Open access

Cross-Layer Design for Smart Routing in Wireless Sensor Networks

Written By

Omar M. Sheikh and Samy A. Mahmoud

Submitted: 07 December 2011 Published: 06 September 2012

DOI: 10.5772/48605

From the Edited Volume

Wireless Sensor Networks - Technology and Protocols

Edited by Mohammad A. Matin

Chapter metrics overview

2,803 Chapter Downloads

View Full Metrics

1. Introduction

With that said, the dependencies of next-generation applications on various performance and energy factors vary. Many of these applications are critical and require immediate response such as those for physical security, industrial processes and infrastructure monitoring; however, those for temperature control and ambient light measurement, for example, are less critical and are able to conserve energy at the expense of less performance-heavy resource allocation. Hence, the aim is to create a flexible cross-layer platform for distributed WSNs that considers the criticality of the resource allocation for next-generation applications.

This chapter covers the main research areas that arise in designing smart routing protocols and require specific engineering attention:

  • Network Architecture - determining the optimal configuration of the distributed architecture and the deployment of WSNs at areas of interest to extend the WMN;

  • Optimization Metrics - identifying cross-layer performance and energy factors that impact resource allocation: application requirements, available routes, channel quality, battery life, physical (PHY) layer considerations (transmit power, operating channel and bandwidth), and the energy efficiency of the wireless communication protocol;

  • Criticality - defining the dependency of commercial applications on performance and energy considerations;

  • Route Selection - selecting the route with the optimal trade-off between performance and energy conservation for a given application criticality;

  • Coexistence - providing connectivity between heterogeneous communication interfaces to bridge sensor and mesh technologies such as Bluetooth and WiMax, respectively; and,

  • Energy Harvesting - quantifying the impact of replenishing energy reserves from kinetic, solar or heat energy on resource allocation.

Each of these topics will be covered in this chapter.

Advertisement

2. Network architecture

Wireless mesh networks (WMNs) are the architectural enabler for wireless sensor networks (WSNs). As mentioned, WMNs provide the opportunity to deploy WSNs in an incremental fashion to execute sensory applications at multiple locations of interest on a per-need basis; WMNs also provide an alternative to carrying Internet Protocol (IP) traffic in rural or hostile environments where access to fibre may not be available. This provides feedback of sensory data from a WSN to a centralized controlling station over a long haul through a mesh node that is assigned to govern a sensor cluster.

These specially-assigned mesh nodes, called cluster-heads, are selected based on proximity, or deployed to extend the network, to the sensory location(s) of interest. Cluster-heads provide a bridge to the mesh network and may assume supervisory control of their subordinate sensors, which are typically limited in their resources and computational capabilities. To perform these functions, cluster-heads are equipped with the additional resources to handle the traffic load, although they likely carry multiple types of traffic, only one of which may be sensory. A WMN enabling a WSN is presented in Figure 1.

Figure 1.

A Wireless Mesh Network Enabling a Wireless Sensor Network

We design a network architecture to analyze the impact of smart routing on resource allocation for WSN applications with varying requirements. This architecture, presented in Figure 2, consists of multiple sensor clusters and an overlay WMN that spans roughly a one kilometer area. In this network, one sensor cluster is formed of high-bandwidth Ultrawideband (UWB) sensors that are suited to data intensive applications such as video monitoring; UWB is a high-speed alternative to Zigbee for sensor networks with low power consumption but is inherently short range [Cheekiralla, 2005]. A second sensor cluster of Zigbee sensors is deployed to execute a low bandwidth application such as temperature monitoring. The WMN uses WiMax mesh technology to connect these geographically distributed clusters to the central controlling stations. This station is responsible for communicating with an outside controller or processing center, or is the processing center itself.

Figure 2.

A Distributed Wireless Mesh Network of Zigbee and UWB Sensor Clusters

The communication technologies chosen are presented as a single scenario but typically depend on the range of communication required, node density and required bandwidth requirements of the applications of interest.

In terms of node interaction, cluster-heads perform supervisory control of sensors and optimize resource allocations for sensors that they govern. Sensors correspondingly inform their cluster-heads of the state of their resources periodically.

