the offered algorithms under various network conditions, which allows for the proper selection of the appropriate algorithm, depending on the network characteristics.
2. Related Work
- The above algorithms are proposed for multi-dimensional WSNs. They do not take advantage of the a priori knowledge of the linearity of the network.
- The algorithms presented in this paper are designed to discover a backbone for LSNs, which is later used for routing. The discovery process is designed to keep the number of overhead messages low and increase communication efficiency, scalability, reliability, and fault tolerance.
- Our technique is more general and takes advantage of the linearity of the network topology. It does not use the energy of the nodes as a constraint and does not use a hierarchical model, which leads to depletion of the energy of the nodes which are used as cluster heads.
- Our algorithms have the ability to provide load balancing through the use of multiple paths, which distributes the energy consumption among the nodes that constitute the paths of the backbone (in the case of LBDx).
- Due to the prior knowledge of the linear nature of the backbone, localized path repair to go around failed nodes can be done in a much easier fashion, since the direction of the propagation of the messages is known.
- Our algorithms are not based on power control, as is the case in some of the algorithms listed above, which requires more complex and expensive circuitry. Our algorithms use simpler and less expensive sensor nodes.
- Unlike some of the algorithms listed above, our algorithms are not based on sleep scheduling, which increases the algorithm’s end-to-end delay for backbone discovery and subsequent data transmissions.
3. Linear Backbone Discovery (LBD)
3.1. Phase 1: Backbone Discovery (BD)
Algorithm 1: BD at the source node |
/* Broadcasting the LD message from the source node */ myParent = NULL BB = TRUE if (this is the first node at the primary edge) then myLc = 0 messageLc = 1 PATH = myID SendLD(messageID, myID, messageLc, PATH) to all neighbors else myLc = ∞ end if |
Algorithm 2: BD at an intermediate node. Reception of an LD message. |
/* The LD message, LD(messageID, x, messageLc), arrives at node y from node x. */ myParent = NULL if (myLc ≥ messageLc) then myParent = x myLc = messageLc messageLc++ Concatenate myID at the end of the PATH list Broadcast LD(messageID, myID, messageLc, PATH) to all neighbors. else Drop LD message end if |
Algorithm 3: BD at the sink node |
BB = TRUE/ *When the sink receives the LD(messageID, x, messageLc, PATH) message from node x it does the following:*/ myPrarent = x myBNeigh = x myFNeigh = NULL BBLc = messageLc BBLcFromSink = 0 Send SF(messageID, source = myID, destination = x, BBlc, PATH) |
Algorithm 4: BD at an intermediate node. Reception of an SF message from the sink. |
/*When node y receives the SF(messageID, x, messageLc, PATH) message from node x it does the following:*/ BB = TRUE Save the full or local part of the discovered backbone in PATH in the routing table according to the adopted caching strategy. myBNeigh = myParent myFNeigh = x BBLc = myLc BBLcFromSink = messageLc − myLc Send SF(messageID, source = myID, destination = x, messageLc, PATH) |
3.2. Phase 2: New Backbone Node Declaration (NBND)
Algorithm 5: NBND at the backbone nodes |
sourceBNID = myID NBDringSize = ρ numOfHops = 0 PATH_TO_BN = myID Broadcast NBD (messageID, sourceBNID, myID, NBDringSize, numOfHops, PATH_TO_BN) |
Algorithm 6: NBND at the non-backbone nodes |
The message NBD (messageID, sourceBNID, myID, BNDringSize, numOfHops, PATH_TO_BN) is received by node y from x. Cache PATH_TO_BN, which constitutes the path from y to the BN node that sent the NBD message in the routing table. numOfHops++ if (NBDringSize ≥ numOfHops) then Concatenate myID at the end of the PATH_TO_BN list Broadcast the message NBD (messageID, sourceBNID, myID, BNDringSize, numOfHops, PATH_TO_BN) else Drop the received NBD message end if |
4. Linear Backbone Discovery with x Backbone Paths (LBDx)
4.1. Motivation
4.2. Design Details
4.3. Mitigating Node Failures
- Increasing x leads to an increased number of paths to reach the sink. Therefore, the load for forwarding data messages from the SNs is spread across a larger number of backbone paths and backbone nodes. This leads to lower energy consumption in the backbone nodes and increases their lifetime.
