Download Full Energy Optimization Protocol Design for Sensor Networks in IoT Domains 1st Edition Sanjeev J. Wagh PDF All Chapters
Download Full Energy Optimization Protocol Design for Sensor Networks in IoT Domains 1st Edition Sanjeev J. Wagh PDF All Chapters
https://ebookultra.com
https://ebookultra.com/download/energy-
optimization-protocol-design-for-sensor-networks-
in-iot-domains-1st-edition-sanjeev-j-wagh/
https://ebookultra.com/download/localization-algorithms-and-
strategies-for-wireless-sensor-networks-1st-edition-guoqiang-mao/
ebookultra.com
https://ebookultra.com/download/iot-projects-with-bluetooth-low-
energy-1st-edition-madhur-bhargava/
ebookultra.com
https://ebookultra.com/download/design-and-deploy-microsoft-defender-
for-iot-1-converted-edition-puthiyavan-udayakumar/
ebookultra.com
Distributed Sensor Networks Sensor Networking and
Applications Volume Two 2nd Edition S. Sitharama Iyengar
(Editor)
https://ebookultra.com/download/distributed-sensor-networks-sensor-
networking-and-applications-volume-two-2nd-edition-s-sitharama-
iyengar-editor/
ebookultra.com
https://ebookultra.com/download/communication-networks-an-
optimization-control-and-stochastic-networks-perspective-srikant-r/
ebookultra.com
https://ebookultra.com/download/building-wireless-sensor-networks-
using-arduino-community-experience-distilled-1st-edition-kooijman/
ebookultra.com
https://ebookultra.com/download/multi-objective-optimization-in-
computer-networks-using-metaheuristics-1st-edition-yezid-donoso/
ebookultra.com
https://ebookultra.com/download/sanjeev-kapoor-s-cakes-bakes-1st-
edition-sanjeev-kapoor/
ebookultra.com
Energy Optimization Protocol Design for Sensor
Networks in IoT Domains 1st Edition Sanjeev J. Wagh
Digital Instant Download
Author(s): Sanjeev J. Wagh, Manisha Sunil Bhende, Anuradha D. Thakare
ISBN(s): 9781032305592, 1032305592
Edition: 1
File Details: PDF, 17.97 MB
Year: 2022
Language: english
ENERGY OPTIMIZATION
PROTOCOL DESIGN FOR
SENSOR NETWORKS IN IOT
DOMAINS
Sanjeev J. Wagh, Manisha Sunil Bhende
and Anuradha D. Thakare
ENERGY OPTIMIZATION
PROTOCOL DESIGN FOR
SENSOR NETWORKS IN IOT
DOMAINS
This book provides an essential overview of Internet of things (IoT), energy-
efficient topology control protocols, motivation, and challenges for topology control
for wireless sensor networks, and the scope of the research in the domain of IoT.
Further, it discusses the different design issues of topology control and energy
models for IoT applications, and different types of simulators with their advantages
and disadvantages. It also discusses extensive simulation results and comparative
analysis for various algorithms. The key point of this book is to present a solution to
minimize energy and extend the lifetime of IoT networks using optimization
methods to improve the performance.
Features:
DOI: 10.1201/9781003310549
Typeset in Times
by MPS Limited, Dehradun
Contents
Preface.......................................................................................................................xi
Author’s Biography ................................................................................................xiii
Abbreviations...........................................................................................................xv
v
vi Contents
Index ......................................................................................................................225
Preface
Internet of things (IoT) and wireless sensor networks (WSN) are the fastest-growing
technologies for deploying general applications ranging from smart home, retail,
supply chain, smart city, industrial Internet, smart farming, and connected cars to
healthcare. IoT has now become a significant empowering technology that extends
various technology dominions from data sensing and processing to networking and
data analytics. This book addresses components of IoT, the importance of topology
control in IoT and WSN, energy-efficient topology control protocols to improve the
performance of IoT, and a framework for performance optimization in the IoT. The
development of IoT applications and services includes various components such as
sensors, actuators, gateways, cloud, etc. Sensors are a very important component of
the IoT system.
