TL;DR: This work proposes a cross-layer designed data dissemination mechanism, referred to as Cross-Layer Diffusion (XD), in which notions in the path discovery (routing) component are exploited by data forwarding (MAC) component to improve the delivery rate and transmission delay.
Abstract: As the R&D experience accumulates, there is a rising interest of wireless sensor network (WSN) deployment in the urban environment. For mission critical applications such as healthcare and workplace safety, in particular, it is essential that the data dissemination mechanisms satisfy two important quality of service (QoS) requirements: (1) high delivery rate and (2) low transmission delay. Proposed in this work is a cross-layer designed data dissemination mechanism, referred to as Cross-Layer Diffusion (XD), in which notions in the path discovery (routing) component are exploited by data forwarding (MAC) component to improve the delivery rate and transmission delay. Using traces collected from a prototype WSN deployed in urban environment, we compare XD to the state-of-the-art mechanisms and find that XD is not only more efficient but also more practical.
Such redundancy is desired by mission-critical applications in that the data delivery rate tends to be high and the end-to-end delay tends to be low.
The conventional TDMA mechanisms do not scale to the density of the WSNs.
In their design, nodes of the same magnetic charge send data at the same time slot.
The authors describe the of XD in detail and provide the rationale o layer designed mechanism achieves relia sensor data collection.
A. Path Discovery
Consider th magnet and the data as metallic nails.
T attracted towards the sink according to the m as the nails are attracted towards the magn in MD llision avoidance mechanism is llected from an the simulations, tacks, MD with delivery rate and use of the multif-the-art TDMA commonly-used indicate that XD Zigbee stack.
Ll to the state-ofing the TDMA nces support that ction mechanism nd yet effective.
The mag in the interest broadcast phase su disseminated towards the sink in the At the interest broadcast phase, th charge is set the highest charge an packet to its neighbors.
The node then records this mag the interest message to its neigh magnetic charges from the sink to s data in the reverse direction, from h points in the magnetic field.
B. Data Forwarding
XD incorporates a hybrid mechanism that utilizes informati Even if there is no contention in delivery rate may still suffer from commonly seen in wireless network proper magnetic charges etic influence of the data determined by the hop propagated based on the high-charge nodes.
In Figure 2, node A and B are sending nodes and the packets collide at node C. The number on the node indicates the assigned magnetic charge.
A significant amount of the collisions can be further reduced by separating the sending time of the nodes at different levels, hinting the benefit of a TDMA strategy to the design.
Packets travelling multiple disjoint paths may collide at the sink node.
The data delivery rate at the low traffic load case is effectively raised to 100% while the end-to-end delay is slightly compromised.
B. MD with ZMAC:
ZMAC is a hybrid CSMA and TDMA mechanism.
The schedule used by its TDMA component is derived by the DRAND [9] algorithm which requires topological information in the two-hop neighborhood.
In ZMAC, although every node has its slots for transmission, it allows nodes competing sending data at the slots which are not assigned.
From mid-load cases and on, the end-to-end delay is raised to the scale of seconds and the data delivery rate begins to drop afterwards.
Combined with the multiple shortest paths discovered by MD, XD performs, in terms of data delivery rate and end-toend delay, better than the Zigbee stack and just as well to the state of the art.
TL;DR: This paper introduces novel solutions for bounding sink-to-node communications in energy-harvesting sensor networks and theoretically proves its NP-Hardness and in approximability property, followed by an efficient heuristic solution.
Abstract: In energy-harvesting sensor networks, limited ambient energy from environment necessitates sensor nodes to operate at a low-duty-cycle, i.e., they communicate briefly and stay asleep most of time. Such low-duty-cycle operation leads to orders of magnitude longer communication delays in comparison with traditional always-active networks, imposing a new challenge in many time-sensitive sensor network applications (e.g., tracking and alert). In this paper, we introduce novel solutions for bounding sink-to-node communications in energy-harvesting sensor networks. We first present an optimal solution for the sink-to-one case and its distributed implementation. For the sink-to-many case, we theoretically prove its NP-Hardness and in approximability property, followed by an efficient heuristic solution. We have evaluated our design with both extensive simulation and a TinyOS/Mote based implementation. Compared with an improved version of a state-of-the-art design, our delay maintenance design effectively provides E2E delay guarantees while consuming as much as 60% less energy.
49 citations
Cites background from "XD: A Cross-Layer Designed Data Col..."
...For many of those operations, there is usually also a delay bound associated with them and require the messages sent out by the sink node to be received at destined receivers within a designated time bound [14]–[16]....
