Professional Documents
Culture Documents
Abstract— This work addresses the problem of mini- try to report it, increasing collisions by transmiting
mizing power consumption in each sensor node locally redundant data. Collisions require re–transmissions and
while ensuring two global (i.e., network wide) properties: increase the energy consumption. Although data aggre-
(i) communication connectivity, and (ii) sensing coverage. gation techniques [2] can help to reduce the traffic that
A sensor node saves energy by suspending its sensing
propagates to the control centers, they do not provide a
and communication activities according to a Markovian
stochastic process. It is shown that a power level to induce a
complete solution to the problem. Coordination among
coverage radius is sufficient for connectivity provided sensor nodes requires synchronization based on either
that
is a function approaching to infinity. The paper a global time reference (e.g., GPS) or clock synchro-
presents a Markov model and its solution for steady nization algorithms. While equipping each sensor node
state distributions to determine the operation of a single with a GPS is a possibility for the future, current solu-
node. Given the steady state probabilities, we construct a tions cannot assume a global time reference. The clock
non-linear optimization problem to minimize the power synchronization protocols are based on message (e.g.,
consumption. Simulation studies to examine the collective control packets) exchange [3], [4] and they are costly
behavior of large number of sensor nodes produce results
for sensor networks. Thus, coordination of sensor nodes
that are predicted by the analytical model.
Keywords: Simulations, Stochastic processes/Queueing must be done with local and independent (asynchronous)
theory, Mathematical programming/Optimization decisions which motivates the deployment of randomized
protocols.
In this work we propose a probabilistic scheme in
I. I NTRODUCTION which each sensor node makes an independent decision
This work considers a sensor network which is com- to be in the transmit, receive/sense or turn off state.
prised of a large number of sensor nodes communicating We are interested in determining the optimal param-
with RF links. We assume that sensor nodes are deployed eters governing the probabilistic transitions of a sensor
in an ad-hoc fashion so as to cover a specified area node so as to minimize power consumption locally while
with their sensing capabilities. Sensors monitor, sense ensuring connectivity and coverage globally.
and collect data from a target domain, process it and Some recent works suggest energy conservation by
transmit the information back to the specific sites (e.g., powering off a subset off the nodes in an ad–hoc wireless
headquarters, disaster control centers). There are many network [5], [6], [7], [8]. The common theme is to enable
potential applications of sensor networks including mil- nodes to power off or go to low energy sleeping mode
itary, environmental and health related areas. Although during idle time, while ensuring connectivity.
the sensor nodes communicate using wireless links, there
are fundamental differences between a sensor network
and other wireless ad-hoc networks. One important prop- A. Our Contributions
erty of a sensor network is redundancy. Sensor nodes are This work is the first to provide rigorous analysis for
usually densely deployed (approximately 20 sensor/ ) an energy saving protocol which ensures both connectiv-
[1], hence the underlying network has high redundancy ity and coverage in sensor networks. We express the sen-
for sensing and communications. sor network design problem as an optimization problem
Increasing the lifetime of a sensor network is of with the objective of minimizing the power used by the
primary importance. The high density can cause signif- nodes. The sensor network design method we present is a
icant inefficiency problems leading to excessive power general tool which can be used to optimize parameters of
wastage. Sensor nodes may sense the same event and any existing energy saving network protocol dependent
2
on local node decisions. We present a variety of such sleep cycles so as to reduce the energy consumption. The
protocols and analyze one. For the protocol we present, sleep and listen periods are implemented using timers.
the power savings over existing ad-hoc protocols is Neighboring nodes listen and go to sleep at the same
at low sensing event densities and at higher time thus the scheme requires synchronization among
densities. the neighbors. The authors show that the proposed MAC
protocol consumes 2-6 times less energy than IEEE
Related Work 802.11.
In one of the pioneering works on energy saving in In [7] the authors present a distributed randomized
wireless networks, the authors in [9] report that leaving algorithm SPAN where each node makes a decision on
the network interface (NI) idle consumes as much energy its own, based on the amount of energy its number of
as reception. They argue that power aware MAC and neighbors. Each node either sleeps (802.11 Power Saving
transport level protocols should be used. Furthermore mode) or becomes a coordinator (part of the networking
[9] reports that it is not the number of packets but the backbone). Coordinators forward the messages they re-
duration of the sending period that correlates with the ceive from the other nodes. A node which has a message
energy usage. The authors also note that (i) most of the to send automatically becomes a coordinator. SPAN is
energy is spent while idling, and (ii) in order to decrease built on the top of 802.11 and it uses both MAC and
the energy consumption the NI should be turned off. routing layer protocols to make decisions.
