Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Abstract— A critical issue in wireless sensor networks is From the energy saving viewpoint, a widely employed
represented by the limited availability of energy within network technique is to place nodes in a low-power operational mode,
nodes; therefore making good use of energy is a must. A widely the so-called sleep mode, during idle periods [10]. In fact,
employed energy-saving technique is to place nodes in sleep mode,
corresponding to a low-power consumption as well as to reduced in idle state sensors do not actually receive or transmit,
operational capabilities. In this work, we develop a Markov model nevertheless they consume a significant amount of power. In
of a sensor network whose nodes may enter a sleep mode, and we sleep mode, instead, some parts of the sensor circuitry (e.g.,
use this model to investigate the system performance in terms of microprocessor, memory, radio frequency (RF) components)
energy consumption, network capacity, and data delivery delay. are turned off. As more circuitry components are switched off,
Furthermore, the proposed model enables us to investigate the
trade-offs existing between these performance metrics and the the power consumption as well as the operational capabilities
sensor dynamics in sleep/active mode. Analytical results present of the sensor decrease. Clearly, a trade-off exists between the
an excellent matching with simulation results for a large variety node energy saving and the network performance in terms of
of system scenarios showing the accuracy of our approach. throughput and data delivery delay.
In this work, we develop an analytical model which enables
I. I NTRODUCTION us to explore this trade-off and to investigate the network
performance as the sensor dynamics in sleep/active mode vary.
Sensor networks are composed of a large number of sensing We consider a sensor network with stationary nodes, all
devices, which are equipped with limited computing and radio of them conveying the gathered information to the sink node
communication capabilities [1]. They operate in various kinds through multihop communications. Each sensor is character-
of fields, performing tasks such as environmental monitoring ized by two operational states: active and sleep. In active state
and surveillance. Although sensors may be mobile, they can the node is fully working and is able to transmit/receive data,
be considered to be stationary after deployment. A typical while in sleep state it cannot take part in the network activity;
network configuration consists of sensors working unattended thus, the network topology changes as nodes enter/exit the
and transmitting their observation values to some processing or sleep state. Through standard Markovian techniques, we con-
control center, the so-called sink node, which serves as a user struct a system model representing: (i) the behavior of a single
interface. Due to the limited transmission range, sensors that sensor, (ii) the dynamics of the entire network, and (iii) the
are far away from the sink deliver their data through multihop channel contention among interfering sensors. The solution of
communications, i.e., using intermediate nodes as relays. In the system model is then obtained by means of a Fixed Point
this case a sensor may be both a data source and a data router. Approximation (FPA) procedure, and the model is validated
Most application scenarios for sensor networks in- via simulation.
volve battery-powered nodes with limited energy resources. By using our analytical model, we study the network per-
Recharging or replacing the sensors battery may be incon- formance in terms of capacity, data delivery delay and energy
venient, or even impossible in harsh working environments. consumption, as the sensor dynamics in sleep/active mode
Thus, when a node exhausts its energy, it cannot help but change. Furthermore, we are able to derive the performance
ceases sensing and routing data, possibly degrading the cover- of the single sensor nodes as their distance from the sink vary.
age and connectivity level of the entire network. This implies Although our work mainly focuses on energy consumption and
that making good use of energy resources is a must in sensor data delay, the level of abstraction of the proposed model is
networks. such that it can be applied to investigate various aspects in the
Various solutions have been proposed to reduce the sensors design of sensor networks.
energy expenditure. For instance, energy-efficient MAC layer To the best of our knowledge, this is the first analytical
schemes can be found in [2], [3]. Traffic routing and connec- model that specifically represents the sensor dynamics in
tivity issues in sensor networks are addressed in [4], [5], [6], sleep/active mode, while taking into account channel con-
while energy-aware strategies for data dissemination and data tention and routing issues.
collection appear in [7], [8], [9]. The remainder of the paper is organized as follows. Sec-
This work was supported by the Italian Ministry of University and Research tion II reviews some previous work on sensor networks.
