[ieee 2010 29th ieee international performance computing and communications conference (ipccc) -...

8
ARM: an Asynchronous Receiver-initiated Multi- channel MAC Protocol with Duty Cycling for WSNs Jinbao Li 1,2 , Desheng Zhang 1,2 , Longjiang Guo 1,2,3 , Shouling Ji 3 and Yingshu Li 3 1 School of Computer Science and Technology, Heilongjiang University, Harbin, Heilongjiang, China, 150080 2 Key Laboratory of Database and Parallel Computing of Heilongjiang Province, Harbin, Heilongjiang, China, 150080 3 Department of Computer Science, Georgia State University, Atlanta, GA, USA, 30303 [email protected], [email protected], [email protected], [email protected], [email protected] Abstract—This paper proposes ARM, an receiver-initiated MAC protocol with duty cycling to tackle control channel sa- turation, triple hidden terminal and low broadcast reliability problems in asynchronous multi-channel WSNs. By adopting a receiver-initiated transmission scheme and probability-based random channel selection, ARM effectively solves control channel saturation and triple hidden terminal problems. Fur- ther, ARM employs a receiver-adjusted broadcast scheme to guarantee broadcast reliability for broadcast-intensive applica- tions. Via the theoretical analysis, two factors that assist ARM to handle these problems are derived. The simulation and real testbed experimental results show that via solving these three problems ARM achieves significant improvement in energy efficiency and throughput. Moreover, ARM exhibits a promi- nent ability to enhance its broadcast reliability. I. INTRODUCTION Recently, some multi-channel MAC protocols (mcMAC) [2, 3, 4] have been proposed to support the applications [1] in wireless sensor networks (WSNs) via parallel transmissions. A mcMAC mainly consists of channel selection and media access. Channel selection decides how to select idle channels for all the nodes efficiently in order to optimize the perfor- mance of WSNs; whereas, media access decides when and how all the nodes access channels that have been selected for them to avoid collisions. Channel selection can be generally classified as static [2] [6] [7] or dynamic [3] [4] [5]; while existing media access schemes generally fall in two basic categories: Time Division Multiple Access (TDMA) [2] [3] [5] [6] and Carrier Sense Multiple Access (CSMA) [4] [12] [13] [14]. Dynamic channel selection and CSMA with duty cycl- ing are jointly considered as suitable schemes for WSNs due to three reasons as follows. First, dynamic channel selection requires less number of channels than static schemes [4]. Second, CSMA involves no overhead of time synchroniza- tion required in TDMA [19]. Third, duty cycling is a scheme to address idle listening, which is considered as one of the largest sources of energy consumption in WSNs [1]. However, the above scheme cannot provide satisfactory performance due to three problems. (1) Control Channel Saturation (CCS), which can lead to severe collisions of con- trol packets and prevent all the channels being fully utilized. (2) Triple Hidden Terminals (THT), which can result in the fact that two node-pairs employ one channel to transmit data. (3) Existing mcMACs in asynchronous WSNs provide an ineffective supporting for broadcast, which lead to Low Re- liability of Broadcast (LRB). Above issues are verified and elaborated in Section III. In this paper, aiming at CCS, THT and LRB, an A syn- chronous R eceiver-initiated M ulti-channel MAC protocol is proposed, called ARM, with duty cycling. Involving no overhead of time synchronization and multi-radio, ARM is tailored to overcome CCS and THT as well as LRB. The key novelty of this work is to use the receiver-initiated trans- mission to minimize loads on the CC to handle CCS together with the probability-based random channel selection to avoid THT. Further, a simple but reliable single-hop broad- cast scheme is proposed for broadcast-intensive applications. This paper hopes to contribute in the following ways: Makes effective solutions for CCS and THT in WSNs context by adopting a receiver-initiated transmission scheme and a probability-based random channel selec- tion. To best of authors’ knowledge, no previous works give such solutions for these problems in WSNs context. Proposes a duty cycling based multi-channel MAC pro- tocol ARM for WSNs, which exploits a receiver ad- justed asynchronous broadcast scheme to solve LRB. This single-hop broadcast scheme is capable of dynami- cally adapting to the objective of specific networks, which makes ARM suitable for QoS requirements. Analyzes two factors related to channel selection and duty cycling, i.e., the probability of random channel se- lections and duty cycle by Queueing theory and Markov chain. These factors bring significant influence in per- formances of ARM’s solutions for CCS, THT and LRB. Conducts extensive simulation to evaluate ARM’s per- formance. The simulation results show that compared with the other protocols, ARM achieves 162% more throughput ratios, 24% better energy efficiency ratios and 35% higher broadcast reliability ratios at most via effectively solutions for CCS, THT and LRB. More im- portantly, ARM is also implemented in a real testbed. The experimental results show that ARM achieves 67% more throughput ratios at most. The rest of this paper is organized as follows. Section II describes the motivation behind this work and definitions of control channel saturation, triple hidden terminals and low broadcast reliability problems. Section III surveys related mcMACs. Section IV introduces ARM design, followed by its analysis in Section V. Section VI evaluates the ARM’s performance by comparing ARM with other MAC protocols in simulation and real testbed experiments, respectively. Section VII concludes the paper. 114 978-1-4244-9328-9/10/$26.00 ©2010 IEEE

Upload: yingshu

Post on 14-Dec-2016

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

ARM: an Asynchronous Receiver-initiated Multi-channel MAC Protocol with Duty Cycling for WSNs

Jinbao Li1,2, Desheng Zhang1,2, Longjiang Guo1,2,3, Shouling Ji3 and Yingshu Li3 1 School of Computer Science and Technology, Heilongjiang University, Harbin, Heilongjiang, China, 150080

2 Key Laboratory of Database and Parallel Computing of Heilongjiang Province, Harbin, Heilongjiang, China, 150080 3 Department of Computer Science, Georgia State University, Atlanta, GA, USA, 30303

[email protected], [email protected], [email protected], [email protected], [email protected]

Abstract—This paper proposes ARM, an receiver-initiated MAC protocol with duty cycling to tackle control channel sa-turation, triple hidden terminal and low broadcast reliability problems in asynchronous multi-channel WSNs. By adopting a receiver-initiated transmission scheme and probability-based random channel selection, ARM effectively solves control channel saturation and triple hidden terminal problems. Fur-ther, ARM employs a receiver-adjusted broadcast scheme to guarantee broadcast reliability for broadcast-intensive applica-tions. Via the theoretical analysis, two factors that assist ARM to handle these problems are derived. The simulation and real testbed experimental results show that via solving these three problems ARM achieves significant improvement in energy efficiency and throughput. Moreover, ARM exhibits a promi-nent ability to enhance its broadcast reliability.