Ideally, mesh nodes, including cluster-heads, are organized in a hexagonal topology for maximum connectivity [Zhang and Hou, 2005]. These mesh nodes are placed at the center of their clusters around which sensors are typically positioned randomly. However, while we would ideally like to maintain a hexagonal topology of mesh nodes, this may not always be practical because the organization of mesh nodes depends highly on the sensory locations of interest. For example, if a sensor cluster is deployed to monitor stresses on bridge infrastructure, or the military is interested in monitoring certain high security areas, it will likely not be possible to deploy a mesh node at an ideal location. It is important to note that, in networks for which a hexagonal mesh topology is not possible, network planners must be aware of potential single points of failure. In these cases, load balancing or redundancy should be explored to ensure that mesh nodes are not overburdened.

In this analysis, neither sensor nodes nor mesh nodes are wired to power sources. This allows us to explore a general architecture and expands the number of environments in which, and applications for which, the system can be deployed. In reality, certain mesh nodes may be connected to power sources if the locations in which the mesh nodes are deployed have power sources readily available. Another option is energy harvesting to replenish energy reserves over time, which we will cover later in this chapter.

2.1. Software radio

In wireless sensor networks (WSNs) that are based on multiple technologies, software radio is required to convert operating parameters between otherwise incompatible communication protocols. The conversion must consider the varying dependencies of these technologies on a number of characteristics that affect communication and performance. For example, in our network architecture, the cluster-head must convert transmission parameters between sensor and mesh communication technologies. These parameters include:

  • Operating bandwidth,

  • Transmit power,

  • Transmission frequency, and

  • Modulation scheme.

WSNs that are based on software radio enable for the deployment of large-scale and distributed systems that are designed with technologies that are most suitable to their applications. Various technologies may be selected based on throughput requirements, cost of deployment and energy efficiency. Software radio enables these systems to dynamically tune operating parameters around current networking conditions to improve capacity.

Advertisement

3. Cross-layer design

Layering systems are the norm in the design of communication protocol stacks. However, wireless systems are not always suited to the common layered protocol stack architecture. For example, in a layered architecture using the Transmission Control Protocol (TCP), a failed packet is considered a sign of congestion, as opposed to simply a lost or corrupted packet which is the case in wireless systems. For sensor networks, and smart routing specifically, given the need to conserve sensor energy and maximize application performance, cooperation between several layers in the protocol stack is crucial. This can only be achieved in a cross-layer architecture. Cross-layer design ensures that the route that best meets both performance and energy requirements can be determined.

Figure 3.

Various Cross-Layer Design Protocols [Srivastava and Motani, 2011]

Figure 3 presents a number of general ways in which a typical layered architecture can be modified by cross-layer design:

  • Creation of new interfaces for information flow between non-adjacent layers (Figures 3a-c);

  • Merging of adjacent layers for joint functionality and reduced overhead (Figure 3d);

  • Design coupling between layers, i.e. one layer assumes information arriving from another (Figure 3e); and,

  • Vertical calibration between layers (Figure 3f).

In next-generation wireless sensor networks (WSNs), a number of these protocols may be used. For example, upward information flow (Figure 3a) may be used to provide the application layer with available routes from the network layer, channel availability from the link layer and remaining energy information from the physical (PHY) layer. Furthermore, downward information flow (Figure 3b) or back-and-forth information flow (Figure 3c) may be used between the application layer and the PHY layer. For example, the application layer may inform the PHY layer of transmission parameters such as transmit power and operating frequency to use during transmission.

The design of a cross-layer optimization algorithm for WSNs that consider both performance and energy factors requires efficient communication between protocol stack layers such as the PHY, link, network and application layers. Direct signaling between application layers reduces latency in the communication between multiple layers and is crucial in the design of cross-layer optimization algorithms [Wang and Abu-Rgheff, 2003]. The direct signaling scheme for our protocol stack model is illustrated in Figure 4.

Figure 4.

Protocol Stack Model to Enable Smart Routing

The goal of direct signaling is to exchange information between important protocol layers for smart routing. This ensures that the required information to perform cross-layer optimization is retrieved, and allocation decisions are sent, with minimal delay. For example, the cluster-head’s PHY layer will inform the application layer of the sensor and mesh node state information which includes energy rating information, surrounding interference and more. State information and coordination protocols to provide feedback to the cluster-head are covered in Section 9. The link layer and network layer will also inform the application layer of the channel conditions and available path information, respectively. Furthermore, upon executing the cross-layer optimization policy, the application layer will inform the PHY layer of the necessary resource allocations and the link layer of the next-hop information. Direct signaling enables these interactions with minimal delay for optimized and timely responses in our distributed network.

