+ All Categories
Home > Documents > Performance Evaluation of Mac Transmission Protocol

Performance Evaluation of Mac Transmission Protocol

Date post: 06-Apr-2018
Category:
Upload: ram7865
View: 217 times
Download: 0 times
Share this document with a friend

of 16

Transcript
  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    1/16

    Performance evaluation of MAC transmission power controlin wireless sensor networks

    Javier Vales-Alonso *, Esteban Egea-Lopez, Alejandro Martnez-Sala,Pablo Pavon-Marino, M. Victoria Bueno-Delgado, Joan Garca-Haro

    Department of Information Technologies and Communications, Polytechnic University of Cartagena, Spain

    Received 1 February 2006; received in revised form 3 July 2006; accepted 4 August 2006

    Available online 12 September 2006

    Responsible Editor: E. Chong

    Abstract

    In this paper we provide a method to analytically compute the energy saving provided by the use of transmission powercontrol (TPC) at the MAC layer in wireless sensor networks (WSN). We consider a classical TPC mechanism: data packetsare transmitted with the minimum power required to achieve a given packet error probability, whereas the additional MACcontrol packets are transmitted with the nominal (maximum) power. This scheme has been chosen because it does not mod-ify the network topology, since control packet transmission range does not change. This property also allows us to analyt-

    ically compute the expected energy savings. Besides, this type of TPC can be implemented in the current sensor hardware,and it can be directly applied to several MAC protocols already proposed for WSN. The foundation of our analysis is theevaluation ofL ratio, defined as the total energy consumed by the network using the original MAC protocol divided by thetotal energy consumed if the TPC mechanism is employed. In the L computation we emphasize the basic properties of sensornetworks. Namely, the savings are calculated for a network that is active for a very long time, and where the number ofsensors is supposed to be very large. The nodes position is assumed to be random a normal bivariate distribution isassumed in the paper and no node mobility is considered. In the analysis we stress the radio propagation and the distri-bution of the nodes in the network, which will ultimately determine the performance of the TPC. Under these conditions wecompute the mean value ofL. Finally, we have applied the method to evaluate the benefits of TPC for TDMA and CSMAwith two representative protocols, L-MAC and S-MAC using their implementation reference parameters. The conclusion isthat, while S-MAC does not achieve a significant improvement, L-MAC may reach energy savings up to 1020%. 2006 Elsevier B.V. All rights reserved.

    Keywords: Energy saving; MAC; Network lifetime; Transmission power control; WSN

    1. Introduction

    Wireless sensor networks (WSNs) consist of alarge set of autonomous wireless sensing nodes [1].They are designed and deployed to accomplishspecific tasks, e.g. environmental monitoring,

    1389-1286/$ - see front matter 2006 Elsevier B.V. All rights reserved.

    doi:10.1016/j.comnet.2006.08.001

    * Corresponding author. Tel.: +34 968 326588; fax: +34 968325973.

    E-mail addresses: [email protected] (J. Vales-Alonso),[email protected] (E. Egea-Lopez), [email protected] (A. Martnez-Sala), [email protected] (P. Pavon-Marino), [email protected] (M. Victoria Bueno-Delgado),[email protected] (J. Garca-Haro).

    Computer Networks 51 (2007) 14831498

    www.elsevier.com/locate/comnet

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    2/16

    industrial sensing or space exploration. As a conse-quence, WSNs have specific traffic patterns and net-work topologies, which are strongly applicationdependent. WSNs also inherit key properties fromad-hoc networks: decentralized control, common

    transmission channel, broadcast nature, multihoprouting, and ephemeral topologies, among others.Besides, there are two WSN basic constraints. First,the expected hardware, program, and data memoryresources are scarce, consequently imposing limita-tions on the protocol complexity. Second, theamount of energy available per node is finite if theyare battery powered. Therefore, the development ofenergy-efficient protocols and applications is amajor challenge in current WSN research, in orderto develop systems that run unattended (withoutbattery replacement) for an arbitrary long time

    (e.g. years).In fact, the major sources of energy waste are

    related to radio communication issues [2,3]. Forinstance, communicating one bit of informationconsumes as much energy as executing hundredsof instructions in typical sensor nodes like Mica2motes [4]. The radio interface consumption dependson its state, which can be one of the following:

    Transmission state (tx). Packet transmission.Power consumption is proportional to the radi-

    ated output power, which can be selected froma set of discrete values (e.g. from 20 to 5 dBmin steps of 1 dB in the Mica2 motes, see Table1). However, in practice the output power is keptfixed at a nominal value (usually the maximumpossible output power).

    Reception- and listening- state (rx). Packet recep-tion and channel listening (carrier sense). It alsoconsumes a significant amount of power whetherreceiving actual data or just listening (e.g.35.4 mW in the Mica2 motes).

    Sleep state (sl). Radio off. Negligible power con-sumption (e.g. 3 lW in the Mica2 motes).

    From the medium access control (MAC) layerperspective consumption may be minimized if thenodes sleep during inactivity instead of being inthe reception state. Thereby the average consump-tion is significantly reduced. This strategy requirescoordination among the nodes (all the neighborsmust sleep and awake simultaneously), and a trade-off between the sleeping time and the achievablethroughput (since nodes cannot send or receive data

    in the sleep state). Consumption may also be

    reduced using only the power needed for each datatransmission. Fig. 1 illustrates this idea. Node 1reaches nodes 2 and 3 with power Q1, howevernodes 4, 5 and 6 are only reached at power Q2. Inthis case Q2 is the nominal power that guaranteesfull connectivity. But, if power is set fixed, there is

    Table 1Path-loss model (a = 3.95) ranges and consumptions for theMica2 output powers

    Output power Consumption (mW) Range (m)

    20 dBm (0.0100 mW) 25.8 19.30

    19 dBm (0.0126 mW) 26.4 20.46

    18 dBm (0.0158 mW) 27.0 21.6917 dBm (0.0200 mW) 27.0 22.9916 dBm (0.0251 mW) 27.3 24.3815 dBm (0.0316 mW) 27.9 25.8414 dBm (0.0398 mW) 27.9 27.3913 dBm (0.0501 mW) 28.5 29.0312 dBm (0.0631 mW) 29.1 30.7811 dBm (0.0794 mW) 29.7 32.6210 dBm (0.1000 mW) 30.3 34.589 dBm (0.1259 mW) 31.2 36.668 dBm (0.1585 mW) 31.8 38.867 dBm (0.1995 mW) 32.4 41.196 dBm (0.2512 mW) 33.3 43.67

    5 dBm 0.3162 mW) 41.4 46.294 dBm (0.3981 mW) 43.5 49.073 dBm (0.5012 mW) 43.5 52.012 dBm (0.6310 mW) 45.3 55.131 dBm (0.7943 mW) 47.4 58.44+0 dBm (1.0000 mW) 50.4 61.95+1 dBm (1.2589 mW) 51.6 65.67+2 dBm (1.5849 mW) 55.5 69.61+3 dBm (1.9953 mW) 57.6 73.79+4 dBm (2.5119 mW) 63.9 78.22+5 dBm (3.1623 mW) 76.2 82.92

    Node 2

    Node 3

    Node 4

    Node 6

    2Q

    1Q

    Node 1

    Node 5

    Fig. 1. Discrete output powers.