I. INTRODUCTION

Recently, some multi-channel MAC protocols (mcMAC) [2, 3, 4] have been proposed to support the applications [1] in wireless sensor networks (WSNs) via parallel transmissions. A mcMAC mainly consists of channel selection and media access. Channel selection decides how to select idle channels for all the nodes efficiently in order to optimize the perfor-mance of WSNs; whereas, media access decides when and how all the nodes access channels that have been selected for them to avoid collisions. Channel selection can be generally classified as static [2] [6] [7] or dynamic [3] [4] [5]; while existing media access schemes generally fall in two basic categories: Time Division Multiple Access (TDMA) [2] [3] [5] [6] and Carrier Sense Multiple Access (CSMA) [4] [12] [13] [14]. Dynamic channel selection and CSMA with duty cycl-ing are jointly considered as suitable schemes for WSNs due to three reasons as follows. First, dynamic channel selection requires less number of channels than static schemes [4]. Second, CSMA involves no overhead of time synchroniza-tion required in TDMA [19]. Third, duty cycling is a scheme to address idle listening, which is considered as one of the largest sources of energy consumption in WSNs [1].

However, the above scheme cannot provide satisfactory performance due to three problems. (1) Control Channel Saturation (CCS), which can lead to severe collisions of con-trol packets and prevent all the channels being fully utilized. (2) Triple Hidden Terminals (THT), which can result in the fact that two node-pairs employ one channel to transmit data. (3) Existing mcMACs in asynchronous WSNs provide an ineffective supporting for broadcast, which lead to Low Re-liability of Broadcast (LRB). Above issues are verified and elaborated in Section III.

In this paper, aiming at CCS, THT and  LRB, an Asyn-chronous Receiver-initiated Multi-channel MAC protocol is proposed, called ARM, with duty cycling. Involving no overhead of time synchronization and multi-radio, ARM is tailored to overcome CCS and THT as well as LRB. The key novelty of this work is to use the receiver-initiated trans-mission to minimize loads on the CC to handle CCS together with the probability-based random channel selection  to avoid THT. Further, a simple but reliable single-hop broad-cast scheme is proposed for broadcast-intensive applications. This paper hopes to contribute in the following ways:

Makes effective solutions for CCS  and THT in WSNs context by adopting a receiver-initiated transmission scheme and a probability-based random channel selec-tion. To best of authors’ knowledge, no previous works give such solutions for these problems in WSNs context.

Proposes a duty cycling based multi-channel MAC pro-tocol ARM for WSNs, which exploits a receiver ad-justed asynchronous broadcast scheme to solve LRB. This single-hop broadcast scheme is capable of dynami-cally adapting to the objective of specific networks, which makes ARM suitable for QoS requirements.

Analyzes two factors related to channel selection and duty cycling, i.e., the probability of random channel se-lections and duty cycle by Queueing theory and Markov chain. These factors bring significant influence in per-formances of ARM’s solutions for CCS, THT and LRB.

Conducts extensive simulation to evaluate ARM’s per-formance. The simulation results show that compared with the other protocols, ARM achieves 162% more throughput ratios, 24% better energy efficiency ratios and 35% higher broadcast reliability ratios at most via effectively solutions for CCS, THT and LRB. More im-portantly, ARM is also implemented in a real testbed. The experimental results show that ARM achieves 67% more throughput ratios at most.

The rest of this paper is organized as follows. Section II describes the motivation behind this work and definitions of control channel saturation, triple hidden terminals and low broadcast reliability problems. Section III surveys related mcMACs. Section IV introduces ARM design, followed by its analysis in Section V. Section VI evaluates the ARM’s performance by comparing ARM with other MAC protocols in simulation and real testbed experiments, respectively. Section VII concludes the paper.

114978-1-4244-9328-9/10/$26.00 ©2010 IEEE

Page 2: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

II. MOTIVATION

A. Need for solving CCS

In multi-channel WSNs,  CCS means that under certain circumstances the CC is considered as a bottleneck of net-work performance, which is verified in Fig.1 as the loads and number of channels increase in the simulation with 144 nodes. When the number of channels is larger than 4 and the loads are larger than 25, throughput of CAM-MAC [16] (details descried in Section VI) becomes stable, which is because collisions on the CC become severer. Thus, it de-grades the throughput of CAM-MAC. This becomes even worse under WSNs, where the deployment density of nodes is usually higher than general ad hoc networks and the traf-fic loads are usually bursty.

B. Need for solving THT

THT includes: (1) traditional multi-hop hidden terminal; (2) multi-channel hidden terminal [5]; (3) sleep hidden ter-minal. A instance for two new hidden terminals is given in Fig.2 where involves one CC and two DCs. Node  ,  ,  ,  , and  are awake and is sleeping. When has data for  , randomly selects an idle DC such as DC1 and puts the reser-vation information (e.g., who will occupy which channel for how long) into a  and sends to  on the CC. Then,  sends a back to to confirm this  . Next,  and  switch their channels to DC1 around time  . The awake neighbors of and (e.g.,  ,  and  ) update their channel usage in-formation by overhearing on the CC; whereas, the sleeping neighbors (e.g.,   ) still assume that DC1 is idle. During ( , ), has data for   .  randomly selects an idle DC such as DC2 and then switches to DC2 with  after a reserva-tion. Because  and as well as  are not overhearing on CC during ( , ),   ,   and   still assume that DC2 is idle. Around time  , two situations can cause packet collisions at

or   . (1) When   finishes sending data to   , has data for  . If  also selects DC2 that   and  are still occupying, then a collision may happens. In this case, is called the multi-channel hidden terminal of   and   . (2) When   wakes up,  has data for  . If  also selects DC2 that   and  are still occupying, then a collision may happens as well. In this case, is called the sleep hidden terminal of  and  . Since WSNs jointly involves multi-hop, multi-channel and duty cycling together, it will suffer from all triple hidden terminals, which will cause the severe packets collisions.