In this book, the authors provide an essential overview of IoT, energy-efficient
topology control protocols, motivation, and challenges for topology control for
wireless sensor networks, the scope of the research in the domain of IoT is also
presented. The aims and objectives of the research are elucidated. Scientific
contributions of the research work in the IoT domain are explored. Further authors
discuss the different design issues of topology control and energy models for IoT
applications. Different types of simulators with their advantages and disadvantages
are discussed. This book provides a discussion on the results for contribution
carried out with extensive simulation results and comparative analysis for various
algorithms.
There are still many aspects of topology control for sensor networks that are not
considered in this book because some of them are out of scope or due to limitations
of time and resources. There are plenty of rooms that can be explored and added on
top of our proposed algorithms. Among the issues that are evaluated in the center of
attention of this book, there are still several aspects for further research.
Today, most system designers imagine things to create or design every possible
system based on the IoT. The components in the IoT system have embedded
computing technologies that support internet facilities to support many application
domains. WSN and IoT have become the prominent field of study for researchers
because of their readily available and applicable resources and extensive application
over the various fields.
IoT is a network of internet-enabled sensor devices and different heterogeneous
wireless technologies that are used for data communication. The analyst firm
Gartner says that by 2021 there will be over 26 billion connected devices and a lot
of connections. IoT involves billions of connected sensors communicating through
the wireless network, energy efficiency and fairness is the biggest concern. It raises
a need to develop energy-efficient techniques or approach that reduces contention
and provide energy-efficient communication. The IoT is a giant network of
connected things. Many of the objects in the surrounding environment are on the
network in different forms. And enormous amounts of data are generated which
have to be stored, processed, and presented in a seamless, efficient, and easily
xi
xii Preface
xiii
xiv Author’s Biography
xv
xvi Abbreviations
RN Random Network
RNG Relative Neighborhood Graph
RTS Request To Send
SBYaoG Smart Boundary Yao Gabriel Graph
SCH Scheduling
SIFS Short Inter-Frame Space
SIG Special Interest Group
SSIM Smart Sensors and Integrated Microsystems
TC Topology Control
TDMA Time Division Multiple Access
Tx Range Transmission Range
UDG Uniform Disk Graph
UWSN Underground Wireless Sensor Network
Wi-Fi Wireless Fidelity
WLAN Wireless Local Area Network
WMSN Wireless Multimedia Sensor Network
WSN Wireless Sensor Network
YG Yao Graph
1 Introduction and
Background Study
DOI: 10.1201/9781003310549-1 1
2 Energy Optimization Protocol Design for Sensor Networks in IoT Domains
academia have piqued the interest of academics. These issues have prompted
academic and scientific researchers to investigate the potential of WSN.
For instance, IEEE has observed the subsequent fact: the low cost and high
proficiencies of these miniature devices. The IEEE association has established a
standard to address low data rate wireless personal area networks – IEEE 802.15.4.
Based on this standard, the ZigBee Alliance published the ZigBee standard for
usage in WSNs.
1.1.2.1 Technology
Sensor Node
It is one of the most crucial aspects of any WSN [3]. A sensor node is a small, low-
power device. Despite its limited energy resources, it has a concurrent processing
capability and a low cost. Figure 1.2 depicts the elements of a sensor node. Definite
units of a sensor node collect and transfer data.
Introduction and Background Study 3
Power Source
The sensor node’s base is equipped with a power source. It provides power to sensor
node units such as sensing units (sensors), CPUs, and radios. Energy is required to
continue performing sensing, computing, and communication operations. As a result,
small sensor nodes are powered by ambient energy harvesting (AEH) techniques.
Watch batteries, solar cells, and smart systems can all be used as power sources.
The AEH is accomplished in a variety of ways, including standard optical cell
power generation as well as small piezoelectric crystals, micro-oscillators, and ther-
moelectric power generation elements [3]. All sensor nodes have limited energy
supplies, and energy is necessary to fulfill all jobs. As a result, nodes may spend up to
99% of their pause time conserving energy. They only awaken to collect, transfer, and
receive data.