- Periodically reinitiating backbone discovery to discover new backbone paths by changing of the anchor nodes. Different strategies can be considered in order to achieve this objective.
- Periodic changing of the value of x and reinitiating backbone discovery can be performed in order to generate new backbone paths with different backbone nodes. This allows for more spreading of the forwarding load and leads to a lower rate of failure of the backbone nodes.
- Periodic hello messages, which are regularly transmitted by the node;
- Hop-to-hop acknowledgements, which are transmitted when messages are forwarded from one node to another;
- Passive acknowledgement, which consists of a node listening for and confirming the forwarding of the message by its neighbor.
- Local repair to overcome failed backbone nodes: Once a node detects failure of the next node in the backbone path to the sink, it initiates a local repair process, which bypasses the failed node. This can be done by initiating a bypass path discovery process. This discovery process must have the next node in the backbone that is following the failed node as the destination. The discovery message must use a fixed hop-based time-out timer to prevent the discovery process from flooding the whole network.
- Reinitiate the backbone discovery process: A backbone node failure message is sent from the detecting node to the source node to reinitiate a new backbone discovery message.
Algorithm 7: LBDx |
for i = 1, 2, …, x do use BD to discover the shortest path I-Ai from I to Ai use BD to discover the shortest path Ai-S from Ai to S end for for i = 1, 2, …, x do join I-Ai and Ai-S end for use NBND to discover paths from each NB node to the closest BN node in the discovered backbone |
Algorithm 8: LBD2 |
use BD to discover the shortest path I-A1 from I and A1 use BD to discover the shortest path A1-S from A1 and S use BD to discover the shortest path I-A2 from I and A2 use BD to discover the shortest path A2-S from A2 and S join I-A1 and A1-S join I-A2 and A2-S use NBND to discover paths from each NB node to the closest BN node in the discovered backbone |
5. Performance Evaluation
5.1. Simulation Setup
5.2. Simulation Results
5.3. Target Scenarios for LBD and LBDx
6. Conclusions and Future Research
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Jawhar, I.; Mohamed, N.; Agrawal, D.P. Linear wireless sensor networks: Classification and applications. J. Netw. Comput. Appl. 2011, 34, 1671–1682. [Google Scholar]
- Jawhar, I.; Mohamed, N.; Al-Jaroodi, J.; Agrawal, D.P.; Zhang, S. Communication and networking of uav-based systems: Classification and associated architectures. J. Netw. Comput. Appl. 2017, 84, 93–108. [Google Scholar] [CrossRef]
- Wang, Y. Topology Control for Wireless Sensor Networks. In Wireless Sensor Networks and Applications; Springer: Boston, MA, USA, 2008; pp. 113–147. [Google Scholar]
- Jawhar, I.; Wu, J.; Mohamed, N.; Zhang, S. An efficient graph search algorithm for backbone discovery in wireless linear sensor networks. In Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, Dallas, TX, USA, 22 October 2015; Institute of Electrical and Electronics Engineers (IEEE): San Diego, CA, USA, 2015; pp. 604–609. [Google Scholar]
- Diggavi, S.N.; Grossglauser, M.; Tse, D.N.C. Even one-dimensional mobility increases ad hoc wireless capacity. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002; p. 352. [Google Scholar]
- Ghasemi, A.; Nader-Esfahani, S. Supporting aggregate queries over ad-hoc sensor networks. IEEE Commun. Lett. 2006, 10, 251–253. [Google Scholar] [CrossRef]