In [10] the authors present two routing protocols
While GAF [6] and SPAN [7] are distributed ap-
BECA and AFECA which have a Markov Model with
proaches with coordination among neighbors, in AS-
sleeping, listening and active states. In BECA the sojourn
CENT a node decides locally whether to be on or off
times of the nodes are deterministic. In AFECA they are
[8].
adaptive, the sleeping time being a random variable that
depends on the number of neighbors the node has. The The pioneering work in [13] provided the first asymp-
authors show (using simulations) a 50% energy saving totic results relating the power level to the connectivity.
over naive ad-hoc routing algorithms. In the simulation The authors showed, using percolation theory, that in
study (III) we compare our protocol to AFECA. order to have connectivity in a network with randomly
The GAF routing protocol in [6] aims to extend placed nodes, the ratio of the number of neighbors to the
the lifetime of the network by minimizing the energy total number of nodes should be "!$#%'&(*)+# where &
consumption and preserving connectivity at the same should go to infinity asymptotically.
time. They present a 3-state transition diagram which In [14] the authors propose an algorithm to adjust
is a simplified version of ours, and is confined to the power level in order to ensure a minimum de-
GAF (Geographic Adaptive Fidelity). Using GAF they gree constraint on each node. In [15] a similar degree
discover the locations of redundant nodes. GAF simply constraint is enforced to ensure a bound on the end-
imposes a virtual grid on the network. If in any of to-end throughput. In [16] COMPOW protocol and its
the grid squares there are more than one node, the architecture are discussed.
redundant nodes are turned off. They also use a protocol
In [17] the authors consider the coverage problem and
called CEC (Cluster-based Energy Conservation) which
use Voronoi diagrams generated with delaunay triangu-
further eliminates redundant nodes by clustering them.
The authors show 40-60% energy saving over other ad- lation to calculate the coverage of the network.
hoc routing algorithms. Recently, in [18], the joint problem of coverage and
While the above approaches address the power con- connectivity is considered using a grid of sensors each
trol problem at the network layer, the third class of of which can probabilistically fail. The authors find the
approaches aims to enhance the MAC layer [5], [11], [8]. necessary and sufficient conditions for connectivity and
For example, in [11] the authors propose a modification coverage in this type of a sensor network. The main
of the 4-way handshake procedure in the IEEE802.11 result in [18] is that within the transmission radius the
protocol for power saving. number of active nodes should be a logarithm of the total
In [5] the authors present a MAC protocol PAMAS number of nodes, for the network to have connectivity
which saves energy by powering off radios that overhear and coverage. They also show that the diameter of the
transmission. PAMAS is a hybrid MAC protocol and network is of order , #-)/.0213# . They cover the network
provides for 10–50% savings. area with disks and use the argument that each disk
In [12] the authors propose a MAC protocol for sensor should contain at least one active node for coverage and
networks in which nodes go into periodic listen and connectivity.
3
Organization of the Paper sensing and receiving event occur. In this case, we can
In the next section we present the model of the sensor require that the node always attempts to transmit the
network and analyze its steady state behavior including sensed event rather than the received event. At time d ,
its global connectivity and coverage properties. We for- there is some probability that the node is in each of its
mulate power conservation as an optimization problem. three states. Denote b O ^b S ^b T as the respective proba-
In Section III we compare the theoretical analysis with a bilities of finding the node in the off, sensing/receiving
simulation of a sensor network as well as with AFECA. and transmit states, and collect these three probabilities
We end with some concluding remarks in Section IV. into the vector efgdh(DXji b O gdh( ^b S gdh( ^b T gdh(lk . Let mon be
the probability that there is an event. Then the state
probabilities for the node at time dpqZ are given by
II. A NALYSIS
There are three components to this section. First we 8 k~}
ergdsZ2(tXergd*(ui mont7vwxZzy{m-nt( 7| (1)
discuss the Markov chain that governs the behavior of an Since an event can be either sensing or receiving, the
individual node. Then we discuss how the properties of probability of an event will depend on the probability
this Markov chain affect the connectivity and coverage of that a single neighbor is transmitting. We now suppose
the sensor network system. Finally we discuss optimizing that the system has equilibrated to a steady state, in
with respect to the parameters of the Markov chain so as which efgdZ2(X efgdh(X e . We also make the
to maximize the life time of the sensor network system, mean field approximation that all the neighbors of the
or other parameters. Extensions and heuristics will be node are in the same steady state and can be treated
investigated in more detail in the simulation section. as independent. In which case, we can compute m n as
follows. Let be the probability of a sensing event and
A. The Markov Model let
be the probability of a receiving event. will
Each node is a three state Markov chain. The three be related to the sensing radius and the sensing event
states are the off, 4 , the sense/receive, 5 , and the density.
