You are on page 1of 5

International Journal of Advanced and Innovative Research (2278-7844) / # 1/

Volume 6 Issue 11
A Survey on Energy Efficiency Distributed Topology Control
Algorithm For Low Power Wireless Networks

M.Jothilakshmi 1 ,S.Subbaiah 2,
Research Scholar, Department of Computer Science1
Asst. Professor, Department of Computer Science 2
Vivekanandha College of Arts & Sciences for Women (Autonomous), Namakkal-637 205,
Tamil Nadu, India
Jothividhula@gmail.com 1, Subbunaren@yahoo.com2

I.INTRODUCTION
Abstract
One of the primary features of topology
Topology Control is one of the significant
control is connectivity between nodes in
research topics in traditional wireless
general network environments.
networks. The primary purpose of topology
Furthermore, low power wireless
control ensures the connectivity of wireless
communications require an energy-efficient
nodes participated in the network. Wireless
solution. wireless communication networks
network environments in which the main
primarily consist of Machine to Machine
communication devices are wireless devices
(M2M) communication. The M2M
with limited energy like battery. In this
communication is likely to the
paper we examine the neighbor discovery
communication of wireless sensors in sensor
algorithm for energy efficiency in low
networks. Usually, the sensor network
power wireless networks. asymmetric
assumes that wireless devices are stationary
neighbor discovery by mixing the concept of
during their lifetime in the network, but this
the combinatorial block design and the
assumption might not work in low-power
multiples of 2. One of the biggest challenges
IoT communication networks. Frequently,
of the block design cannot guarantee proper
nodes join into the network and leave at any
generation of neighbor discovery schedules
time in low power wireless networks. In this
when a desired duty cycle is presented.
situation, the management of network
Neighbor discovery algorithm has minimum
topology is slightly more difficult than that
number of total and wake-up slots. This
of a static network topology. To make
implies that Combinatorial +M2 protocol
matters worse, each node only has limited
finds neighboring nodes faster and spends
battery power in low-power networks.
less energy resource than other protocols.
Therefore, a network topology mechanism
Keywords: Machine to Machine should deal with the energy constraints
Communications, Neighbor Discovery, efficiently. When physical devices join the
Latency, WS network, one of the first job they perform

2017 IJAIR. All Rights Reserved


http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / # 1/
Volume 6 Issue 11
might find their neighboring machines to when various asymmetric cases are
make a connection between them. We presented. We need to confirm that the result
traditionally call this process neighbor of numerical analysis corresponds with a
discovery. In low-power communication simulation study or an actual experiment in
networks, all of the nodes have restricted the near future. In addition, we could choose
energy. Therefore, they have their own and apply the multiples of other numbers to
power-saving mechanism. Generally asynchronous and asymmetric neighbor
accepted battery-saving technique is to turn discovery for further energy consumption.
off a radio interface because transmission Consequently, we can find the best
and idle listening consume most of the parameter of the multiples for both fast
energy instead of sensing and computation. neighbor discovery and minimum energy
If nodes cannot find their neighbors within a consumption. This paper is organized as
certain amount of time then the follows. Section 2 reviews relevant literature
communication channel of nodes cannot be regarding neighbor discovery for distributed
established properly and the topology network topology management. We describe
control management may not be successful. the background and main idea of our
Non-power-saving mechanism could be proposed algorithm and explain how to
used for fast neighbor discovery, but accomplish fast neighbor discovery and
physical devices could be died before they energy efficiency in detail in section 3.
find their neighbors, or they could survive at Next, section 4 shows our numerical
a shot time only. Therefore, this simple analysis to compare representative discovery
solution does not work in low-power schemes with the proposed technique based
wireless communication networks because on discovery latency and energy
each node is an energy-constraint device. consumption. The last section provides the
Consequently, the entire network may be conclusions of the paper and guides the
disconnected and useless at a worst case. future research direction.
One of the key challenges of topology
control in low-power wireless network II. Related Work
platforms is to manage limited energy There have been a number of
efficiently in a distributed manner. There are research works of neighbor discovery since
a variety of ways to overcome this obstacle a neighbor discovery problem was
in previous neighbor discovery research. introduced. In mobile network
One fundamental feature of the previous environments, the topology of networks
works is asynchronous neighbor discovery.. keep changing. Frequent node join and leave
The combinatorial block design has the happens during network lifetime. Therefore,
minimum value of cycle when the same duty continuous node discovery is crucial in order
cycle is given among existing neighbor to manage network topology successfully. In
discovery protocols. In addition, the this section, we present the literature review
combination of block designs and multiples of representative neighbor discovery
of 2 guarantee the minimum wake-up slots protocols.

