+ All Categories
Home > Documents > 1-s2.0-S0140366411000831-main

1-s2.0-S0140366411000831-main

Date post: 04-Apr-2018
Category:
Upload: zaigham-abbas
View: 214 times
Download: 0 times
Share this document with a friend

of 15

Transcript
  • 7/30/2019 1-s2.0-S0140366411000831-main

    1/15

    A cyclic MAC scheduler for collecting data from heterogeneous sensors

    Chun-Yu Lin a,, Chen-Lung Chan b, Chung-Ta King a, Huang-Chen Lee b

    a Department of Computer Science, National Tsing Hua University, Taiwanb Computer and Communication Research Center, National Tsing Hua University, Taiwan

    a r t i c l e i n f o

    Article history:

    Received 27 November 2009

    Received in revised form 27 February 2011

    Accepted 28 February 2011

    Available online 5 March 2011

    Keywords:

    Wireless sensor networks

    Data collecting system

    Time division multiple access

    Cyclic schedule

    Distance constrained task set

    a b s t r a c t

    Many wireless sensor networks applications, e.g., structural health monitoring (SHM), require the sensors

    to construct a multihop network to collect the environmental data in real-time. These sensors generallygenerate sensing data in fixed rates, so their transmission schedules can be deterministically listed. Time

    division multiple access (TDMA) is especially appropriate for these applications because it can prevent

    radio interference, thereby reducing the transmission power and maximizing wireless spectrum reuse.

    However, to reserve sufficient bandwidths on distinct links of a heterogeneous WSN, a complex TDMA

    schedule is necessary, and a sensor node might need to keep a large TDMA schedule table in its tiny mem-

    ory. To prevent a large size TDMA schedule table, this paper proposes a CyclicMAC scheduler that assigns

    each node a temporal transmission pattern which is merely parameterized by period and phase. The

    CyclicMAC scheduler determines the period to satisfy the bandwidth requirement of the node, and

    adjusts the phase to achieve collision-freeness and reduce the end-to-end latency as well. The end-

    to-end latency of the resulting schedule is proven to be optimal if the wireless links only interfere with

    their parent link andsibling links. As far as we know, CyclicMAC is the first that simultaneously addresses

    the three design issues of TDMA scheduling, which satisfies heterogeneous bandwidth requirements,

    minimizing schedule table size, and reducing end-to-end latency, for multihop wireless sensor networks.

    2011 Elsevier B.V. All rights reserved.

    1. Introduction

    Structural health monitoring(SHM) refers to a collection of tech-

    nologies that monitor and diagnose the health state of an architec-

    tural structure in real-time. Typically, heterogeneous sensors are

    deployed inside and around the structure to periodically collect

    various types of data relevant to the health state. For example,

    to monitor a bridge, engineers must deploy sensors such as

    accelerometers, strain gauges, displacement transducers, level

    sensing stations, anemometers, temperature sensors and dynamic

    weight-in-motion sensors. These sensors measure everything from

    tarmac temperature, wind speed, deflection and rotation of cables,

    and movement of the bridges desks. Different measurements have

    different characteristics and need to be sampled and reported at

    different rates, e.g., temperature may be reported once every few

    minutes, while vibration and movement may need to be reported

    several hundred times per second. Since most existing SHM

    systems rely on wired sensors, the cost of deployment and mainte-

    nance is usually very high. The massive advances in the develop-

    ment of wireless sensor networks (WSN) in recent years offer new

    opportunities to the SHM applications. Wireless communication

    eliminates the cost of deploying wires and increases the scalability

    of the SHM systems.

    Wireless sensor nodes are usually powered by batteries. Short-

    range communication is more appropriate for transmitting sensed

    data because it requires less energy than long-range communica-

    tion. It also enables spatial reuse of the radio spectrum, and there-

    by increases the throughput of network. For these reasons, sensors

    usually use multihop transmission, which utilizes a series of short-

    range communication links to send data back to the control center,

    called a sink. In WSN applications, the multihop networks are

    usually built based on either CSMA or TDMA MAC protocols. In

    CSMA-based protocols, such as S-MAC [1] and T-MAC [2], when a

    sensor node needs to transmit a data packet, it and the other sen-

    sor nodes in the same network exchange messages or use Clear

    Channel Assessment (CCA) hardware components to grant the

    right to access the channel and prevent the packet collision. But

    in TDMA-based protocols, the sensor nodes transmit data packets

    according to a predefined schedule that will never cause the packet

    collision. In general, a CSMA-based protocol is suitable for a dy-

    namic environment in which the wireless links between the sensor

    nodes are easily broken or the sensor nodes will generate data in

    unstable rates. However, such overhead on energy consumption

    is unnecessary if the system environment is relatively stable. For

    0140-3664/$ - see front matter 2011 Elsevier B.V. All rights reserved.doi:10.1016/j.comcom.2011.02.012

    Corresponding author at: Room 734, EECS Building, No. 101, Section 2, Kuang-

    Fu Road, Hsinchu 30013, Taiwan. Tel.: +886 3 5715131x33906; fax: +886 3

    5723694.

    E-mail addresses: [email protected] (C.-Y. Lin), [email protected]

    (C.-L. Chan), [email protected] (C.-T. King), [email protected] (H.-C. Lee).

    Computer Communications 34 (2011) 16301644

    Contents lists available at ScienceDirect

    Computer Communications

    j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / c o m c o m

    http://dx.doi.org/10.1016/j.comcom.2011.02.012mailto:[email protected]:[email protected]:[email protected]:[email protected]://dx.doi.org/10.1016/j.comcom.2011.02.012http://www.sciencedirect.com/science/journal/01403664http://www.elsevier.com/locate/comcomhttp://www.elsevier.com/locate/comcomhttp://www.sciencedirect.com/science/journal/01403664http://dx.doi.org/10.1016/j.comcom.2011.02.012mailto:[email protected]:[email protected]:[email protected]:[email protected]://dx.doi.org/10.1016/j.comcom.2011.02.012
  • 7/30/2019 1-s2.0-S0140366411000831-main

    2/15

    example, in most SHM applications, each sensor node is mounted

    on the structures and transmits sensed data regularly. Such stable

    system characters lead to a static network topology and static data

    rates that are appropriate to the TDMA-based protocols.

    Consider a wireless sensor network with a set of sensor nodes.

    We assume that a pair of sensor nodes has a wireless link if they

    are in the radio range of each other. If a group of nodes are in range

    of each other, their data packets will collide if these packets are

    transmitted simultaneously. To prevent the potential radio inter-

    ference, the transmissions of these wireless links must be stag-

    gered into different times. In a TDMA-based MAC protocol, the

    TDMA scheduler determines the times to transmit packets of each

    wireless link to prevent radio interference. Assuming the timeline

    is slotted, the TDMA scheduler assigns each wireless link a series of

    timeslots on which it can transmit the data packets. The assign-

    ments are stored in the TDMA schedule tables of the two sensor

    nodes connected by the wireless link. The sensor nodes can thus

    turn on/off their radio interfaces according to their TDMA sched-

    ules to save energy. Due to its simplicity and efficiency on energy

    consumption, TDMA-based protocols have been widely applied in

    many WSN applications.

    However, when applying TDMA to a multihop wireless sensor

    network that supports real-time SHM applications, the TDMA

    scheduler should further take the following three practical design

    issues into account:

    Satisfying bandwidth requirement: The available bandwidth of a

    wireless link is determined by the number of transmission

    timeslots allocated to the link, and the bandwidth should be

    sufficiently large to not only transmit the data packets gener-

    ated by the sensor nodes connected by the link but also relay

    the traffic from the upstream links. Thus, the TDMA scheduler

    should assign sufficient timeslots to each link according to its

    aggregated bandwidth requirement so that all the sensed/

    relayed data packets can be collected in time.

    Minimizing TDMA schedule table: The TDMA schedule table spec-

    ifies when the wireless links will be activated in a given period.The sensor node must store the TDMA schedule in its main

    memory, which is a resource as scarce as the battery power.

    Therefore, the TDMA schedule should be compact enough so

    that the remaining memory space can be used by other critical

    tasks, such as queuing the sensing data.

    Reducing the end-to-end latency: When using WSN in an emer-

    gency application, the underlying wireless network should have

    similar performance as a wired network, i.e., data packets

    should be delivered to the sink immediately after they are

    generated. Note that in a multihop wireless network, the end-

    to-end latency of a data packet will be increased if the transmis-

    sion of the packet is interrupted to wait for the active timeslot

    of an intermediate wireless link. Thus, to reduce the end-to-end

    latency, the TDMA scheduler must arrange the transmissiontimeslots of this packet link by link along the end-to-end path

    to ensure the timeslots are consecutive.

    Many previous works have addressed some of these design is-

    sues of TDMA scheduling for wireless sensor networks. However,

    to the best of our knowledge, none of these works fulfills all the

    above three issues simultaneously. Some TDMA schedulers [48]

    take the bandwidth requirement into account by allocating each

    sensor node a contiguous timeslot whose length is proportionally

    fair to its bandwidth requirement. However, such design does

    not consider the consecutiveness of the allocated timeslots along

    the end-to-end path from a sensor to the sink, and therefore could

    lead to a considerable end-to-end latency of transmitting a data

    packet. The EDF-based TDMA schedulers [911] enumerate everyintending packet transmission and schedule the transmissions

    based on Earliest Deadline First policy to reduce the end-to-end

    latency. These approaches consider both different bandwidth

    requirements and low end-to-end transmission latency. However,

    the TDMA schedule tables in these approaches must include the

    enumeration of all the packet transmissions, so these approaches

    tend to generate a huge schedule table when the sensor nodes have

    deviated sensing rates, or when the network size is large. The

    resulting TDMA schedule table might be too enormous for sensor

    nodes to store in their tiny memory. Some TDMA schedulers

    [12,1519] generate a round-robin TDMA schedule table, which

    is simple and small. However, these TDMA schedulers do not con-

    sider the different bandwidth requirements of the sensor nodes

    and the end-to-end latency in a data collecting system.