through the VICOM and the PRIMO projects Section III introduces the network scenario under study and
R the sensor can receive and transmit; also it generates data where E (amp) is a constant value and di,νρ (i) is the distance
units according to a Poisson process with rate equal to g. In between i and νρ (i) in the disk of unit radius.
phase N the sensor does not receive nor generate data; it can
When a sensor wants to transmit a data unit, it adopts
only transmit the data units that are still in its buffer or be
the following routing strategy (although other strategies could
idle waiting for a transmission opportunity. In Figure 2 it is
be considered as well). The node polls its next-hops giving
highlighted that A coincides with R when at the scheduled
priority to the routes associated with the lowest energy cost,
end time of A the sensor buffer is empty.
until it finds a next-hop that is ready to receive. Thus, a sensor
We observe that the behavior described above allows sensors always dispatches its data units to the best next-hop among the
to simply adapt to traffic conditions and prevents network available ones.
instability due to overload. However, this is not a critical
assumption in constructing our analytical model, which could
be easily modified to represent a different sensor behavior. C. Channel Access
We also highlight that, although sensors can be in different Consider a transmission over one hop and let nodes i and
operational states, they are always functioning. Indeed we j (1 ≤ i ≤ N , and 0 ≤ j ≤ N with 0 indicating the sink) be
assume a stationary network topology and the event that a the transmitter and the receiver, respectively. The transmission
sensor either runs of out of energy or fails is not considered. is successful if [13]:
1) the distance between i and j is not greater than r,
2 Indeed, the transition cost from sleep to active state is typically very high. di,j ≤ r (3)
mod
0.002 0.03 sensor j if and only if j can receive while all next-hops with
0.02 higher priority cannot.
0.0015
0.01
0.001 0 1
sim sim y=x
Average Buffer Occupancy Probability of Phase N
1.4 0.1
y=x 0.4 y=x
1.2
mod
1 0.3
0.8
mod
mod
Then our goal is to derive the internal arrival rate at each C. Interference model
sensor ΛiI , given the average generation rates ΛiE ’s. This can The purpose of the interference model is to compute for
be done by solving the system of flow balance equations: each node the parameter β to be used into the sensor model
presented in Section IV-A. The method used to estimate the
ΛI = ΛI R + ΛE (10) parameters α, f , and w needed to solve the sensor model will
be described in Section IV-D.
where ΛI and ΛE are row vectors stacking the rates ΛiI ’s
We remind that β has been defined as the probability to
and ΛiE ’s, respectively, and R is the (unknown) matrix of
transmit a data unit in a time slot given that the buffer is not
transition probabilities between the queues of the network.
empty and at least one next-hop is in phase R at the beginning
Element R(i, j) represents the fraction of outgoing traffic of
of the slot. If there were no contention on the wireless channel,
sensor i that is sent to its next-hop j. In order to compute
β would be equal to 1. As described in Section III, a node
R, one has to account for the routing policy chosen by the
transmission attempt is successful if the conditions expressed
sensor, as well as the effect of the sleep/active dynamics of the
as in (3)–(5) are satisfied. The computation of β thus requires a
next-hops and the contention on the wireless channel. In our
careful investigation of the interference produced by other sen-
case the routing policy is a strict priority for the best available
sors trying to transmit in proximity of the node for which we
next-hop, as described in Section III. The simplest approach is
want to estimate β. In order to explain our approach, consider
to consider only the stationary probabilities of the next-hops
the set of nodes shown in Figure 7. The transmission range
state, and to assume that the next-hops state are independent.
