Research on the energy balance algorithm of WSN based on topology control
- 153 Downloads
Topology control is a key energy-saving technology in the wireless-sensor networking. In this paper, networking-associated algorithm named local minimum spanning tree (LMST) employed while compromising on energy balance issues, leading to the short lifetime of the network, and proposes an energy balance algorithm. The algorithm fully investigates the energy utilization to link the data communication and the remaining energy of the communication node, to achieve the balanced energy, and to avoid the complexities associated with excessive consumption of energy when the intermediate node acts as a data forwarding task, thus extending the network life cycle. The simulated experimental outcomes showed a great potential of the proposed algorithm that can efficiently prolong the network lifetime and guarantee the long-term reliable operation of the network while ensuring other network performance indicators, such as throughput and delivery rate.
KeywordsEnergy balance Topology control Wireless sensor network CLC: TP918.91
Local Information No Topology
Local minimum spanning tree algorithm
Media access control
Minimum spanning tree
Relative neighborhood graph algorithm
Unit disk graph
As a new type of network information acquisition system, wireless sensor networks have extremely broad application prospects in civilian and military fields. It has the characteristics of huge scale self-organized, random distribution, and multifaceted circumstances with just few sensor node resources and frequent network topology changes . This depicts the significance of controlling topology in the field of wireless sensor network. The research of controlling topology is to improve the life of the network life as the main target and with the foundation of ensuring the communication degree and coverage of the network, taking into account the communication interference, network delay, load balancing, simplicity, reliability, scalability, and so on, thus forming an optimized network topology . Currently, several classification methods to control the topology algorithms, which are sub-divided into two algorithms such as “global topology control” algorithms and “distributed topology control” according to whether the algorithm needs global network information or local network information.
The “global topology control” is an algorithm that performs topology modification according to the worldwide topology statistics, performs network topology structure work on a particular node, and serves as algorithms named “relative neighborhood graph” (RNG) , “minimum spanning tree” (MST), connect algorithm , and so on. While the other algorithm called “distributed topology control” links the local statistics to maintain the association of the network, such as “local information no topology (LINT) algorithm  distributed relative neighborhood graph (dist-RNG) algorithm , LMST-type algorithm , and mobile grid algorithm .
Because the wireless sensor network belongs to a distributed network, there is no central node in the network, and it is not suitable to use a global topology control algorithm. In document , a popular control topology-based “local minimum spanning tree” (LMST) has been proposed. It has a common purpose which is to control power on adjacent graph. This algorithm mainly contains each node that computes by the minimum spanning tree method according to the locally associated topology, which can successfully reduce the global communication energy utilization. However, the network topology constructed by local spanning tree algorithm has little connectivity and very less noisy link. Moreover, the algorithm does not include the issues of balance energy. The middle node of the whole network communication link beside the sink-node controlling the task of accelerating a large amount of information. While the larger load increases the energy losses greater than the leaf node, and any middle-node is invalid, that will ultimately lead to network topology interruption. As a result, network connectivity is affected and network lifetime is shortened. Therefore, concerning the solution of energy balance complications, this research work aims to propose an LMST algorithm grounded on energy stability. In the construction of the topology, the energy utilization because of nodes communications and the remaining energy for communication nodes are comprehensively considered. Because the middle-node consumes more energy for sending information packets. The other leaf nodes are not accountable for information packets forwarding by minimizing energy utilization. As the service time increases, it leads to gradual increase of link weight among the middle node and supplementary nodes, and the intermediate node may become a leaf node, and it is no longer responsible for the data forwarding work and saves energy.
2 Energy-balanced network topology control algorithm
2.1 LMST algorithm
LMST algorithm [8, 9, 10] is a typical control algorithm grounded on neighborhood graph. Such type of graph control algorithm sets the topology graph G formed when all the nodes transmit using the maximum transmit power. According to a certain neighbor judgment condition q, the neighboring graph G’ of the graph is obtained. Finally, each node in G’ determines the transmit power by its nearest communication node. The main algorithms include RNG, MST, LMST, and so on. The LMST algorithm [11, 12, 13, 14] is to send Hello packets to any node in the plane with the maximum statement radius dmax, accumulate all the info from closer nodes, and starts greedy algorithm to construct the local minimum spanning tree which takes itself as the root node.