TL;DR: This work investigates a fundamental scheduling problem of both theoretical and practical importance, called multi-task schedulability problem, to determine the maximum number of tasks that can be scheduled within their deadlines and work out such a schedule.
Abstract: In many sensor network applications, multiple data forwarding tasks usually exist with different source-destination node pairs. Due to limitations of the duty-cycling operation and interference, however, not all tasks can be guaranteed to be scheduled within their required delay constraints. We investigate a fundamental scheduling problem of both theoretical and practical importance, called multi-task schedulability problem, i.e., given multiple data forwarding tasks, to determine the maximum number of tasks that can be scheduled within their deadlines and work out such a schedule. We formulate the multi-task schedulability problem, prove its NP-Hardness, and propose an approximate algorithm with analysis on the performance bound and complicity. We further extend the proposed algorithm by explicitly altering duty cycles of certain sensor nodes so as to fully support applications with stringent delay requirements to accomplish all tasks. We then design a practical scheduling protocol based on proposed algorithms. We conduct extensive trace-driven simulations to validate the effectiveness and efficiency of our approach with various settings.
7 citations
Cites background from "XD: A Cross-Layer Designed Data Col..."
...We investigate a fundamental scheduling problem of both theoretical and practical importance, called multitask schedulability problem, i.e., given multiple data forwarding tasks, to determine the maximum number of tasks that can be scheduled within their deadlines and work out such a schedule....
TL;DR: This paper proposes autility- based delay bounded scheme for data forwarding MaxOpUtility-based scheme, which offers the ability to increase reliability through relay nodes selection as well as to ensure the timeliness of messages sent within a designated time bound.
Abstract: In many sensor network applications, sink node needs to actively communicate with other sensor nodes in order to perform data forwarding operations. For those applications, there is usually adelay-bounded associated with them and require the messages sent to be received within a designated time bound. In energy harvesting sensor networks, limited energy from environment necessitates sensor nodes to operate at alow-duty-cycle. Sensor nodes work active briefly and stay asleep most of time. Such low-duty-cycle operation leads to communication delays in comparison with the always-active networks. In this paper, we address the data forwarding problems in an energy harvesting sensor network where energy efficiency and data freshness need to be balanced. To solve this problem, we propose autility-based delay bounded scheme for data forwarding MaxOpUtility-based scheme. MaxOpUtility scheme offers the ability to increase reliability through relay nodes selection as well as to ensure the timeliness. In add...
TL;DR: The Centralized Cluster-based Location Finding (CCLF) algorithm is proposed to reduce the high latency in low-duty-cycle WSNs by finding a suitable position for the sink by requiring less operation time compared with the optimal algorithm.
Abstract: Low-duty-cycle mechanisms can reduce the energy consumption in wireless sensor networks. Many related researches have been made in recent years. In the low-duty-cycle environment, the latency of sending packets from a sink to each node is much longer than traditional WSNs because nodes stay asleep most of the time. In this paper, the Centralized Cluster-based Location Finding (CCLF) algorithm is proposed to reduce the high latency in low-duty-cycle WSNs by finding a suitable position for the sink. The algorithm mainly consisted of three steps: (1) Cluster construction, (2) The fast look-up table (FLU-table) construction, and (3) Sink location decision. The simulation results show that the performance of the CCLF algorithm approaches the performance of the optimal algorithm. Moreover, the CCLF algorithm requires less operation time compared with the optimal algorithm.
TL;DR: The results of a derailed packet-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocols, which cover a range of designchoices: DSDV,TORA, DSR and AODV are presented.
Abstract: An ad hoc networkis a collwtion of wirelessmobilenodes dynamically forminga temporarynetworkwithouttheuseof anyexistingnetworkirrfrastructureor centralizedadministration.Dueto the limitedtransmissionrange of ~vlrelessnenvorkinterfaces,multiplenetwork“hops”maybe neededfor onenodeto exchangedata ivithanotheracrox thenetwork.Inrecentyears, a ttiery of nelvroutingprotocols~geted specificallyat this environment havebeen developed.but little pcrfomrartwinformationon mch protocol and no ralistic performancecomparisonbehvwrrthem ISavailable. ~Is paper presentsthe results of a derailedpacket-levelsimulationcomparing fourmulti-hopwirelessad hoc networkroutingprotocolsthatcovera range of designchoices: DSDV,TORA, DSR and AODV. \Vehave extended the /~r-2networksimulatorto accuratelymodelthe MACandphysical-layer behaviorof the IEEE 802.1I wirelessLANstandard,includinga realistic wtrelesstransmissionchannelmodel, and present the resultsof simulations of net(vorksof 50 mobilenodes.