of three nodes, {A,F,H}, is represented by a circle. Assume
Following this approach the transition probability R(i, j) can
that we want to estimate the parameter β of node A, which
be computed as,
has two next-hops, B and C. We need to find all transmissions
that could potentially interfere with the transmission of A to its
R(i, j) = K (πSm + πNm j
) πR (11) next-hops. Let (X,Y) denote the transmission from the generic
m∈Ni,j node X to the generic node Y. We notice that transmissions
F 0.8
B
E 0.7
C
0.6
D A I
0.5
β
H 0.4
0.3
0.2
0.1 sim
Fig. 7. Example of channel contention and hindered transmissions mod
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
distance from sink
like (D,E) and (H,C) violate condition (4) since the receivers
are within the radio range of A; a special case is given by the Fig. 8. Estimation of β using conditioned transmission rates obtained from
simulation, for the various network nodes
transmissions whose receiver is A itself (e.g., (E,A)). Instead,
transmissions like (F,G) and (H,I) meet condition (4) and
violate condition (5) since the transmitters interfere with A’s Then, β i is estimated as follows:
next-hops. In addition, we observe that transmissions as (D,E),
(E,A), (H,C) and (F,G) totally inhibit A’s transmission, thus
N
βi = 1 − I i (n) . (16)
we call them total interferers. Instead, transmissions like (H,I)
n=1
do not necessarily prevent A from sending data (e.g., (A,B)
could take place), thus we call them partial interferers. We To validate our estimate of β i , we take from simulation
highlight that transmissions violating (4) or where A is the all transmission rates λn,m ’s. Since β i is a transmission
receiver are always total interferers. probability conditioned on the fact that the sensor buffer is not
To estimate β for the generic sensor i we proceed as follows. empty and at least one next-hop is available, the correct values
First we compute for each node n (1 ≤ n ≤ N ) the probability of λn,m to be used should also be conditioned on this fact.
I i (n) that a transmission in which n is involved as either For a network load equal to 0.6, we obtained from simulation
transmitter or receiver, totally inhibits i’s transmission (total the conditioned transmission rates, and using (13) and (16) we
interferer). Our approach is based on the knowledge of the computed the parameter β i for each sensor. Results are shown
average transmission rates λn,m between n and its generic in Figure 8 as a function of the distance from the sink, and
receiver m. We write, present an accurate matching with simulation results proving
that our approach to estimating β i as in (16) is correct.
N
Unfortunately, the conditioned transmission rates seem to
I i (n) = λm,n 1{d(n,i) ≤r}
be hard to be evaluated analytically. Thus we resorted to the
m=1
unconditioned rates λn,m ’s provided by the network model,
N
+ λn,m 1{d(m,i) >r} V i (n) C i (n) (13) and slightly refined the interference model in order to account
m=0
for the neglected correlation between the λn,m ’s and the state
of the sensor for which β i is computed. Our approach is briefly
where m = 0 denotes the sink and 1{·} is the indicator described in the rest of this section.
function. The first summation on the right hand side accounts For each sensor i whose distance from the sink is smaller
for the transmissions violating (4) or destined to i; while the than r, we define the set of nodes Ai whose transmission
second summation accounts for the transmissions that meet (4) range covers all of the next-hops of i. We compute the average
but violate (5). The term V i (n) is equal to 1 if there exists probability tAi that a node in this set is ready to transmit a
at least one next-hop of i within the transmission range of n, packet as,
with n being different from i:
1 k
tAi = (πN + πRk
− πRk
) (17)
V (n) = 1 ∃k ∈ H : d(n,k) ≤ r , n = i
i 0
i
(14) NA i
k∈Ai
0 otherwise
where NAi is the cardinality of set Ai . Then, we consider that
where H i is the set of next-hops of i. The term C i (n) is node i will be able to transmit only if it gets control of the
equal to 1 if n’s transmission is a total interferer; otherwise it channel before every other node in Ai , assuming that nodes
accounts for a partial interferer considering that this becomes are equally likely to seize the channel at the beginning of a
a total interferer if the next-hops of i outside the transmission time slot, and their probability to be ready to transmit are
range of n are also unable to receive because they are in phases independent. We therefore obtain a refined estimate of β i as,
S or N . Hence,
k 1 NA
NAi
C i (n)= k (πS + πN ) ∀k ∈ H : d(n,k) > r if any
k i
β =
i i
tkAi (1 − tAi )NAi −k 1 − I i (n)
1 else. k+1 k
k=0 n∈A
/ i
(15) (18)
0.4 inside the inner loop is not worthwhile, since the target value
0.3 of sensor throughput is updated by the exterior loop, thus we
0.2 decided to limit the number of iterations in the inner loop to
0.1 sim 3.