Although the LMST type algorithm constructs a network topology efficiently by locally minimum total energy consumption, ignoring the problem of energy balance. The middle node bears too much load in the network, which consumes a lot of energy and easily leads to poor network connectivity.
2.2 Network model
Where E = consumed energy, k = a constant associated with the working system, d = communication gap, and C = working system constant and its value is taken as “0.” Here, n has a value of 3. That is, energy consumption for communication is related to the third power of communication space.
Where k1 + k2 = 1, and d (r, t) = space between the transferring node and accepting nodes, E0 = the node’s initial energy, Et = remaining energy of the transferring node. Er = remaining energy of the accepting node; k1 and k2 are variable parameters. However, if the remaining energy of two nodes after transferring or accepting is high, the weight of link parameter (R) becomes lower. While if the remaining energy of nodes is lower, the weight (R) value becomes relatively high and the intermediate node is less likely to be responsible for the task of data forwarding, which saves its own energy and prolongs the life of the node. The whole network gradually reaches the state of energy balance during operation.
2.3 Description of network topology control algorithm based on energy balance
Collect node information. The node “u” periodically transmits a Hello packet to other node in the valid range at the dmax, and the subsequent acceptor node feeds back the response packet to the sender node u, so that the node u can acquire the response of all the nodes in its visible neighboring area NVu(G).
Constructing topology graph. The node u works on the basis of the greedy algorithm to obtain the LMST in perspective of the visible neighbor node information and calculates the link weight coefficient R according to the formula (2). With the increase of service time, the gradual increase of weight between the intermediate node and other neighbor nodes has been observed, and there is a greater probability in topology construction from intermediate node to leaf node, which is no longer responsible for data forwarding and saves energy.
Determine the transmit power. Based on the determined structure of the LMST, the node u determines its own transmit power and regulates the communication radius dmax to grasp all one-hop neighbors.
Bidirectional processing. The node u directs a check packet for whole one-hop neighbors in the tree and waits for receiving the response packet from the neighbor node. After the time-lag, the received response packet defines a link between the node u and neighbor node is bidirectional. If not, the edge is deleted.
Broadcast topology. The node u broadcasts its own reasonable neighbor node, and the advised node stores information into the data construction Info_Root Node, marking the considered node as the reasonable neighbor node of the node u and receiving the information packet from the u. After accepting a data packet by each node, it requires to examine the Info_Root Node to determine the receiving of the data packet. If it cannot be received, it is discarded.
Reconstruct the topology. Due to energy consumed by the node or may be dead node, every network node needs to operate the algorithm periodically, to perform topology reconstruction based on the existing visible information by the neighbor node, to obtain a new LMST, and to determine the transmit power.
3 Simulation experiment
Parameter setting of simulation experiment
100 m × 100 m
Static sensor node
Static sink node
Maximum power radius of the node
Adjustable power radius
Node topology reconstruction time
Node packet interval time
Based on 1.0
The size of the packet
Start time of node contract
4 Simulation analysis
The LMST algorithm can excellently construct a network topology employing local minimum total energy consumption, but the algorithm ignores the problematic energy balance. The intermediate node bears too much load in the network, which consumes a lot of energy and easily leads to poor network connectivity. This algorithm fully ponders the energy consumed by the communication link of the provided data and the remaining energy of the communication node to attain the outcome of energy balance, avoiding the complexities of excessive energy consumed, while the intermediate node acts as a data forwarding task, thereby extending the life cycle of the whole network. The simulation experiment illustrated that the proposed algorithm will effectively elongate the life span of the network and guarantee the long-term reliable operation of the network while ensuring other network performance indicators, such as throughput and delivery rate.