Microcontroller
The CPU of a sensor is typically accomplished with a microprocessor and flash
memory. Most of the sensor nodes have connectors that allow you to easily add exterior
processing units and sensors to the main unit. Making decisions and analyzing data are
two examples of crucial CPU tasks. The CPU keeps the data in flash memory until
there is enough of it. Once the system has gathered sufficient data, the CPU’s micro-
processor unit arranges the data in envelopes since envelopes are extremely effective in
data transport. These envelopes are then broadcast over the airwaves. Meanwhile, to
maintain the most effective network structure, the system communicates with other
nodes in the same way that it communicates with data. The CPU is associated with the
base, from which it connects with the sensors and radio [4].
Sensor Transducer
A WSNs most significant component is its sensors. Sensors transform environ-
mental variables such as light, smoke, heat, and sound, among others, into electrical
impulses. Over the previous two decades, there has been rapid progress in a wide
range of sensing technologies, which has facilitated sensor production:
4 Energy Optimization Protocol Design for Sensor Networks in IoT Domains
Transceiver
It is the responsibility of a sensor node’s wireless communications. The four op-
erational states of a transceiver are receive, transmit, idle, and sleep. Radio fre-
quency (RF), infrared, and laser can all be used as wireless media in a transceiver.
RF is the most popular wireless communication technology for WSNs. The typical
RF operation range is 10 meters for indoors and 100 meters for outdoors.
Operating System
Operating systems used for WNSs include Tiny OS, Contiki, MANTIS, and BTunt.
Tiny OS is the most open source and energy-efficient of these systems. Tiny OS
employs event-driven programming instead of multithreading.
1.1.2.2 Gateways
System managers can use gateways to connect nodes to personal digital assistants
(PDAs) and personal computers (PCs). There are three types of gateways: active,
passive, and hybrid. The active gateway enables nodes to communicate with the
gateway server in real-time. The passive gateway does not have the same freedom
as the active gateway. It demands that sensor nodes give the data they need. A
hybrid gateway is a grouping of these dual gates that can function in either mode.
delivers it to other sensor nodes during data transfer. The radio receives data from
another node’s radio and transfers it to the central system along with data reception.
The sensor node sends all data it collects to the parent node. This parent node is
linked to a multi-functional computer, which permits access to other nodes’ data
through the user’s computer interface. If the user offers instructions, they will be sent
to a multi-functional computer over the Internet. These commands will be delivered
to the parent node, which will then transmit the same message to its child nodes.
ZigBee
The communication range of ZigBee is normally 10 meters. It can, however, transport
data across large distances. This is accomplished by sending data over short distances
between intermediate devices. It consumes very little power. The data rate is limited
to 20 kbps.
Bluetooth
It is a wireless technology standard that enables mobile devices to communicate
across short distances. The communication range is one meter to one hundred
meters. It consumes very little power. The maximum data rate is 3 Mbps.
6LoWPAN
This is a method for sending and receiving IPv6 packets via IEEE 802.15.4 net-
works. It has a range of communication from 45 meters to 90 meters. It uses a
moderate amount of power.
Quality of Service
Quality of service (QoS) is associated with the dependability and priority me-
chanisms of WSNs. As a result, sensors can accomplish several emerging appli-
cations, like object tracking and fire detection. QoS should be employed in such
applications to improve WSN security and dependability. As a result, three major
restrictions should be considered while developing new protocols for important
applications. Data redundancy, collision, and resource limits are examples of these.
Fault Tolerance
Sensors may fail due to the hostile environment; nonetheless, this failure should
not affect the WSN. Every algorithm or protocol created for WSNs would be
6 Energy Optimization Protocol Design for Sensor Networks in IoT Domains
Energy Consumption
In some situations, replacing or recharging batteries may be impossible or com-
plicated. As a result, battery life has a significant impact on the lifetime node. As a
result, the overall network’s lifespan will be shortened. In the worst-case scenario,
when nodes are routers, this failure will damage the entire network. The major tasks
that sensors need energy for include sensing, processing, transmitting, and re-
ceiving. Furthermore, noise might increase power usage owing to retransmissions.