For any two non-adjacent layers, lxandly, the propagation latency Tlx,lyDS for the direct signaling method is calculated as,

Tlx,lyDS=Tlx,lyL(n-1)E1

where Tlx,lyL is the propagation latency between layers lx and ly in a traditional layered protocol stack with (n-1) layers between them. Hence, the direct signaling method provides a speed-up factor of (n-1) [Wang and Abu-Rgheff, 2003].

Advertisement

4. Problem statement

In solving the smart routing problem via cross-layer design, the goal is to solve the 4-tuple defined by,

  • Path (or next hop);

  • Operating channel;

  • Transmission power; and,

  • Throughput,

to identify the most suitable path that satisfies both performance needs of an application and energy conservation considerations; this path routes data from a source sensor to a centralized controlling station. In doing so, the cross-layer optimization policy focuses on functions at three layers: path selection at the network layer; channel selection at the link layer; and, transmit power allocation at the physical (PHY) layer. Hence, the 4-tuple defines the operating point for the network in solving the resource allocation for a single transmission.

The 4-tuple forms the basis of utility functions that model the preferences of nodes in allocating various PHY layer resources to throughput; the optimization problem exists since these PHY layer resources also impact network lifetime. Utility functions quantify the performance benefits and power costs associated with the allocation prior to selecting the optimal operating point. In doing so, the criticality of the application plays a major role in determining the necessary tradeoff for the given sensor.

Advertisement

5. Network definition

Define our distributed wireless sensor network (WSN) N=(G(Cl(Vi,Mi),El),S)that is composed of a set of sensor nodes Vi and mesh nodes Mi to solve the smart routing problem. These sensor and mesh nodes are organized into clusters Cl(Vi,Mi) and connected in a two-tier network via directed link setEl. The nodes are connected according to a topology G(Cl(Vi,Mi),El)that is presented in space Sin Figure 2.

We make the following additional definitions:

  • the set of all nodes in the network,Z=ViMi;

  • the set of technologies available to each node in the network,T={tvx|vxZ};

  • the number of sub-networks (sensor and mesh networks) in the distributed WSN,SN;

  • the set of residual energies of all nodes in network,Eavail={evx|vxZ};

  • the set of initial energies of all nodes in network,Einit={Evx|vxZ};

  • the set of channels available to all nodes of a given sub-network,FSN={ftvx|tvxT};

  • the energy efficiencies of various communication protocols,Q={qtvx|tvxT};

  • the central controlling station,vjMi;

  • a cluster-head node,vmMi;

  • the maximum number of hops in a path,K';

  • the number of hops in a single path,KK';

  • the average battery replenishment rate from energy harvesting,rh;

  • the path between any sensor vi and central controlling station vj through cluster-headvm, pathvi,vj={vi,...,vm,...,vj}, where the number of nodes along a simple path between vi and vj can be computed as,K=n(pathvi,vj)(K'+1); and,

  • (K'+1)W|Vi|XW|Vi|

The selection of K'limits the maximum number of hops along a path and, hence, the number of nodes used to route traffic. Communication protocols have varying dependencies on multi-hop routing given their ranges of acceptable transmit powers and operating ranges, and as such they will likely have different path lengths. However, energy consumption characteristics between a transmitter and receiver suggest that it is better for the network to reduce the number of hops in a path at the expense of using a higher transmit power [Oppermann et al., 2004]. Hence, based on our network topology, we set a self-imposed limit to reduce the path length. This is configurable given the network scenario in question.