mod
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Furthermore, to solve the sensor model, we need to estimate
distance from sink parameters wi and f i of the DTMC describing the behavior of
the next-hops (see Section IV-A and Figure 4). We compute
Fig. 9. Estimation of β using unconditioned transmission rates computed by
the model, for the various network nodes the stationary probability of state W for sensor i as follows:
πwi
= (πSk + πNk
) (19)
k∈H i
0.08
sim
0.07
using the most recent estimate of the stationary probabilities of
the sensor next-hops. The transition probability f i is estimated
0.06
as
0.05 πk
fi = 1 − 1−p k R k . (20)
0.04 πS + π N
α
i k∈H
0.03
k
πR
0.02 where p k +π k
πS
approximates the transition probability of
N
0.01 sensor k from the aggregate state including phases S and
0
N , to phase R. It is then straightforward to derive the other
i
πw
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 unknown transition probability: wi = f i 1−π i . Once we have
distance from sink w
solved numerically the DTMC of each sensor [21], we can
Fig. 10. Probability that a data unit is received from neighboring nodes in a compute all metrics of interest described at the end of Section
time slot (parameter α of the sensor model), for the various network nodes IV-A, and in particular a new estimate of the generation rates
ΛiE ’s (using (6)) to be plugged again into the network model.
The overall procedure is repeated until convergence on the
parameter estimates is reached. We use as stopping criterion
D. Fixed Point Approximation
the worst relative error among all sensors for two successive
The three building blocks of the model described in Sections estimates of the sensor throughput.
IV-A, IV-B and IV-C can be combined together to obtain We highlight that the complexity of the numerical method
a global system solution which does not require to get any used to solve the sensor model reduces to the solution of
parameter values from simulation. This is done by using an
4 At the very first iteration of the FPA procedure, we solve the DTMC for
FPA, based on the close loop depicted in Figure 11.
each sensor assuming that only the considered node generates data; thus, we
The procedure starts with the solution of the DTMC rep- obtain: ΛiE = g p+qq
. Note that the parameters g, p and q could be specialized
resenting the individual sensor behavior for each sensor i for each node.
´½
´½
µ
´
to transmit and receive data units, and (ii) the energy spent Transition probabilities among the states of Figure 12 are
during transitions from sleep to active state. They are given reported in the diagram, except for self-transitions that can
by, be derived from the others. In the Figure, γ is the parameter
N of the geometric decay that characterizes the queue length
T i (Ei,j R(i, j)) + πSi 0 q E t . (23) distribution of a sensor, and can be computed from the
i=1 j∈H i
analysis of the DTMC representing the detailed behavior of
It is also possible to compute the entire distribution of the a sensor. Finally, notice that the arrival of a data unit at a
transfer delay of data units from a given source to the sink, sensor can occur in any of the states QF , QW , ZF or ZW ,
using a technique that we briefly describe in the rest of this with probabilities derived from the stationary probabilities
section. computed by the detailed sensor model.
We build an additional Markov Chain representing the To obtain the distribution of the transfer delay of a data unit
current location of one individual data unit, generated at a from a given source to the sink, we study the transient behavior
given source, while traversing the network towards the sink. of the complete Markov chain described in this section starting
When the data unit is stored into a sensor node, we distinguish from the initial condition in which the data unit is stored at
five different states shown in the diagram of Figure 12, which the source. The Markov chain has an absorbing state that is
represents only a portion of a much larger Markov chain the state in which the data unit arrives at the sink, so as time
comprising 5N states, plus one state representing the arrival of goes to infinity the probability of this state grows from zero
the data unit at the sink. States labeled as QW and QF are used to one. Such probability is also the cumulative distribution
when the data unit is enqueued into the buffer after other data of the transfer delay of the data unit. From the cumulative
units waiting for transmission. The subscripts W and F have distribution we easily obtain the probability density function
the same meaning described in the sensor model, representing (pdf) of the data delivery delay.
two states in which the next-hops of the current sensor can be.
When the data unit comes at the head of the queue, it is ready
V. R ESULTS
to be transmitted to another sensor, and it transits to state ZF 5 .