    In this paper, we propose a TDMA scheduler called CyclicMAC

    that fulfills all the above design issues in multihop wireless sensor

    networks. CyclicMAC scheduler specifies a cyclic link schedule

    parameterized only by period and phase for each wireless link,

    where the period is the time interval between two consecutive

    packet transmissions and the phase is the initial delay time to

    transmit the first packet. Undoubtedly, the size of the TDMA sche-

    dule table in CyclicMAC can be effectively reduced since it only

    needs to store two parameters for each wireless link, instead of

    the timetable of each individual packet transmission. The band-

    width requirement of a wireless link can be satisfied by setting

    an appropriate period, and the end-to-end latency of a data packet

    can be minimized by adjusting the phase. We also prove that in an

    ideal case in which the wireless links only interfere with their par-

    ent links and sibling links, CyclicMAC scheduler will generate a

    TDMA schedule with an optimal end-to-end latency, i.e., the time-

    slot length multiplies the number of intermediate links from

    source node to sink. Such ideal case is reasonable in a sparsely de-

    ployed wireless sensor network. We also prove that in a densely

    deployed network, the end-to-end latency is still bounded. There-

    fore, CyclicMAC is considered to be an ideal MAC scheduler to WSN

    applications whose data sampling rates are static.

    The remainder of this paper is organized as follows. Section 2

    lists the previous works related to our research. In Section 3, weformally describe the system model of TDMA over a multihop

    wireless sensor network. Section 3.1 introduces the proposed

    CyclicMAC scheduler. In Section 5, we present some performance

    evaluations of the proposed scheduler via simulation. Section 6

    gives some concluding remarks.

    2. Related works

    In this paper, we focus on the design of a TDMA scheduler that

    generates a small TDMA schedule to support both the bandwidth

    requirement and latency minimization for a data collecting system

    over a multihop wireless sensor network. While some famous

    works, such as B-MAC [1] T-MAC [2], Dozer [3], target at support-ing general purpose WSN applications which might be highly

    dynamic, we only target at the data collection system whose

    network condition is stable, rather than dynamic.

    Some previous works [48] propose TDMA schedulers that sup-

    port the bandwidth requirements by achieving the fairness of

    bandwidth allocation. Sridharan and Krishnamachari [4] proposed

    a method that determines the number of time slots allocated to the

    sensor nodes proportionally according to their bandwidth require-

    ments. Wang et al. [5], Zheng et al. [7], and Rajendran et al. [8] de-

    fine the timeslot allocation as an optimization problem that

    maximizes the throughput. Soldati et al. [6] further defines an opti-

    mization problem that considers the end-to-end bandwidth alloca-

    tion over a multihop network. In general, these TDMA schedulers

    allocate timeslots for the sensor nodes according to their samplingrates to ensure bandwidth fairness among the nodes. These

    C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644 1631

  • 7/30/2019 1-s2.0-S0140366411000831-main

    3/15

    schedulers usually allocate some consecutive timeslots to each

    node according to its bandwidth requirement. However, such con-

    secutive allocation could easily induce additional transmission la-

    tency in a multihop wireless sensor network. In a multihop

    wireless sensor network, a data packet is transmitted by the source

    sensor node, relayed by several intermediate sensor nodes, and

    then delivered to the sink. If the timeslot allocation does not con-

    sider the order of packet transmission carefully, the data packet

    might need to be queued in an intermediate node because the cur-

    rent timeslot has been allocated to another neighbor node. This

    undoubtedly lengthens the end-to-end latency, and once the queue

    has overflowed, the packets will be dropped and therefore cause

    packet loss.

    A TDMA scheduler that only considers the bandwidth require-

    ment is insufficient. In a static data collecting system such as a

    SHM application, the sensor nodes usually sample the environ-

    ment and transmit the sample data to the sink at regular rates.

    Therefore, the TDMA scheduler can deterministically enumerate

    all the packet transmissions in a given time interval and then sche-

    dule the packet transmission times to satisfy various designated

    goals, such as real-time [911]. For example, both Li et al. [9]

    and Stankovic et al. [10] schedule packet transmissions, in a multi-

    ple hop and a single hop network respectively, via the Earliest-

    Deadline-First(EDF) scheduling algorithm, which has been proven

    effective in both satisfying bandwidth requirements and reducing

    end-to-end latency [12]. Chipara et al. [11] schedules the transmis-

    sions of the messages responding to a specific query with deadline,

    in a multiple hop wireless sensor network. However, in a network

    consisting of many sensor nodes with heterogeneous sampling

    rates, enumerating the packet transmissions requires both inten-

    sive computation and memory overhead. Even if the scheduler is

    executed on a powerful server to eliminate the computation over-

    head on the sensor nodes, it still has to announce a huge schedule

    table to the entire network. Undoubtedly, to broadcast such a large

    schedule table to a multihop wireless sensor network requires con-

    siderable energy consumption on the sensor nodes. Besides, to

    keep this schedule table in the wireless sensor network requiresthe sensor nodes to allocate an excessive amount of memory for

    storage, which might not be feasible for resource constrained sen-

    sor nodes.

    An interesting approach to reduce the size of TDMA schedule ta-

    bles is to let the wireless links transmit data packets in a round-ro-

    bin schedule [1319]. These works assume that the system

    execution timeline is equally divided into many periods, with each

    period being composed of a set of equally-sized timeslots with

    identifiers. Then, a round-robin scheduler allocates each node a

    timeslot ID that indicates the node can periodically be active to

    transmit data at that timeslot in each period. By the round-robin

    schedule, each sensor node could only use the timeslot id and total

    timeslot number to determine the activation of its wireless link so

    that the sensor nodes could keep a small schedule table. DMAC[13] further staggers the activation of sensor nodes to reduce the

    end-to-end latency. Mao et al. [15] proposes a TDMA scheme

    which employs machine learning model to find the time-optimal

    solution for such staggered TDMA schedule. Song et al. [16] ana-

    lyzes the time-optimality of such staggered schedule in typical tree

    routing structure. Some of these previous works [1719] employ

    the graph coloring algorithm to determine the order of transmis-

    sion timeslots of wireless links. The coloring algorithm also allows

    spatial reusability when scheduling the transmissions of a multi-

    hop wireless network, thus improving the throughput of the net-

    work. Li et al. [17] provides a general coloring model for

    scheduling the transmissions, and extends the model to consider

    the transmission latency in multihop network. Gandham et al.

    [18] devises a distributed coloring algorithm for link scheduling.Lu et al. [19] analysis delay efficiency of a coloring based sleep

    scheduling algorithm. However, these round-robin-based TDMA

    schedulers basically assign the bandwidth evenly to the adjacent

    wireless links according to the network topology. When the sensor

    nodes have heterogeneous bandwidth requirements, such even

    bandwidth allocation could allocate too many timeslots to low

    data rate wireless links but insufficient timeslots to high data rate

    wireless links. If the network is single hop, previous work proposed

    by Carley et al. [20] could be a good reference to solve such band-

    width allocation problems. In their work, a contention-free peri-

    odic message scheduler is proposed to support heterogeneous

    bandwidth allocation by giving each wireless link a cyclic schedule

    that is parameterized by a period and a phase. However, their

    scheduling algorithm can only be applied in single hop networks,

    so it still cannot benefit data collecting systems generally imple-

    mented over multihop networks. However, the idea behind this

    previous work is interesting, and this triggers our work on devel-

    oping CyclicMAC, which extends the concept of cyclic scheduling

    to support multihop wireless sensor networks.

    3. System models

    In this section, we formulate the system model of a WSN-based

    data collecting system. We assume the topology of the data collect-

    ing system is static and consists of total m wireless sensor nodes

    N= {n0, n1, . . . , nm} to collect sampling data. Among the sensor

    nodes, n0 is the sink, and it collects the sampling data from the

    other sensor nodes {n1, n2, . . . , nm}. To address the heterogeneity,

    each sensor node has its own designated sampling rate. Let

    S= {s1, s2, . . . , si, . . . , sm} denote the sampling rates of the sensor

    nodes, where si indicates the sampling rate of the sensor node ni.

    A data collecting tree E= {e1, e2, . . . , ei, . . . , em} is a collection of wire-

    less links rooted on n0, where the routing structure ofEis assumed

    to be a given parameter, which is determined based on the appli-

    cation requirements, such as energy efficiency, latency efficiency

    or load balance. Each wireless link ei is a directional link whose

    source node is ni and destination node is the parent node of ni inthe data collecting tree E. Since the data collecting tree defines

    the precedence relationships among links when they collect sam-

    pling data, we can say that each link has a parent link and a set

    of child links. That is, Parenti denotes the next link of ei to the sink

    in E, while Childreni denotes the preceding links whose destination

    nodes are ni. Fig. 1 illustrates a data collecting system. {n0, n1, n2,

    n3, n4, n5, n6} are the sensor nodes that collect structure health data.

    They form a data collecting tree, illustrated in solid links, to deliver

    their sample data to the sink node n0. As mentioned, the data col-

    lecting tree also defines the precedence relationship of the wireless

    links. Take e4 in Fig. 1 as an example; thus Children4 is {e3, e2} and

    both Parent3 and Parent2 are e4.