is the probability that exactly one of the nodes
transmit, 6 , states. Consider a node. Its transition matrix neighbors are transmitting. We will assume to a first
depends on the state of its environment. The environ- order approximation that the state probabilities for the
neighbors are independent. In this case, if there are
ment of a node can be in one of two states: either
neighbors, then
/Xw b T xZy b T (
JI . Note that if the
a sense/receive event is occurring or no such event is
occurring. The Markov state diagram in each of these transmit radius is
T , then assuming that the disks are
cases is given below, along with the Markov transition in the unit torus, the probability that a node is within
probability matrices, 7 when there is an event and 7 8 transmitting range of our node is
T , and has a
Binomial distribution %i kXqD*#yZ ^
T ( , where
when there is no event. J
No Event Event
b xZy b ( . Multiplying
by
DUh ^b (X
i k and summing over , we finally arrive at the
= following expression for
:
: J
Xg#YyZ2(
T b T x Zzy
T b T (¡ } (2)
O 9 O Notice that
is a function of b T . Since the sens-
>
; ing and receiving events are independent, m_n X
i sense or receivekpX¢'
£y{/
. We can now use this
S T S T expression for mon to solving (1) for the steady state
<
? probabilities e¤ , which leads to the following set of non-
BDC E F G BD R C E F G linear equations.
E A@ H I*JH K PQ E @A H I*JH K QP
F L I*JL K F K K I e X e i mont7jwxZzy{m-nt( 7| 8 k^
J
G M N O G M N O m n X qg#y'Z2(uxZy¥(&"xZy&( ^
S UTVUWYX[Z Z X e¦¥§¨X b O b S b T } (3)
]\ S_^ T ^ W ^a`^b \cZ
where &VX©
T b T and § is a vector of ones. Had m n
Notice that when a sensing event occurs, the node will been a constant independent of e , it is well known from
always transition to the transmit state. This requirement the theory of finite state Markov chains that a steady
can be relaxed. There is also an ambiguity if both a state set of probabilities exists, [22]. It turns out that the
4
introduction of this non-linearity does not change the Then, i±Á¤gº-(rXµZÄkpXËxZy
S b S ( . Let Ì be the area
situation. that is not covered, then
Theorem 1: The set of non-linear steady state equa-
tions for e given in (3) has at least one solution. ÌwXcÍÊκÏÁ¤gº-( (5)
Proof: Let ªe(¤Xi mne(x7«¬xZym-ne(*(7¢
8 k as
defined in (3). ªe( is a transition matrix, i.e., ®¯±°²³ and so Ð%i ÌkXÇÑÎ¥º[i±Á¤gº-(YXÒZÄkÓXÔxZÓy
S b S ( .
and ´ ° ® ¯±° XµZ for all ¶ . Let · be the -dimensional Thus we see that the expected area covered is ZÕyÐ%i ÌkX
probability simplex, ZyÖxZyÓ
S b S ( , which, after using the fact that "!xZy
¼(f\|y¼ for ¼×cZ , leads to the following proposition:
·¸X¢¹º»"¼¯² ^¾½ ¼¯pX¿Z/À¥} Proposition 2: Let
S b S XÙØg#-(*)+# . Then, the ex-
¯
pected coverage is given by
· is compact, and Á¤e(¤X[ªYe¤(¡Â-e maps · into itself. JÞÝàß ^
m-nze¤( is a polynomial in e , and hence is continuous. Øg#-(
ZyµÚpZy ²cZy{Ü á
Thus, Á¤e¤( is a continuous mapping. Thus the conditions # Û
to apply the Brower fixed point theorem are satisfied for (Note: Øg#-(*)+#\cZ .)