This work was supported by the National Natural Science Foundation of China (61662045, 61762045) and the Special Program of talents Development for Excellent Youth Scholars in Tianjin.
Availability of data and materials
The materials and data are true and reliable in this paper.
TQ (email@example.com) is the corresponding author. WZ and YH conceived the proposed scheme. WZ and MW conducted the detailed derivation of the proposed algorithm and carried out most of the experiments and data analysis. MK carried out some parts of the experiments and data analysis. MW helped to improve the experimental simulation. All authors have read and approved the final manuscript.
The authors declare that they have no competing interests.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
- 3.J.A.R.O.M.C.Z.Y.K. JW, T.O.U.S.S.A.I.N.T. GT, The relative neighbourhood graphs and their relatives[C]//Proceedings of the IEEE. [S.l.]: IEEE (1992).Google Scholar
- 4.R. RAMANATHAN, R. ROSALES-HAIN, Topology control of multihop wireless networks using transmit power adjustment[C]//Proc of IEEE INFOCOM. [S.l.]: IEEE (2000).Google Scholar
- 5.B.O.R.B.A.S.H. SA, J.E.N.N.I.N.G.S. EH, Distributed topology control algorithm for multihop wireless networks[C]//Proc 2002 World Congress on Computational Intelligence. [S.l.]: [s.n.] (2002), pp. 355–360.Google Scholar
- 6.L.I. Ning, H.O.U. JC, L. SHA, Design and analysis of an MST-based topology control algorithm[C]//Proc of Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFORCOM 2003) (IEEE Press, Sanfrancisco, CA, 2003), pp. 1702–1712.Google Scholar
- 7.J. LIU, B. LI, Mobile grid: Capacity-aware topology control in mobile Adhoc networks[C]//Proceedings of the 11th International Conference on Computer Communications and Networks. [S.l.]: [s.n.] (2002), pp. 570–574.Google Scholar
- 8.H.A.N. Hong-quan, Z.H.U. Hong-song, M.E.N.G. Jun, The wireless sensor network[J]. Applications of the Computer Systems 8(2), 16–19 (2005).Google Scholar
- 11.Y. Xu, J. Heidemann, D. Estrin, Geography-informed energy con-servation for ad hoc routing[C]∥ Rose C,ed.Proceedings of the ACM International Conference on Mobile Computing and Net- working(MobiCom) (ACM Press, New York, 2001), pp. 70–84.Google Scholar
- 12.B. Deb, S. Bhatnagar, B. Nath, A topology discovery algorithm for sensor networks with applications to network management[ R].DCS-TR-441 (Department of Computer Science, Rutgers Univer-sity, 2001).Google Scholar
- 13.W. Zhang, P. Passow, E. Jovanov, R. Stoll, K. Thurow, A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications, 2013 IEEE International Conference on Automation Science and Engineering. CASE 2013, 617-622 (2013).Google Scholar
- 14.G.L. Xing, C.Y. Lu, Y. Zhang, et al., in Proceedings of the ACM International Sym-posium on Mobile Ad Hoc Networking and Computing(Mobi-Hoc), ed. by P. R. Kumar, A. T. Campbell, R. Wattenhofer. Minimum power configuration in wireless sensor networks[ C]∥ (ACM Press, New York, 2005), pp. 390–401.CrossRefGoogle Scholar
- 15.Y.E. Chi, S.U.N. Li-min, L.I.A.O. Yong, Overview of energy management in sensor networks[J]. Computer Engineer and Application 40(8), 196–198 (2004).Google Scholar
- 16.V. Kawadia, Protocols and architecture for wireless ad hoc net-works[D].University of Illinois at Urbana-Champaign (2004).Google Scholar
- 19.N. Li, J.C. Hou, Topology control in heterogeneous wireless net-works:Problems and solutions[ C]∥ proceedings of the IEEE conference on computer communications(INFOCOM) (IEEE Press, New York, 2004), pp. 232–243.Google Scholar
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.