Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract WSNs have been proposed also for surveillance and moni-
toring applications where the actual position of the sensors
In this paper we propose SPARE MAC, a TDMA based can be planned a priori, in contrast to the paradigm of sen-
medium access control (MAC) scheme for data diffusion in sors regarded as "smart dust" only. WSNs for the support
Wireless Sensor Networks (WSNs). The rationale behind of multimedia traffic [2] and for the monitoring of under-
SPARE MAC is to spare energy through limiting the im- ground soil [3] are good representatives of this latter class
pact of idle listening and traffic overhearing. To this extent, of applications. Furthermore, many WSNs feature a con-
SPARE MAC implements a distributed scheduling solution vergecast communication paradigm [4] according to which
which assigns to each sensor specific radio resources (i.e., the information must be delivered to a specific device (clus-
time slots) for reception, summarized as Reception Sched- ter head, data center, base station, gateway, etc. . . ).
ules (RS), and spreads the information of the assigned RS Regardless of the application, in many cases, battery re-
to neighboring sensors. A transmitting sensor can conse- placement is impractical or impossible in WSNs. Therefore,
quently become active in correspondence of the RS of its both the design of WSN hardware as well as communica-
intended receiver only. tion protocols must be done to maximize energy efficiency.
We analyze the performance of SPARE MAC in terms of At MAC layer, energy efficiency can be achieved through
throughput, power consumption, and data delivery delay minimization of idle listening, retransmissions, unwanted
both through analytical models and through detailed sim- overhearing, and over-emitting.
ulations. Moreover, we compare the performance of SPARE In this paper, we propose an energy efficient data centric
MAC against SMAC. MAC scheme for data collection in WSNs characterized by
low sensor mobility and low-to-moderate traffic. Our solu-
1 Introduction tion is well-suited for those target scenarios where the col-
Wireless Sensor Networks (WSNs) are composed of lection of sporadic data through multi-hop paths is required
small sized battery operated network devices geared with and very high energy efficiency is of paramount importance
processing capabilities, wireless communication interfaces, to extend network lifetime. Examples of such applications
and sensing functionalities. With diminishing cost of com- include environmental monitoring and underground sensing
munication devices, WSNs have emerged as an ideal solu- of the soil condition (humidity, density, movements, etc. . . ).
tions to a large number of applications in both civilian and Our proposed MAC protocol with Slot Periodic Assign-
military scenarios where large network infrastructure is re- ment for Reception (SPARE MAC) limits the energy waste
quired [1]. Just to mention some of the fields where WSNs due to packet overhearing, packet over-emitting, and idle
can be (or are already) deployed, WSNs can be used for de- listening. SPARE MAC is a Time Division Multiple Access
tection and tracking, environmental monitoring, industrial (TDMA) based scheme, which implements a distributed
process monitoring, and tactical systems. Obviously, tar- scheduling solution that assigns time slots to each sensor for
get applications determine WSN capabilities and properties. data reception and shares such assignments with neighbor-
Similarly, applications also determine the choice and design ing nodes. A transmitting sensor becomes active during the
of communication protocols. receiving period of its intended receiver only, limiting afore-
For example, if a WSN is used in inaccessible or hostile mentioned problems of overhearing, over-emitting, and idle
areas, the network deployment is done in a random man- listening.
ner (e.g., dropping sensors from air crafts), which implies The paper has the following organization: Section 2 de-
that the network should be able to self configure to pro- scribes SPARE MAC operation mode, highlighting the pro-
vide a minimal backbone infrastructure. On the other hand, cedures for acquiring and distributing the Reception Sched-
i.e., indicating the slots selected for reception by the BSP SSU DSU
transmitter. Consequently, each sensor receiving BSPs from Frame 1 Frame 2 Frame 3 Frame 4
its neighbors can store its neighbors’ RS, and choose an
AVAILABLE RS for itself defined according to the follow- Figure 3. BSP acquisition procedure triggered by
ing: the activation of a new sensor (sensor 3).