Á¤e( [23], and so Á¤e( has a fixed point. Thus, as long as Øg#-(â ã , the expected coverage
While we have hidden the dependence up to now, we approaches Z . Øg#-( can be interpreted as the expected
explicitly note here that e_ is a function of St^ T ^a`2^b and power used by the sensing nodes. In order to get a
continue with this dependence being understood. concentration result on the coverage, we will use a
second moment method, and compute ä3å3
àÌ( , to which
B. Connectivity and Coverage end we would need Ð%i Ì k . We use the mean field
Here we will discuss the coverage and connectivity approximation that our nodes are acting independently
properties of the system of sensors. There are already in the mean field environment of the neighbors. Then,
some results regarding these issues in the literature, and using a second moment method, we have that
I
we add one more that is appealing on account of its Theorem 3: Let
S \ . Then, for any çè³ .
elementary probabilistic derivation. Existing results for hæ Ýàß I
coverage and connectivity have also dealt with various Jféêë+ì í Ýàß exp ¥y]ñ òxó á ³ô¨ Ýàß (
forms of random graphs ranging from various types of i Ì¿²"Ü êïîgð á k-× I á ^
disk graphs, [13], [18], [20], to Bernoulli graphs, [19], Øg#-(tZ$'ô] Ýàß (
"á
to percolation processes, [21]. b
We assume that the # sensors are well approximated where Øg#-(¤X#p
S S .
by points independently and uniformly distributed in the Proof: Since the proof, though elementary, is long
unit torus, Ã|X¸i ^ ZÄk¤Åi ^ ZÄk , where the opposite edges and tedious, we first provide a proof sketch. First we
are identified. We use a torus to avoid unnecessary com- observe that the coverage by squares inscribed in the
plications due to edge effects. Similar results would hold disks cannot be more than the coverage by the disks.
for the square, with only minor additional technicalities. Thus it will suffice to show that the coverage by these
Let
S be the sensing radius and let
T be the transmitting inscribed squares is large. Proposition 2 gives the ex-
radius. pected coverage. We will show that the variance of this
1) Coverage: We first consider coverage. We assume coverage goes to zero sufficiently fast so that the actual
that the system has equilibrated to its steady state, and coverage will not deviate too much from the expectation.
that every node can be treated as independent to first The variance is given by a double integral over two
order, with state probabilities given by et . A point two dimensional variables. We compute this integral
ºÇÆÈà is covered if there is a node in the sensing as a finite summation, and then bound the variance
state within
S of º . In this case, an event that occurs by bounding this summation. Once we have bound the
at º will be detected. Thus, the probability that a given variance, we can use the Markov inequality to bound the
node is sensing and within
S of º is
S b S . Under the probability of a large deviation from the expected value,
independence assumption, the probability that no node and this leads to the result claimed.
can sense an event at º is then given by xZy¬
S b S ( , We can inscribe a square of side õ XÒ
S ö in a
which is the probability that º is not covered. Define the circle of radius
S . The coverage by the disks will then
coverage function by, be no less than the coverage by the squares. Let ÷
be the area not covered by the squares, then ÌÇ\÷ .