    1484 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    3/16

    a waste when data packets are delivered to nodes 2and 3 at power Q2. Selecting the best output powerin each transmission may reduce the output powerconsiderably, and thus the total consumption. Thistype of strategy is called Transmission Power

    Control (TPC). Up until now only the formerscheme coordinated sleeping has been exhaus-tively studied as a technique for energy saving inWSNs, since idle listening avoidance has beenwidely considered the dominant factor to reducepower consumption. This has been the major designobjective of a large set of specific WSN MAC proto-col proposals [3,58].

    In this paper, we are interested in the additionalbenefits, in terms of energy saving, that the use ofTPC may provide to WSN MAC protocols. First,we have to select a TPC mechanism suitable (or at

    least adaptable) for the vast majority of the WSNMAC approaches, in order to evaluate the perfor-mance of TPC. We have selected a well-knownapproach for TPC [9]: the considered TPC mecha-nism uses the minimum power necessary to transmitthe network layer packet data units with a boundedpacket error probability, and the nominal (maxi-mum) power to transmit the additional MACcontrol packets. For instance, in the exampledepicted in Fig. 1, considering the IEEE 802.11 pro-tocol [10]: RTS/CTS/Data/ACK1 sequence. If node

    1 has to send a data packet to node 2, then node 1would start transmiting the RTS at the maximum(nominal) power Q2. Afterwards, node 2 wouldanswer with the CTS at the same nominal power.The data is then exchanged, but at the reducedpower Q1, and finally the ACK is transmitted withthe nominal power Q2.

    This approximation does not modify networktopology since control packet transmission rangeis not modified. Thereby, upper layer behavior isnot affected. This property allows us to fairly com-pare the energy consumption between TPC andnon-TPC protocols.

    As a drawback, this type of TPC requires thatnodes have an exact knowledge about the outputpower needed for every packet exchange. Neverthe-less, since we are interested in the maximum energysaving achieved by an ideal TPC, we will assumethat this information is already known by the nodes.

    To evaluate such a mechanism, we compute theratio of the energy without TPC to the energy using

    the TPC algorithm after a very long running time.We denote this ratio as L. We find that, for a givennode distribution, L depends on two factors: (i) onecharacterizes the geometrical distribution of thenodes and the other (ii) is mainly influenced by

    the MAC protocol and the traffic of the network.Both parameters are evaluated under the mostwidely accepted WSN assumptions (see Section 4),stressing the geometrical distribution and the trans-mission properties of the network. It is shown thatL converges if the number of nodes is large. Thistheoretical framework can be applied to a widerange of MAC proposals just by adjusting theparameters of the model according to a givenMAC operation. As an example, it is applied to aset of traffic loads and nodes densities for twoMAC protocols, a TDMA one (L-MAC) [8] and a

    contention one (S-MAC) [3]. The results reveal thatenergy savings are considerable for L-MAC (from10% to 20%), while rather average for S-MAC(

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    4/16

    the aim of increasing the capacity in wireless mediaby means of channel reuse, or to ensure networkconnectivity. Two types of strategies have alreadybeen considered: (i) In network layer TPCs trans-mission power control is used to select the best sub-

    set of the actual neighbors to be reached, that is, fortopology control purposes (e.g. COMPOW [12] andPSP [13]). And (ii), the MAC layer TPCs, wherepower is selected for each packet to improve chan-nel reuse, or to reduce packet collision probability(e.g. PCM [14], PCDC [15], PCMA [16] andDCAPC [17]). The three latter proposals are basedon multichannel devices, using the additional chan-nels to signal incoming transmissions and tocompute the best output power to be used. Besides,the PCM protocol must run on specialized radiohardware that allows very fast output power

    variation.These solutions effectively reduce collisions and

    improve capacity, which is the major issue inMANETs. However, in WSN the primary concernis energy consumption efficiency, rather than highchannel throughput and reusability. Moreover,WSN protocols are constrained by the scarce mem-ory, CPU and radio resources available. Sensornodes are too limited to support most of the previ-ously mentioned approaches proposed for MAN-ETs. For instance, multichannel proposals cannot

    be implemented since current sensors are mainlymonochannel.

    There is a number of TPC algorithms designedspecifically for sensor networks. In [18] a set ofdistributed TPC algorithms is proposed. Thesemechanisms select a single transmission power levelfor each node. The different proposals are comparedto one another, using network connectivity and life-time as performance metrics, but no comparisonwith non-TPC protocols is provided. In this paper,on the contrary, we evaluate the expected energysavings that can be achieved by using a genericTPC protocol, without describing a particular wayof finding the power level necessary to reach aspecific neighbor. Thus, our analysis provides anideal upper bound on energy saving.

    Analytical studies on several aspects of TPC canalso be found in the scientific literature. In [19] theauthors look for the optimal transmission rangethat maximizes a parameter called expected one-hop progress in the desired direction, but energyconsumption is not considered. In [20], an analyticalcomparison between common range and variable-

    range TPC for MANETs is provided. The study is

    focused on the impact of TPC on network connec-tivity, capacity and routing protocols. An energyconsumption model, as a function of the packet size,MAC protocol and radio characteristics, is used in[21] to derive an optimal transmission power in

    terms of end-to-end energy consumption. Ourapproach focuses on the improvement that TPCmay provide. In addition, the TPC mechanism usedin our evaluation can be combined with proposalsfocused on network layer operation. It should benoticed that the network topology is determinedby the range of control packets, which here is setto the maximum (nominal) transmission power.Therefore, this nominal transmission power can beselected in order to achieve a desired network prop-erty, such as full connectivity, allowing TPC to beused for data transmission.

    3. Performance analysis

    In this section, we introduce the calculation ofthe energy saving which can be obtained from theTPC mechanism selected. Let n be the number ofnodes in the network. Let Titx(t), T

    irx(t) and T

    isl(t)

    be stochastic processes representing the accumu-lated time that node i, for i= 1, . . . , n, is in eachstate transmission (tx), reception (rx) and sleep(sl) during the interval [0, t). Then, we can define

    the total network accumulated time in each state,adding all the nodes contributions, Ttx(t), Trx(t)and Tsl(t), as

    Ttxt Xni1

    Titxt;

    Trxt Xni1

    Tirxt;

    Tslt Xni1

    Tislt:

    1

    Let us define Ptx, Prx and Psl accordingly, as thepower consumptions associated to each state. Then,the total energy consumed until an arbitrary instantt, E(t), is given by Eq. (2).