E[W] [s]
responding RS. If the node is a transmitter, i.e., it has data 0.8
15
Capacity
[kb/s]
10
a) b)
5
Figure 7. Test topologies: fully connected cluster
0
topology (a), tree topology (b)
20
10
40 15
60 20
M 80
30
25
N
Table 1. Standard setting of the simulation parame-
100
120 40
35
ters.
Figure 6. Reception capacity versus N and M in the Parameter Value
case of single slot RS. Data packets L = 512 bytes. Simulation Run Length 1000 s
Bandwidth 250 kb/s
the network. Referring again to Figure 5, the cardinality Data Slot 560 byte
of the biggest one-hop cluster (the one on the left side) is Signalling Slot 50 byte
equal to 5, thus Mmin = 5. If M was equal to 4 two sensors
Wake-up Slot 9 byte
would be forced to choose the same RS, thus they could not
Packet Length 512 byte
communicate.
TX Power 24 mW
On the other hand, Mmax depends on the bandwidth re-
RX Power 13.5 mW
quirement of the application. Having in mind the dimen-
Idle Power 13.5 mW
sioning guidelines of N and M, the data rate, R, of the chan-
Sleep Power 5 µW
nel obtained by assigning a single RS can be calculated as:
First, we validate the proposed energy and delay models
BRS
R= (13) by comparing them with simulation results in Section 4.1.
NTBSP (N) + MTDP + Tw In Section 4.2, we compare the performances of SPARE
where BRS is the RS dimension (in bits) and TBSP (N), TDP MAC and SMAC [14] in the cluster topology, whereas Sec-
and Tw , are the BSP duration, the RS duration (in seconds), tion 4.3 studies the performance of SPARE MAC in a multi-
and the wake up slot duration, respectively. Figure 6 shows hop network scenario where data traffic converges to a sink
the behavior of the reception capacity as a functions of the node.
number of slots in the DSU, M, and the number of slot in 4.1 Model Validation
the SSU, N.
Figure 8 shows the comparison between the average de-
4 Numerical Results lay measured in the simulations and predicted by the model
To test the performance of SPARE MAC, we conducted a in Section 3.1 in the cluster topology with 10 sensors. As
simulation analysis in two different WSN topologies shown clear from the figure, the delay predicted by the model has
in Figure 7. In the first topology (Fig. 7.a), each sensor is the same tendency as the simulated one. The model slightly
within the transmission range of all the other S − 1 sensors underestimates the actual delay mainly due to the simplified
in the network, thus representing a fully connected network assumptions on the collision probability.
scenario. The second topology (Fig. 7.b) represents the Regarding the power consumption model, Figure 9 com-
case of convergecast traffic going from leaf sensors to a data pares the simulated values of the consumed power against
sink. the one predicted by the model in Section 3.2 in the same
The performance of SPARE MAC in each of these one-hop cluster topology as above. Here, the predicted and
topologies are assessed using three performance metrics: measured results match closely for the tested traffic loads.
the end-to-end throughput, the end-to-end delivery delay, The good match between simulation and analytical
and the consumed power. All the results presented in this model has been observed also for different number of sen-
section have been obtained using ns2.29 [12], running 50 sors within the cluster. The corresponding results are not
simulations for each network configuration and averaging reported here for the sake of brevity.
the results. The measured confidence index for all collected
statistics is below 5% in 98% of all cases. Table 1 sum- 4.2 SPARE MAC vs SMAC
marizes the standard setting of the simulation parameters. We also compared the performance of our proposed
SPARE MAC protocol with SMAC, which is one of the
2 7
DC=50%
1.8 M=40 Fully Connected Cluster
1.2 M=30
4 DC=20%
1
M=20 3
0.8
0 0
0 0.5 1 1.5 2 2.5 0 0.2 0.4 0.6 0.8 1
Offered Traffic [kb/s] Throughput [kb/s]
Figure 8. Average delivery delay versus the offered Figure 10. Average consumed power versus the
traffic in the cluster topology with 10 sensors (RS=1). achieved throughput in the cluster topology (RS=1,
Delay model validation. N=10). Comparison between SMAC and SPARE
MAC.