    In a wireless network, two wireless links cannot be scheduled

    for transmission at the same time if their radio interfaces interferewith each other. In Fig. 1, the dashed lines illustrate the interfer-

    ence between two wireless links. To represent this schedule con-

    straint, an interference graph I is introduced to represent the

    interference between the wireless links. The vertices of I indicate

    the wireless links of E, e.g., the vertex e1 in I is the wireless link

    e1 in E. If ei and ej interfere with each other, there will be an edge

    between them. The interference graph I can be represented as a

    m m matrix I= {Iij j Iij = 1 if ei and ej interfere with each other;

    otherwise, Iij = 0}.

    Fig. 2 shows the corresponding interference graph of the exem-

    plary network in Fig. 1. The interference graph Ican be built using

    the theoretical [21,22] or empirical interfering model [23,24].

    Maheshwari et al. [25] study the impact of interference estimation

    algorithms by evaluating packet reception rate under variouslevels of radio interference. They especially compare the packet

    1632 C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644

  • 7/30/2019 1-s2.0-S0140366411000831-main

    4/15

    reception rates of a TDMA MAC under several famous interference

    estimation models. Their work is helpful for the readers to under-

    stand the practical issues in details.

    3.1. TDMA scheduling model and constraints

    Based on the above model, the TDMA scheduler still needs to

    determine the active times of the wireless links in E. Let the system

    execution timeline be divided into a set of timeslots numbered

    incrementally from 0. The length of a timeslot tk is the time re-

    quired to transmit a single sample packet completely. The TDMA

    schedule can then be represented as a mapping function f(tk, ei) 2

    {0,1}, where each f(tk, ei) determines the state of a wireless link eiin a specific timeslot tk. That is, f(tk, ei) = 1 indicates that ei can be

    active to transmit data from ni to its parent at time tk, while

    f(tk, ei) = 0 indicates the ei is silent.

    A feasible TDMA schedule for a static data collecting systemshould satisfy the two requirements below:

    Collision-free requirement: The TDMA schedule should stagger

    the packet transmission times of interfering wireless links.

    Bandwidth requirement: The TDMA schedule should allocate suf-ficient timeslots to each wireless link according to its aggre-

    gated bandwidth requirement.

    A TDMAschedule is said to be collision free if no two interfering

    wireless links are active at the same time. The collision-free

    requirement is formally defined as below, given any timeslot tk:

    8ei; ej 2 E and Iij 1;ftk; ei ftk; ej 5 1: 1

    Furthermore, a wireless link might deliver the data packets gener-

    ated by the source node of the link or forwarded from the children

    links. The TDMA schedule should allocate sufficient timeslots to

    each wireless link in order to ensure the wireless link has sufficient

    bandwidth to deliver these data packets. Formally, given a period T

    and the TDMA schedule of a wireless link ei, the bandwidth require-ment is formulated as below:

    XT0tk 0

    ftk; eiP T si X

    ej 2Childreni

    XTtk0

    ftk; ej; 2

    where si is the sampling rate of ni, and Tsi is the total number of

    data packets generated by ni. The left hand side of Eq. (2) is the total

    timeslots that ei owns to transmit data during T, and the right hand

    side is the sum of the total data that ei receives from its children

    links and itself. Note that to keep the discussion clear, we default

    assume that one packet contains one sample data (i.e., without data

    aggregation) and the packet size equals to the maximum sample

    size. Therefore, the length of a timeslot will be equal to the time re-

    quired to completely transmit a single packet. Of course, Eq. (2) canalso be applied in the scenario where one data packet contains more

    Fig. 1. An example of a WSN-based data collecting system.

    e2

    e3

    e4

    e5

    e6

    e1

    Fig. 2. The interference graph of the network in Fig. 1.

    C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644 1633

  • 7/30/2019 1-s2.0-S0140366411000831-main

    5/15

    than two samples by adjusting the sampling rate, if the samples can

    be fitted into a packet. But if the required packet size increases (e.g.,

    the maximum sample size increases), the system must be resched-

    uled. However, this exception should rarely happen in a static WSN.

    3.2. Problems of timetable-based implementation

    In a static data collecting system, the sensor nodes generate thesensing data in static sampling rates. Therefore, the aggregated

    transmission pattern will repeat in every hyper-period, which

    is the least common multiple of all the sensor nodes sampling

    periods. For such a static system, a TDMA schedule can be imple-

    mented via a timetable that specifies the transmission timeslots

    of each wireless link during a hyper-period. The timetable is then

    distributed to all the sensor nodes, and a sensor node will follow

    the TDMA sub-schedules of the wireless links connected to it to

    transmit its data packets. After the current hyper-period is fin-

    ished, the sensor node will re-execute the schedule.

    Although the timetable-based approach is easy to implement, it

    intends to construct a huge schedule table. We illustrate such a

    problem by estimating the space complexity of the timetable. Con-

    sider a data collecting system with n sensor nodes. Assume that adata packet generated by a sensor node ni is relayed by hi number

    of wireless links, i.e., total hi number of packet transmissions will

    be generated. In addition, the hyper-period T is the least common

    multiple of all the sensor nodes sampling periods. During each hy-

    per-period T, the sensor node will generate Tsi data packets be-

    cause its sampling rate is si. Therefore, in a TDMA schedule table,

    the number of the timetable entries for the wireless link ei will

    be hi T si. Based on the above, the number of the entries in the

    complete TDMA schedule table will bePn

    i1hi T si. Furthermore,

    the hyper-period T intends to be large in a data collecting system

    with heterogeneous sensor nodes because the sampling rates of

    the sensor nodes are deviated. In the worst case, Tmight be as large

    as the production of all the sampling periods, and such a large hy-

    per-period will undoubtedly lead to a large TDMA schedule table.

    As we mentioned above, a huge TDMA schedule table will occu-

    py considerable memory space, which might not be affordable in

    resource limited sensor nodes. Besides, to broadcast such a huge

    TDMA schedule table to the entire network will cause a lot of en-

    ergy consumption on the sensor nodes. Due to the above two dis-

    advantages, a timetable-based TDMA scheduler is considered to be

    less efficient for a resource-limited WSN.

    4. CyclicMAC: collision free cyclic TDMA scheduler

    To minimize the size of the TDMA schedule table, in this paper

    we propose a TDMA scheduler that specifies a cyclic schedule to

    each wireless link of a given data collecting tree. A cyclic schedule

    is parameterized by a period, which is the time interval betweentwo consecutive transmissions, and a phase, which is the initial

    delay time of the first transmission. This kind of TDMA schedule re-

    quires a tiny memory space because only two parameters are

    needed to be stored. Broadcasting such a small TDMA schedule

    to the entire network also requires much less energy consumption

    than broadcasting a timetable-based TDMA schedule. Note that the

    concept of cyclic schedule is introduced by Carley et al. [20], but

    the scheduler they proposed can only be applied to single hop net-

    works. This paper adapts such a concept and proposes a new cyclic

    scheduler that not only supports multihop wireless networks but

    also takes the bandwidth and the end-to-end latency requirements

    into account.

    4.1. Cyclic TDMA scheduling problem

    To simplify the notations, we let the schedule that specifies the

    transmission timeslots of a wireless link be referred to as a cyclic

    linkschedule,and welet theaggregationof the cyclic linkschedules

    of the entire network be referred to as a cyclic TDMA schedule.

    More specifically, letqi and/i bethe periodandthe phase ofa wire-less link eis cyclic link schedule, respectively. That is, ei will initially

    pause for /i timeslots and then periodically transmit a data packet

    everyqi timeslots. Fig. 3 shows an example of a data collecting treethat uses a cyclic TDMA schedule for data transmissions. In this

    example, the cyclic link schedule of wireless link e2 is hq2,/2 i =h6,4i; hence, e2 will transmit data at timeslots {4,10,16, . . .}. Simi-

    larly, e3 will transmit data at timeslots {9,19,29, . . .} and e4 will

    transmit data at timeslots {3,13, 23,33, . . .}. Formally, assuming

    the timeslots are numbered incrementally from zero, the cyclic link

    schedule of a wireless link ej is defined as below:

    fti; ej 1 ifti /i%qi 0;

    0; otherwise:

    3

    The previous section has demonstrated that the TDMA schedule for

    a data collecting system based on WSN should fulfill both collision-

    free and bandwidth requirements. Eq. (1) illustrates the condition

    of the collision-free requirement for a TDMA schedule. We extend

    Eq. (1) to derive the condition that a collision-free cyclic TDMA

    schedule must satisfy. Let ei and ej be two wireless links that inter-

    fere with each other, i.e., Iij = 1. A TDMA schedule will lead them to

    actually collide with each other if f(tk, ei) +f(tk, ej) > 1 at a certain

    timeslot tk, i.e., both their cyclic link schedules allocate timeslot tkto transmit the data packet. This collision condition can be formu-

    lated as below:

    /i g qi tk;

    /j h qj tk;

    (

    where both g and h are non-zero positive integers. The formulation

    can be reduced as follows:

    /i g qi /j h qj;

    ) /i /j h qj g qi:

    n1

    n2

    n3 n4

    (6, 4)

    (10,9) (10, 3)

    e2

    e3

    e4

    0 1 2 3 4 5

    e3 e4

    e2

    6 7 8 9 10 11 12 13 14 15

    2

    3

    4

    2

    4

    3

    2

    16

    4

    Fig. 3. An example of a cyclic TDMA schedule.

    1634 C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644

  • 7/30/2019 1-s2.0-S0140366411000831-main

    6/15

    Moreover, let gcd (qi,qj) be the greatest common divider of qi and

    qj. Hence, let u qi

    gcdqi ;qjand z

    qjgcdqi ;qj

    , and then the above equa-

    tion can be simplified as below:

    /i /j h u gcdqi;qj g z gcdqi;qj:

    Let another non-zero positive integer k represent h u g z, and

    the above equation can be reduced as below:

    /i /j k gcdqi;qj for k h u g z: 4

    Eq. (4) shows that the cyclic schedules of ei and ej, i.e., hqi,/ii andhqj,/ji, will use the same timeslot to cause a collision if we can finda certain non-zero positive integer k that makes the Eq. (4) be true.