Z º is not covered, Defining the coverage function Á3øgº-( for the squares
Á¤gº-(_XÊÉ (4)
º is covered. analogously to (4), we find that Ð%iù÷okzXúxZ£yõ b S ( }
5
I
Ð%iù÷ k X Ñ Î¥º Ñ Î¥ûUÁ"øsgº-(xÁ"øpgûo( . The Á¥øgº-(xÁ"øpgûo( term Noting that for
¨\cZ2) ö , õ \ , hence, xZs "!xZs
in the integrand is the probability that both the points º (*(*) xZy b S õ (f\2¥)ÕZ , we get that
and û are not covered. Let ÷ü denote the square centered
at the point ýÆDÃ . Then the probability that both points H I
º and û (in the integrand) are not covered is given by the exp ¥
y IlK S ô¨ H (
äÕå
à~÷_ ( \ I
S
By the union bound, iù m]Z]\Ò m^\ m[Z+kU\ achieve successful transmission given that f is within
Ü I g#-(r[Ü g#-(r¿Ü g#-(â , hence we conclude that transmission range, either the first try was successful,
i m]Z`_£ma _ mbZ+kâÔZ for a sufficiently large area, prov- or the first try was not successful, and some try after
ing that the network is path connected on a sufficiently the first try was successful. Since the process is Markov
large area, with probability 1 in the asymptotic limit. and since the nodes are independent, the probability that
While we can provide sufficient conditions under some try after the first one is successful (given that
which the graph is path connected, let us note here you remain in the transmit state) is also ® . Let ® I
some of the limitations of this result. The first is the be the probability that you were successful on the first
assumption of independence of the nodes (the mean try given that f is within transmission range. Since the
field theory approximation). This is not strictly true, probability to remain transmitting is S , we have that
since the probability that a node is in the transmit state ®|X|® I wxZzy® I ( S ® ^ or that
(say) will be dependent on whether one of its neighbors
® I
was in the transmit state one time step earlier, and so ®|X S } (6)
the current state of neighboring nodes will exhibit a Zy S ® I
weak dependence which we have ignored. The extent Suppose that f has neighbors. Then you are successful
to which this dependence will affect the analysis will be on the first try if f is in the sensing state and no
investigated in the simulations. The second limitation is other neighbor of f is transmitting, which occurs with
of course that while there may exist a path, it may not
probability b S xZy b T ( . Multiplying by m( , summing
be usable due to contention. over using the fact that has a Binomial distribution J
To address the contention, we need to look at the DU*# y¨ ^
T ( , we arrive at ® I X b S xZyÓ
T b T ( .
transmission connectivity of the network. However, in- Since there are #_y£Z packets to whom you could transmit,
troducing the constraint that there is no contention along the expected number of successful transmissions is given
the path introduces significant dependence among the by g#yZ2(m
nodes. As a result, analysis is difficult, and we present a hg]i . Requiring that the expected number of
successful transmissions is c then leads to the following
heuristic which we refer to as c -flooding. We require that constraint,
in the event that a node needs to transmit a message, the Proposition 7: In order to achieve c -flooding, the
expected number of recipients will be given by c%è|Z . following condition must be satisfied,
In such a scenario, it is easy to see that the particular J
message will rapidly flood through the network. In fact, g#Yy³Z2(
T b S x Zy
T b T ( J
cX (7)
we can expect the message to spread exponentially fast. Zzy S SÞb S xz Z y
T b T (
Since there are # S nodes, we can expect that in order of
"!t# S )o
"!dc time steps, every member in the network
C. Optimizing The Power Consumption
will have received the message. If we simply use c -
flooding, the contention in the network will become un- The main goal of this paper is to develop a systematic
controllable. To alleviate this problem, we would need to approach for power conservation in sensor networks. The
also implement a safety mechanism to prevent such over idea is to select the available parameters in the Markov
flooding – one approach might be to bound the maximum model so as to minimize the power consumption, while
number of hops a packet is allowed to make. This can at the same time guaranteeing coverage and connectiv-
be implemented in practice by adding to each packet ity. Accomplishing this involves solving a constrained
a hop counter, and setting its maximum allowed value optimization problem, which we effect numerically, the
appropriately. Two possibilities are "!tÐVi # S kg)o
"!ec , the details being given in the Simulation section.
time we expect it takes to flood the whole network, We assume that the power consumption in each of
or , # S )o "!f# S , the expected diameter of the network, the three states is given by O ^ S ^ T . Suggested values
[18]. The requirement of c -flooding sets constraints on for these parameters have been given
in the literature,
the allowable parameters in the Markov model, which is [9]. For our purposes, we assume that these are exter-
what we derive here. nally supplied parameters, or functional forms that may
Let’s consider the situation when a node is in the depend on
S ^
T . The expected power consumption per
transmission state, and let f be any one of the other #zy]Z node in steady state is then given by Ð X b
O O
nodes. Let ® be the probability that you successfully b b } In order to guarantee path connectivity
S S T T
transmit the packet to f given that f is within transmis- coverage,
and it is sufficient to enforce the conditions in
sion range. Let m
hg]i be the probability to successfully Theorem 6. We are thus led to the following optimization
transmit the packet to f , then m X
T ® . To problem:
hg]i
8
OPT1: Let Á I g#-( ^ Á g#-( be any two functions that was used in [10]. We mention it here to demonstrate how
approach infinity in the asymptotic limit, for their model fits within the general methodology we have
example "!t# or #aj . Let ×çz×cZ . developed here. While in [10], the authors develop some
b b b ^ reasonably good parameters for the latency times in each
O M H L
minimize
O O
S S
T T
state, in the present framework, one can optimize these
parameters while at the same time enforcing connectivity
subject to the constraints
and coverage. Figure 1 illustrates the model.