    Et PtxTtxt PrxTrxt PslTslt: 2We should specify a way to measure the energetic

    efficiency improvement due to the application of theTPC mechanism to a particular MAC protocol. Onemetric may be the increase in the lifetime of the net-work. However, this is difficult to define in a general

    way, since it is unclear when the network (as a

    1486 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    5/16

    whole) stops operating properly (which usuallydepends on the application). Instead, we can com-pute a metric of the efficiency (we name it L) ofTPC based on the asymptotical ratio for a large tof the energy consumption of the network in both

    cases (with and without TPC) through Eq. (3).

    L limt!1

    Etjno-TPCEtjTPC

    : 3

    This expression can be further developed takinginto consideration the assumption that controlpackets are always sent at the maximum power.Therefore, neither network topology, nor Titxt,Tirxt and Tislt, changes when TPC is used.

    Let us assume that the network is composed ofhomogeneous sensors with p possible transmission

    output powers (Qj,j= 1, . . . ,p). Let us denote Ptxias the power consumption associated to outputtransmission power Qi. Let Qp be the nominal (max-imum) transmission output power, and hence Ptxp isthe nominal consumption. Indeed, the transmissiontime of each node can be decomposed into twocontributions: data and signaling. Let us define thestochastic processes Tidatat, Tisignt for i= 1, . . . , nas the accumulated transmission time dedicated todata and signaling respectively for each node. LetTdatat P

    n

    i1Tidatat, Tsignt P

    n

    i1Tisignt. In

    addition, Ti

    datat can be further subdivided in thetime spent transmitting at each output power j:Tidatajt. Let us define Tdatajt

    Pni1T

    idataj

    t forj= 1, . . . ,p.

    Then, assuming that the power consumption dur-ing the sleep periods is negligible, the energy con-sumption without and with TPC is given by Eqs.(4) and (5), respectively.

    Etjno-TPC TdatatPtxp TsigntPtxp TrxtPrx; 4

    EtjTPC Xpj1

    TdatajtPtxj TsigntPtxp

    TrxtPrx: 5

    Therefore, from Eqs. (3)(5)

    L limt!1

    TdatatPtxp TsigntPtxp TrxtPrxPpj1TdatajtPtxj TsigntPtxp TrxtPrx

    :

    L can be rewritten dividing both numerator and

    denominator by PtxpTdatat; we obtain

    L limt!1

    1 TsigntTdatat

    PrxTrxtPtxpTdatatXp

    j1PtxjTdatajtPtxpTdatat

    TsigntTdatat

    PrxTrxtPtxpTdatat

    : 6

    Now, let us define the variable n as

    n limt!1

    TsigntTdatat

    Prx

    Ptxp

    TrxtTdatat

    !: 7

    Besides, let Q be the output transmissionpower random variable that assigns, to each trans-mission output power Qj, its corresponding proba-bility Pr[Q= Qj] (i.e., the probability that a datatransmission occurs in the jth power quantum).Let us note that

    PrQ Qj limt

    !1

    TdatajtTdata

    t

    : 8

    Hence,

    L 1 nPpj1

    Ptxj

    PtxpPrQ Qj n

    : 9

    Finally, calling s Ppj1 PtxjPtxp PrQ Qj, we arriveto

    L 1 ns n : 10

    This expression says that the energy ratio of the

    two approaches converges after a long running timeto a value that is a function of two variables: s and n.

    On the one hand, s-coefficient characterizes thegeometrical distribution of the network since itdepends on the relative distance between neighbors,which determines the output power required. More-over, s values are always within the interval (0,1].Low values indicate that nodes are closer, and sav-ings are thus more noticeable (larger values of L).High values indicate that it is unlikely that the out-put quantum can be reduced. In fact, s = 1 meansthat no saving is possible at all. In this case TPClacks interest.

    On the other hand, the n-coefficient measures thebalance between the time devoted to data transmis-sion and the time used for signaling and reception.Note that oL/on = (s 1)/(s + n)2 < 0 for alls 2 (0,1). Therefore, L decreases as n increases. Pro-tocols with a good balance have a low n value, yield-ing to a higher L ratio, that is, larger savings.

    Finally, let us note that both coefficients areinfluenced by the traffic properties, and that if eitherthe position of the nodes or the number of sensors

    changes, these variables (s and n) will also change,

    J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498 1487

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    6/16

    and so will the L factor. That is, L is a function ofthe number of nodes and their positions. Hence, ifnodes position is random (a likely case in WSN),the L factor is also random.

    We will compute the mean of L, L, in the next

    sections. We will show that for large values ofn

    ,in a representative WSN deployment, L is givenby the following expression:

    L 1 n

    s n : 11

    Both s and n (and, therefore, L) are evaluated inthe following sections applying the realistic assump-tions for WSN discussed in Section 4.

    4. WSN model

    At this point, we aim at computing the general Lfunction derived in the previous section for a repre-sentative WSN model. Such scenario is specified by:(i) a suitable propagation model, (ii) a node distri-bution, (iii) a traffic pattern and (iv) a multipleaccess scheme.

    4.1. Propagation model

    WSN media can be considered a time-invariant

    narrow-band channel, which can be modeled usinga path-loss approximation [22]. In this case, the

    transmission power required (cPtx ) to achieve a tar-get probability error (bpe ) for nodes at a given dis-tance d is

    cPtx daXbpe 12being a the propagation coefficient of the path-lossmodel and X a function that depends on bpe andthe communication environment. Appendix A de-scribes how this expression is found.

    For instance, for the Mica2 motes hardware, apacket size of 100 bytes, a target error probabilitybpe 103, a = 3.95 (value experimentally obtainedin our test-beds [11]), and a bit rate of 30 Kbps,we have X % 97.5 dB.2 For the discrete transmis-sion output powers of the Mica2 motes, the associ-ated distances using the previous parameters aresummarized in Table 1.

    Maximum range. Additionally, receivers have asensitivity (PS% 102 dBm for the Mica2 motes)that establishes the maximum distance betweennodes (dS). For instance, for the path-loss modelwith the previous propagation coefficient

    (a = 3.95) the associated maximum distancedS is89.92 m.