    Hence, let L = {hq1,/1i, hq2,/2 i, . . ., hqi,/ii, . . . , hqm,/mi} be a cyclicTDMA schedule, where m is the number of sensor nodes. L will

    not lead each pair of interfering wireless links to actually interfere

    with each other if the below condition is true:

    8ei; ej 2 E&Iij 1;/i /j k gcdqi;qjfor all integer k;

    5

    In addition to the collision-free requirement, the cyclic TDMA

    schedule should also satisfy the bandwidth requirement that is

    formulated by Eq. (2). A cyclic TDMA schedule should allocate suf-

    ficient timeslots in each link according to its bandwidth require-

    ment. Let T be an arbitrary time period. The number of timeslots

    in which a wireless link ei will transmit data isTqi

    j k. Then the band-

    width requirement can be formulated asXTtk0

    ftk; ei T

    qi

    ; 6

    where qi is the period of the wireless link ei. In other words, qidetermines the bandwidth allocated to the wireless link ei and it

    should satisfy eis bandwidth requirement. Eq. (2) can be reduced

    by substituting

    PTtk 0

    ftk; ei withTqi

    j k:

    XTtk0

    ftk; eiP T si X

    ej 2Childreni

    XTtk0

    ftk; ej

    )T

    qi

    P T si

    Xej2Childreni

    T

    qj

    $ %

    )1

    qi

    P si

    Xej 2Childreni

    1

    qj

    $ %:

    Finally, we can derive that the cyclic TDMA schedule L can ensure

    each wireless link satisfies the bandwidth requirement if the below

    condition is true:

    8ei 2 E; qi 61

    si Pej 2Childreni1qj

    : 7

    Hence, we define a TDMA scheduling problem as below:Collision-free cyclic link scheduling for data collecting: Given a data

    collecting system consisting of:

    m sensor nodes N= {n1, n2, . . . , nm} with sampling rates S= {s1,

    s2, . . . , sm}, and

    a data collecting tree E= {e1, e2, . . . , em} with interference graph I

    determine a cyclic TDMA schedule L = {hq1,/1i, hq2,/2i, . . .,hqi,/ii, . . . hqm,/mi}, in which qi and qi are the period and thephase of a wireless link e0is cyclic link schedule, that satisfies the

    below two conditions:

    8ei;ej 2 E&Iij 1;/i /j k gcdqi;qj for all integer k

    8ei 2 E;qi 61

    si P

    ej 2Childreni1qj

    4.2. CyclicMAC scheduler

    In this subsection, a cyclic TDMA scheduler, called CyclicMAC, is

    introduced to solve the problemofcollision-free cyclic link scheduling

    for data collecting. CyclicMAC generates a cyclic TDMA schedule

    that consists of a set of cyclic link schedules for the wireless links

    in the data collecting tree. The CyclicMAC scheduler works in two

    stages: (1) period determination, and (2) phase determination. Inthe period determination stage, CyclicMAC determines the periods

    of the wireless links cyclic link schedule according to their band-

    width requirements. That is, the bandwidth of each wireless link

    cannot be smaller than the summation of its sampling data rate

    and the bandwidth requirements of its children wireless links, as

    Eq. (7) describes. CyclicMAC scheduler traverses the data collecting

    tree fromleaves to root and initiates each wireless link a cyclic link

    schedule whose period satisfies the bandwidth requirement. Let L

    be the resulting cyclic TDMA schedule, and let hqi ;/i i be the cyclic

    link schedule for a wireless link ei after the period determination,

    while /i is set to zero initially. In the phase determination stage,

    the CyclicMAC scheduler first sorts all the cyclic link schedules

    (i.e., hqi ;/i i ) in L

    by the order of the period lengths (i.e., qi )and then determines the phase of each

    hq

    i;/

    j ithat does not violate

    the collision-free requirement as Eq. (5) depicts.

    Finding the phases that make L collision-free is not trivial. The

    first reason is that such collision-free phases might not exist at all.

    Recall that Eq. (5) describes the collision-free requirements of the

    wireless links. If gcdqi ;q

    j 1 , no matter which values of the

    phases /i and/j are selected, we can always find an integer k that

    lets wireless links ei and ej be active in the same timeslot. There-

    fore, if ei and ej interfere with each other, their packets will

    undoubtedly collide in this case. The second reason is that the

    search space of finding collision-free phases for L could be enor-

    mous. Consider L as set of periodic tasks that periodically perform

    transmission jobs; then the period of a cyclic link schedule is re-

    ferred to as the period of a periodic task. If we let L be referred to

    as a set of periodic tasks whose phases are not determined yet, pre-

    vious work [20] in real-time systems has concluded that the num-

    ber of possible phase assignments for L will beQm

    i1qi , which is

    exponential.

    In this paper, we employ the Distance Constraint scheduler(DCS)

    [26] to derive a collision-free phase assignment. The Distance Con-

    straint scheduler (DCS) targets the real-time scheduling problem

    named Distance Constraint Task System (DCTS). A DCTS refers to

    a set of periodic tasks that contend for CPU resources, and each

    of these tasks should be executed periodically in a fixed interval.

    The fixed interval that each task periodically executes is called

    the distance constraint of the task. By conclusion of [26], a DCTS

    has a collision-free phase assignment if their periods are har-

    monic. The word harmonic means that, in a set of periods, one

    period is always divisible by all the other periods that are shorter

    than it. Similarly, we can let the cyclic link schedule of a wirelesslink ei be referred to as a periodic task with distance constraint qi ,and then the cyclic TDMA schedule L can also be transformed to a

    DCTS in which a set of wireless links contend for access to the

    wireless channel for periodically transmitting data packets in

    fixed intervals. However, in a practical data collecting system, it

    is almost impossible to guarantee the periods generated in the

    period determination stage are harmonic if the sampling rates of

    the sensor nodes are arbitrary. Hence, to force the periods to be

    harmonic, we let the CyclicMAC scheduler automatically trans-

    form the periods into numbers in powers of 2. That is, let qi bethe period of eis cyclic link schedule determined by Eq. (7); then

    we have

    qi 2 log2

    qi

    2j k

    : 8

    C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644 1635

  • 7/30/2019 1-s2.0-S0140366411000831-main

    7/15

    Note that the transformed period will be smaller or equal to the ori-

    ginal one in order to fulfill the bandwidth requirement. Due to the

    harmonic transformation of the periods in Eq. (8), the resulting cyc-

    lic link schedules might allocate more timeslots than the actual

    requirement. Hence, using DCS for phase determination seems to

    easily degrade the utilization of the wireless channel, and thus de-

    creases the system throughput. However, this problem is not too

    critical of the CyclicMAC scheduler because these over-allocated

    timeslots still have the chance to be reallocated to the other wire-

    less links that does not interfere with the current one. Remind that

    a timeslot can only be allocated to one of the wireless links that

    interference with each other, to prevent packet collision. That is,

    we can say that a timeslot is shared among these wireless links

    that does not interfere with each other. Even if the current link allo-

    cates more timeslots than its demand, the over-allocated timeslots

    can be reallocated to the others that have not been scheduled yet.

    Table 1 shows the function CyclicMAC-Schedulerwhich summa-

    rizes howthe CyclicMAC scheduler determines the phases of a cyc-

    lic TDMA schedule. Assume L is the cyclic TDMA schedule

    determined in the period determination stage. From line 2 to line

    5, the periods of the cyclic link schedules in L are all transformed

    into harmonic numbers based on 2 according to Eq. (8). Fromline 6

    to line 9, the CyclicMAC scheduler determines the phases of the

    cyclic link schedules according to an increasing order based on

    their period lengths. Line 8 is the procedure to determine the

    phases according to the collision-free requirement, and the func-

    tion Collision-Free-Phase-Determinationillustrated in Table 2 details

    the steps. The phase of a wireless links cyclic link schedule is the

    initial delay time to transmit the first packet. Undoubtedly, the ini-

    tial delay time is smaller than the length of a period, i.e., the phase

    ranges from 0 to qi 1 the length of the period. Therefore, theCyclicMAC scheduler exhaustively goes through the phases from

    0 to and picks the first met phase that will not cause the wireless

    link ei to interfere with other wireless links that have been sched-

    uled, as the function Collision-Free-Phase-Determination does. The

    procedure IsCollisionFree illustrated in Table 3 checks if the candi-

    date phase conflicts with the cyclic link schedules which have beenscheduled, via the facilitation of interference graph I.

    The operation of the proposed CyclicMAC scheduler has been

    introduced as shown above. However, a TDMA scheduler might fail

    to determine a schedule for a data collecting system whose band-

    width requirements of some wireless links are too high or the link

    degree of some nodes are too dense. In this case, we say that the

    system is not schedulable. We then derive the essential conditions

    to formulate the schedulability of a data collecting system that ap-

    plies the CyclicMAC scheduler. We start the derivation from the

    simplest case that the interference graph of a data collecting sys-

    tem is a complete graph. In this case, because only one wireless

    link can be active at any timeslot, we can use the total bandwidth

    requirement of the data collecting system to determine whether

    the system is schedulable or not. Let L be the cyclic TDMA schedule

    of the data collecting system. Given a time period T, the number oftimeslots allocated by L is Tq1

    Tq2 Tqm. Thus, the schedulability

    condition for L will be as below:

    Xmi1

    T

    qi6 T )

    Xmi1

    1

    qi6 1: 9

    If the above condition is not true, this implies that L allocates times-

    lots more than actual availability, which also implies that L is not

    schedulable.