2
1.8
1.8 Fully Connected Cluster
Average Consumed Power [mW]
DC=10%
Model 10 sensors 1.6
1.6
Simulation N=10
1.4
Average Delivery Delay [s]
1.4 SMAC Fully Connected Cluster
N=10
1.2 1.2
M=20
1 DC=20%
1
0.8 DC=30%
M=30 0.8
0.6 SPARE MAC DC=50%
0.6
0.4 M=40 M=50
0.2 0.4 M=40
M=30
0 0.2 M=20
0 0.5 1 1.5 2
Offered Traffic [kb/s] 0
0 0.2 0.4 0.6 0.8 1
Figure 9. Average power consumed versus the of- Throughput [kb/s]
fered traffic in the cluster topology with 10 sensors Figure 11. Average delivery delay versus the
(RS=1). Power consumption model validation. achieved throughput in the cluster topology (RS=1,
N=10). Comparison between SMAC and SPARE
most widely adopted MAC protocols. SMAC implements MAC.
an access scheme based on an evolution of the IEEE
802.11b Distributed Coordination Function to account for ciency, i.e., with the lowest duty cycle in SMAC, and with
energy efficiency. Under SMAC, the radios of the sensors longest frame (that is, highest M) in SPARE-MAC. From
are switched on and off periodically according to specific Figure 10, it is clear that SPARE MAC is able to support
activity schedules. Sensors exchange their own schedule a given throughput level consuming much less power than
with other sensors through a synchronization procedure. SMAC. The power consumption increases linearly with re-
The main parameters of SMAC are the sync interval, i.e., spect to the achieved throughput in both cases. However,
the interval between two consecutive packets carrying the the SMAC curve is much steeper than the one of SPARE
activity schedules, and the duty cycle, that is, the percent- MAC.
age of the time each sensors is active with respect to the As for the delivery delay, SPARE MAC always provides
overall cycle (sleep + active). In the simulations of SMAC, faster delivery with respect to SMAC with a gain ranging
we adopted the same bandwidth and packet lengths reported from 100 ms at high throughput to 1 s to lower throughput
in Table 1. values.
Figures 10 and 11 compare the behavior of SPARE MAC
and SMAC in the cluster topology by reporting the aver- 4.3 Convergecast Applications
age consumed power and the average delivery delay versus The network topologies tested so far are uniform with
the achieved throughput. Under single-hop cluster topol- respect to the traffic, where all sensors have the same band-
ogy, every sensor generates Poisson traffic with equal prob- width requirements. However, WSNs devoted to moni-
ability to all its neighbors. For each throughput value, we toring and data gathering applications are often deployed
consider those configurations with the highest energy effi- and/or organized into hierarchical structures like the one in
the tree topology of Figure 7. Here, each leaf generates the
same traffic amount (Poisson distributed) towards the Sink. Table 2. RS dimensions in a three-level tree topology
Therefore, the total amount of traffic at each level of the with a end-to-end delay target Dtg = 810 [ms] when
tree is different. The traffic bottleneck is represented by the varying the throughput. N=15, M=20.
sensors (two in this case) 1 hop away from the sink. To this Traffic offered by Leaves [kb/s]
end, the bandwidth assigned to each sensor must depend on 0.125 0.25 0.325 0.5 0.625 0.7
the location of the sensor itself with respect to the traffic m1 2 4 5 7 8 9
and the network topology. As seen in the previous sections, RS m2 1 2 3 4 4 5
SPARE MAC allows to differentiate the bandwidth assigned m3 1 1 2 2 2 3
in reception to different sensors by increasing/decreasing
the number of slots in the correspondent RS. Dtg = 810 [ms], and consequently the per-hop delay Ti ≤
Intuitively, the dimension of the RS depends on the 270 [ms]. Level 1 represents the sink.