C. Need for solving LRB

Broadcast is an important traffic pattern on which many upper layer protocols depend. But, in the asynchronous mul-ti-channel scenario, it is hard to guarantee that all the neigh-bors receive broadcast packets, because of two reasons. (1) Only a small subset of neighbors is on the same channel with the sender, when it decides to send a broadcast packet. (2) In duty cycle based WSNs, the idle nodes enter sleeping state periodically, so the sleeping neighbors of a broadcast sender cannot receive the broadcast packet. Fig.3 illustrates the problem of broadcast packet loss. Among all the neigh-bors of broadcast sender  , only and can receive broad-cast packets, since   , , ,   and are not on the same channel with , while and are in the sleeping state.

III. RELATED WORK

In this section, related mcMACs are surveyed from two categories: synchronous and asynchronous.

A. Synchronous MAC Protocols

1) mcMACs for WSNs: Zhou et al. [2] proposed MMSN which is the first mcMAC that takes into account the restric-tions imposed by WSNs. Salajegheh et al. [6] proposed HyMAC for WSNs where the base station allocates specific time slots and channels to all the nodes. Jovanovic et al. [7] proposed TFMAC for WSNs where the schedules are made by all the nodes rather than the base station. Kim et al. [3] proposed Y-MAC, which schedules receivers rather than senders to achieve low energy consumption.

2) mcMACs for other networks: So et al. [5] proposed MMAC for ad hoc networks by dividing up time into mul-tiple slots, where all the nodes exchange control information on the CC for reservations of DCs  at the front of each slot and switch to DCs for data communication at the rest of the slot. Chen et al. [8] proposed MAP for ad hoc networks. MAP works in the same way to MMAC but has variable-size data time slots. Tzamaloukas et al. [9] proposed CHAT for ad hoc networks using channel hopping scheme. Under CHAT, all idle nodes switch among all channels using a common hopping sequence. Bahl et al. [10] proposed SSCH for ad hoc networks, which adopts multiple hopping se-quences for different nodes. Tzamaloukas et al. [11] pro-posed RICH-DP based on channel hopping for wireless networks, which differentiates itself with a receiver-initiated collision-avoidance scheme.

Figure 1. The verification of CCS Figure 2. The illustration of THT Figure 3. The broadcast issue

1 2 3 4 5 6125

150

175

200

225

250

275

300

325

350

Total Number of Channels

A

ggre

gate

MA

C T

hrou

ghpu

t (K

bps)

15 CBR 20 CBR 25 CBR 30 CBR 35 CBR

115

Page 3: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

3) Summing up: Above studies design protocols by time synchronization where let all the control information or data be sent in predetermined slots or channels. However, for larger scale WSNs, synchronization itself remains an open issue [4]. One common solution is to send SYNC packets periodically, but these SYNC packets induce considerable overhead, which consumes more energy [19].

B. Asynchronous MAC Protocols

1) mcMACs for WSNs: Le et al. [4] proposed PMC which utilizes a control theory approach to dynamically add available channel in a distributed method. Sun et al. [18] proposed RI-MAC which is a receiver-initiated single-channel MAC protocol for WSNs. Wu et al. [19] proposed TMCP, which does not require synchronization. However, this protocol is more like a topology control protocol than a MAC protocol. Zhou et al. [20] proposed CUMAC using cooperation for WSNs, but it requires a tone device on each node to notify collisions, which increases the cost of WSNs.

2) mcMAC for other networks: Wu et al. [12] proposed DCA for ad hoc networks, which uses two radios, one for control information exchanging and the other for data com-munication. Adya et al. [13] proposed MUP for wireless networks, which allows both radios to send control informa-tion and data interchangeably. Jain et al. [14] proposed RBCS for wireless networks with a receiver-based channel selection scheme via SNR comparisons at receivers. Nasipu-ri et al. [19] proposed a multi-radio MAC protocol for wire-less networks. Above four protocols are based on multi-radio scheme. Exploiting multi-radio can simplify the de-sign of protocols by dedicating one radio on the CC to con-sistently overhear the control information exchanging. However, multi-radio schemes lead to not only larger node size but also more energy consumption [16].

Luo et al. [16] exploited Distributed Information SHar-ing mechanism (DISH) and proposed CAM-MAC for ad hoc networks. When a node-pair reserves a channel, all its neighbors send cooperative packets to invalidate the reser-vation if they aware of the fact that the selected DC or re-ceiver is unavailable. Luo et al. [17] also proposed ALTU based on altruistic cooperation, which introduces some spe-cialized nodes called altruists whose only role is to acquire and share channel usage information. These two mcMACs are based on DISH. However, all the idle neighbors of the sender and its receiver will send packets for invalidation if they assume that this reservation is invalid. It involves more packet transmission than necessary and easily results in packet collisions, since many cooperative packets can be sent simultaneously. Thereby, this scheme will consume considerable energy under large scale WSNs [20].

C. Summary

All the mcMACs mentioned are summarized in Table I. It can be seen from Table I that currently there is no MAC protocol that is based on single-radio multi-channel asyn-chronous and supports broadcast and duty cycling for WSNs. The design of ARM addresses all the needs in Table I.

IV. DETAILED DESIGN OF ARM

In ARM, wireless bandwidth is divided into one dedicat-ed Control Channel (CC) for control packets only and Data Channels (DC) for control packets and data packets.