WSN-specific data compression algorithms are being studied to reduce power
consumption. Here study determined that data communication munches more re-
sources over data processing. Several communication activities take place in WSNs,
with the transmission, reception, frequency synthesizers, voltage management, and
so on, and all of these functions drain power from sensors.
Gathering Data
Based on how data is acquired, WSN applications are categorized as Event Detection
(ED) or Spatial Process Estimation (SPE). In the emergency department, a specific
occurrence, such as a fire, must be identified by positioning sensors. SPE, on the other
hand, is used to forecast a physical situation, like ground temperature in a volcano or air
pressure. Though, some environmental applications may fall within both categories.
Communication Architecture
Sensors have two basic purposes. These tasks detect data or route it to the sink
node. The sink node, like all other nodes in the network, communicates in a tiered
fashion. A protocol stack is a type of communication architecture.
other wired and wireless technologies. We’ve seen the OSI (open system inter-
connection) model, which outlines a seven-layer networking architecture. OSI
outlines the functions and interfaces of each of these layers. Let’s have a look at
the functional description of the seven tiers of the IoT protocol stack, as depicted
in Figure 1.3.
1.3.4 RF LAYER
This radio frequency layer contains RF technologies based on short or long-range,
as well as the data rate required by the application. Wifi, Bluetooth, Zigbee, Zwave,
NFC, and RFID are examples of common indoor RF/wireless technologies. GSM/
GPRS, CDMA, LTE-M, NB-IoT, and 5G are some of the most common outdoor RF
cellular technologies. The RF layer communicates data via radio frequency-based
EM waves. Another type of data communication method employs light waves. This
type of light-based data transfer is known as LiFi.
deliver messages to nodes about their surroundings, ensuring that they always
have a route to their destinations.
1.4.6 E-CARP
This protocol extends CARP to support greedy and location-free hop-to-hop routing
to ensure energy-efficient packet forwarding from sensor nodes to sink. CARP
ensures that data acquired by sensor nodes is not ignored by their presence in the
network; however, unwanted forwarding may occur from those nodes in the net-
work; E-CARP is designed to address this issue by enabling caching of sensory
node data at the sink.
Another feature that is underutilized in CARP is the reusability of network re-
lays. There is usually no need for a PING-PONG message transfer between nodes
when the network is stable. E-CARP is designed to capitalize on the reusability of
previous links by prioritizing previously used links before initiating a transfer.
1.7 SUMMARY
This section describes the introduction and background details of IoT and WSN and
their applications in different areas. Also discussed is the IoT layer protocol stack.
Furthermore, addressed the various protocols being used in WSN and IoT with
energy consumption and network topology. At last, discussed various challenges for
energy consumption in IoT networks.
Introduction and Background Study 17
Exercise
1. What is the significance of IoT and WSN?
2. Explain in detail the applications of IoT and WSN.
3. Explain the IoT layer stack in detail.
4. List and discuss in detail the protocols used in WSN and IoT.
5. What are the different challenges for energy consumption and IoT
networks?
REFERENCES
[1] Ephrem, E. Architecture of Wireless Sensor Networks. Retrieved October 8, 2015,
from http://servforu.blogspot.com.tr/2012/12/architecture-of-wirelesssensor-networks.
html
[2] Wang, Q. and Balasingham, I. 2010. Wireless sensor networks – An introduction.
Wireless Sensor Networks: Application-Centric Design, 1–15. DOI: 10.5772/13225
[3] Yinbiao, D. and Lee, D. 2014. IEC White Paper Internet of Things: Wireless Sensor
Networks. International Electrotechnical Commission White Paper.
[4] Raja, C. and Sinnaiya, M. 2011. Analysis and report of wireless sensor networks.
International Journal of Computer Science, 8:1–2.