2017 IJAIR. All Rights Reserved


http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / # 1/
Volume 6 Issue 11
II a)The Birthday protocol was proposed worst case, most of the communications in
for neighbor discovery in static ad hoc the network may be broken. Consequently, it
networks. The main idea of Birthday is to is impossible to sustain network life cycle. It
use a probabilistic method in order to reduce is well known that wireless nodes frequently
the energy of wireless nodes. join and leave the network in a mobile
computing environment. In addition, the
II.b)Quorum-based neighbor discovery nodes cannot survive for a long time in the
protocol Given a two dimensional network because of battery constraint.
array m m, a wireless node can choose one Therefore, one of the primary
row and one column randomly and wake up responsibilities of topology control is
all the slots of chosen row and column. finding the colleagues of networked devices
II.c)Searchlight, there are two wake- and connecting them each other in a
up slots in each cycle, one static slot (the distributed manner. Fining neighboring
anchor slot) in the beginning of the cycle nodes is an active research area in mobile
and one floating slot (the probe slot) and wireless networks. Furthermore, low-
searching for the anchor slots of the other power communication networks could have
node. the problem of energy consumption and
frequent node movement we discussed in
II.d)BlindDate maintains multiple probe this section. 3.1. Neighbor Discovery As we
slots with opposite directions in order to mentioned above, wireless nodes
increase the chances of the overlaps between continuously find their nearby neighboring
two probe slots. This idea can reduce the nodes in order to maintain network
time of discovery latency. The researchers connectivity because each node has battery
showed that BlindDate protocol reduced the constraint and the node joins and leaves the
worst case discovery latency and network frequently. In other words, a
accomplished a better average performance network environment keeps changing.
compared with other primary discovery Hence, we need a well-defined network
protocols. However, BlindDate has a similar topology mechanism. First of all, we
problem Searchlight has. introduce what neighbor discovery is in this
section. Most wireless devices perform their
III. Distributed Topology Control
task with limited battery power. Therefore,
Algorithm
an energy efficient battery control technique
One of the most significant tasks for is required. IEEE 802.11 and 802.15.4
topology control in a traditional wireless standards provide a power saving (PS) mode
network environment maintains network for wireless network environments. The
connectivity among a number of wireless main idea of PS mode is to turn off the radio
devices. If networked devices lose their interface of networked devices when there is
connection between their neighboring nodes no communication. One study discovered
then it might affect the performance and that wireless communication (sending and
throughput of the entire network. In the receiving packets) spends a lot of battery

2017 IJAIR. All Rights Reserved


http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / # 1/
Volume 6 Issue 11
compared to other activities. As a result, addition, we cannot guarantee that a certain
there are two conditions like on and off symmetric design exists for constructing a
in the PS mechanism. In this paper, we call WS. The latter problem can be easily solved
on a wake-up mode and off a sleep by the proposed block combination
mode. That is, a wireless node can send or technique. In this section, we focus on how
receive data packets in a wake-up mode and to maintain the former problem. We propose
it cannot communicate with its neighbors in a new distributed asymmetric neighbor
a sleep mode. With binary numbers zero and discovery algorithm for topology control in
one, a number one can illustrate the wake-up IoT communication networks. The primary
mode and a number zero can denote the idea of the solution is to integrate a
sleep mode. A wake-up mode represents a symmetric design with the multiples of 2
wireless device turns on its radio interface to (M2). M2 is introduced to the new algorithm
communicate with its neighbors. A sleep in order to deal with the problem of
mode denotes a networked device turns off asymmetric neighbor discovery. If a slot
its radio interface to save its battery power. number is equal to M2 starting from the
However, wireless nodes cannot remain in a beginning of the schedule then the new
sleep mode most of their lifetime for saving algorithm wakes that slot up and make it
their energy. Periodically, they need to wake find its neighbors. That is, M2 synchronizes
up and listen to the message from their the wake-up time of two nodes working with
neighboring nodes not have data packets to asymmetric duty cycles and make them meet
send in order to maintain network each other at a certain amount of time.
connectivity. Otherwise, the network is
useless. Therefore, nodes keep changing Discovery Latency is a total amount of time
their PS mode from wake-up to sleep, and used by each node until it finds its
vice versa during their lifetime in the neighbor(s) during neighbor discovery.
network. Additionally, changing the PS
Energy Consumption is a total amount of
mode requires a certain of periodic pattern energy spent by each node until it finds its
for efficient communication. neighbor(s) during neighbor discovery
IV. Distribute Asymmetric Neighbor Table .1 Comparision of different protocol in
Discovery Algorithm different slots