A. Unicast Scheme

1) Overview: In Fig.3, a message transmission includes five steps. (1) When sender  in sleeping period has a mes-sage for receiver that is also in sleeping period, wakes itself up passively to listen on the CC. (2) When wakes up to receive a message, initiates a possible transmission by sending a broadcast AnNounCement ( ) packet on the CC including a DC ID number, say  , selected by based on a certain scheme (discussed in next Subsection). Then, switches to the DC with ID number and listens for possi-ble incoming packets. (3) After receiving an  from , switches to the DC with ID number and sends a  after a random delay, which is to avoid the collisions caused by the fact that multiple senders may send their s simulta-neously. (4) After receiving a  , sends a  to to confirm this transmission. (5) After  receives this  , employs the & method for data transmission. Finally, they switch back to the CC to enter sleeping period when this communication is over. Other situations described as follows. (1) When does not receive an from within a predetermined time, sends an on the CC just like waking up, which is to avoid the deadlock. (2) When switches to a DC and waits for a predetermined time, if there is no or  for , enters to sleeping period based on its duty cycle (addressed in Section V.B).

2) Channel Selection Scheme: When wakes up to re-ceive packet, selects a DC and then puts its ID number in an   . should select the “best” DC based on some Channel Usage Information (CUI) that can be obtained by eavesdropping on the CC. This Eavesdropping based Chan-nel Selection (ECS) is an effective scheme in ad hoc net-works and is adopted by most of mcMACs [5] [12] [13] [16] [17]. However, THT make ECS is inefficient in WSNs, and is not suitable for ARM. Thus, it is no better choice than the random selection, when duty cycling and single-radio are employed and traffic loads are heavy. Thereby, to avoid THT, ARM uses probability-based random scheme to select DCs. By this scheme, when a node is ready to receive, it randomly selects a DC  (No matter this DC  is idle or busy) with probability  , and enters to sleeping period with 1 to conserve energy. is elaborated in Section V.

Figure 4. The unicast scheme of ARM

116

Page 4: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

Figure 5. The broadcast scheme of ARM

B. Broadcast Scheme

By adjusting all the potential receivers, ARM utilizes a simple but reliable receiver adjusted scheme to solve LRB.

1) Overview: Under ARM, Broadcast Channel (BC) is a dedicated DC for broadcast. When a sender has a broadcast packet to send, it switches to the BC, and then senses the BC. If the BC is idle, it repeatedly sends this broadcast packet for

continuous time intervals, which are defined as the aver-age length of time that a node sends a broadcast packet. Al-though nodes are asynchronous in ARM, every neighbor node (potential receivers, including all sleeping nodes) ad-justs itself to switch to the BC in every 1 time intervals. Thus, every neighbor of the broadcast sender can receive the broadcast packet during time intervals. This is because the length of neighbor’s hopping intervals (i.e.,  1) is shorter than the length of sender’s continuous broadcast packet transmission (i.e., ). Fig.5 gives an example of this scheme. When   has a broadcast packet to send,   first switches to the BC, and then  repeatedly sends a broadcast packet in  5 time intervals. Every 1 4 time in-tervals, other nodes such as and adjust themselves to switch to the BC to receive possible broadcast packets. The-reby, all the neighbors of the sender can receive this packet. ARM utilizes this broadcast scheme to achieve high reliabil-ity, which is validated in Section VI.A.4).

2) Broadcast Parameter: is significant to the broad-cast performance of ARM. The larger is, the more times a broadcast sender transmits the same packet repeatedly with, the longer latency of broadcast incurs, the more energy the sender consumes, while the smaller hopping frequency other potential receivers have, the less energy other nodes con-sume. A trade-off between energy and latency has to be achieved. Under ARM, to achieve a balance of energy con-sumption between a sender and all its receivers, the default setting of is the value that can make all the energy, with which a sender sends a broadcast packet, is equal to all the energy, with which all its receivers receive a broadcast packet. More importantly,  can be dynamically changed in order to make ARM suitable for QoS requirements as well. For instance, if the objective of the networks is to minimize broadcast latency as less as possible, regardless of energy cost, can be set to 2. Thus, after every one time interval, all the nodes have to switch to the BC to check whether there is a broadcast packet to receive. The optimal is based on specific applications of WSNs.

V. PERFORMANCE ANALYSIS

Two parameters bring significant influence on ARM’s performance, which are: (1) Probability , with which a receiver randomly selects a DC and communicates with the sender; (2) Duty cycle , with which idle nodes enter to the sleeping state periodically. Subsection A and B are to decide the optimal values of and , respectively.

A. The Probability

In ARM, the optimal p is set to the ratio of the number of Average available DCs (denoted as  ) and the number of total available DCs (denoted as ). So, represents the probability that a node randomly selects a DC  which is not occupied by other nodes. Usually, is limited by the hard-ware design standards or the reality of wireless spectrum availability, which are not determined by MAC protocols. Assuming that is given, can be obtained by analyzing  .

can be easily obtained, if the number of average occupied DCs (denoted as  ) is given. is derived as follows.

In a networks, denoted as   , the routing layer of   (which consists of the routing layers of all the nodes) pays a cost to the MAC layer of  for the messages that are re-layed from the routing layer to the MAC layer. Let de-notes the average rate at which the MAC layer of earns. In other words, denotes the sum of all the nodes’ MAC layers earning rate in  . Let denotes the average amount of money that the routing layer of pays to MAC layer for every message. Let denotes the average rate at which the messages of routing layer arrive to the MAC layer. Under the network stabilization condition, it is self-explaining that

.                                               1

Next, Eq. 1 is used to obtain the number of average oc-cupied DCs ( ) when becomes stable. Assuming that at the MAC layer, the total number of packets belonging to the same message at routing layer is independent and geometri-cally distributed with parameter  , i.e. with mean 1/ .