5.1. Assumptions

To perform this study, we make the following assumptions:

  1. All clusters perform periodic data delivery according to a Poisson process with exponentially distributed inter-arrival times of events with parameterλ;

  2. Sensor node are frequency-agile and can tune their frequencies to select different operating channels;

  3. Mesh nodes use software radio to communicate with both sensor nodes and mesh nodes over different communication technologies;

  4. All nodes within a cluster use omni-directional antennas with equal gains;

  5. Neither sensor nodes nor mesh nodes are wired to power source so that we may explore a general architecture;

  6. Mesh nodes are placed in a hexagonal topology for topology optimality and maximum network coverage as discussed in Section 2;

  7. Sensor nodes are aware of their positions and are equipped with the Global Positioning System (GPS). Sensor localization will be considered in future work;

  8. The central controlling station contains a mesh node and is the sink of transmissions in the network;

  9. Single channels are not used end-to-end for a path and each hop chooses a different operating channel;

  10. Each sensor node follows a M/M/3/3 queueing model with three operating channels and no queue. This limits the competition between all nodes to only three channels to leave sufficient capacity available to carry relay traffic; and,

  11. The cluster-head has real-time channel state information, which can be assumed because our sensor nodes are fixed, allowing us to assume a slow fading model.

Advertisement

6. Link utility function

In forming our optimization functions via cross-layer criteria, we define the communication resources rf associated with a wireless channelfF; F is the channel set of a given communication protocol. The capacity of a channel cf is dependent on a number of factors includingrf, but in this study we focus on the case where cf=ϕ(rf) only. The transmission rate Rvx,vy,fcf is defined as a fraction of the frequency division multiple access (FDMA) Shannon capacity for rf=(Pvx,ft) as,

Rvx,vy,f=ϕ(Pvx,ft)=wflog2    1+Pvx,ft|Hvx,vy,f|2wfNvy,f+Ivy,fE2

where our resource of interest rf=(Pvx,ft) is the selected power at transmitter vx in sending data to receiver vy on wireless channelf, |Hvx,vy,f|2is the channel gain between vx andvy, Nvy,fis the Gaussian noise power on the channel from the perspective of the receivervy, and Ivy,f is the interference of vy on channelf. As we form our link utility function, it evaluates the allocation of our resources rf=(Pvx,ft) for link vx-vy in terms of the achievable transmission rate Rvx,vy,f and the power cost associated with transmitting at rate Rvx,vy,f over the link.

The use of the FDMA Shannon capacity allows us to perform adaptive resource allocations based on the real-time state of the network by relating the data rate to physical (PHY) layer parameters. In our study, rf=(Pvx,ft)only because we consider that all channels have equal bandwidthswf. However, since the Shannon capacity is theoretical, we limit the Shannon capacity with additional regulatory limits.

Lvx,vy,f(Rvx,vy,f,t)=    αlog101+Rvx,vy,fCvy,f(t)-ψ(E)    qtvxlRvx,vy,fm+ηE3

Our link utility function Lvx,vy,f(Rvx,vy,f,t) is the basis of the resource negotiation between a prospective transmitter and receiver in network and is shown in (3). It is formed from the receiver’s perspective as the difference between a benefit function and a cost function. Figure 5 shows a sample plot of the link utility functionLvx,vy,f(Rvx,vy,f,t), which is concave as a function of theRvx,vy,f.

Figure 5.

Example of a Link Utility Function Lvx,vy,f(Rvx,vy,f,t)

The first term of Lvx,vy,f(Rvx,vy,f,t) represents the benefit gained as a function ofRvx,vy,f. This is modeled by a logarithmic function which is monotonically increasing and follows the law of diminishing returns. As a result, an initial increase in Rvx,vy,f is more important to a node than further increases in Rvx,vy,f as the node approaches the incoming channel capacity,Cvy,f(t).

The second term is the cost function that models the power cost of utilizing a link in a path. The cost is a function of the energy efficiency coefficient of the technology used for the communication link,qtvxQ. By multiplying qtvx by the ratio of l/m, we retrieve the energy efficiency for the full packet size including overhead. The power consumption in sending a packet over the prospective link (in watts) is found by multiplying qtvx (in joules/bit) by the transmission rate Rvx,vy,f (in bits/sec). The result is the amount of energy over time, or power, used in transmitting a packet over the link. By considering the Shannon rate in (2), we observe that the link utility is a function of physical resources for both throughput and power cost.

ψ(E)is a function of the transmitter and receiver’s residual energyE, which represents the maximum of the inverse residual energy of the transmitter vx and receiver vy as,
E=maxEvx(t)evx(t),Evy(t)evy(t)E4

Hence, if either the transmitter or receiver of the link have a low residual energy, the cost of using the link increases. In this manner, we encourage the optimization algorithm to select nodes with higher residual energy in the network.