    4.2. Nodes distribution

    In a general WSN deployment, the position ofthe nodes may not be controlled, and it is a prioriunknown. In this paper we consider a reasonabletype of node position pattern, where nodes are con-centrated around a point of interest. This pattern islikely in several cases, such as natural disaster zones,where sensing nodes are thrown close to a targetarea. A simple way to model this scenario is to selectnodes with a random normal bivariate distributionaround the coordinates of the focus point. Thetypical deviation parameter r will control the nodedispersion. An example of this type of distributionis plotted in Fig. 2, for n = 250 nodes and r = 100.

    Let us assume, without lost of generality, that thefocus point is situated in the center of the realplane. Then, the position of the ith node is (Xi,Yi), being Xi, Yi independent and identically distrib-

    uted random variables N(0,r). The quadratic dis-tance between two nodes i, j is d2 = DX2 + DY2,being DX= Xi Xj, DY= Yi Yj. The probabilitydensity function (pdf) ofd2 is (see Appendix B):

    fd2x 1

    4r2exp x

    4r2

    : 13

    2 This value has been calculated for Manchester codification,

    which doubles the baud rate.

    -400

    -300

    -200

    -100

    0

    100

    200

    300

    400

    -400 -300 -200 -100 0 100 200 300 400

    Fig. 2. 250 nodes positioned with a normal bivariate distribution

    of parameter r = 100.

    1488 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498

    http://-/?-http://-/?-
  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    7/16

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    8/16

    spatial region of the network3 (and, therefore, thereare no collisions), whereas in CSMA-like proposalsall the nodes with information to transmit contendto access the channel.

    5.

    n Evaluation

    Let c(t) be the number of timeslots until instant t.Notice, that c(t) is the same for all the nodes in thenetwork. Let us denote K as the number of linksthat exists in the network. Let m(t) be the stochasticprocess representing the number of packets sent ineach one of the K network links until time t. Thus,m(t) = c(t)q. In addition, let vi(n) be the randomvariable representing the number of neighbors ofthe i-th node, for i= 1, . . . , n. Obviously, it dependson the total number of nodes n. Let us define

    vn Pni1vin, the sum of the neighbors that eachnode has. Note that v(n) = 2K, as each neighbornode corresponds to a link in the network, whichis counted twice in the sum. Then, the followingrelationship holds:

    ct 2Kmtvnq : 14

    Besides, it is now possible to compute theamount of time that nodes are in each state. Let mbe the bit transmission time of the radio transceiver.

    Until time t, m(t) packets have been sent in eachlink, and c(t) timeslots have passed in each node.Then, the contributions to each time are thefollowing,

    Data transmission: B bits for each packet sent.Km(t) packets altogether.

    Tdatat BmKmt: 15Signaling transmission: B0p bits out of every C times-lots per node (nc(t) altogether). B0l Ba bits for eachpacket sent.

    Tsignt B0pmC

    nct B0l BamKmt: 16

    Reception: Bp bits during C 1 out of every Ctimeslots (in the remaining timeslot, the node trans-mits its own preamble, and only listens to the chan-nel Bp B0p bits). Bl bits for each timeslot in whichthe node itself does not transmit (if the node trans-mits it listens only Bl B0l bits). B+ Ba bits for eachpacket received.

    Trxt mBpCB0p

    CnctBlmnct

    B0lmKmtBBamKmt

    nctm BpCB0p

    CBl

    KmtmBBa B0l

    17Using these equations and Eq. (14), we have that

    (notice that m disappears in the fractions since it wasboth in denominator and numerator)

    TsigntTdatat %

    B0pnCct B0l BaKmt

    BKmt

    2B0p

    BCq

    n

    vn B0l Ba

    B18

    and

    TrxtTdatat %

    nct BpCB0p

    CBl

    KmtBBa B0l

    BKmt

    2BpCB0p

    CBl

    Bq

    n

    vnBBa B0l

    B:

    19These equations are approximations, since pack-

    ets can be partially transmitted at instant t. How-

    ever, this approximation will be fine for largevalues oft. Thus, as t tends to infinity, n is equal to

    n 2B0p

    BCq

    n

    vn B0l Ba

    B

    PrxPtxp

    2

    BpCB0pC

    BlBq

    n

    vn B Ba B0l

    B

    26643775:20

    To sum up, notice that the n coefficient depends

    on the power ratios (a hardware parameter), andon the traffic load and message lengths (a protocolparameter). Also, n is a function of n/v(n), which,for random topologies like the one considered, is arandom variable.

    Proposition 1. The mean of the random variable

    n/v(n) is

    En

    vn& '

    1v

    1

    n

    1

    1

    exp

    d2S

    4r2 !; 21

    3 Obviously, timeslots may be reused spatially in the network

    without causing collisions.

    1490 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    9/16

    where v denotes the average number of neighbors of a

    node in a network of n nodes.

    The expression for v is obtained in Appendix C.We have no direct proof for the former expression.Instead, we have analyzed its correctness using

    intensive computing. Fig. 4 shows some of theresults. For r values of 50, 100 and 150 we havedropped random networks of n nodes and calcu-lated the mean and typical deviation ofn/v(n) using10,000 samples. The lines in Fig. 4 are the mean the typical deviation obtained in the experiments,while the points represent the analytical computa-tion of 1/v. As can be clearly observed, the probabil-ity concentrates around the expected value as ngrows.

    Using the previous expression, the mean of n is

    given by Eq. (22).

    n 2B0p

    BCq

    1

    vB

    0l BaB

    PrxPtxp

    2

    BpCB0pC

    BlBq

    1

    vB Ba B

    0l

    B

    26643775:

    22

    Fig. 5 represents n evaluated versus q for differentdata packet sizes (B) using n = 100 nodes. Theparameters used to compute these plots are Bp B0p 100 bits, Bl B0l 400 bits, Ba = 400 bits,C= 20 and Prx = 35.2 mW, Ptxp 76:2 mW. Packetlengths have been chosen as representative values ofa WSN configuration, and the consumption powerscorrespond to actual Mica2 motes consumptions.

    The curves show that the expected value of ndecreases as q increases, and that the value is greaterfor lower values of B.

    6. s Evaluation

    As shown in Section 3, the energy savingobtained depends on the value of the s coefficient.This coefficient is a function of the mass probabilityfunction of the random variable Q found in Section3 and given by Eq. (23).

    s Xpj1

    Ptxj

    PtxpPrQ Qj: 23

    Indeed, s is actually a function of the position ofthe nodes and the number of nodes. Since the posi-tion is random, s is also random.