Theorem 1: Under the network stabilization condition:

1/ .                                             2

Proof: If the cost rule is set as that routing layer of pays $1  per time-unit only when one packet is sending on a DC. Then, the earn rate ( ) of the MAC layer is equal to the number of the packets sending on all DCs, which is equal to the number of occupied DCs, i.e. . Further, the average amount ( ) of money, which the routing layer pays to the MAC layer, is equal to the average number of packets belonging to the same message at the routing layer, i.e. 1/ .

is independent with the cost rule, so is not varying. Based on 1 , ,  1/ , Eq. 2 is valid. ▇

Based on Theorem 1, the average number of occupied DCs ( ) can be obtained under the network stabilization condition. Thereby, the average number of available DCs ( ) can be obtained by   , since is given. Finally,

/ / .                                  

117

Page 5: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

B. The Duty Cycle

Under duty cycling, the duty cycle  is defined as the ra-tio of wake-up time and wake-up time plus sleeping time, but the optimal (denoted as ∗ ) is hard to find. So, we transfer seeking ∗ to seeking optimal (denoted as   ∗ ), which is maximum sleeping time. The following model and simplifications are made for analyzing ARM. (1) The net-works consist of stationary nodes sharing common media in one hop. (2) Time is divided up into small slots, and each slot length (denoted as  ) is equal to the time of a packet sending at MAC layer. (3) Messages of routing layer arrive to the MAC layer by a Poisson process with rate  .

1) State Diagram: The state diagram of nodes is shown in Fig.7. All states fall into 5 main categories, i.e. Sleeping State ( ), Transmitting State ( ), Receiving State ( ), Hopping State ( ), and Listening State ( ). In addition,

consists of 7 substates, which are: TryA state ( ) where a node tries to send an ; TryR state ( ) where a node tries to send a ; Back-Off state ( ) where a node is backing off before sending a packet; WaitA state ( ) where a node is waiting for an ; Waking state ( ) where a node is wake-up for a possible on a DC; state where a node as a Sender is Listening on channel for two slots Unconditionally due to THT; state where a node as a Receiver is Listening on channel for two slots Unconditionally for the same reason. All state symbols are in Table II. The state occupancy time depend on , and all lengths of time in Fig.7 are represented by times of  . The different slots in the same states are denoted as [state name, slot number]. In Fig.7, denoted as low case letters, i.e. a, the transition probabilities for the state diagram are derived as follows.

P , 1 | , e , 1 .                  3

P , 1 | , 1 , 1 .                             4

P , 1 | , 0 e .                                                           5

Eq. 3 is the decrement of backoff counter, which means no message arrives and happens with probability  e . Eq. 4 represents the probability of messages arriving, and Eq. 5 gives the probability of waking up and trying to send  .

P , | , 1 e e , 1 . 6

P , 1 | , 1 1 e e , 1 . 7

P , 1 | , 1 1 1 e e .    8

Eq. 6 and Eq. 7 model the probabilities that either only one or multiple nodes try to transmit a packet in  , respec-tively. Eq. 8 gives the probability that retry limit reached.

P , | , 1.                                9

P , 1 | , 1.                               10

P , 0 | , 1 1.                              11

Eq. 9 - 11 model the process that a receiver switches to a DC unconditionally listening for two slots due to THT.

P , | , 0 1 .                         12

P , 1 | , 0 .                           13

Eq. 12 and Eq. 13 give the probability of either only one or multiple senders trying to transmit a in this slot, re-spectively. can be solved via , which is the probability that only one sender chooses the least slot in all backing off slots it can choose. Thereby, the winner is the only one try-ing to transmit a in a coming slot. Therefore,

  1 ∑ ∙ ,                   14

where is the expected number of receivers. Assuming that all the senders choose receivers with equal probability,

∑ 1 ∙2

1,                         15

where is the number of average waking up nodes on the CC. Since the number of average occupied DCs (denoted as

) is already obtained in previous subsection, in the long run,

  ∙ 2 1 ,                                   16

where is the duty cycle and is the number of neighbors of a node, which both are given.

P , | , 1 , 0 1.                 17

P , 1 | , , 0 1.                   18

P , | , 0 .                            19

P , 1 | , 1.                          20

Figure 6. The state diagram for ARM node

TABLE II. STATE SYMBOL

Symbols Meanings S maximum number of Sleep slotsA maximum number of wait slots for an D maximum time of resenDU maximum number of wake-Up slotsB maximum number of Back off slotsDC Data Channel CC Control Channel

tryA try to transmit an tryR try to transmit a

AnNounCement packet 1st packet Mth packet

Average number of packets in a Message

118

Page 6: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

Eq. 17 - 18 give the probabilities that after listening for one slot on a DC, the node receives a and continues to listen. Eq. 19 - 20 model the process that no sender sends

 to the node in this wake-up period, and then the node goes back to the CC to enter sleeping period.

P , | , 1.                          21

P ,  1 | , 1.                      22

P ,  1 | ,  1 1.                    23

P , | ,   1.                       24

When the node is in , , it implies that this node al-ready knows a sender has packets to it. Based on assump-tions, this transmission is not inferred by other senders from now. The node goes to , to transmit a , and then goes to ,  1 to receive the 1st data packet, and then moves to ,  1 to transmit the 1st and so on, until the last is sent out. The node switches to the CC to enter sleeping period. Eq. 21 - 24 model this process.

P , | , 1 , 1 .        25

P , 1 | , , 1 .       26

P , | , 0 1 .                       27

Eq. 25 - 26 give the process that a node waiting for receives the or continues to wait, respectively. Eq. 27 represents that probability that the node goes to , to prevent a possible deadlock. is the probability that no

is sent by intended receivers on the CC. Let , denotes the steady-state probability of , , and then

is equal to 1 , .

P , | , 1.                            28

P , 1 | , 1.                              29

P , 0 | , 1 1.                             30

Eq. 28 - 30 model the process that a sender receives re-ceiver’s  , and switches to a DC to listen in two slots.

P , 1, | , 01, 1 .       31

Eq. 31 represents probability of the 1st time randomly backing off for avoiding collisions. State , 1, means backing off ( ) slot at 1st backing off.