    However, in a multihop wireless network, the interference

    graph is not necessary to be a complete graph. Inspirited from

    [5], we derive the schedulability condition of such a general case

    based on the maximal cliques of interference graph. A set of nodes

    and edges is called a clique if it induces a complete sub-graph. A

    maximal clique is a complete sub-graph that does not contain

    any other complete sub-graph. Undoubtedly, a clique in the inter-

    ference graph I refers to a set of wireless links that interfere with

    each other; therefore, the cyclic link schedules of these wireless

    links should satisfy the schedulability condition (Eq. (9)). Hence,

    the schedulability of L can be verified by the following lemma:

    Lemma 1. Assume I = {C1, C2, . . ., Ck}, in which Ck is a maximal clique

    of I. A cyclic TDMA schedule L is schedulable if the below condition is

    true:

    8Ck 2 I;Xei2Ck

    1

    qi6 1:

    When the system is not schedulable, it means that the sensorsmight send out too many packets so that the resulted traffic

    exceeds the capacities of the wireless channels. Undoubtedly, the

    data collecting system cannot work perfectly because the band-

    width requirement is higher than the upper bound that the net-

    work can support. The only solution to let the system workable

    is to reduce the amount of packets, e.g., adopting the solutions

    fromcongestion control, such as [46], to adjust the periodin order

    to meet the schedulable condition.

    4.3. Toward end-to-end latency efficiency

    For data collecting systems that collect environmental data dur-

    ing emergencies, the end-to-end latency of a data packet is also a

    critical optimization goal. The end-to-end latency of a data packetis the time interval from the time the packet leaves the source node

    Table 1

    Main function of CyclicMAC scheduler.

    Function CyclicMAC-Scheduler (L, I): L

    1 let L :{};

    2 for each < qi;0 >2 L do

    3qi : 2

    log2q

    i2

    j k;

    4 put < qi,0> into L;5 end for;

    6 sort all < qi,0 >2 L by qi in ascending order;

    7 for each < qi,0 >2 L do8 invoke Collision-Free-Phase-Determination (ei, < qi, 0 > ,L,I);9 end for;

    10 return L;

    Table 2

    The function to determine a collision-free phase for wireless link

    ei.

    Function Collision-Free-Phase-Determination

    (ei, hqi,0i ,L, I)

    1 for j = 0 to qi 1 do2 if IsCollisionFree(j,qi, L, I) then3 /: =j;

    4 end if;

    5 end for;

    Table 3

    The function to inspect whether the given phase is

    collision-free.

    Function IsCollisionFree (/,qi,L, I): Boolean

    1 for each < qj,/j >2 L and /j 0 do2 if (/%qj = /j) and Iij then3 return FALSE;

    4 end if;

    5 end for;

    1636 C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644

  • 7/30/2019 1-s2.0-S0140366411000831-main

    8/15

    to the time it is received by the sink. In a multihop network, the

    end-to-end latency of a data packet is the summation of the trans-

    mission times and the queuing times in the intermediate nodes. The

    total transmission time depends on the number of wireless links to

    relay the data packet, and it can be effectively reduced by applying

    a routing structure with fewer intermediate hops from the source

    node to the sink, e.g., a balanced routing tree with small tree

    height. The total queuing time depends on the transmission sched-

    ules of two consecutive wireless links. That is, if two consecutive

    wireless links are active discontinuously, the data packet from

    the incoming wireless link will be queued in the intermediate node

    to wait for permission to use the outgoing wireless link. In a data

    collecting tree, the data packets are transmitted in the direction

    from the leaves to the roots. Hence, given a data path from the

    source node to the sink, the optimal case is that the transmission

    timeslots of any two consecutive wireless links are always contin-

    uous to eliminate the queuing time. In this subsection, we improve

    the collision-free phase determination toward minimizing the

    queuing time to reduce the end-to-end latency.

    The phases of the cyclic TDMA schedule are the primary factors

    that affect the queuing time. Consider two consecutive wireless

    links, ei and ej, where ej is the parent ofei (i.e., the data packets will

    be delivered from ei to ej). Let hqi,/ii and hqj,/ji be the cyclic linkschedules of ei and ej, respectively. Recall that the source nodes

    of ei and ej are ni and nj, respectively. Hence, the data packets of

    ni will be transmitted through ei and possibly be queued in nj to

    wait for the transmission timeslot to access ej. Consider an exam-

    ple thathqi,/ii = h32,16i and hqj,/ji = h4,1i. If we unroll these twocyclic link schedules, the transmission timeslots of ei and ej will

    be {16,48,80,. . .} and {5,9,13,17, . . .,49, . . . ,81, . . .}, respectively.

    Note that in this case, every data packet transmitted by ei will be

    immediately relayed by ej in the subsequent timeslot, i.e., the pack-

    et will not be queued in the intermediate node nj. However, if

    hqi,/ii = h32,15i, the unrolled transmission timeslots of ei will be{15,47,79, . . . }, so the data packets transmitted by ei will be queued

    for 1 timeslot in nj. In cyclic TDMA schedule, the queuing time is

    deterministic if the periods are harmonic. Assuming qi > qj, thequeuing time between hqi,/ii and hqj,/ji can be computed asbelow:

    QueueTimehqi;/ii; hqj;/ji

    /j

    /iqj

    j k 1

    qi /i 1; if/i%qj > /j

    /j /iqj

    j k qi /i 1; otherwise:

    8>: 10

    Consider the first transmission period {0,1, . . . ,qi} ofei. The case that(/i%qj) > /j means that when the first packet transmitted by thechild link ei was received by the source node of the parent link ej,

    the parent link ej has already used its active timeslot of the current

    period, i.e., the/iqjj kth

    period, to transmit other packets. Hence, thepacket from ei must be queued in the intermediate node nj to wait

    for the next period. Thus, the next closest active timeslot of ej will

    be /j /iqj

    j k 1

    qi , so the queuing time will be /j

    b/iqjc 1

    qi /1 1. In the other case where (/i%qj)6 /j, the

    parent link ej has not used its active timeslot of the current period,

    so the queue time will be /j b/iqj

    c

    qi /i 1.

    By using Eq. (10), the function Latency-Efficient-Phase-Determi-

    nation depicted in Table 4 can greedily pick the phases that induce

    a minimum queuing time. From line 1 to line 12 in the function

    Latency-Efficient-Phase-Determination, the CyclicMAC scheduler

    determines the phase of a wireless link eis cyclic link schedule.

    Let ej be the parent link ofei (Line 1). In line 3 to line 11, the Cyclic-MAC scheduler greedily searches the phase that is collision-free

    and induces the smallest queuing time among all the candidate

    phases. The function ends after all the phases are checked (Line

    12).

    4.4. Latency analysis

    In this subsection, we analyze the end-to-end latency of a given

    cyclic schedule generated by the CyclicMAC scheduler. Recall that

    the end-to-end latency of a data packet is the time interval from

    the timethe packet leaves the source node to the timeit is received

    by the sink, and let Queue Time(hqi,/ii, hqj,/ji) represent the queu-ing time of a packet from a wireless link ei to its parent link ej. In a

    data collecting tree, a data packet will be relayed by several inter-

    mediate wireless links before arriving at the sink node. The end-to-

    end latency of a data packet will be the summation of the trans-

    mission times of the wireless links and the queuing times in the

    intermediate nodes during the transmission. Let a sensor node nibe i hops away from the sink n0, and let P= {ei, ei1, . . ., ej, . . ., e2, e1}

    be the end-to-end path that relays the data packets from thesource node ni to the sink n0, where each ej 2 Eand is the jth inter-

    mediate link of P from the sink to the source node ni. Due to the

    basic principle of TDMA summarized in Section 3, a wireless link

    will spend one timeslot to transmit a data packet, so the total

    transmission time of the wireless links will be jPj timeslots, where

    jPj is the number of intermediate links from the source node ni to

    the sink n0. Hence, let Latency(jPj) denote the end-to-end latency

    (in number of timeslots) of a data packet along the path

    P;Latency(jPj) is computed as below:

    LatencyjPj X

    ek ;ek12P

    QueueTimehqk1;/k1i; hqk;/ki jPj:

    Based on the latency metric, we then discuss the end-to-end latency

    of the CyclicMAC scheduler in the sparsely deployed data collectionsystem, and in the densely deployed data collection system.

    [Sparsely deployed data collection system]. A sparsely deployed

    data collection systemrefers to the data collection system in which

    a wireless link is only interfered by its parent and sibling links. For

    a wireless link, the CyclicMAC scheduler must pick the phase that

    will not conflict with the schedules of its parent and sibling links.

    In addition, as the phase will affect the length of queuing time,

    CyclicMAC scheduler should carefully determine the phase for each

    wireless link in order to minimize the end-to-end latency. We will

    show that, with the heuristic, Latency-Efficient-Phase-Determina-

    tion, the CyclicMAC will generate a schedule that lets the queuing

    time of a packet transmission on each hop be zero in sparsely de-

    ployed data collection system. Because the transmission time can-

    not be eliminated, such a schedule leads to an optimal end-to-endlatency. The proof is as below:

    Table 4

    Determine the phase with consideration of end-to-end latency.