An ideal asynchronous and


Protocol 10% 5% 2% 1%
asymmetric neighbor discovery solution
Quorum 361 1,521 9,801 39,601
should take care of creating flexible Disco 391 1,591 9,579 39,203
discovery schedules and discovering U-Connect 169 841 5,329 22,201
wireless nodes in a distributed manner. As Searchlight 200 800 5,000 20,000
we mentioned before, the combinatorial Combinatorial+M2 91 381 2451 9507
neighbor discovery has been considered as
an optimal solution, but the problem is that
it cannot support asymmetric operation. In

2017 IJAIR. All Rights Reserved


http://ijairjournal.com/
International Journal of Advanced and Innovative Research (2278-7844) / # 1/
Volume 6 Issue 11
V.CONCLUSION discovery in Ad Hoc wireless networks. In
This paper surveys on energy Proceedings of the 2nd ACM International
efficient distributed topology control Symposium on Mobile Ad Hoc Networking &
algorithm based finding the neighbor Computing, Long Beach, CA, USA, 45 October
discovery low power wireless networks. In 2001; pp. 137145.
[9] .Tseng, Y.-C.; Hsu, C.-S.; Hsieh, T.-Y. Power-
wireless network energy is a valuable
saving protocols for IEEE 802.11-based multi-
resource which is to be used efficiently. The
hop ad hoc networks. In Proceedings of
algorithms present in this paper offer a the Twenty-First Annual Joint Conference of the
prominent improvement in energy IEEE Computer and Communications Societies,
efficiency. New York, NY, USA, 2327 June 2002; pp. 200
209.
[10]. Jiang, J.; Tseng, Y.; Hsu, C.; Lai, T. Quorum-
VI.REFERENCES
based asynchronous power-saving protocols for
IEEE 802.11 Ad Hoc networks. In Proceedings
[1]. Aziz, A. A.; Sekercioglu, Y.; Fitzpatrick, P; Ivanovich,
of the 2003 International Conference on Parallel
M. A Survey on Distributed Topology Control
Processing, Kaohsiung, Taiwan, 69 October
Technique for Extending the Lifetime of Battery
2003; Volume 10, pp. 257264.
Powered Wireless Sensor Networks. IEEE
Communications Surveys &
Tutorials, 2013, 15, 121-144. [11]. Dutta, P.; Culler, D. Practical asynchronous
neighbor discovery and rendezvous for mobile
[2]. Phivou, P; Panousopoulou, A.; Tsakalides, P. On sensing applications. In Proceedings of the 6th
Realizing Distributed Topology Control in Low- ACM Conference on Embedded Network Sensor
powerIoT Platforms. In IEEE World Forum on Systems, Raleigh, NC, USA, 47 November
Internet of Things, Milan, ITALY, 14- 2008; pp. 7184.
16 December 2015.
[3]. Dohler,M.; Anton-Haro, C. Machine-to- [12]. Kandhalu, A.; Lakshmanan, K.; Rajkumar, R. U-
Machine (M2M) communications Architecture, connect: A low-latency energy-
Performance and Applications; Woodhead efficient asynchronous neighbor discovery
Publishing: Cambridge, UK, 2015. protocol. In Proceedings of the 9th ACM/IEEE
[4]. Stojmenovic, I. Machine-to- International Conference on Information
Machine Communications With In-Network Data Processing in Sensor Networks, Stockholm,
Aggregation, Processing, and Actuation Sweden, 1215 April 2010; pp. 350361.
for Large-Scale Cyber-Physical Systems. IEEE
Internet of Things Journal, 2014, 1, 122-128.
[13]. Zheng, R.; Hou, J.C.; Sha, L. Asynchronous
[5]. Akyildiz, I.F.; Su,W.; Sankarasubramaniam, Y.; wakeup for Ad Hoc networks. In Proceedings of
Cayirci, E. A survey on sensor networks. IEEE the 4th ACM International Symposium on
Commun. Mag. 2002, 40, 102114. Mobile Ad Hoc Networking & Computing,
[6]. Akyildiz, I. F.; Wang, X.; Wang, W. Wireless Mesh Annapolis, MD, USA, 13June 2003; pp. 3545.
Networks: A Survey. Elsevier Comp.
Networks, 2005,47, 445-487. [14]. Bakht, M.; Trower, M.; Kravets, R. Searchlight:
[7]. Sun, W.; Yang, Z; Zhang, X.; Liu, Y. Energy- Wont You Be My Neighbor? In Proceedings of
Efficient Neighbor Discovery in Mobile Ad Hoc the 18th Annual International Conference on
and Wireless Sensor Networks: A Survey. IEEE Mobile Computing and Networking (MobiCom),
Communications Surveys & Tutorials, 2014, Istanbul, Turkey, 2226 August 2012; pp. 185-
16, 1448-1459. 196.
[8]. McGlynn, M.J.; Borbash, S.A. Birthday protocols
for low energy deployment and flexible neighbor

2017 IJAIR. All Rights Reserved


http://ijairjournal.com/

You might also like