P , 1, 1 | , 1, 1,   1 .    32

P , 1 | , 1,0 1.                            33

Eq. 32 is the decrement of backoff counter, which happens with probability 1. Eq. 33 gives the probability of the node trying to send with the 1th time.

P , | , 1 ,   1 .          34

P , 1, | ,1

, 1 , 1 . 35

P , | , 1 .                          36

Eq. 34 gives the probability that a sender sends a . Eq. 35 models the process of a sender backing off th time.

Eq. 36 represents the probability that the backing off limit reached and a sender switches to the CC to sleep.

P , | , 1.                       37

P ,  1 | , 1.                   38

P ,  1 | ,  1 1.                 39

P , | ,   1.                    40

Eq. 37 - 40 model the process related to Eq. 21 - 24 .

2) Steady-state Probability: , represents the steady-state probability of , 1 . Denoting , by

, all steady-state probabilities can be represented with and transition probabilities, e.g. , , . The prior of , is a state which can transfer to   , with the transition probability, e.g. , 1 is the only prior to , 2 . The steady-state probability of , can be represented as the sum of all the priors’ steady-state probabilities multiply-ing by related transition probabilities, e.g.,

P , 1 ∑ , ∙ 1 1 ∙ . 41

Thus, all the steady-state probabilities can be expressed by transition probabilities and . Since all the transition proba-bilities are given and all the steady-state probabilities can be represented by alone, using normalization condition (i.e., the sum of all steady-state probabilities is equal to 1), is solvable. Then, all steady-state probabilities are solvable.

3) Optimal Duty Cycle: All states can be put into 5 cate-gories. Each category represents one kind of given energy consumption model, i.e.,  , , ,  and

, respectively. The steady-state probabilities are de-noted as , , ,  and , we have

∑ , ,

, , , ,         

∑ ,, ,  ∑ ,   ,   ,

 ∑ ,, ,  ∑ ,   ,   ,

∑ , ∑ ,   ,

 ∑ ∑ , , ∑ , .                          42

Next, the expectation of energy consumption of a node in one slot, denoted as , can be represented as

∑ , , , , ∙ .        43

Similarly, if the average length of a message is denoted as , then the expectation of data a node transmits in one

slot, denoted as , is

∑ ,   ∙ E / .                 44

The ratio of and represents energy efficiency, denoted as / . Assuming all the parameters of ARM are given except for which is the maximum num-ber of sleeping slots. If is varied, is also changing. The optimal number of sleeping slots (denoted as ∗) can obtain the maximum   . Thereby, ∗ / ∗ can be ob-tained which is the optimal duty cycle for ARM.

119

Page 7: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

VI. PERFORMANCE EVALUATION

In this section, simulation and testbed experiments are conducted to examine the effectiveness of ARM.

A. Simulation Experiments

Three metrics, aggregate MAC throughput, energy con-sumption, and broadcast reliability, are utilized to verify the effects of ARM. In each group, different Total Number of Channels (TNC) and network loads are considered except for the last one where the broadcast Packet Arrival Rate (PAR) and the Number of Broadcast Nodes (NBN) are con-sidered. Network loads are varied via changes of the Num-ber of CBR (NCBR, Constant Bit Rate) streams in the net-work. In all simulations, TNC is set to 4 when NCBR is va-rying, and NCBR is set to 30 when different TNCs are used.

The configurations of the simulation for unicast are as follows. Total 289 nodes, whose radio communication ranges are set to 40m, are uniformly deployed in a square area of size 200m 200m with a node density of 38. The traffic model is many to many. The payload size is set to 32 Bytes, and the channel bandwidth is set to 250 Kbps. ARM with OPtimal Duty Cycle (ARM-OPDC) is compared with four MAC protocols described as follows: (1) RI-MAC [18]; (2) MMSN [2]; (3) PMC [4]; (4) CAM-MAC [16]. Further, two varieties of ARM-OPDC are also involved to justify the value of the optimal duty cycle from the analysis: first va-riety utilizes the duty cycle of 25% (ARM-25%); the second exploits the duty cycle of 50% (ARM-50%).

1) Evaluation on Throughput: Aggregate throughput is computed as the total amount of all useful data successful delivered via the MAC layer in the network per unit time.

The throughput is explored when different TNCs are used in Fig.7 (a). Compared with others, three ARMs have similar or little lower throughput when TNC is small. This is because under ARM, all transmissions start on DCs that the receiver randomly selected, and the sender has to switch to that DC, and then makes a handshake with the receiver. This scheme will pay considerable cost if TNC is small, since all senders will handshake with receivers on such few DCs. When more channels are available, ARMs, PMC and CAM-MAC allow more nodes to transmit on different DCs simul-taneously. ARM-50% has better throughput than ARM-25% and ARM-OPDC, but as TNC is larger than 7, the dif-ference becomes smaller. When NCBR is increasing, throughput changes are shown in Fig.7 (b). It is observed that aggregate throughputs of all protocols increase with NCBR, because if more node-pairs are involved in data communication, more parallel transmissions will occur. However, the results show that under heavy loads, ARMs perform progressively better than other MAC protocols, which illustrates that ARMs significantly benefit from the receiver-initiated scheme and random channel selection when degrees of CCS and THT increase with loads.

2) Evaluation on Energy Consumption: The energy consumption is computed as the energy consumed to suc-cessfully deliver a useful data byte.

(a) Throughput vs. TNC (b) Throughput vs. NCBRFigure 7. Throughput evaluation

As TNC increases, energy consumption changes are ob-served in Fig.8 (a). Results show that all energy consump-tions decrease with the rise of TNC, but ARMs perform bet-ter than others, since they conserve energy by duty cycling. Further, ARM-OPDC outperforms ARM-25% and ARM-50%, which validates the analysis of the optimal duty cycle. The energy consumption is measured by varying loads in Fig.8 (b) where energy consumptions increase when loads rise. ARMs maintain relatively low energy consumption because of their duty cycle schemes. ARM-OPDC achieves better energy efficiency than ARM-25% and ARM-50%.