    Function Latency-Efficient-Phase-Determination

    (ej, hqi,0i ,L, I)

    1 let ej be the parent link of ei, i.e., Parenti;

    2 MinQueueTime :MAXVALUE;

    3 for h = 0 to qi 1 do4 if IsCollisionFree(h, qi, L, I) then

    5 tmp : QueueTime (qi, h,qj,/j);6 if tmp < MinQueueTime then

    7 MinQueueTime : tmp;

    8 /i : h;

    9 end if;

    10 end if;

    11 end for;

    12 puthqi, /ii into L;

    C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644 1637

  • 7/30/2019 1-s2.0-S0140366411000831-main

    9/15

    Theorem 1. In a data collecting system, if

    (a) the periods of a cyclic TDMA schedule L satisfy the bandwidth

    requirementsof the wireless links i:e:;8ei 2 E;qi 61

    siP

    ej 2Childreni

    1qj

    !,

    (b) the periods in L are schedulable, and

    (c) each wireless link only has interference with its parent link and

    its sibling links,

    the function Latency-Efficient-Phase-Determination can always

    find phases for the cyclic TDMA schedule L to ensure the end-to-end

    latency of a data packet will always be equivalent to the link count

    from the source node to the sink, in units of timeslot. The above

    condition can be formally represented as below:

    LatencyP jPj;

    where P is an end-to-end path in the data collecting system.

    Proof. The theorem is proven if we can show that the queuing

    time of any pair of consecutive wireless links is zero so that the

    end-to-end latency of Pwill be equal to the number of its wireless

    links, i.e., jPj. Therefore, the goal is to prove the queue time will be

    zero. That is,Xek ;ek12P

    QueueTimehqk1;/k1i; hqk;/ki 0:

    Remember that we have assumed that the wireless links do not

    have any interference relationship except their parent links and

    their sibling links. Therefore, we can derive the end-to-end latency

    of a data packet under distinct numbers of intermediate links (i.e.,

    distinct values of jPj) to prove Theorem 1, as below:

    jPj = 1: The total transmission time will be one timeslot if the

    source node n1 is the one hop neighbor of the sink node.

    Besides, the end-to-end latency of the data packet from n1 will

    be zero because the wireless link e1 can only interfere with itssibling links. Note that the sibling links of e1 with shorter peri-

    ods than q1 will be scheduled prior to e1, e.g., ek and el in Fig. 4have been scheduled. In addition, because all the periods are

    harmonic, q1 will be an integral multiple of the hyper-periodofqk and ql. This implies that in a period of e1, the cyclic linkschedules of these sibling links will repeat several times. That

    is, in each period q1, the timeslot allocations for ek and el will

    be the same, as illustrated in Fig. 4. Hence, once CyclicMAC

    can pick an initial offset /1 in the first period to be the phases

    ofe1, the timeslots {/1 + q1,/1 + 2 q1,/1 + 3 q1, . . .} will alsobe available for e1. But if no such available timeslot is found in

    the first period, CyclicMAC will also be unable to find such a

    timeslot in the following periods. This implies that q1 is notschedulable, which violates assumption (b). Based on the above,

    we have proven that if the periodq1

    is schedulable, no queuing

    time will be necessary to transmit a packet from n1 to the sink.

    jPj = 2: The total transmission time will be two timeslots if the

    source node ni is two hops away from the sink node. We then

    prove that a data packet from ni will be transmitted to the sink

    in two timeslots.

    Assume P= {e1,e2} is an end-to-end path from a node n2 to the

    sink n0. Let q2 be the period of the cyclic link schedule of e2,and letq1 be the period of the cyclic link schedule ofe1. The goalis to determine a phase /2 for e2 in the range from0 toq2 1 sothat, Queue Time(hq2,/2i, hq1,/1i) = 0. Which implies that thedata packets can be transmitted to the sink in 2 timeslots.

    Because e1 will not only transmit its own data packets but also

    relay the data packets from its child link e2

    , the period rho1

    must

    be equal to or shorter than q2. Note that e2 might interfere withits parent link (i.e., e1) and sibling links. Thus, when determin-

    ing the phase of the link e2, the phases of (1) the parent link

    e1, (2) e1s sibling links with shorter periods than q2, and (3)e2s sibling links with shorter periods than must have been

    determined. Therefore, there is no need to prove that in each

    period q2, the timeslot allocations for these scheduled links willbe the same, as illustrated in Fig. 5. Hence, once CyclicMAC can

    pick an initial offset /2 in the first period to be the phases ofe2,

    the timeslots {/2 + q2,/2 + 2 q2,/2 + 3 q2, . . .} will always beavailable for e2. Thus, we have proven that if the period q2 isschedulable, no queuing time will be necessary to transmit a

    packet from e2 to e1.

    jPj =f: Assume that the above condition is fulfilled for an end-

    to-end path whose length is f; in other words, there are fwire-

    less links in P (i.e., P= {ef, ef1, . . . , e1}), and the end-to-end

    latency of P will be f timeslots. Fig. 6 illustrates such an

    example.

    jPj =f+ 1: An end-to-end path P= {ef+1,ef, ef1, . . ., e1} whose

    length is P =f+ 1 must include an end-to-end path

    {ef, ef1, . . ., e1} whose length is f. Based on the above induction,

    the end-to-end latency of the path {ef, ef1, . . ., e1} will be f.

    Fig. 4. The timeslot allocation that allows the data packets from n1 to be immediately transmitted to the sink.

    Fig. 5. The timeslot allocation that allows the data packets from e2 to be transmitted by e1 immediately.

    1638 C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644

  • 7/30/2019 1-s2.0-S0140366411000831-main

    10/15

    Hence, if we can find a phase for ef+1 that will let a packet from

    ef+1 be transmitted by ef immediately, the end-to-end latency of

    jPj will be f+ 1. Note that ef is the first link of the path

    {ef, ef1, . . ., e1} and also the second link of P= {ef+1, ef, ef1, . . ., e1}.

    Hence, qf, which is the period of ef, will be allocated with ashorter period than the period ofef+1. Note that ef+1 might inter-

    fere with its parent link (e.g., ef) and sibling links. Thus, when

    determining the phase of ef+1, (1) the parent link ef and its sib-

    ling links with shorter periods than qf+1, (2) efs downstreamlinks and their sibling links with shorter periods than qf+1,and (3) ef+1s sibling links with shorter periods than qf+1 musthave been determined. Because the periods are all harmonic,

    the period qf+1 will be an integral multiple of the hyper-periodof (1)qf , (2) the periods of efs sibling links with shorter periodsthan qf+1, (3) the periods of efs downstream links and their sib-ling links with shorter periods than qf+1, and (4) the periods ofef+1s sibling links with shorter periods than qf+1. Once Cyclic-MAC can pick an offset /f+1 to be the phase of ef+1, the timeslots

    {/f+1 + qf+1, /f+1 + 2 qf+1, /f+1 + 3 qf+1 , . . .} will always beavailable for ef+1. Otherwise, this implies that qf+1 is not sched-ulable, which violates assumption (b).

    Based on the above induction, we have proven that the function

    Latency-Efficient-Phase-Determination will pick phases for a cyclic

    TDMA schedule to obtain an optimal end-to-end latency if all the

    wireless links only interfere with their parent links and sibling

    links. Such ideal case is although restricted but still reasonable in

    a sparsely deployed wireless sensor network.

    [Densely deployed data collection system]In case of densely de-

    ployed data collecting system, a wireless link interferes with not

    only the parent and sibling links, but also the wireless links of

    the other sub-trees. That is, when determining the phase for a

    wireless link, CyclicMAC scheduler might not be able to assign

    the phase leading to zero queuing time to the wireless link because

    such phase might conflict with the cyclic link schedule of a nearby

    link. In that case, the function Latency-Efficient-Phase-Determina-

    tion (line 4 to line 10) will greedily select the phase that will queue

    the data packet for just one timeslot. If no such phase is available,

    the function Latency-Efficient-Phase-Determination will select the

    phase that queues the data packet for two timeslots. This phase

    determination process will continue until a phase is selected or

    the phase offset exceeds the period length. Such additional latency

    will be at most the number of its interfering neighbor wireless

    links. That is, assuming the data collecting system is schedulable,

    the resulted end-to-end latency of schedule L will be as below:

    max8P2E

    jPj Xej 2P

    jIjj where jIjj is the number of ejs neighbor in I

    0@

    1A;

    where Pis an end-to-end path in a data collecting tree E, and Iis the

    corresponding interference graph.

    5. Simulation results

    In this section, we evaluate the performance of the CyclicMACscheduler via simulation. We use TOSSIM-CC2420 [27] to simulate

    a network containing some sensor nodes equipped with a Chipcon

    CC2420 wireless transceiver. We compare CyclicMAC with three

    popular MAC mechanisms, which are commonly used on wireless

    sensor networks as follows:

    EDF-based TDMA: EDF-based TDMA is a typical timetable-

    based TDMA scheduler. It lists the transmissions within the

    hyper-period of the sampling periods of the sensor nodes. Note

    that the total packet transmissions include those directly

    launched by the sensor nodes and the corresponding relaying

    transmission. Then, EDF-based scheduler specifies a timeslot

    to every packet transmission according to the Earliest Deadline

    First policy. Notably, EDF-based scheduler has been proven to

    be optimal in reducing end-to-end latency[12].

    Coloring TDMA: In Coloring TDMA, each wireless link is

    assigned a timeslot ID, which indicates a color in the coloring

    algorithm. The coloring algorithm is executed based on the

    interference graph of the network so that two wireless links

    that interfere with one another will not be assigned to the same

    timeslot. The order of color assignment is in the order of Depth

    First Search (DFS) from the sink to the leaf nodes in order to

    minimize the end-to-end latency. That is, during traversing of

    the data collecting tree, each visited wireless link will be

    assigned a timeslot that is closest to the timeslot assigned to

    its parent.

    CSMA: The default MAC mechanism supported by TOSSIM-

    CC2420 is CSMA. Before transmitting a packet, a sensor node

    will wait for a random period and then assess the channel con-

    dition via a Channel Clear Assessment (CCA) hardware compo-

    nent to ensure the channel is clear for transmission. If the

    channel is not clear, the sensor node will wait for an additional

    random period and check the CCA again to see if the channel is

    clear to send.