Since the range of available transmit power is small (on the order of milliwatts or microwatts), the algorithm is sensitive to small changes in link cost. Consider a situation where a node has half of its battery power remaining. While it should be able to operate normally, a doubling of the link cost, in the absence of a function likeψ(x), forces the selection of zero transmit power. The effect is worse at larger R due to a higher link cost. As a result, ψ(E)scales the power cost to operate within the limits of the optimality range.

The function ψ(x)is of the form,

ψ(x)=βln(x)+γE5

for a Ultrawideband (UWB) and WiMax transmission, and of the form,

ψ(x)=βx2+δx+γE6

for a Zigbee transmission. The two forms of ψ(x)are due to the achievable rates of the communication technologies of interest and the scale required to fit the power cost within the necessary operating range.

Theα, β, γ, and δparameters are coefficients of the empirical benefit and power cost that define the criticality of the application, which will be covered in Section 8. The parameter αscales the empirical benefit to provide a greater weight to the utility gained by achieving a higher transmission rate. Meanwhile, the three scaling factors, β, γand δare parameters in ψ(x)that may be obtained via curve-fitting after determining the desired operating points for a particular networking configuration as a function ofE.

The optimized transmission rate rvx,vy,f* is calculated by maximizing Lvx,vy,f(Rvx,vy,f,t) where Rvx,vy,f=ϕ(Pvx,ft) as,

rvx,vy,f*=argmaxRvx,vy,f    αlog101+Rvx,vy,fCvy(t)-ψ(E)    qtvxlRvx,vy,fm+ηE7

Givenrvx,vy,f*, the optimized link utility for a single hop vx-vy is calculated as,

Lvx,vy,f*(rvx,vy,f*,t)=αlog101+rvx,vy,f*Cvy,f(t)-ψ(E)    qtvxl    rvx,vy,f*m+ηE8

Based on this information, it is necessary for the cluster-head to receive feedback of the real-time residual energies of sensors. This is achieved through the feedback of hello messages that will both announce presence in the network and provide feedback of node state information to the cluster-head. If the cluster-head is required to perform the cross-layer optimization in between two received hello announcements, the cluster-head will extrapolate the residual energies of both vx and vy based on the elapsed time since the last update to ensure accurate optimization.

The necessary coordination protocols will be covered in Section 9.

Advertisement

7. Objective function

The profit function, Uvi,vja(t), calculates the suitability of candidate path pathvi,vj={vi,...,vm,...,vj}to route a message from a source sensor vi to the central controlling station vj through cluster-headvm. The profit function shown in (6) is our objective function where the goal is to find the candidate path with the maximum profit,Uvi,vja*(t). The profit gained by using a candidate path is calculated as the average of the optimized link utilities, L*, across each hop along a path.

2Uvi,vja*(t)=max    1K-1[x=1gLvx,vx+1,fx*(rvx,vx+1,fx*,t)    +z=g+1K-1Lvz,vz+1,fz*(rvz,vz+1,fz*,t)]E9
    s.t.    (1)    Pvx,fxPvx+1,fx=0,    vx,vx+1pathvi,vjE10
(2)    Pvz,fzPvz+1,fz=0,    vz,vz+1pathvi,vjE11
3)    Pvx,fx,Pvz,fzmax(PMIRS,PSNR,Pmin),    vx,vzpathvi,vjE12
(4)    Pvx,fx,Pvz,fzmin(Ptech,Pcap,Pmax),    vx,vzpathvi,vjE13
(5)    KK'.E14
Uvi,vja*(t)is formed of two summations that separate the optimization of the sensor cluster and mesh network portions of a path. The first summation represents the sum of link utilities as computed via the optimized link utility function L* across all nodes along a candidate path inside the cluster only; g represents the number of hops along the path within the cluster before reaching cluster-head vm and is computed asg=find(pathvi,vj==vm)-1. The second summation represents the sum of link utilities for a candidate path.