    Proposition 2. The mean of the random variable s is

    sPjp1j1 Ptxj exp

    Qj1X

    2=a

    4r20B@ 1CA exp Qj

    X 2=a

    4r20B@ 1CA264 375Ptxp 1 exp

    d2S4r2

    !

    exp Qp1X

    2=a4r2

    0BBB@1CCCA exp d2S4r2

    1 exp d2S

    4r2

    ! :24

    0.001

    0.01

    0.1

    1

    100 1000

    n/v(n)(logscale)

    Number of nodes (n) (logscale)

    =150=100=50

    Fig. 4. n/v(n) evaluated versus n for different r.

    1

    10

    100

    0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1

    Link load,

    B=500B=750

    B=1000B=1250B=1500

    Fig. 5. n evaluated versus q for different data packet sizes (B).

    J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498 1491

    http://-/?-http://-/?-
  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    10/16

    The aim of this section is to prove Proposition 2.A data transmission between two nodes uses

    transmission output power Qj if the distancebetween them is within an interval Dj dminj ;dmaxj. If the link usage is equiprobable, then

    Pr[Q= Qj] is just the probability that the distancebetween nodes is within Dj. TPC MAC algorithmsmust select a value of transmission power that guar-antees a given error probability bpe at the receiver (or,equivalently that the SNR be greater than a giventhreshold). Let Pr[Nodes in range] denote the prob-ability that the nodes are in range. For consistency,let Q0 = 0. Then, from Eqs. (12) and (13) we obtain

    PrQ QjPrNodes in range PrQj1 6

    cPtx ;Qj P

    cPtx

    PrQj1 6 cPtx 6 Qj PrQj1 6 daX 6 Qj

    Pr Qj1X6 da 6

    Qj

    X

    ! Pr Qj1

    X

    26 da2 6 Qj

    X

    2" #

    Pr Qj1X

    2a

    6 d2 6 QjX

    2a

    " #

    exp Qj1X 2=a4r2

    0B@ 1CA exp QjX 2=a

    4r20B@ 1CA

    25

    for j= 1, . . . ,p 1. For the p-quantum there is anexpanded region between

    Qj

    X

    2a

    and d2S where recep-

    tion is still possible, but with a higher error rate. Inthis case, the probability associated to the last quan-tum (nominal power) is

    PrQ QpPrNodes in range Pr Qp1

    X

    2a

    6 d2 6 d2S

    " #

    exp Qp1X

    2=a4r2

    0B@1CA exp d2S

    4r2

    : 26

    The probability that nodes are in range is justPr[Nodes in range] = Prd2 6 d2S. Therefore, fromEq. (23), the average s coefficient (s) for a normal

    distribution is

    sPjp

    j1Ptxj PrQQjPtxp

    Pjp1j1 Ptxj exp

    Qj1X

    2=a4r2

    0

    BBB@

    1

    CCCA exp

    Qj

    X

    2=a4r2

    0

    BBB@

    1

    CCCA

    2

    6664

    3

    7775Ptxp 1exp

    d2S4r2

    !

    exp Qp1X

    2=a4r2

    0BBB@1CCCAexp d2S4r2

    1exp d2S

    4r2

    ! :27

    We additionally verified Proposition 2 usingnumerical computation. Fig. 6 shows the results.For r values of 50, 100 and 150 we have droppedrandom networks ofn nodes and calculated the meanand typical deviation of s using 10,000 samples foreach point. The lines in the Fig. 6 are the mean typ-ical deviation obtained in the experiments, while thepoints represent the analytical computation of s(Eq. (24)). It can also be observed that the probabilityconcentrates around the expected value as n grows.

    Fig. 7 shows an evaluation of this expression, for

    different values of parameter r, and assumingX = 97.5 dB, and a = 3.95 (same values used inthe previous numerical examples). As it is clearlyobserved, lower values of parameter s (which implyhigher values ofL) are obtained for lower r distribu-tions, since the distance between nodes is also shorter.It should be noted that the resulting function has aninterval of fast growing for r 2 (10, 50). For the

    0.7

    0.72

    0.74

    0.76

    0.78

    0.8

    0.82

    0.84

    0.86

    100 1000

    s(n)

    Number of nodes (n)

    =150=100=50

    Fig. 6. s evaluated versus n for different r.

    1492 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    11/16

    values r > 100 the function asymptotically increasestoward a limit value ofs

    0:78.

    7. L Evaluation

    Based on the previous results, we can enunciatethe following proposition.

    Proposition 3. For large values of n, the mean of the

    random variable L converges to

    Ljn)1 %1 ns n : 28

    The reason behind this asymptotical behavior isthe concentration of the pdf around the mean of nand s as n grows (as can be seen in Figs. 4 and 6,respectively). Thus, for large values of n the uncer-tainty on the value ofn and s is very small and, there-fore, so is the uncertainty ofL. That is the reason thatallows us to substitute the random variables for theirexpected values in Eq. (28). Nevertheless, we have nodirect proof for Proposition 3. Instead, we haveperformed computational tests to verify this state-ment. Fig. 8 depicts the evaluation ofL for growingvalues of n. The experiments are similar to thoseshown in Figs. 4 and 6. For each point, 10,000 ran-dom networks are thrown and L is averaged. Themean typical deviation obtained are representedby lines depicted in Fig. 8. This figure also showsthe analytical results computed via Eq. (28) (points).The configuration used is similar to that of theprevious numerical examples: B= 800 bits, Bp B0p 100 bits, Bl B0l 400 bits, Ba = 400 bits,C= 20, Prx = 35.4 mW and Ptxp 76:2 mW.

    At this point, the previous results can be appliedto a given MAC protocol just by adjusting the

    model parameters properly. The s parameter

    depends on the propagation model, the hardware

    used and the distribution of nodes (see Section 4).The n parameter basically depends on the trafficmodel and the protocol operation. That is, theparameters of Eq. (22), Bp;B

    0p;Bl;B

    0l;B;Ba;C, take

    their value according to the MAC protocol opera-tion. Therefore, someone interested in evaluating aMAC protocol with this method should analyze thedesired MAC protocol to determine the value of theseparameters. Their meanings are provided in Section4.4.

    In the remainder of this section we show how to

    do this evaluation. We apply the previous analysisto evaluate the benefits of TPC for two representa-tive WSN protocols: a TDMA protocol (L-MAC)and a contention protocol (S-MAC). Since we keepthe propagation model (path loss), hardware used(Mica2), and the distribution of nodes (normalbivariate) as in Section 4, we focus on the protocoloperation to determine n.

    7.1. TDMA example: L-MAC

    Lightweight medium access protocol (L-MAC) [8]is a TDMA protocol proposed for sensor networks,based on a modification of the Eyes MAC(E-MAC) [7]. In L-MAC each node selects a uniquetimeslot by using the slot occupancy informationfrom its one-hop neighbors. Once a node has selecteda slot, it always uses it to transmit either a controlmessage (preamble) or a control plus data message.