]\ t S ^ T ^bs^a` \|Z
S UT\cZ Event No Event
# b S ²Á I g#-( n
# S ç¾(tXq "!g# S ç¾(*(s³Á g# S ç¾(*( OS
where
XE#&FG¹
S ^
T À and # S ç¾(_XxZy%ç¾(¡# b S .
l OS m
Here # and the sensing event density are given, o p
from which , the probability of sensing an R T k
event can be calculated. b ^b ^b are the so- O S T
R T
lutions to the steady state equations, (3), which B C
Y E F
t q G BR C
Y E_F q G
depend on the parameters.
IÁ g#-( and Á g#-( can chosen so that the connectivity EtF A@ K K I QP E_F A@ H I*JH K QP
q K K I q K K I
and coverage converge to Z at the desired rate. In order G M N O G M N O
to enforce transmission connectivity, one can incorporate S ÏTVWDXZ
the additional constraint given in Proposition 7. After
this constraint has been incorporated, and the power con- \ S_^ T ^ W ^b \cZ
sumption minimized, one can use the additional heuristic Fig. 1. Off/Sensing–Receive–Transmit
of a maximum number of hops to avoid over-flooding the
sensor network.
b) Off–Sensing–Receive–Transmit: Here, we have
a separate state for each of the four possible activi-
D. Extensions ties. One possible advantage of this setup is that the
There are a number of ways in which the general asymmetry between sensing and receiving may allow
methodology we have presented may be extended, the one to preferentially treat one of these events and pay
most immediate is to consider different Markov models. less attention to the other. In fact one could have two
We have presented a relatively simple Markov model for classes of nodes, those with a preference for 5 over
r r
the state diagram of a single sensor node. We list below and those with a preference for over 5 . In this
several other interesting models. The analysis of these way, one could have “separately” functioning sensing
models follows virtually identical lines to the model and listening networks. While the analysis to take into
we have presented, the main difference being the the account two types of nodes in the ensemble of nodes
introduction of additional parameters and/or states in is slightly more complex, it follows the same general
the Markov chain of a sensor. The only change in the approach. The main difference is that the connectivity
form of the steady state equations, (3) may be a change would be defined with respect to the “listening” network,
in the dimensionality of the system and the constant and the coverage would be defined with respect to the
matrices 7 and 7 8 . Otherwise, the entire methodology “sensing” network. Figure 2 illustrates the model.
remains intact, including the constraints for connectivity c) Back-off: This is a technique that can be used
and coverage. Thus we will not follow through on most with any of the previous models and we illustrate this
of the details, and we leave the further theoretical devel- concept here with our original model. The idea is to
opment and experimental investigation of these models allow the transmit state one more alternative rather than
as avenues for future work. simply continue transmitting or exit transmitting. One
a) Off/Sensing–Receive–Transmit: In the state dia- also allows transmition to “pause” or back-off into the
gram for this Markov model, we combine the off state back-off state where the node holds the item to be
with the sensing state, and receiving occurs in a separate transmitted, but is not creating contention. Such a model
state. Otherwise, it is very similar to the model we have may allow for better contention management. Figure 3
been describing. This model is basically the model that illustrates the model.