We divide the utility sum by the hop count of the path to calculate the average link utility in the path. By doing so, we are able to more closely analyze the difference between a k-hop path and (k+)-hop path in choosing the optimal route. If we were to use total rather than average link utility, the algorithm would favor the (k+)-hop path as the summation of more link utilities leads to a higherUvi,vja. In a power-constrained network, this over-utilizes already limited resources. Hence, by evaluating the average link utility, we are in fact reducing latency and conserving power. It should be noted, however, that, if a path with more hops has the highest average link utilityUvi,vja*, it will be chosen by the optimization policy as the path with the best tradeoff between performance and energy consumption across all candidate paths.

7.1. Constraints

The constraints on the optimization as presented in (6) provide the boundaries for the selection of optimal resource parameters for both sensor and mesh nodes. The first constraint, Pvx,fxPvx+1,fx=0,vx,vx+1pathvi,vj, provides a power allocation restriction that a cluster node vx+1 in an end-to-end path cannot receive and transmit on the same channelfx, that isfxfx+1. This restricts node vx andvx+1, which are successive nodes in a path, from allocating power on the same transmission channel. The second constraint, Pvz,fzPvz+1,fz=0,vz,vz+1pathvi,vj, is the corresponding power allocation restriction for the mesh network.

The third constraint, Pvx,fx,Pvz,fzmax(PMIRS,PSNR,Pmin),vx,vzpathvi,vj, restricts the minimum power that the receiver can receive. PMIRScorresponds to the minimum input signal power at the receiver, or the minimum input receiver sensitivity (MIRS), defined in Table 1. The PSNR constraint is the minimum power required to reach the signal-to-noise ratio (SNR) threshold at the receiver. The third term, Pmin, represents the lower bound on the transmit power that keeps Lvx,vy,f(Rvx,vy,f,t) positive. There is a fourth factor that is the lower bound on the available capacity at the transmitter, which is zero and is thus ignored.

Standard MIRS Minimum SNR Maximum EIRP
Zigbee -85 dBm -1.2 dB 0 dBm
UWB -85 dBm -1.59 dB -14.3 dBm
WiMax -83.2 dBm 9.8 dB 24 dBm

Table 1.

Operating Parameters for Zigbee, UWB and WiMax for Constraint Modeling [Wan and Wang, 2011, IEEE 802.15.3b-2005, 2006, IEEE 802.16-2004, 2004, IEEE 802.15.4-2006, 2006]

The fourth constraint, Pvx,fx,Pvz,fzmin(Ptech,Pcap,Pmax),vx,vzpathvi,vj, restricts the maximum power of the optimality range. Ptechcorresponds to the maximum allowable transmit power on a transmission channel for the technology being used. From Table 1, Ptechis calculated as Ptech (dBm) = Maximum EIRP (dBm) - Gt (dBi), where the Effective Isotropic Radiated Power (EIRP) is the maximum allowable power that can be put on the transmission channel and Gt is the transmit antenna gain in dBi. Pcaprepresents the power that corresponds to the available outgoing capacity on the channel at the transmitter and ensures that the channel capacity is not exceeded. While the lower bound on the outgoing capacity is zero in the previous constraint, the upper bound Pcap is not zero unless the full channel capacity is being used by the transmitter. Meanwhile, Pmaxrestricts the upper bound on transmit power as that which keeps Lvx,vy,f(Rvx,vy,f,t) positive.

The final constraint limits a path to at most K'hops to reduce power dissipation due to routing.

7.2. Steps in resource allocation

The cluster-head executes the following steps to perform resource allocation for a sensorvi:

  1. Path Identification: The cluster-head forms the (K'+1) x Wpath sub-matrix, AX, of the available paths from vi to the central controlling stationvj. For the purposes of this chapter, we will assume that Xis known.

  2. Power Optimization: The cluster-head optimizes the transmit powers across all links for each candidate path aAfor vi using (4) and (5). The cluster-head stores the optimizedLvx,vy,f*, rates rvx,vy,f* and transmit powersPvx,ft*,vx,vya.

  3. Channel Optimization: The cluster-head ranks channels according to their optimized link utilities to find the most preferred channels of a node along a candidate path. The cluster-head will attempt to allocate the most preferred channel at each hop. However, since this may not always be possible given channel constraints, it may be necessary to iterate over possible bin combinations to find the valid combination with the largest link suitability over all links. The optimal valid channels for path a are denoted asf1*,,fK*.