    We then conduct several simulations with distinct sampling

    rates and deviations to evaluate the performances of the above

    schedulers. In each simulation, we assume that the timeslot lengthis 4 ms, which is capable of transmitting one 42-byte packet with a

    29-byte payload. The data packets are not aggregated by the inter-

    mediate nodes due to their heterogeneous nature. Additionally, the

    queue size of each sensor node is 420 bytes, i.e., capable to queue

    10 packets. If the queue is full, the oldest data packet will be

    dropped and considered as a lost packet. The simulation is re-

    peated for three rounds; in each round, the simulation lasts for

    5 min and then generates the following performance metrics:

    Delivery rate: The ratio of the packets successfully received by

    the sink.

    End-to-end latency of a data packet: The duration between the

    time that a data packet leaves the source node to the time that

    it is received by the sink node.

    5.1. Table size

    In the previous section, we analyzed the space complexity of a

    timetable-based TDMA schedule. For a static data collecting sys-

    tem, the length of the hyper-period (i.e., the least common multi-

    ple) of the sampling periods affects the size of the timetable. The

    worst case of the table size will be the production of all the sam-

    pling periods, which will be exponential, and such a large table

    could be too large for practical WSN-based applications. But if

    the sampling periods are in harmonic form, the length of the hy-

    per-period will be equal to the longest period. In this subsection,

    we will demonstrate how the sampling rates and their deviations

    impact the timetable size via simulation. In the following simula-tions, we randomly generate 4, 8, 12, 16, 20, 24, and 30 sensor

    nf+1 n0...

    f+1 hops

    fhops

    efef+1e1

    n1nf

    Fig. 6. An end-to-end path with f intermediate links.

    C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644 1639

  • 7/30/2019 1-s2.0-S0140366411000831-main

    11/15

    nodes, and a minimum hop tree is constructed above the sensor

    nodes. We compare the maximum size of the TDMA schedule ta-

    bles generated by the EDF-based TDMA scheduler and CyclicMAC.

    In the EDF-based TDMA schedule, each table entry specifies a

    transmission timeslot for a wireless link, and the size of a table en-

    try is 5 bytes, i.e., 1 byte for the wireless link id and 4 bytes for the

    timeslot id. We also assume that a sensor node only keeps the nec-

    essary entries that specify its transmission timeslots of its adjacent

    wireless links.

    In the first simulation, the average sampling rate of the sensor

    nodes is set to 2.5 Hz (i.e., the corresponding sampling period is

    100 timeslots). We define the deviation as the difference between

    the upper bound and the average, the same to the difference be-

    tween the lower bound and the average. The deviation of the sam-

    pling rate in this simulation is set to 50%, i.e., the possible sampling

    periods range from 50 to 150 timeslots. As mentioned above, the

    schedule table of a sensor node in EDF-based TDMA should specify

    sufficient transmission timeslots to transmit the data packets of

    the sensor itself and its upstream nodes. The number of entries

    in the schedule table of the node is primarily determined by three

    major factors: the number of upstream nodes, the sampling rates

    of the node and its upstream nodes, and the length of the hyper-

    period of the sampling periods of these nodes. The worst case of

    the table size will happen if the following three conditions are all

    satisfied: (1) the sink has only one child node, (2) all the other sen-

    sor nodes are the children of this child node, and (3) the sampling

    periods of these nodes are all prime numbers. In our simulation,

    the average sampling rate is 2.5 Hz (i.e., the average sampling per-

    iod of the sensor nodes is 100 timeslots), and the largest number of

    sensor nodes is 30. Since the deviation of the sampling rates is 50%,

    the worst case in such a scenario happens when the sampling peri-

    ods of these 30 sensor nodes are the largest 30 prime numbers in

    the range from 50 to 150 timeslots. Since the size of a table entry

    is 5 bytes, the size of the entire schedule table in the worst case

    will be tens of Gigabytes, which is an incredible large storage

    requirement. Fig. 7(a) illustrates our simulation results that dem-

    onstrate the relationship between the maximum TDMA scheduletable size and the number of sensor nodes in EDF-based TDMA

    and CyclicMAC. As expected, when the number of sensor nodes in-

    creases, the schedule table size will grow exponentially. When the

    number of sensor nodes increases up to 30, the size of the EDF-

    based TDMA schedule table will be larger than 350 M bytes.

    In the next simulation, we still set the average sampling rate to

    2.5 Hz and then vary its deviation to 10%, 20%, 30%, 40%, and 50%.

    Fig. 7(b) illustrates the relationship between the table size and the

    deviation of sampling rate in EDF-based TDMA and CyclicMAC.

    This figure illustrates an apparent trend that a larger deviation of

    the sampling rate implies a larger EDF-based schedule table.

    Hence, we conclude that, in a data collecting system, the table size

    is primarily affected by the number of sensor nodes, the sampling

    rates, and the deviation of sampling rates. The simulation resultsalso demonstrate that the EDF-based TDMA schedule is only

    affordable to a data collecting system containing just a few sensor

    nodes, and all of these nodes must operate homogeneously. Both

    the figures also show that under all the above configurations, the

    CyclicMAC scheduler always generates a constant and small-sized

    schedule table, which is more desirable to the sensor nodes with

    limited resources.

    5.2. Performance evaluation

    In this subsection, we evaluate the performance of CyclicMAC

    when the sampling rates of the sensor nodes are in different levels

    of deviation. In detail, the average sampling rates of the sensor

    nodes are set to 2.5 Hz, 1.3 Hz, 0.8 Hz, 0.6 Hz, or 0.5 Hz, and thedeviation of its sampling rate is set to 10%, 20%, 30%, 40%, or 50%.

    We generate ten topologies, which all contain 30 sensor nodes that

    are randomly separated in a field of 290 235 square meters. Fig. 8illustrates one of these network topologies in the simulation. We

    let the transmission range of CC2420 radio be 50 m, because it

    can achieve 99% delivery rate if no interference happens under this

    configuration. We build the underline network topology based on

    this information, above which we build a routing tree whose tree

    height equals 7 hops. For convenience, the interference graph of

    the network topology is also built based on the distance based

    interference model. That is, two wireless links will interfere with

    each other if (1) the distance between their source nodes is shorter

    than or equal to 50 m, or (2) the distance between the destination

    node of one wireless link and the source node of the other wireless

    link is shorter than or equal to 50 m.

    Fig. 9(a) compares the average system delivery rates of EDF-

    based TDMA, Coloring TDMA, CSMA, and CyclicMAC under differ-ent sampling rates over the randomly generated networks. In gen-

    eral, the delivery rates of the three TDMA-based protocols are

    much better than that of the CSMA protocol. This is because CSMA

    highly suffers the hidden station problem [28]. Even if the sam-

    pling rate is low, the hidden station problem also incurs extensive

    packet collisions. Moreover, the Coloring TDMA performs poorly

    when the sampling rate is high. This is because the Coloring TDMA

    scheduler allocates the transmission timeslots based on the inter-

    ference graph rather than the bandwidth requirements of the wire-

    less links. Hence, when the sampling rate is high, a lot of data

    packets will be queued too long in the sensor nodes and finally

    could be dropped, thus decreasing the packet delivery rate.

    Fig. 9(b) illustrates the average delivery rates of the nodes with dif-

    ferent distances to sink node. The delivery rates of the TDMA-basedschedulers are still higher than the CSMA protocol. However, we

    Fig. 7. The size of TDMA schedule tables generated by different schedulers: (a) the

    number of sensor nodes vs. maximum table size; (b) the deviation of sampling rate

    vs. maximum table size.

    1640 C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644

  • 7/30/2019 1-s2.0-S0140366411000831-main

    12/15

    also observe that as the distance increases, the delivery rate of Col-

    oring TDMA significantly decreases. This is also because Coloring

    TDMA does not consider the heterogeneous bandwidth require-

    ments on wireless links. In overview, the EDF-based scheduler per-

    forms similarly to CyclicMAC on the delivery rate. However, as

    mentioned in the previous sub-section, the overhead on schedule

    table size of EDF is much larger than that of CyclicMAC.

    Fig. 9(c) shows the comparisons on the end-to-end latenciesand the corresponding deviations in EDF-based TDMA, Coloring

    TDMA, and CyclicMAC. As we mentioned in the previous subsec-

    tion, the mechanism of CSMA differs too much from those of the

    other TDMA-based schedulers, and the delivery rate of CSMA is

    also too low, so we just ignore CSMA in this simulation. Obviously,

    the end-to-end latency of Coloring TDMA is the worst among the

    three TDMA schedulers. This is also because the Coloring TDMA

    does not consider the heterogeneous bandwidth requirements on

    wireless links, so the queuing time lengthens the end-to-end la-

    tency. On the other hand, the end-to-end latency of EDF-based

    TDMA is slightly shorter than that of CyclicMAC; however, the

    extensive table size of EDF-based TDMA makes it infeasible to be

    applied in a resource limited WSN. In addition, the deviations of

    the end-to-end latency of CyclicMAC are slightly smaller thanthose of EDF-based TDMA. This result shows that the CyclicMAC

    induces amore static behavior in packet deliveries, which is bene-

    ficial to the management of the sensor data. As CyclicMAC has a

    delivery rate, an end-to-end latency similar to EDF-based TDMA,

    and a static packet delivery behaviors but requires much less stor-

    age overhead on TDMA schedule tables, CyclicMAC is considered as

    the most balanced solution among these TDMA schedulers.

    Finally, we evaluate the improvement on end-to-end latency

    caused by the proposed latency minimization function Latency-

    Efficient-Phase-Determination. Without the proposed latency mini-

    mization function, the consecutive wireless links might not be able

    to transmit data in contiguous timeslots. This implies that a data

    packet might be queued for a while in an intermediate link, and

    thus the end-to-end latency will increase. The simulation resultillustrated in Fig. 10 conforms to our expectation. With the

    proposed latency minimization function, the end-to-end latency

    can be reduced to around half of the original.