9
|}
swv
O x O O O
| {
}
S st T
u S T
y
~
S T S T
R } z B
R B
BDC E F q G BR C
D E F q G
BYC E F G BY R C E F G
E @ H ê H ]H K P
E @ H ê H H]K P
F A K K K I Q F A LhjL ê L K Q E @ H H R K K P
E @ H H R K K P
q K K K I q h ê K F A K K I K Q F A L LR K K Q
G M N O G M N O G M O G M O
b I b b X¿Z K K NR N K K NR N
` I ` ` XZ b b X¿Z
` ` 8 8 XZ
¼¶ I X¿Z
S UTVXWDXZ W¨ WDX¿Z
S UTVX8 X¿Z
]\ S_^ T ^ W ^ ^a` ¯ ^b ¯ ^ ¯\cZ
¨\ _ S ^ T ^ ^ ^a`^ `8 ^bs^ bs^ W ^ W\cZ
8 8
Fig. 2. Off–Sensing–Receive–Transmit.
Fig. 3. Back-off
are randomly distributed on the surface, see Table I. # of neighbors. In the listen state it would wait ä£ seconds
event nodes are also randomly dispersed on the same (10sec). In the case of traffic or an event, the node moves
surface. Each of the event nodes can generate an event to the active state. The authors give the optimal time to
with a certain firing probability. The firing probability is stay in à as 60sec, see Figure 4. All the times à , Ã
j j j
related to the user input sensing probability. and Ã¥£ are values chosen by the AFECA’s authors.
The nodes within a distance of
of each other are
adjacent and can communicate. Nodes within a distance
¦ © after last traffic
sleeping
of
to an event node will sense the event, provided that
they are in the sense/receive state and the event node
¦¨©
after upon sensing event
¡ 50000 0.06
0.05
In [10] the authors use the power consumption figures: Sense/Rx State(Theory)
Sense/Rx State(Sim)
Tx State (Theory)
1.6W for radio transmission, 1.2W for reception and 1W 0.01 Tx State (Sim)
1 0.9
0.9
0.8
Off State
Sense/Receive State
0.8 Transmit State
0.7 AFECA
0.7 Our Algorithm
0.6
0.6
0.5 0.5
0.4
0.4
0.3
0.3
0.2
0.2
0.1
0 0.1
0 1 2 3 4 5 6 7 8 9 10 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.11
Number of Nodes 4 Probability of an Event
x 10
Fig. 6. Number of Nodes vs. Steady State Probabilities Fig. 8. AFECA vs. Our Scheme
0.35
tributions close to the theory. In the simulation study,
we also show that the power savings of our protocol
0.3
outperforms that of the existing competitors, by as much
as an order of magnitude in some cases.
0.25
0.2
0.15
R EFERENCES
0.1
[1] I. F. Akyildiz, W. Su, and E. Cayirci Y. Sankarasubramaniam,
0.05
0 1 2 3 4 5 6 7 8 9 10
“Wireless sensor networks: A survey,” Computer Networks, vol.
Number of Nodes x 10
4
38, no. 4, pp. 393–422, 2002.
[2] B. Krishnamachari, D. Estrin, and S. Wicker, “Impact of data
Fig. 7. Number of Nodes vs. Average Power aggregation in wireless sensor networks,” in Int. Workshop on
DIstributed Event-Based Systems, Vienna, Austria, July 2002.
[3] Leslie Lamport, “Time, clocks, and the ordering of events in a
We compare our network design against AFECA for distributed system,” Communications of the ACM, vol. 21, no.
7, pp. 558–565, July 1978.
different event probabilities in Figure 8. The number of [4] N. Lynch, Distributed Algorithms, Morgan Kaufmann, San
nodes in the network is fixed to ¬" . We fix the radius Mateo CA, 1996.
to } and we vary the probability of an event in the [5] S. Singh and C. S. Raghavendra, “Power efficient mac protocol
range i }ùÞZ ^ }
ZÄk . It can be observed that while AFECA is for multihop radio networks,” in Nineth IEEE ISPIMRC’98,
1998, pp. 153–157.
still far better than any protocol without energy savings, [6] Y. Xu, J. Heidemann, and D. Estrin, “Geography-informed
it reacts too much to small changes in the probability energy conservation for ad hoc networks,” in Proceedings
of an event, lagging behind our protocol in terms of MOBICOM’01, 2001, 2001.
[7] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span:
the power used. This is because AFECA very quickly
An energy-efficient coordination algorithm for topology main-
saturates in to a permanently active state as probability tenance in ad hoc wireless networks,,” in Proceedings of
of event increases. MOBICOM’01, 2001.
12