  4. Path Optimization: The cluster-head assigns an overall suitability coefficient or profit, Uvi,vja, to each candidate path. Uvi,vjais formed in (6) as the average link utilities using the optimal channel allocation f1*,,fK* for the path.

  5. Path Selection: The cluster-head ranks the paths by the suitability coefficient and selects the candidate path with the highestUvi,vja. The suitability of the selected path is denoted as Uvi,vja* and the cluster-head will retrieve the corresponding frequenciesf1*,,fK*, transmit powersP1,f1*t*,,PK,fK*t*, and ratesr1*,,rK*.

  6. Routing Decision Propagation: The cluster-head will inform each node vx (sensor or mesh node) along the selected path of their necessary operating frequencyfvx*, transmit powerPvx,fvx*t*, and next-hop vy in a routing decision update (RDU).

For node vx at hopk, the 4-tuple (vy, fk*, Pvx,fkt*,rvx,vy,fk*) solves the smart routing problem.

Advertisement

8. Application criticality

The criticality cr of an application is defined as,

cr(α,E)=αψ(E)E15

which represents the ratio of the weights placed on the empirical benefit and power cost, respectively. At one extreme, cr(,E)allocates maximum resources towards throughput performance, while, at the other extreme, cr(0,E)emphasizes energy conservation for minimum energy routing. The associated optimized link utility Lvx,vy,f* for minimum energy routing is,

Lvx,vy,f*(rvx,vy,f*,t)=-ψ(E)    qtvxl    rvx,vy,f*mE16

where the goal is to minimize the link’s power cost. The corresponding objective function is,

2Uvi,vja*(t)=max    1K-1[x=1gLvx,vx+1,fx*(rvx,vx+1,fx*,t)    +z=g+1K-1Lvz,vz+1,fz*(rvz,vz+1,fz*,t)]E17
 s.t.    (1)    Pvx,fxPvx+1,fx=0,    vx,vx+1pathvi,vjE18
(2)    Pvz,fzPvz+1,fz=0,    vz,vz+1pathvi,vjE19
(3)    Pvx,fx,Pvz,fz=max(PMIRS,PSNR),    vx,vzpathvi,vjE20
(4)    KK'.E21

where the effect of minimum energy routing is seen in the third constraint, which enforces that the minimum required power to transmit between node pairs is chosen.

The impact of application criticality on resource allocation will be analyzed by comparing the throughput performance of smart routing versus minimum energy routing.

Advertisement

9. Packet formats

In gathering the required node information for the cross-layer policy, we define the state of a node vx that includes:

  • Node identifier (NID): the ID of sensor or mesh nodevx;

  • Sub-network identifier (SNID): the ID of the sub-network (sensor or mesh network) in which the node vx resides;

  • Energy rating information (ERI): the remaining energy of node vx in the form of a percentage of the initial energy capacity, evx/Evx; and,

  • Surrounding interference temperature (SIT): the measurement of the surrounding interference plus noise (I + N) energy as measured by nodevx.

State information is broadcasted to announce presence in the network and is also used in the propagation of resource allocation to nodes selected during the optimization process using a coordination channel. The state information above and the position of a node are all that a cluster-head requires to optimize a request.

From this point onwards, we shall denote Vand Mas the cardinalities of the sensor and mesh nodes sets as V=|Vi|andM=|Mi|, respectively, to simplify equations.

9.1. Hello messages for presence broadcast

Node state information is used in the formation of hello messages sent between mesh nodes, and also between sensor nodes and their cluster-heads to announce presence in the network. The exchange of hello messages maintains accurate connectivity tables at the cluster-head. These hello messages also update the cluster-head’s knowledge of the state of a sensor or mesh node vx in terms of remaining energy capacity.

The hello packet format is presented in Figure 6 where the LAT and LONG fields represent the latitude and longitude of the node, respectively, using GPS. The node identifier (NID) field is used to identify the source of the hello packet and, hence, is the number of bits necessary to represent the node identifier. Thus, the NID field has a length of ceil(log2(V))or ceil(log2(M))bits depending on if the sender is a sensor or mesh node. The sub-network identifier (SNID) is the number of bits needed to identify the sub-network in which the node resides. The energy rating information (ERI) field is 14 bits in fixed point number representation to represent the percentage of initial energy capacity remaining (using a scaling factor of 1/100), i.e. sending 14 bits that represent 10,000 in decimal yields an ERI of 100.00%; we use fixed point number representation for the ERI field, as opposed to single precision floating point (32 bits long), because the ERI has a fixed number of digits - two - after the decimal point. Hence, we reduce the number of bits needed to represent the residual energy.