    Our generic protocol model (see Section 4.4) candirectly be applied to L-MAC operation. L-MACuses a pure TDMA access scheme, and it directlynotifies neighbors of transmission in the preamble

    packet. Thus, the listening/notifying phase of our

    0.35

    0.4

    0.45

    0.5

    0.55

    0.6

    0.65

    0.7

    0.75

    0.8

    20 40 60 80 100 120 140 160 180 200

    s

    Nodes position standard deviation

    Fig. 7. s evaluated versus r.

    1.04

    1.05

    1.06

    1.07

    1.08

    1.09

    1.1

    1.11

    1.12

    1.13

    100 1000

    L(n

    )

    Number of nodes (n)

    =150=100=50

    Fig. 8. L evaluated versus n for different r.

    J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498 1493

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    12/16

    model (see Fig. 3) is not necessary (thereforeBl = 0). Additionally, the timeslot period is C= 32and there are no acknowledgements, Ba = 0. There-fore, a L-MAC timeslot includes only a preambleand data (when corresponding).

    The TPC can be used with this protocol withoutchanging the topology if nodes always transmit theirpreamble at nominal power. The following data sec-tion would be sent at a controlled power. Thus, inorder to evaluate L we directly set the followingparameters according to the L-MAC operation inEq. (22):

    n = 100 nodes. Data size, B= 800 bits. Preamble, Bp B0p 96 bits. Signaling, Bl

    B0

    l 0 bits.

    Auxilary, Ba = 0 bits. Preamble period, C= 32. Prx = 35.4 mW. Ptxp 76:2 mW.

    Fig. 9 depicts the evaluation of L versus rthrough Eq. (28) for different link loads (q). Resultsshow considerable savings, in the order of 1020%,for mid-large values of r. Moreover, in Fig. 9 sav-ings are more noticeable for low r and high valuesof q. This trend is sound, since if network nodes

    are close and transmit a high number of packets,the TPC is more effective.

    7.2. Contention example: S-MAC

    S-MAC [3] is a contention-based protocol pro-posed for WSN. It uses a timeslot structure, similarto Fig. 3. Nodes synchronize their active/sleep peri-

    ods by means of the short SYNChronization(SYNC) packet. SYNCs are periodically broad-casted by stations in the preamble, which allowsnodes to correct time drifts. Data transmission isperformed by means of CSMA/CA, i.e the RTS/

    CTS/Data/ACK sequence. The RTS/CTS packetsare transmitted in the listening/notifying stage indi-cated in Fig. 3. Finally, in the message exchangeperiod the data packet and the ACK are transmit-ted, corresponding respectively to lengths B andBa. Again, the analysis can be done just by settingthese parameters according to the S-MAC opera-tion in Eq. (15)(17). We have chosen the valuesemployed in the reference implementation of S-MAC for TinyOS [23], which are:

    n = 100 nodes.

    Data size, B= 800 bits. Preamble, Bp = 727 bits, B

    0p 100 bits.

    Signaling, Bl= 1226 bits, B0l 100 bits.

    Auxillary, Ba = 100 bits. Preamble period, C= 20. Prx = 35.4 mW. Ptxp 76:2 mW.

    Fig. 10 plots L versus r for different link loads(q). Results show a worse behavior than in theL-MAC case studied in the previous section. The

    average saving is below 10% for mid-large valuesof r. The reason of this worsening is twofold. Onone hand, S-MAC nodes transmit more controlpackets (RTS, CTS) than L-MAC ones. Since thesepackets are always sent at nominal power, moreenergy is wasted. On the other hand, in L-MACnodes go to sleep just after the preamble (if they

    1

    1.1

    1.2

    1.3

    1.4

    1.5

    1.6

    1.7

    1.8

    1.9

    0 20 40 60 80 100 120 140 160 180 200

    L

    =0.01=0.02=0.05=0.1

    Fig. 9. L vs. r for different link loads (q) for L-MAC protocol.

    1

    1.1

    1.2

    1.3

    1.4

    1.5

    1.6

    0 20 40 60 80 100 120 140 160 180 200

    L

    =0.01=0.02=0.05=0.1

    Fig. 10. L vs. r for different link loads (q) for S-MAC protocol.

    1494 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    13/16

    are not the data receivers). In S-MAC all the nodeshave to wait always at least until the end of thelistening period to sleep.

    We must remark that, although S-MAC is a con-tention protocol, we have assumed that no collisions

    are possible in our analysis. Therefore, the real val-ues will be even worse than those predicted byFig. 10. This yields to the conclusion that S-MACis not a good candidate for TPC use.

    7.3. Discussion

    In the introduction we stated that we are inter-ested in the maximum energy saving that an idealTPC may provide. In this way, basically two strongassumptions have been made in this paper: (1) everynode knows in advance the power necessary to

    reach its neighbors and (2) there are no collisions.Therefore, the results drawn in the previous sectionsshould be interpreted accordingly: they show thetrend of the energy saving obtained by the use ofTPC, that is, an estimate of what may be achieved.Clearly, the conditions of the real scenario willdetermine the actual saving, whether collisions arelikely or nodes implement some mechanism todecide the power needed to reach their neighbors.

    In any case, our analytical method allows toquickly estimate the benefits of TPC in order to

    decide if it is worth adding it to a MAC proposal.Let us take the case of L-MAC: since it is a pureTDMA protocol, the no-collision assumptionapplies. In this case, the saving may be close tothe upper bound derived here, and so it is worthdeveloping a heuristic to gather information aboutthe powers needed and performing simulations totest it. On the other hand, the results for S-MACclearly suggest not to use TPC: the upper bound isalready low and the energy saving will be furtherdecreased by collisions. In addition, in S-MACmore than one transmission schedule may beadopted [3], increasing the overall listening time.

    8. Conclusions

    In this paper we have developed an analyticalmethod to compute the energy savings providedby a general MAC TPC mechanism, which can beapplied to most of the current WSN MAC propos-als. We have shown that the average energy savings,measured through the L ratio, converge if the num-ber of nodes is large (a very likely condition in

    WSN).

    An upper bound of the energy saving achievableby TPC can be quickly obtained by adjusting theformula parameters according to the operation ofthe protocol under evaluation. We have shownhow to apply this method with two representative

    protocols. The conclusion derived is that the TPCmechanism analyzed is worth being included insome proposals of WSN MAC layer. Energy sav-ings up to 1020% can be expected in TDMA accessprotocols like L-MAC, while contention ones, likeS-MAC, achieve no significative improvements.

    Future work will include the computation of Lratio by means of simulation to verify the results,and to extend our work to a broader set of WSNMAC protocols, traffic patterns and random distri-bution deployments. Furthermore, we aim at testingthis type of TPC strategy in real test-beds using

    Mica2 motes.