5,147 citations
"XD: A Cross-Layer Designed Data Col..." refers background in this paper
...About half of the packets are collided which results in a significant data delivery rate for mid-load and high-load cases....
TL;DR: This book explains coding for Reliable Digital Transmission and Storage using Trellis-Based Soft-Decision Decoding Algorithms for Linear Block Codes and Convolutional Codes, and some of the techniques used in this work.
Abstract: 1. Coding for Reliable Digital Transmission and Storage. 2. Introduction to Algebra. 3. Linear Block Codes. 4. Important Linear Block Codes. 5. Cyclic Codes. 6. Binary BCH Codes. 7. Nonbinary BCH Codes, Reed-Solomon Codes, and Decoding Algorithms. 8. Majority-Logic Decodable Codes. 9. Trellises for Linear Block Codes. 10. Reliability-Based Soft-Decision Decoding Algorithms for Linear Block Codes. 11. Convolutional Codes. 12. Trellis-Based Decoding Algorithms for Convolutional Codes. 13. Sequential and Threshold Decoding of Convolutional Codes. 14. Trellis-Based Soft-Decision Algorithms for Linear Block Codes. 15. Concatenated Coding, Code Decomposition ad Multistage Decoding. 16. Turbo Coding. 17. Low Density Parity Check Codes. 18. Trellis Coded Modulation. 19. Block Coded Modulation. 20. Burst-Error-Correcting Codes. 21. Automatic-Repeat-Request Strategies.
TL;DR: This work has shown that polynomials over Galois Fields, particularly the Hadamard, Quadratic Residue, and Golay Codes, are good candidates for Error Control Coding for Digital Communication Systems.
Abstract: 1. Error Control Coding for Digital Communication Systems. 2. Galois Fields. 3. Polynomials over Galois Fields. 4. Linear Block Codes. 5. Cyclic Codes. 6. Hadamard, Quadratic Residue, and Golay Codes. 7. Reed-Muller Codes 8. BCH and Reed-Solomon Codes. 9. Decoding BCH and Reed-Solomon Codes. 10. The Analysis of the Performance of Block Codes. 11. Convolutional Codes. 12. The Viterbi Decoding Algorithm. 13. The Sequential Decoding Algorithms. 14. Trellis Coded Modulation. 15. Error Control for Channels with Feedback. 16. Applications. Appendices: A. Binary Primitive Polynomials. B. Add-on Tables and Vector Space Representations for GF(8) Through GF(1024). C. Cyclotronic Cosets Modulo 2m-1. D. Minimal Polynomials for Elements in GF (2m). E. Generator Polynomials of Binary BCH Codes of Lengths Through 511. Bibliography.
TL;DR: The Virtual Inter Network Testbed (VINT) project as discussed by the authors has enhanced its network simulator and related software to provide several practical innovations that broaden the conditions under which researchers can evaluate network protocols.
Abstract: Network researchers must test Internet protocols under varied conditions to determine whether they are robust and reliable. The paper discusses the Virtual Inter Network Testbed (VINT) project which has enhanced its network simulator and related software to provide several practical innovations that broaden the conditions under which researchers can evaluate network protocols.
TL;DR: A hybrid MAC protocol for wireless sensor networks that combines the strengths of TDMA and CSMA while offsetting their weaknesses, ZMAC, which achieves high channel utilization and low latency under low contention and reduces collision among two-hop neighbors at a low cost.
Abstract: This paper presents the design, implementation and performance evaluation of a hybrid MAC protocol, called Z-MAC, for wireless sensor networks that combines the strengths of TDMA and CSMA while offsetting their weaknesses. Like CSMA, Z-MAC achieves high channel utilization and low latency under low contention and like TDMA, achieves high channel utilization under high contention and reduces collision among two-hop neighbors at a low cost. A distinctive feature of Z-MAC is that its performance is robust to synchronization errors, slot assignment failures, and time-varying channel conditions; in the worst case, its performance always falls back to that of CSMA. Z-MAC is implemented in TinyOS.
762 citations
"XD: A Cross-Layer Designed Data Col..." refers background or methods in this paper
...One is C component of ve IEEE 802.15.4 onent is adopted ther suite consists C [ 8 ]....
[...]
...Using traces co WSN deployed in an urban building to drive we compare XD to two other protocol s ZMAC [ 8 ] and Zigbee [5] in terms of data end-to-end delay....