A Coverage and Connectivity Method To Cluster Topology in Wireless Sensor Networks
A Coverage and Connectivity Method To Cluster Topology in Wireless Sensor Networks
{ (( D ) – 2) * ( 3 r² – π r² )} 3 3
2r 2 6 、Calculation the Optimum Cluster of Nodes
3.4、
c. The most right arc area intersection of the upper Number
and lower nodes is In this section, we study required and sufficient
conditions for the grid network to node covering the unit
{ 2 * ( 1 π r² + 3 r² ) } area. Before presenting details of the proposed optimum
12 2
cluster of formula (K), we will express an example for this
3. The measure of area is section. When the edge of grid network is D = 100(m),
each node of cover radius is r = 2(m). So we will obtain
3 )Dr – 1 1 the best node quantity of the cluster for the value into this
( 3 r² – D π r + π r² ---- (G)
2 6 3 formula. At the same time, we discuss the different value
of the connectivity. The following example r represents
、The Forth Part of Coverage on Grid Area
3.3.4、 covering radius of the node, c is connecting range of the
1. The orange nodes in D x D area as Figure 3.1.1 node and N is the number of the node.
a. The calculation in vertical side( the leftest side) each When c = r , then N = 213.22 (nodes)
2r distance has a node so each horizontal side has
About the CCC of algorithm will divide into 3 parts to 1. Each sensor node of cluster set as cluster head for
prove. At first, it builds about the cluster topology. It is initial value.
utilized the formula to make optimal node number. The 2. Each cluster head is transmitted to the next cluster
cluster topology uses the characteristic of the regard head that regarded as this cluster in accordance with
equilateral triangle to institute the formation. Furthermore, the same node serial number.
we will discuss the 2nd part that the routing protocol
transmit to sink of messages from nodes of gathers or 3. The cluster head of the last cluster is transmitted the
events. Nodes dispersed in WSN environment will make messages to base station.
the topography or the limited energy cause to fault. For 4. Then the cluster of cluster head is selected by node
this fault tolerance will be discussed in the last part. serial number and accumulates 1.
References
[1]. Edgar H. Callaway, “Wireless Sensor Networks,
Architectures and Protocols”
[2]. J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan,
D. Estrin, and D. Ganesan, “Building efficient wireless
sensor networks with low-level naming,” in Proceedings
of the Eighteenth ACM symposium on Operating
Systems Principles [21], Oct 2001, pp. 146-159.
Figure 4.3.2 A comparison of CCC’s system lifetime
[3]. W. Heinzelman,“Application-Specific Protocol
with other cluster protocol Architectures for Wireless Networks,” Ph.D. thesis,
Massachusetts Institute of Technology, 2000.
[4]. Heinzelman, W.R. and Chandrakasan, A. and
Balakrishnan, H. System Sciences, 2000. Proceedings of
the 33rd Annual Hawaii International Conference, 4-7
Jan. 2000 Pages: 10 pp. vol.2
[5]. Rajagopal Iyengar, Koushik Kar, Suman Banerjee,
“Low-coordination Topologies For Redundancy In
Sensor Networks”, May 2005 Proceedings of the 6th
ACM international symposium on Mobile ad hoc
networking and computing MobiHoc '05
[6]. Ozgur Sanli, H.; Hasan Cam;” Energy efficient
differentiable coverage service protocols for wireless
Figure 4.3.3 A comparison CCC and LEACH of
sensor networks” Pervasive Computing and
average energy dissipation Communications Workshops, 2005. PerCom 2005
Workshops. Third IEEE International Conference on
8-12 March 2005 Page(s):406 – 410
[7]. Tarun Banka, Gagan Tandon, Anura P. Jayasumana:
“Zonal Rumor Routing for Wireless Sensor Networks”
Proceedings of the International Conference on
Information Technology: Coding and
Computing(ITCC’05)
[8]. Omar Moussaoui Mohamed Naïmi. ” A Distributed
Energy Aware Routing Protocol for Wireless Sensor
Networks” October 2005 Proceedings of the 2nd ACM
international workshop on Performance evaluation of
Figure 4.3.4 A comparison CCC and LEACH of wireless ad hoc, sensor, and ubiquitous networks
PE-WASUN’05
system lifetime