    Acknowledgements

    This work has been cofunded by the Economy,Industry and Innovation Council, with the SOLID-MOVIL project (2I04SU044), supported by Funda-cion Seneca, with the ARENA Project (00546/PI/04), both from the Region of Murcia, the SpanishResearch Council with the ARPaq project(TEC2004-05622-C04-02/TCM), and by the Span-

    ish Ministry of Industry, Tourism and Commercewith the project m:Ciudad (FIT-330503-2006-2).

    Two anonymous referees made relevant com-ments that helped us to improve this paper.

    Appendix A. Radio channel model

    Let Ptx and Prx be the transmission and receptionsignal power, respectively. Let d be the distancebetween peers. WSN media can be considered atime-invariant narrow-band channel, which can be

    modeled using a path-loss approximation [22],where

    Prxd Ptx k4pd0

    2d0

    d

    a29

    being a the path-loss coefficient (typically, a 2 [2,4])calculated at a reference distance d0.

    There are two main contributions to the noise inthe transmission: (1) the channel noise is usuallyconsidered Additive White Gaussian Noise(AWGN) with spectral power density N0 = KT,

    where K is the Boltzmann constant and T is the

    J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498 1495

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    14/16

    absolute temperature. And (2) the internal noise ofthe receiver, characterized by a noise figure(F% 1015 dB). Let Eb be the energy per bit, R bethe bit rate and B be the transmission bandwidth.The signal to noise ratio S

    N is

    SN

    PrxKTBF

    EbN0

    RB

    : 30

    Mica2 motes use the NCFSK modulation, thenthe bit probability error (be) is [24]

    be 12

    exp 12

    Eb

    N0

    : 31

    And, consequently, the packet probability error(pe) for a packet of n bits is

    pe 1 1 ben

    : 32Given a target error packet probability (bpe ), the

    necessary power transmission (cPtx ) can be obtainedfrom the previous equations. This objective errorpacket probability bpe is the quality (figure of merit)we would like to have in our communications. First,notice that

    cEbN0

    2 ln2bbe 2 ln 2 1 1 bpe

    1n

    h i : 33

    And from Eq. (30),

    cPrxKTBF

    2 ln 2 1 1 bpe1nh i RB

    cPrx 2KTFR ln 2 1 1 bpe1nh i : 34

    Then, from Eq. (29), cPtx can be expressed ascPtx daX; 35where

    X, 2KTRF ln 2 1 1 bpe1nh i 4pd0k 2

    1

    d0 a:

    36

    Appendix B. Probability density function of the

    quadratic distance with normal distribution

    Theorem 1. The pdf ofd2 for a Normal distribution is

    fd2x 1

    4r2exp x

    4r2 : 37

    Demonstration: First, notice that

    DX Xi Xj N0;r N0;r N0;

    ffiffiffi2

    pr

    DY Yi Yj N0;r N0;r 38 N0;

    ffiffiffi2

    pr:

    Therefore,

    DXffiffiffi2

    pr

    2 DYffiffiffi

    2p

    r

    2 v22: 39

    Thus,

    d2 DX2 DY2 2r2v22: 40Since v22 exp 12

    , the PDF ofd2 is

    Prd2 6 x Pr2r2v22 6 x Pr v22 6x

    2r2h i Zx2r20

    12

    exp u2

    du

    1 exp x4r2

    : 41

    And, finally, the pdf ofd2 is the derivate of thePDF:

    fd2x d 1 exp x

    4r2

    dx

    14r2

    exp x4r2

    :

    42

    Hence, proved.

    Appendix C. Average number of neighbors with

    normal distribution

    Let n be the total number of nodes in the net-work. Let v be the random variable number ofneighbors of a node. Since nodes position isselected independently, the mpf ofv is

    Pr

    v

    i

    n1

    i gi

    1

    g

    n1i for i

    1; . . . ;n

    1;

    43where g is the probability that two nodes indepen-dently selected are neighbors, that is the probabilitythat distance between nodes (d) is less than dS. Fromthe pdf ofd2 obtained in Appendix B, we know that

    g Prd2 6 d2S 1 exp d2S

    4r2

    . Additionally, the

    first order moment of v can be obtained

    v

    Xn1

    i1i

    n 1i gi1 gn1i gn 1: 44

    1496 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498

  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    15/16

    References

    [1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Asurvey on sensor networks, IEEE Communications Maga-zine 40 (8) (2002) 102116.

    [2] J. Polastre, J. Hill, D. Culler, Versatile low power medium

    access for wireless sensor networks, in: Proc. ACM Confer-ence on Embedded Networked Sensor Systems (SenSys2004), 2004, pp. 95107.

    [3] W. Ye, J. Heidemann, D. Estrin, Medium access controlwith coordinated, adaptive sleeping for wireless sensornetworks, ACM/IEEE Transactions on Networking 12(2004) 493506.

    [4] MICA MOTES. Online, available from: .

    [5] T. van Dam, K. Langendoen, An adaptive energy-efficientMAC protocol for wireless sensor networks, in: Proc. ACMConference on Embedded Networked Sensor Systems (Sen-Sys 2003), 2003, pp. 171180.

    [6] G. Lu, B. Krishnamachari, C. Raghavendra, An adaptive

    energy-efficient and low-latency MAC for data gathering insensor networks, in: Proc. Int. Symp. on Parallel andDistributed Processing, 2004.

    [7] L. van Hoesel, T. Nieberg, H. Kip, P. Havinga, Advantagesof a TDMAbased, energy-efficient, self-organizing MACprotocol for WSNs, IEEE VTC (2004).

    [8] L. van Hoesel, P. Havinga, A lightweight medium accessprotocol (L-MAC) for wireless sensor networks, in: Proc.Int. Workshop on Networked Sensing Systems (INSS 2004),2004.

    [9] Gomez, J., Campbell, A.T., Naghshineh, M., Bisdikian, C.,Conserving transmission power in wireless ad hoc networks,in: 9th Int. Conf. Network Protocols (ICNP 2001), 2001,pp. 2424.

    [10] IEEE 802.11, 1999 Edition (ISO/IEC 8802-11:1999). Part 11:Wireless LAN Medium, Access Control (MAC) and PhysicalLayer (PHY) Specifications.

    [11] A. Martnez-Sala, J.M. Molina-Garca-Pardo, E. Egea-Lopez, J. Vales Alonso, L. Juan-LLacer, J. Garca-Haro,An accurate radio channel model for wireless sensornetworks simulation, Journal of Communications and Net-works 7 (4) (2005) 401407.