5 If
In this section we present a collection of results obtained
the data unit was previously enqueued, it comes at the head of the
queue only when a service has been completed, which implies that at least exploring the parameter space of the network scenario de-
one next-hop is ready to receive. scribed in Section III. Analytical predictions derived from the
0.002 0.05
0.001
simulation results averaged over several different topologies.
0 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 In all of these experiments p=0.1; S and A represent the
distance from sink
percentage of nodes in sleep and active state, respectively.
Fig. 13. Unfairness among the network nodes These results provide a useful indication on the quality of
service degradation that we incur when we try to maximize the
network capacity. We observe that the network performance
global system solution presented in Section IV-D are compared is strongly affected by the average number of active nodes in
against detailed simulations of the same system. the network, which depends on both the number of deployed
We set the system parameters as follows: r = 0.25, sensors (N ) and the sleep/active dynamics. The model cap-
E (amp) = 0.057 mJ/slot, E (ele) = E (proc) = 0.24 mJ/slot, tures quite well the behavior observed by simulation, the major
E (sleep) = 300 nJ/slot, and E t = 0.48 mJ. Moreover, unless discrepancies appearing when the average number of active
differently specified, we assume that all sensors generate data nodes is very small and, hence, some of the nodes around the
and we set the number of nodes to N = 400, the maximum sink are heavily congested.
number of routes available to each sensor to M = 6, and
the sleep/active transition probabilities to p = q = 0.1. Note 18
that, assuming that a node never enters phase N , having 16
p = q corresponds to the case where a sensor spends an 14
data delivery delay (slots)
0.18
pdf
20
0.16
0.01
0.14
15
0.12
0.001 10 0.1
0 10 20 30 40 50 60 0.025 0.05 0.1 0.2 0.4
data delivery delay (slots) p
Fig. 15. Probability density function (pdf) of the data delivery delay for the Fig. 17. Trade-off between average data unit delivery delay and average
farthest source from the sink, under different load conditions. Analytical and network energy consumption, as a function of the sleep/active transition rates
simulation results are compared (p and q with q = p). Analytical and simulation results are compared for
different values of the maximum number of available routes (M )
R EFERENCES
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey
on Sensor Networks,” IEEE Comm. Mag., Aug. 2002, pp. 102–114.
[2] S. Singh and C. S. Raghavendra, “PAMAS: Power Aware Multi-Access
Protocol with Signaling for Ad Hoc Networks,” ACM Computer Com-
munication Review, July 1998, pp. 5–26.
[3] W. Ye, J. Heidemann, and D. Estrin, “An Energy Efficient MAC Protocol
for Wireless Sensor Networks,” IEEE Infocom, New York, NY, June
2002.
[4] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Direct Diffusion: A
Scalable and Robust Communication Paradigm for Sensor Networks,”
IEEE/ACM MobiCom 2000, Boston, MA, Aug. 2000.
[5] R. Jain, A. Puri, and R. Sengupta, “Geographical Routing for Wireless
Ad Hoc Networks Using Partial Information,” IEEE Personal Comm.,
Feb. 2001.
[6] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: An
Energy-Efficient Coordination Algorithm for Topology Maintenance in
Ad Hoc Wireless Networks,” IEEE/ACM MobiCom, Rome, Italy, July
2001.
[7] J. Kulik, W. Rabiner Heinzelman, and H. Balakrishnan, “Negotiation-
based Protocols for Disseminating Information in Wireless Sensor
Networks, ACM/IEEE MobiCom ’99, Seattle, WA, Aug. 1999.
[8] F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, “A Two-tier Data Dissem-
ination Model for Large-scale Wireless Sensor Networks,” ACM/IEEE
MobiCom 2002, Atlanta, GA, Sep. 2002.
[9] C. Florens and R. McEliece, “Packet Distribution Algorithms for Sensor
Networks,” IEEE Infocom, San Francisco, CA, Mar. 2003.
[10] A. Sinha and A. P. Chandrakasan, “Dynamic Power Management in
Wireless Sensor Networks,” IEEE Design and Test of Computers Mag-
azine, Vol. 18, No. 2, Mar.-Apr. 2001, pp. 62–74.