[5] Villegas, M. A. E., Tang, S. Y. and Qian, Y. 2007. Wireless Sensor Network
Communication, Architecture for Wide-Area Large Scale Soil Moisture Estimation
and Wetlands Monitoring, Department of Electrical and Computer Engineering,
University of Puerto Rico at Mayaguez.
[6] Mahdi, M. A. and Hasson, S. T. 2017. A contribution to the role of the wireless
sensors in the IoT Era. Journal of Telecommunication, Electronics and Computer
Engineering, 10:1–6.
[7] Botta, A., Donato, W., Persico, V. and Pescapé, A. 2016. Integration of cloud
computing and Internet of Things: A survey. Future Generation Computer Systems,
56:684–700.
[8] Keertikumar, M., Shubham, M. and Banakar, R. M. 2015. Evolution of IoT in smart
vehicles: An overview. in 2015 International Conference on Green Computing and
Internet of Things (ICGCIoT).
[9] Xiaojun, C., Xianpeng, L. and Peng, X. 2015. IOT-based air pollution monitoring
and forecasting system. Computer and Computational Sciences (ICCCS), 2015
International Conference on IEEE.
[10] Kaewmard, N. and Saiyod, S. 2014. Sensor data collection and irrigation control on
vegetable crop using smart phone and wireless sensor networks for smart farm.
Wireless Sensors (ICWiSE), 2014 IEEE Conference on IEEE.
[11] Zenglin, Z., Pute, W., Wenting, H. and Xiaoqing, Y. 2012. Design of wireless
underground sensor network nodes for field information acquisition. African
Journal of Agricultural Research, 7:82–88.
[12] Hodge, V. J., O’Keefe, S., Weeks, M. and Moulds, A. 2015. Wireless sensor net-
works for condition monitoring in the railway industry: A survey. IEEE
Transactions on Intelligent Transportation Systems, 16-3:1088–1106.
[13] Darwish, T., Bakar, K. A. and Hashim, A. 2016. Green geographical routing in
vehicular ad hoc networks: Advances and challenges. Computers & Electrical
Engineering, 64:436–449.
[14] Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levism, P., Pister, K., Struik, R.,
Vasseur, J. and Alexander, R. 2012. RPL: IPv6 Routing Protocol for Low-Power and
Lossy Networks, RFC 6550(Protocol Standard), Mar.
18 Energy Optimization Protocol Design for Sensor Networks in IoT Domains
[15] Wang, Z. M., Li, W. and Dong, H. L. 2018. Analysis of energy consumption and
topology of routing protocol for low-power and lossy networks. Journal of Physics
Conference Series, 1087(5):052004. DOI: 10.1088/1742-6596/1087/5/052004
[16] Kaur, N. and Sood, S. K. 2015. An energy-efficient architecture for the Internet of
Things (IoT). IEEE Systems Journal, 11:796–805.
[17] Lin, Y., Chou, Z., Yu, C. and Jan, R. 2015. Optimal and maximized configurable
power saving protocols for corona-based wireless sensor networks. IEEE
Transaction Mobile Computing, 14:2544–2559.
[18] Shakerighadi, B., Anvari-Moghaddam, A., Vasquez, J. C. and Guerrero, J. M. 2018.
Internet of Things for Modern Energy Systems: State-of-the-Art, Challenges, and
Open Issues. Energies, 11:1252.
[19] Kounev, V., Tipper, D., Levesque, M., Grainger, B. M., Mcdermott, T. and Reed, G. F.
2015. A microgrid co-simulation framework. In Proceedings of the 2015 Workshop on
Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES), Seattle, WA,
USA. 1–6.
[20] Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A. and Vasilakos, A.
V. 2016. The quest for privacy in the internet of things. IEEE Cloud Computing,
3:36–45.
[21] Jayaraman, P. P., Yang, X., Yavari, A., Georgakopoulos, D. and Yi, X. 2017.
Privacy preserving Internet of Things: From privacy techniques to a blueprint ar-
chitecture and efficient implementation. Future Generation Computing Systems,
76:540–549.