    [12] V. Kawadia, P.R. Kumar, Power control and clustering in adhoc networks, in: Proc. 22nd Annual Joint Conference of theIEEE Computer and Communications Societies (INFO-COM 2003), vol. 1, 2003, pp. 459469.

    [13] C. Yu, K.G. Shin, B. Lee, Power-stepped protocol: enhanc-

    ing spatial utilization in a clustered mobile ad hoc network,IEEE Journal on Selected Areas in Communications 22 (7)(2004) 13221334.

    [14] E. Jung, N.H. Vaidya, A power control MAC protocol forad hoc networks, in: Proc. ACM Conference on MobileCommunications (MobiCom 2002), 2002, pp. 3647.

    [15] A. Muqattash, M. Krunz, Power controlled dual channel(PCDC) medium access protocol for wireless ad hocnetworks, in: Proc. 22nd Annual Joint Conference of theIEEE Computer and Communications Societies (INFO-COM 2003), vol. 1, 2003, pp. 470480.

    [16] J.P. Monks, V. Bharghavan, W.M. Hwu, A power controlledmultiple access protocol for wireless packet networks, in:Proc. 20th Annual Joint Conference of the IEEE Computer

    and Communications Societies (INFOCOM 2001), vol. 1,2001, pp. 219228.

    [17] Y.-C. Tseng, S.-L. Wu, C.-Y. Lin, J.-P. Sheu, A multi-channel MAC protocol with power control for multi-hopmobile ad hoc networks, in: Proc. DistributedComputing Systems Workshop, 2001, pp. 419424.

    [18] M. Kubisch, H. Karl, A. Wolisz, L.C. Zhong, J. Rabaey,Distributed algorithms for transmission power controlin wireless sensor networks, in: Proc. IEEE WirelessCommunications and Networking, vol. 1, 2003, pp. 558563.

    [19] H. Takagi, L. Kleinrock, Optimal transmission ranges forrandomly distributed packet radio terminals, IEEE Trans-actions on Communications 32 (3) (1984) 246257.

    [20] J. Gomez, A. Campbell, A case for variable-range trans-mission power control in wireless multi-hop networks,in: Proc. IEEE INFOCOM 2004, vol. 2, 2004, pp. 14251436.

    [21] Y. Chen, E.G. Sirer, S.B. Wicker, On selection of optimaltransmission power for ad hoc networks, in: Proc. 36th

    Hawaii International Conference on System Sciences,2003.[22] T. Rappaport, Principles of Communications Systems,

    second ed., Prentice Hall, 2002.[23] S-MAC Source Code for TinyOS. Online, available from:

    .[24] J. Proakis, Digital Communications, Fourth ed., McGraw-

    Hill, 2001.

    Javier Vales-Alonso received the Tele-communications Engineering degreefrom the University of Vigo, Spain, in2000 and the Ph.D. in Telecommunica-tions from the Polytechnic University ofCartagena (UPCT), Spain, in 2005. InNovember 2002 he joined the UPCTwhere he is assistant professor of theDepartment of Information Technolo-gies and Communications. He has beeninvolved in several National and Inter-

    national research projects related to cellular networks, opticalpacket switching, wireless and sensor networks and performanceevaluation issues. He is author or co-author of more than 15papers mainly in the fields of cellular and wirelesscommunications.

    Esteban Egea-Lopez received the Tele-communications Engineering degree in2000, from the Polytechnic University ofValencia (UPV), Spain, the MasterDegree in Electronics in 2001, from theUniversity of Gavle, Sweden, and Ph.D.in Telecommunications in 2006 from thePolytechnic University of Cartagena.Since 2001, he is an assistant professor ofthe Department of Information Tech-nologies and Communications at the

    Polytechnic University of Cartagena. His research interest isfocused on ad-hoc and wireless sensor networks.

    J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498 1497

    http://www.xbow.com/http://www.xbow.com/http://www.isi.edu/ilense/software/smac/download.htmlhttp://www.isi.edu/ilense/software/smac/download.htmlhttp://www.xbow.com/http://www.xbow.com/
  • 8/2/2019 Performance Evaluation of Mac Transmission Protocol

    16/16

    Alejandro Martnez-Sala received theElectrical Science Engineering degrees(B.S. in 1998, M.S. in 2000) and thePh.D. in Telecommunications in 2006from the Polytechnic University ofCartagena (UPCT) in Spain. Since 2001,he is an assistant professor of theDepartment of Information Technolo-gies and Communications at the Poly-technic University of Cartagena. Hisresearch interest is focused on wireless

    sensor networks and active RFID technology.

    Pablo Pavon-Marino received the Tele-communication Engineering degree inTelecommunications in 1999 from theUniversity of Vigo (UVIGO), Spain. In2000 he joined the Polytechnic Univer-sity of Cartagena (UPCT), where he is anAssociate Professor at the Departmentof Information Technologies and Com-munications. He received the Ph.D.degree from this University in 2004. Heis involved in several National and

    International research projects related to optical packet switch-ing, performance evaluation issues and wireless sensor networks.

    M. Victoria Bueno-Delgado received theTelecommunication Engineering degree(B.S. in 2002, M.S. in 2004) from thePolytechnic University of Cartagena(UPCT) in Spain. Since 2005, she is an

    assistant professor of the Department ofInformation Technologies and Commu-nications at the Polytechnic Universityof Cartagena. Her research interest isfocused on wireless sensor networks andactive RFID technology.

    Joan Garca-Haro received the Tele-communication Engineering degree andthe Ph.D. in Telecommunications in1989 and 1995 respectively, both fromthe Polytechnic University of Catalonia(UPC), Spain. He has been an AssistantProfessor at the Department of AppliedMathematics and Telematics (DMAT-UPC) since 1992, and Associate Profes-sor since 1997. In September, 1999 he joined the Polytechnic University of

    Cartagena (UPCT), Spain, where he is Professor of the Depart-ment of Information Technologies and Communications. He hasbeen involved in several National and International researchprojects related to electronic and optical packet switching, B-ISDN design and planning, next generation Internet, wireless andsensor networks, value-added services and performance evalua-tion issues. He was a visiting research scientific at Queens Uni-versity at Kingston, Ontario, Canada. He is author or co-authorof more than 50 papers mainly in the fields of switching and

    performance evaluation. Since 1994 he served as regional corre-spondent of the Global Communications Newsletter (and Editorin Chief from April 2002 to December 2004) included in the IEEECommunications Magazine, Associate Technical Editor fromJanuary, 2000, and Technical Editor of the same magazine fromMarch 2001. He also holds an Honorable Mention for the IEEECommunications Society Best Tutorial paper Award (1995).

    1498 J. Vales-Alonso et al. / Computer Networks 51 (2007) 14831498


Recommended