- Miorandi, D.; Altman, E. Connectivity in one-dimensional ad hoc networks: A queueing theoretical approach. Wirel. Netw. 2006, 12, 573–587. [Google Scholar] [CrossRef] [Green Version]
- Younis, M.; Senturk, I.F.; Akkaya, K.; Lee, S.; Senel, F. Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Comput. Netw. 2014, 58, 254–283. [Google Scholar] [CrossRef]
- Javadi, M.; Mostafaei, H.; Chowdhurry, M.U.; Abawajy, J.H. Learning automaton based topology control protocol for extending wireless sensor networks lifetime. J. Netw. Comput. Appl. 2018, 122, 128–136. [Google Scholar] [CrossRef]
- Dhanapala, D.C.; Jayasumana, A.P. Topology preserving maps: Extracting layout maps of wireless sensor networks from virtual coordinates. IEEE/ACM Trans. Netw. (TON) 2014, 22, 784–797. [Google Scholar] [CrossRef]
- Douik, A.; Aly, S.A.; Al-Naffouri, T.Y.; Alouini, M.S. Robust node estimation and topology discovery algorithm in large-scale wireless sensor networks. arXiv 2015, arXiv:1508.04921. [Google Scholar]
- Yu, T.; Wang, X.; Shami, A. Physical Topology Discovery Scheme for Wireless Sensor Networks Using Random Walk Process. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Institute of Electrical and Electronics Engineers, Washington DC, USA, 4–8 December 2016; pp. 1–5. [Google Scholar]
- Kim, N.; Noel, E.; Tang, K.W. WSN communication topology construction with collision avoidance and energy saving. In Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2014; Institute of Electrical and Electronics Engineers (IEEE): Las Vegas, NV, USA, 2014; pp. 398–404. [Google Scholar]
- Ramanathan, R.; Rosales-Hain, R. Topology control of multihop wireless networks using transmit power adjustment. In Proceedings of the IEEE INFOCOM 2000; Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), Tel Aviv, Israel, 26–30 March 2000; Institute of Electrical and Electronics Engineers (IEEE): Lausanne, Switzerland, 2002; Volume 2, pp. 404–413. [Google Scholar]
- Shahabuddin, M.Z.; Hasbullah, H.; Aziz, I.A. Preliminary framework of topology control algorithm in WSN to achieve node’s energy efficiency. In Proceedings of the Institute of Electrical and Electronics Engineers (IEEE), 3rd International Conference on Computer and Information Sciences (ICCOINS), Kuala Lumpur, Malaysia, 15–17 August 2016; pp. 259–263. [Google Scholar]
- Deb, B.; Bhatnagar, S.; Nath, B. A Topology Discovery Algorithm for Sensor Networks with Applications to Network Management. 2001. Available online: https://www.researchgate.net/publication/215619114_A_Topology_Discovery_Algorithm_for_Sensor_Networks_with_Applications_to_Network_Management (accessed on 1 July 2021).
- Bagci, H.; Korpeoglu, I.; Yazici, A. A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2014, 26, 914–923. [Google Scholar] [CrossRef]
- Abu-Khzam, F.N.; Markarian, C.; auf der Heide, F.M.; Schubert, M. Approximation and Heuristic Algorithms for Computing Backbones in Asymmetric Ad-hoc Networks. Theory Comput. Syst. 2018, 62, 1673–1689. [Google Scholar] [CrossRef] [Green Version]
- Kavitha, V.; Moorthi, M. A quality of service load balanced connected dominating set–stochastic diffusion search (CDS–SDS) network backbone for MANET. Comput. Netw. 2019, 151, 124–131. [Google Scholar] [CrossRef]
- Saeedvand, S.; Aghdasi, H.S.; Khanli, L.M. Novel Distributed Dynamic Backbone-based Flooding in Unstructured Networks. Peer-to-Peer Netw. Appl. 2019, 13, 872–889. [Google Scholar] [CrossRef]