[22] Poyner, I. and Sherratt, R. S. 2018. Privacy and security of consumer IoT devices
for the pervasive monitoring of vulnerable people. In Proceedings of the Living in
the Internet of Things: Cybersecurity of the IoT—2018, London, UK, 28–29 March
2018; 1–5.
[23] Roman, R. and Lopez, J. 2012. Security in the distributed internet of things. In
Proceedings of the 2012 International Conference on Trusted Systems, London, UK,
17–18 December 2012; 65–66.
[24] Banafa, A. IoT Standardization and Implementation Challenges. 2016. Available on-
line: https://iot.ieee.org/newsletter/july-2016/iot-standardization-and-implementation-
challenges.html (accessed on 10 May 2019).
[25] Chen, S., Xu, H., Liu, D., Hu, B. and Wang, H. 2014. A Vision of IoT: Applications,
Challenges, and Opportunities with China Perspective. IEEE Internet Things
Journal, 1:349–359.
[26] Al-Qaseemi, S. A., Almulhim, H. A., Almulhim, M. F. and Chaudhry, S. R. IoT
architecture challenges and issues: Lack of standardization. In Proceedings of the
2016 Future Technologies Conference (FTC), San Francisco, CA, USA, 6–7
December 2016; 731–738.
2 IoT and Topology
Control: Methods
and Protocol
DOI: 10.1201/9781003310549-2 19
20 Energy Optimization Protocol Design for Sensor Networks in IoT Domains
FIGURE 2.4 The four classifications of 2D-distributed topology control algorithms and
12 representative algorithms.
The MECN algorithm works in two steps. In the first step, each node can find its
neighbor set. Typically, the neighbor set of a node includes all the nodes within its
field of communication. Here, the node adds to its neighbor collection only those
that can communicate directly by investing minimal packet transmission power. In
other words, a node can only admit another node to its neighbor set if:
Figure 2.5 shows this distinction. Algorithm 1 defines the building mechanism set
by the neighbor.
In the second step, the nodes run the Bellman-Ford shortest path algorithm to
evaluate the minimum energy path to the node of the sink. Each node communicates
24 Energy Optimization Protocol Design for Sensor Networks in IoT Domains
FIGURE 2.5 Neighbors of the node u: It can directly exchange packets with v, w, r, and q,
but discovers that relayed packet transmissions toq via r are more efficient than direct
communications. So, it does not include q in its neighbor set.
the cost of using itself as a relay to the sink (here, the cost is the minimum power
consumption required to send a packet to the sink). When a node u receives cost
information from a neighbor node v, it determines the minimum cost of the path to
the sink relayed by v as in 2.1,
where d(u, v) is the Euclidean distance between the nodes u and v (it is assumed that
the nodes know their locations), n is the path loss exponent, and β is the power
absorbed by the receiver serving as the relay node.
Based on the costs, node u selects a route that requires a minimal transfer cost of
packets between its neighbors. The chosen node with the minimum cost is the next
node to begin the creation of the minimum energy path. Cost measurements are kept
up-to-date and broadcast to neighbors. To further optimize energy consumption, the
node will switch to sleep mode after completion of the second step if no messages
are sent.
To handle dynamic changes in the environment (spread path fluctuations, faulty
nodes, etc.), the MECN algorithm also includes a mechanism called “Flip”. It is
used to deal with the following cases:
1. Nodes are removed from the neighbor set if it is found that direct com-
munication with them is no longer efficient (i.e., it is possible that, due to
the dynamic changes in the environment, communication with this node
could become more efficient if another neighbor is used as the relay), or
2. A node is added to the neighbor set as direct communication with them
becomes more efficient. The newly inserted node activates the cases referred
to in point 1.
For the details of the Flip mechanism, Ref. [4] can be referred.