3) Evaluation on Broadcast Reliability: The broadcast reliability is computed as the ratio of the average number of packets received by neighbors of the broadcast sender, and the total number of packets sent by the broadcast sender.

Fig.9 (a) plots broadcast reliability changes when NBN is set to 35 and PAR is varying. It is observed that the relia-bilities of all protocols decrease with the rise of arrival rate, but ARM-OPDC outperforms others when PAR is larger than 20. This is because ARM-OPDC benefits from the lightweight of its broadcast scheme. The broadcast reliabili-ty is measured by setting PAR to 25 and changing NBN in Fig.9 (b). All the reliabilities generally drop when NBN be-comes larger. However, ARM-OPDC has a higher reliability when NBN is bigger than 30. This is also due to the lightweight of ARM, which is not largely affected by loads.

(a) Energy vs. TNC (b) Energy vs. NCBRFigure 8. Energy consumption evaluation

(a) Reliability vs. PAR (b) Reliability vs. NBNFigure 9. Reliability evaluation

0 1 2 3 4 5 6 7 8 92.0

2.1

2.2

2.3

2.4

2.5

2.6

2.7

2.8

2.9

3.0

TNC

Th

e E

ner

gy C

onsu

mp

tion

(E

-7m

Wh

r)

RI-MAC MMSN ARM-25% PMC ARM-50% CAM-MAC ARM-OPDC

16 20 24 28 32 36 40 44 48 52

2.1

2.2

2.3

2.4

2.5

2.6

2.7

2.8

2.9

RI-MAC MMSN ARM-25% PMC ARM-50% CAM-MAC ARM-OPDC

NCBR

Th

e E

ner

gy C

onsu

mpt

ion

(E

-7m

Wh

r)

10 15 20 25 30 35 40 45 50 550.30

0.35

0.40

0.45

0.50

0.55

0.60

0.65

0.70

0.75

0.80

0.85

0.90

RI-MAC MMSN CAM-MAC ARM-OPDC

The Number of Broadcast Nodes

Th

e B

road

cast

Rel

iab

ility

0 5 10 15 20 25 30 35 40 450.30

0.35

0.40

0.45

0.50

0.55

0.60

0.65

0.70

0.75

0.80

0.85

0.90

RI-MAC MMSN CAM-MAC ARM-OPDC

The Broadcast Packet Arrival Rate

The

Bro

adca

st R

elia

bili

ty

16 20 24 28 32 36 40 44 48 52100

150

200

250

300

350

400

450

500

550

600 RI-MAC MMSN PMC CAM-MAC ARM-25% ARM-50% ARM-OPDC

NCBR

Agg

rega

te M

AC

Th

roug

hp

ut (

Kbp

s)

0 1 2 3 4 5 6 7 8 9100

150

200

250

300

350

400

450

500

550

600

TNC

Agg

rega

te M

AC

Thr

ough

put

(Kbp

s) RI-MAC MMSN PMC CAM-MAC ARM-25% ARM-50% ARM-OPDC

120

Page 8: [IEEE 2010 29th IEEE International Performance Computing and Communications Conference (IPCCC) - Albuquerque, NM, USA (2010.12.9-2010.12.11)] International Performance Computing and

B

eHnsproinnha

athTdrCbimarsTsthdstrhbM

Aalato3pthAh

B. Testbed Exp

To evaluateevaluated in CHeilongjiang UnRF905 radio shown in Fig.1plemented. Notreach for todayoptimal duty cyng to network

nodes. The testbhop as in Fig.1and the data tra

The throughand different That CAM-MATNC is less thadoes not have treas, under ARCCS and THT better throughpmprovement i

available, CCS breceiver-initiatesimilar throughTNC is set to 5served in Fig.1hroughput than

due to when fescheme of CAMransmission sc

heavy, fewer nbecome more sMAC as NCBR

In this papARM is proposare conducted tation results inocols, ARM a

35% higher broperimental reshroughput rati

ARM successfuhidden termina

(a) Hawk node

periments

e the performanC/OS on hawk University. The

and MSP43010 (a). Only Ate that the com

y's sensing deviycle is solved bk parameters abed consists of0 (b). The size

ansmission rate

hput is explorTNC are used. FC has a higheran or equal to to decouple du

RMs, duty cyclare less serio

put as TNC is is due to the becomes severed transmissiohput with ARM  and  loads are11 (b). It is sn CAM-MAC,

fewer nodes arM-MAC workcheme of ARMnodes are left serious. TherefR is equal to or

VII. CON

per, a multi-csed. Both simuto verify the pendicate that comachieves 162%oadcast reliabiults show thaos at most. Th

fully solves col and lower rel

(b) A

Figure 10. Tes

nce of ARM innodes, which

e hawk node i processor, an

ARMs and CAMmplex computaices. Thus, in Aby a desktop cand then is trf 10  nodes depe of a packet ise is set to 100 K

ed when  NCBFrom Fig.11 (r throughput th3. Under CAM

uty cycling in iling degrades tous. However,larger than or fact that whe

re, and ARMs on. Further, AM-25% or ARe varying, the tshown that AR, when loads are communicatks better than Ms. However,for cooperatio

fore, ARMs oularger than 3.

NCLUSION

channel MAC ulation and testerformance of Ampared with th

% more throughlity at most. Mat ARM achihese results cleontrol channel liability of broa

snapshot in the testb

stbed experiments

n real world, itare developed is equipped wnd its picture M-MAC are iations are out ARM-OPDC, tcomputer accorransmitted to ployed within os set to 32  BytKbps.

BR is set to bea), it is observ

han ARMs, whM-MAC, a noits lifetime; whthroughput wh, ARMs achieequal to 4. Thn more DCs atackle it with t

ARM-OPDC hRM-50%. Whthroughput is oRMs have loware small. Thisting, cooperatireceiver-initiat when loads aon, so collisioutperform CAM

protocol calltbed experimenARM. The sim

he other four prhput at most a

Moreover, the eeves 67% moarly indicate thsaturation, trip

adcast problem

bed experiment

Sink

t is by

with is

m-of

the rd-all

one tes,

  5 ved hen ode he-hen eve his are the has hen ob-wer s is ive ted are ons M-

led nts

mu-ro-

and ex-ore hat ple

ms.