- Kunz, T. Efficient Backbone Routing in Hierarchical MANETs. In Proceedings of the International Conference on Ad Hoc Networks, Paris, France, 17 November 2020; Springer: Cham, Switzerland, 2020; pp. 147–163. [Google Scholar]
- Kumar, S.; Singh, A.K. A.K. A Backbone Formation Protocol Using Minimum Spanning Tree in Cognitive Radio Networks. In Data Preprocessing, Active Learning, and Cost Perceptive Approaches for Resolving Data Imbalance; IGI Global: Hershey, PA, USA, 2020; pp. 211–223. [Google Scholar]
- Zhang, J.; Liu, S.-J.; Tsai, P.-W.; Zou, F.-M.; Ji, X.-R. Directional virtual backbone based data aggregation scheme for Wireless Visual Sensor Networks. PLoS ONE 2018, 13, e0196705. [Google Scholar] [CrossRef] [PubMed]
- Luo, C.; Chen, W.; Yu, J.; Wang, Y.; Li, D. A novel centralized algorithm for constructing virtual backbones in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018 2018, 55. [Google Scholar] [CrossRef]
- Papakostas, D.; Eshghi, S.; Katsaros, D.; Tassiulas, L. Energy-aware backbone formation in military multilayer ad hoc networks. Ad Hoc Netw. 2018, 81, 17–44. [Google Scholar] [CrossRef]
- Park, S.-Y.; Jeong, D.; Shin, C.S.; Lee, H. DroneNet+: Adaptive Route Recovery Using Path Stitching of UAVs in Ad-Hoc Networks. In Proceedings of the GLOBECOM IEEE Global Communications Conference, Institute of Electrical and Electronics Engineers (IEEE), Singapore, 4–8 December 2017; pp. 1–7. [Google Scholar]
- Guo, J.; Liu, X.; Jiang, C.; Cao, J.; Ren, Y. Distributed fault-tolerant topology control in cooperative wireless ad hoc networks. In Proceedings of the IEEE Transactions on Parallel and Distributed Systems, Sydney, Australia, 14 October 2014; Volume 26, pp. 2699–2710. [Google Scholar]
- Hajiaghayi, M.; Immorlica, N.; Mirrokni, V.S. Power optimization in fault-tolerant topology control algorithms for wireless multi-hop networks. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, Los Angeles, CA, USA, 14 September 2003; pp. 300–312. [Google Scholar]
- Santi, P. Topology control in wireless ad hoc and sensor networks. ACM Comput. Surv. 2005, 37, 164–194. [Google Scholar] [CrossRef] [Green Version]
- Tarique, M.; Tepe, K.E.; Adibi, S.; Erfani, S. Survey of multipath routing protocols for mobile ad hoc networks. J. Netw. Comput. Appl. 2009, 32, 1125–1143. [Google Scholar] [CrossRef]
- Habib, A.; Saha, S.; Nur, F.N.; Razzaque, A. Starfish Routing for Wireless Sensor Networks with a mobile sink. In Proceedings of the 2016 IEEE Region 10 Conference (TENCON), Singapore, 22–25 November 2016; Institute of Electrical and Electronics Engineers (IEEE): Savannah, GA, USA, 2016; pp. 1093–1096. [Google Scholar]
- Saha, S.; McLauchlan, L.; Saha, S. An energy balanced topology construction protocol for Wireless Sensor Networks. In Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Las Vegas, NV, USA, 30 June–2 July 2014; Institute of Electrical and Electronics Engineers (IEEE): Sydney, Australia; pp. 1–6. [Google Scholar]
- Sathya, S.; Sowmiya, P.; Vijayaraghavan, R.; Ragavi, A.; Rajkumar, G. Minimization of energy consumption in Wireless Sensor Networks using Virtual Backbone Scheduling with hierarchical clustering. In Proceedings of the International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, 13–14 February 2014; Institute of Electrical and Electronics Engineers (IEEE): Sydney, Australia, 2014; pp. 1–6. [Google Scholar]
- Dhawan, A.; Tanco, M.; Yeiser, A. Randomized algorithms for approximating a Connected Dominating Set in Wireless Sensor Networks. In Proceedings of the International Conference on Computing and Network Communications (CoCoNet), Trivandrum, India, 16–19 December 2015; Institute of Electrical and Electronics Engineers (IEEE): San Diego, CA, USA, 2015; pp. 589–596. [Google Scholar]