IoT and Topology Control 25
procedure FINDNEIGHBORSET(u)
N(u) ← ∅
for all received beacon packets do
q ← Sender of the beacon
if q /∈ N(u) then
Pu→q > Compute the power cost
N_candidate ← true
for all v ∈ N(u) and N_candidate = true do
if Pu→v + Pv→q < Pu→q, then
N_candidate ← false
end if
if N_candidate = true, then
N(u) ← N(u) ∪ {q}
end if
end for
end if
end for
end procedure
authors concluded that the minimum common power level could offer a
range of benefits to the networks, including increased transport capability,
energy usage, and MAC controversy. The option of using the smallest
common power level often results in bi-directional connections, an essential
feature needed for efficient routing and proper communication on the MAC
layer. This protocol is the first to be implemented in a real wireless testbed
and to investigate the different power levels available in the Aironet WLAN
access points of the CISCO 350 range. COMPOW blends both power
control and routing due to the way that they both influence each other.
The length of the grid r is selected in such a way that every two nodes in the
adjacent grids will meet each other. The scale of the simulated grids is based on
the nominal R spectrum and they are all equal in size. The longest potential distance
between the nodes of the adjacent grids is the length of the diagonal connecting the
two adjacent grids that can be measured using Equation (2.2),
r R/5 (2.2)
GAF uses the word “equivalent nodes” to describe a neighbor set appropriate for
routing. The “equivalent nodes” identify nodes capable of interacting with all the
nodes in their neighboring grids. Equivalent nodes can be used to save power by
keeping only some of them alive for routing while the remaining nodes can sleep.
For example, in Figure 2.6 [9], nodes v, w, and x are identical nodes, since, in order
for node u to communicate with node z, packets can be relayed by either v, w, or x.
In this example, energy savings are accomplished by putting nodes w and x in sleep
mode while node v forwards data and alternates between sleeping and active. This
phase can be represented in a state transformation diagram in Figure 2.7, which is
redrawn from Ref. [9].
There are three GAF operational states – primarily sleeping, discovery, and
active states. In the discovery state, nodes identify their neighbors on the grid by
flipping on their radios and exchanging discovery messages. The discovery message
contains the id of the node, the state, the grid, and the active time of the node Tact.
The Tact value is used to evaluate the length of the nearby nodes remaining to sleep.
The instant when the node depletes half of its energy resource is set. Nodes engage
in routing in the active state. In the sleeping state, the nodes turn off the radio and
stay inactive. Initially, all nodes begin with the state of discovery. In this state,
nodes set their discovery time for Td seconds, transmit the discovery message to find
nodes inside the same grid, and then enter the active state. Nodes that join the active
state set their timer to the timeout value Ta to determine the period that they remain
in the active state. After Ta, the nodes will return to the discovery state and re-
broadcast their discovery message every Td second. Nodes in discovery or active
state can turn to sleep state if they find other equivalent nodes for routing. When
going to sleep, nodes cancel all the timers and shut down their radios. They sleep
for the length of Ts, which is a random interval between Tact/2 and Tact. Information
28 Energy Optimization Protocol Design for Sensor Networks in IoT Domains
on whether or not these nodes are capable of receiving messages during sleep is not
given in Ref. [9].
To optimize network life, nodes that engage in routing are ranked according to
a set of rules. The rules ensure that only one active node remains in each grid and
that nodes with a longer projected lifespan are used first. There are a variety of
rules for determining rank. Next, the node in the active state is of a higher rank
than the node in the discovery state. Second, if nodes are in the same state, the
GAF gives a higher rank to a node with a longer life expected. Third, node IDs
are used to remove the connection. GAF also adopts a load balancing approach to
ensure that the load is equally spread between nodes to keep nodes from ex-
hausting their energy. By setting the timeout value Ta, nodes that are in an active
state can gradually move to the exploration state to allow other nodes with a
higher energy level to become active within the same grid. GAF considers
system-level actions to conform to high mobility to avoid the drop of high packet
rates. This is achievable by calculating the time that each node persists in the grid.
This value of the Tmob is included in the discovery message and forwarded to the
neighbors. Its neighbors who are about to transit to sleeping state use the Tmob
along with the Tact to assess the length of their Ts.
V.
PETROPOWLOWSK IN KAMTCHATKA
VII.
VIII.