ThiFoundatific anProvinc(20080ProjectPostdocTechnotee (11for Outsearch

[1] D. Com

[2] G. Acc

[3] Y KMA

[4] H.Con

[5] J. SHanTra

[6] M.Pro

[7] M.Pro

[8] J. Cfor

[9] A. wit

[10] P. BHopNet

[11] A.TPro

[12] S.LMAMo

[13] A. Wir

[14] N. ProWir

[15] A.Pro

[16] T. MuTM

[17] T. Ene

[18] Y.Asyin W

[19] Y WCom

[20] Z ZChaINF

(a

1 20

50

100

150

200

250

300

350

400

Agg

rega

te M

AC

Th

rou

ghp

ut

(Kb

ps)

V

s work is suppation of China nd Technologice (GC09A109430902), the

t of Harbin ctoral Foundatology Research154Z1001), thetstanding YounProject (20102

Culler, D. Estrin,mputer, Special IssZhou, C. Huang,cess Control for WKim, H Shin, et aAC Protocol for DeLe, and D. Henrikntrol Protocol for WSo and N. Vaidyandling Multi-Chansceiver, in MOBI

Salajegheh , et otocol for Wireless

Jovanovic, and otocol for WirelessChen, S. Sheu, andIEEE 802.11 Ad HTzamaloukas and

th Packet Trains foBahl, R. Chandra, pping for Capacitytworks, in MOBICTzamaloukas, J.J.Gotocol for Multi-ChL. Wu, C.Y. Lin, YAC Protocol with obile Ad Hoc NetwAdya, et al. A Mreless Networks, inJain, S.R.Das, an

otocol with Recereless Networks, iNasipuri, J. Zhuan

otocol for MultihopLuo, M. Motani,

ultichannel MAC:MC, Vol 8, No 3, 20

Luo, M. Motani,ergy-Efficient Mul

Sun, O. Gurewynchronous Duty CWireless Sensor NWu, John A. Stankmmunications in WZhou, et al. Handlannel MAC in LFOCOM, 2010.

a) Throughput vs. TFigure 11

2 3 4TNC

CAM-MAC ARM-25% ARM-50% ARM-OPDC

VIII. CONCLUSIO

ported by the N(61070193, 60

ical Research 9), the China Science and (2008RFQXG

tion (No.LRB0h of Heilongjiae Heilongjiangng Scholar, the208) and Innov

REFERENCE

, et al. Overview sue on Sensor Net T.Yan, et al. MM

Wireless Sensor Neal. Y-MAC: An Eense Wireless Senksson. A PracticaWireless Sensor Na. Multi-Channel

hannel Hidden IHOC, 2004. al. HyMAC : H

s Sensor NetworksG. Djordjevic. T

s Sensor Networksd C. Yang. A NewHoc Wireless LANd J.J.Garcia. Chanor Ad Hoc Networ

and J. Dunagan. Sy Improvement in

COM, 2004. Garcia. A Receivehannel Networks,

Y.C. Tseng, and J.POn-Demand Chan

works, in ISPAN, 2ulti-Radio Unifican BROADNETS, 2nd A, Nasipuri. Aeiver-Based Chann ICCCN, 2001. ng, and S. R. Dasp Wireless Networ

and V. SrinivasaDesign, Analysis

009. , and V. Srinivaslti-Channel MAC witz and D. JohCycle MAC Proto

Networks, in SenSyskovic, et al. RealisWireless Sensor Nling Triple HiddenLong-Delay Und

TNC

. Testbed evaluati

5 6 00

50

100

150

200

250

300

350

400

Agg

rega

te M

AC

Th

roug

hp

ut

(Kb

ps)

ON

National Natur0803015), the KProject of HePostdoctoral FTechnology

G107), the He08-021), the Sang Educationag University Fe Student Inno

vative Laborato

ES

of Sensor Netwotworks, 2004. MSN: Multi-Freq

etworks, in INFOCEnergy-efficient Mnsor Networks, in Il Multi-Channel M

Networks, in IPSN,MAC for Ad HoTerminals Using

Hybrid TDMA Fs, in PIMRC, 2007TFMAC: Multi-Chs, in TELSIKS, 200w Multichannel AcNs, in PIMRC, 200nnel-Hopping Murks, in MoMuC, 20SSCH: Slotted SeeIEEE 802.11 Ad-

r-Initiated Collisioin INFOCOM, 20P. Sheu. A New Mnnel Assignment f2000. ation Protocol for 2004. A Multichannel Cnnel Selection f

. A Multichannel rks, in WCNC, 199an. Cooperative As, and Implementa

san. Altruistic Coprotocols, in MOBhnson. A Recei

ocol for Dynamic Tys, 2008. tic and Efficient Metworks, in INFOC

n Terminal Problemderwater Sensor N

(b) Throughput vsion for unicast

1 2 3

CAM-MAC MAC-NBF MAC-EBF MAC-RCS

NCBR

ral Science Key Scien-eilongjiang Foundation Innovation eilongjiang cience and

al Commit-Foundation ovative Re-ory Project.

orks, in IEEE

quency Media COM, 2006. Multi-Channel IPSN, 2008. Media Access , 2008. oc Networks: g a Single

FDMA MAC . hannel MAC

07. ccess Protocol 03. ultiple Access 000. eded Channel Hoc Wireless

on Avoidance 01.

Multi-Channel for Multi-Hop

IEEE 802.11

CSMA MAC for Multihop

CSMA MAC 99. Asynchronous ation,in IEEE

operation for BICOM, 2007. iver Initiated Traffic Loads

Multi-Channel COM, 2008. ms for Multi-Networks, in

s. NCBR

4 5 6

121