    5.3. Bridge monitoring: a case study

    In this section, we evaluate CyclicMAC using the configuration of

    a practical bridge monitoring application. This bridge monitoring

    system is to monitor the health state of the Chun-Chen Bridge,which connects Taipei City and Taipei County in Taiwan. Table 5

    illustrates both the placements of the sensor nodes on the bridge

    and the topology of the underlying wireless networks. The length

    of the Chun-Chen Bridge is 400 meters, and the distance of farthest

    pair of sensor nodes are 50 m. Table 5 lists the sensors used in this

    scenario, including their locations and sampling rates. Note that the

    accelerometers are placed on positions {1, 9, 10, 11, 12}, which are

    close to thesink, and these sensors generate an extensiveamountof

    sample data which is not affordable to the wireless channel. Recall

    that the payload of a packet in our simulator is 29 bytes, so we let

    these high sampling rate sensor nodes continuously feed the sam-

    ple data to the payload of a packet and transmit the packet until

    the payload is full, thus reducing the packet transmission rates.

    However, even with this down-sampling mechanism, the bridgemonitoring system still has some challenges with packet transmis-

    sion. Apparently, the traffic in the area near to the sink node is hea-

    vy, implying that a large amount of packet collisions might occur. If

    a MAC protocol does not arrange the packet transmission well, the

    packet delivery rate will decrease dramatically, whilst the end-to-

    end latency will increase significantly.

    Fig. 11(a) shows the resulting delivery rates of EDF-based

    TDMA, CSMA, Coloring TDMA, and CyclicMAC scheduler. The deliv-

    ery rate of CSMA is only about 30% and is the worst among the four

    MAC protocols. This is because the traffic around the sink is so

    crowded that the CCA of each sensor node in this area is usually

    aware of the transmissions of data packets, thus the sensor node

    usually cannot send its packets. This, therefore, lets the packets

    be easily queued too long in some intermediate nodes and finallyleads to packet loss due to queue overflowing. In addition, even

    Fig. 8. The network topology used in the simulation.

    C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644 1641

  • 7/30/2019 1-s2.0-S0140366411000831-main

    13/15

    if the CCA acknowledges that the channel is clear to send, packet

    collision still could happen due to the hidden station problem

    [28]. Coloring TDMA prevents packet collision, so it has a higherdelivery rate than CSMA. However, the coloring algorithm assigns

    the timeslots based on the network topology rather than the band-

    width requirements of the wireless links, so we expect that the

    data packets might be queued in some intermediate nodes too

    long, even being dropped due to queue overflowing. As we ex-

    pected, Fig. 11(a) shows that Coloring TDMA can only successfully

    deliver 77% of the data packets. This figure also illustrates that both

    EDF-based TDMA and CyclicMAC can deliver almost 100% of the

    data packets, which are the best in this application.

    The bridge monitoring system must collect the sample data for

    alarming the emergencies, like bridge breaking, so the end-to-end

    latency is also important. Because the mechanism of CSMA differs

    too much from those of the other TDMA-based schedulers, and the

    delivery rate of CSMA is also too low, we just ignore CSMA in thissimulation. Fig. 11(b) shows the end-to-end latencies of EDF-based

    TDMA, Coloring TDMA, and CyclicMAC. With the same results in

    the previous subsection, the latency of Coloring TDMA is the worst

    among the three TDMA schedulers, and the latencies of EDF-basedTDMA and CyclicMAC are very similar in this scenario. CyclicMAC

    only performs slightly worse than EDF-based TDMA on the nodes

    whose distances from the sink are 7 and 8 hops, respectively.

    The above simulation results demonstrate that the EDF-based

    TDMA seems a suitable solution to a static data collecting system

    because it can support both the highest delivery rate and the short-

    est end-to-end latency. However, the simulation results in Section

    5.1 have demonstrated that the EDF-based TDMA will generate a

    huge TDMA schedule table that is not affordable to resource-lim-

    ited sensor nodes. On the other hand, the delivery rate and the

    end-to-end latency of CyclicMAC are almost the same as the

    EDF-based TDMA. Besides, unlike the EDF-based TDMA, CyclicMAC

    just requires a tiny TDMA schedule table. Hence, CyclicMAC seems

    to provide a more practical solution to a WSN-based data collectingsystem.

    0%

    20%

    40%

    60%

    80%

    100%

    0.5 0.6 0.8 1.3 2.5

    DeliveryRate(%)

    Sampling Rate (Hz)

    CyclicMAC

    EDF

    Coloring

    CSMA

    0%

    20%

    40%

    60%

    80%

    100%

    1 2 3 4 5 6 7 8

    DeliveryRate(%)

    Distance (hops to sink)

    CyclicMAC

    EDF

    Coloring

    CSMA

    0.00

    1.00

    2.00

    3.00

    4.00

    5.00

    6.00

    7.00

    1 2 3 4 5 6 7 8

    End-to-EndLatency(seconds)

    Distance (hops to sink)

    CyclicMAC

    EDF

    Coloring

    Deviation (%)

    ops 1 2 3 4 5 6 7 8

    Cyc icMAC 0.0% 0.1% 1.8% 6.2% 10.1% 7.1% 14.1% 11.3%

    EDF 0.0% 11.2% 12.0% 20.9% 12.5% 14.9% 12.5% 21.5%

    Co oring 88.5% 88.5% 86.8% 51.7% 48.7% 46.7% 44.7% 42.8%

    (a)

    (b)

    (c)

    Fig. 9. Network performance of different schedulers: (a) delivery rates vs. sampling rates; (b) delivery rates vs. the distances from the nodes to the sink; (c) average end-to-

    end latencies vs. the distances from the nodes to the sink.

    1642 C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644

  • 7/30/2019 1-s2.0-S0140366411000831-main

    14/15

    6. Conclusion and future works

    In this paper, we have proposed a TDMA scheduler, called

    CyclicMAC scheduler, that fulfills the three design issues of a struc-

    tural health monitoring (SHM) application over a multihop wire-

    less sensor network. For a given routing structure and bandwidthrequirement of each wireless link, CyclicMAC scheduler can gener-

    ate a cyclic TDMA schedule with minimum end-to-end latency. A

    cyclic TDMA schedule only occupies a small amount of memory

    space, and this advantage makes it suitable to be stored and ex-

    changed in a resource limited wireless sensor network. Besides,

    the schedule not only satisfies the heterogeneous bandwidth

    requirements of distinct wireless links but also reduces the end-

    to-end latency of transmitting a data packet. We have proven that

    in an ideal case where each wireless link only interferes with its

    parent link and sibling links, the schedule will not induce any

    queuing time so that the end-to-end latency of transmitting a

    packet is optimal. Such ideal case is although restricted but still

    reasonable in a sparsely deployed wireless sensor network. And

    in other cases, our schedule also results in a bounded end-to-endlatency of transmitting a packet. We have compared the perfor-

    mance of CyclicMAC with those of an EDF-based TDMA, Coloring

    TDMA, and CSMA over 10 randomly deployed networks and a real

    bridge monitoring system. Simulation results have demonstrated

    that the EDF-based TDMA scheduler has both the highest packet

    delivery rate and the shortest end-to-end latency, but it might gen-

    erate a huge TDMA schedule table that is not affordable to a re-

    source-limited sensor node. In addition, CyclicMAC scheduler

    performs almost as efficiently as the EDF-based TDMA scheduler

    but requires only a tiny TDMA schedule table. With these advanta-

    ges, CyclicMAC is considered to be an ideal MAC scheduler to real-time WSN applications whose data sampling rates are static.

    0.00

    0.10

    0.20

    0.30

    0.40

    0.50

    0.60

    0.70

    0.80

    1 2 3 4 5 6 7 8

    End-to-EndLatency(seconds)

    Distances (hops to sink)

    With latency minimization

    Without latencyminimization

    Deviation (%)hops 1 2 3 4 5 6 7 8

    With latencyminimization

    0.0% 0.1% 1.8% 6.2% 10.1% 7.1% 14.1% 11.3%

    Without latencyminimization

    0.0% 0.1% 2.0% 7.0% 10.1% 8.1% 14.0% 11.0%

    Fig. 10. Effectiveness of different phase determinations on the end-to-end latency.

    Table 5

    A Topology of a bridge monitoring system.List of sensor nodes.

    Sensor type Sampling

    rate (Hz)

    Data size for

    a sample

    Location

    Accelerometer 100 6 bytes 1, 9, 10

    Thermal sensor 1 1 byte 2, 3, 4, 5, 6, 11, 12

    Settlement Gauges 1 1 byte 13

    Inclinometer 0.125 1 byte 7, 8, 14

    Fig. 11. Network performances of different MAC schedulers: (a) delivery rate; (b)average end-to-end latencies vs. the distances from the nodes to the sink.

    C.-Y. Lin et al. / Computer Communications 34 (2011) 16301644 1643

  • 7/30/2019 1-s2.0-S0140366411000831-main

    15/15

    To extend CyclicMAC, we will further explore a number of is-

    sues. The first is to improve the utilization of the timeslots. Recall

    that in CyclicMAC, the lengths of the periods are transformed into

    harmonic numbers so that the timeslots can be scheduled via the

    Distance Constraint scheduler. The transformed periods must be

    shorter than or equal to the original ones; hence, there might be

    some wastage in utilization because the number of allocated

    timeslots might exceed the actual requirement. This problem is

    actually not too critical in CyclicMAC because these timeslots still

    have a second chance to be allocated to other links, as we have

    mentioned in Section 4. However, a more accurate period assign-

    ment still could


Recommended