throughput requirements, the end-to-end delay require- Figure 12 reports the end-to-end delay versus the
ments of the application, and on the overall energy effi- achieved throughput when varying the dimension of the RS
ciency of the network. The problem of finding the optimal according to the dimensioning criteria provided by Table
dimensioning can be formulated as the problem of assign- 2. As clear form the figure, the end-to-end delay is kept
ing the minimum number of slots for reception throughout below the upper bound (810 [ms]) regardless the through-
the network while ensuring a bounded average end-to-end put by adjusting the dimensions of the RS. Obviously, when
delay and the requested throughput. In a homogeneous tree the throughput increases, the total dimension of the RS, i.e.,
topology, the problem can be formally stated as follows: mtot = ∑3k=1 mi , increases forcing the sensors to operate with
higher duty cycles; the effect is a higher power consumption
n
min ∑ mi ai (14) throughout the network as represented in Figure 13.
i=1
s.t. 1
m1=8
n ¡ Gi ¢ 0.9 m1=5 m1=7 m1=9
m1=4 m2=4
∑ Ti mi ≤ Tbound , (15) 0.8
m1=2
m2=1
m2=2 m2=3
m3=2
m2=4
m3=2 m3=2
m2=5
m3=3
i=1 m3=1
End-To-End Delay [s]
0.7 m3=1
where n is the number of levels in the tree structure, ai is 0.6
the number of sensors in each ¡ Gilevel,
¢ mi the number of slots 0.5
in the RS at level i, and Ti m i
the delay experienced by 0.4
traffic traversing level i. Such delay depends on the overall 0.3
Tree Topology
SPARE MAC (N=15, M=20)
traffic entering level i, Gi , and the number of slots assigned 0.2 SMAC (DC=50% )
to level i. Since the delay-traffic dependency is non-linear 0.1
(see Eq. (3) ), so is the constraint (15). It can be shown 0
that the problem can be reduced to an MILP (Mixed Integer 50 100 150 200 250 300 350 400 450 500 550 600 650 700 750 800
Offered Traffic at leaves [b/s]
Linear Programming) formulation [11]. In the following we
provide a simple heuristic to determine mi . Such heuristic Figure 12. Average end-to-end delivery delay ver-
exploits the delay model and the configuration guidelines sus the achieved throughput at the sink in the tree
provided in Section 3.1. topology.
Constraint (15) on the end-to-end delay can be split into
several constraints of single-hop delays; namely, if we as- 9
sume to evenly split the delay among different hops, i.e., 8
Average Consumed Power [mW]
Ti = Tbound
n , we can easily dimension the single-hop delay, 7
using the methodology provided in Section 3.1. Given the Tree Topology
6 SPARE MAC (N=15, M=20)
actual traffic Gleaves generated by the leaves and the one- SMAC (DC=50% )
hop delay bound, Tbound
5
n and consequently the corresponding
4
maximum traffic Gmax , the number of slots in the RS, mi is m1=7 m1=8 m1=9
given by Eq. (5), i.e., mi = d GGmax i
e, where Gi = Gleaves 2i . 3
m1=2
m1=4
m1=5
m2=3
m2=4 m2=4 m2=5
m3=3
m2=2 m3=2 m3=2
In other words, each triplet hGleaves , Tbound , ni induces 2
m2=1 m3=1
m3=2
m3=1
a scheduling assignment m = [m1 , m2 , . . . mn ] for the tree 1
works, ACM/IEEE Transaction on Networking, vol. 12, no. 3, Finally, Eq. (22) and Eq. (18) can be substituted into Eq.
page(s): 493–506, June 2004. (19) to find σX2 .