- Nimisha, T.S.; Ramalakshmi, R. Energy efficient connected dominating set construction using ant colony optimization technique in Wireless Sensor Network. Proceedings of International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, India, 19–20 March 2015; IEEE: San Diego, CA, USA, 2015; pp. 1–5. [Google Scholar]
- Jawhar, I.; Zhang, S.; Wu, J.; Mohamed, N.; Masud, M.M. Efficient topology discovery and routing in thick wireless Linear Sensor Networks. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 1–4 May 2017; Institute of Electrical and Electronics Engineers (IEEE): Singapore, 2017; pp. 91–96. [Google Scholar]
- Shu, L.; Zhang, Y.; Yang, L.T.; Wang, Y.; Hauswirth, M.; Xiong, N. TPGF: Geographic routing in wireless multimedia sensor networks. Telecommun. Syst. 2009, 44, 79–95. [Google Scholar] [CrossRef]
- Alafeef, I.; Awad, F.; Al-Madi, N. Energy-aware geographic routing protocol with sleep scheduling for wireless multimedia sensor networks. In Proceedings of the 14th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT (HONET-ICT), Irbid/Amman, Jordan, 9–11 October 2017; Institute of Electrical and Electronics Engineers (IEEE): Singapore, 2017; pp. 93–97. [Google Scholar]
- Gopi, P. Multipath Routing in Wireless Sensor Networks: A Survey and Analysis. IOSR J. Comput. Eng. 2014, 16, 27–34. [Google Scholar] [CrossRef]
Symbol | Meaning |
---|---|
messageID | The ID of a message |
messageLc | The number of nodes in the discovered path from the source node |
myID | The ID of a node |
myLc | The location of a node from the source node |
PATH | An ordered list of nodes in the discovered path from the source node |
myParent | The last node before a node in PATH |
myBNeigh | The backward neighbor of a node in the backbone path |
myFNeigh | The forward neighbor of a node in the backbone path |
BBLc | The location of a node in the backbone path from the source node |
BBLcFromSink | The location of a node in the backbone path from the sink node |
BB | A Boolean variable indicating whether a node belongs to the backbone path |
Symbol | Meaning |
---|---|
sourceBNID | The myID of the sending BN node |
BNDringSize | Set to ρ, which is the broadcast ring size in a number of hops |
numOfHops | Cumulative number of hops traversed by the message |
PATH_to_BN | Ordered list of nodes to reach the newly discovered BN in the backbone |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jawhar, I.; Zhang, S.; Wu, J.; Mohamed, N.; Masud, M.M. Distributed Algorithms for Multiple Path Backbone Discovery in Thick Linear Sensor Networks. J. Sens. Actuator Netw. 2021, 10, 49. https://doi.org/10.3390/jsan10030049
Jawhar I, Zhang S, Wu J, Mohamed N, Masud MM. Distributed Algorithms for Multiple Path Backbone Discovery in Thick Linear Sensor Networks. Journal of Sensor and Actuator Networks. 2021; 10(3):49. https://doi.org/10.3390/jsan10030049
Chicago/Turabian StyleJawhar, Imad, Sheng Zhang, Jie Wu, Nader Mohamed, and Mohammad M. Masud. 2021. "Distributed Algorithms for Multiple Path Backbone Discovery in Thick Linear Sensor Networks" Journal of Sensor and Actuator Networks 10, no. 3: 49. https://doi.org/10.3390/jsan10030049
APA StyleJawhar, I., Zhang, S., Wu, J., Mohamed, N., & Masud, M. M. (2021). Distributed Algorithms for Multiple Path Backbone Discovery in Thick Linear Sensor Networks. Journal of Sensor and Actuator Networks, 10(3), 49. https://doi.org/10.3390/jsan10030049