Figure 6.

Hello Packet Format

The surrounding interference temperature (SIT) field, on the other hand, given real-time variations in the level of interference, is represented in full 32-bit single precision floating point format. Full 32-bit single precision floating point is also used to represent both the LAT and LONG fields. As nodes are stationary, it may only be necessary to include the LAT and LONG fields in the initialization phase to inform cluster-heads of node positions, after which it may not be required. Nevertheless, we include the LAT and LONG fields in the hello message, while PD bits of padding may be used to fill out the packet.

Data aggregation is also critical in these networks to preserve sensor energy and reduce the amount of routed information in the network. Figure 7 illustrates an example of data aggregation in a distributed wireless sensor network (WSN) in which presence information is exchanged and specific data aggregation nodes are used to merge information from one or more neighbors. In the example presented, the identifiers of the sensors in the sensor cluster are aggregated at node 4 and node 5 to give a single message to the cluster-head at node 6 of the NIDs [1 2 3 4 5]. Data aggregation for presence information occurs in both the sensor and mesh networks where all mesh nodes are data aggregators and exchange information until there is a consistent view among all mesh nodes.

Figure 7.

The Exchange of Presence Information in Distributed WSNs

For a distributed WSN of SN=3 sub-networks (with two sensor clusters and the mesh network presented in Figure 2), V=1,000sensor nodes per cluster and a mesh network composed of M=7mesh devices, the hello packet has a length of 16 bytes. This includes ten or three bits for the NID field, and padding of six or thirteen bits, depending on if the source is a sensor or mesh node, respectively.

We design one hello packet format for both the sensor and mesh network to simplify the system design process and to reduce decoding complexity. A packet length of 15 bytes could have been used in the mesh network, but we choose to have a common packet format at the expense of a transmitting an extra byte of padding. With that said, separate packet formats may need to be considered depending on the number of sensor and mesh nodes in the network and the overhead associated with using a single format.

9.2. Routing decision updates

Upon determining the optimized resource allocation for a request from a source sensorvi, a cluster-head vm will propagate a routing decision update (RDU) to each node vx pathvi,vj. The RDU is sent backwards along the path in the sensor network to the sourcevi, and forwards along the path in the mesh network to the central controlling station vj as shown in Figure 8. This ensures that all nodes along the path are aware of their necessary resource allocations.

Figure 8.

Propagation of RDU through Sensor and Mesh Networks

The cluster-head will include the following parameters such that all nodes can update their forwarding tables with up-to-date information:

  • Sending sensor identifier (SSID): the ID of source sensor vi that is the origin of the request;

  • Request identifier (RID): the ID of the request being serviced at source sensor vi given that sensors may support multiple requests;

  • Previous-hop identifier (PHID): the ID of node vx-1 from whom vx will receive packets; and,

  • Next-hop identifier (NHID): the ID of node vx+1 to whom vx will forward packets.

Figure 9.

RDU Packet Format

where the resulting format of the RDU is presented in Figure 9. Additionally, the cluster-head will include the node identifier (NID) of each node along the determined path such that they can retrieve their necessary operating parameters when they receive the routing decision. The message will also include the transmit power POW (each hop in 32-bit single precision floating point format), and operating channel FRQ (four bits to represent the channel number to be used per hop) determined during the optimization process, and the sub-network identifier (SNID) of the sub-network in which the node resides. PDbits of padding may also be used.

The RDU packet is designed such that each RDU contains information for at most (K'-1) hops, with separate RDUs being sent backwards through the sensor network to the source and forwards through the mesh network to the central controlling station. Recall that, since the cluster-head acts as a bridge between the sensor cluster and the mesh network, at least one hop must reside in each sub-network. Hence, information for only (K'-1) hops is required.

For the RDU, we design our network with separate packet formats for the sensor and mesh networks, as the overhead associated with a single format is significant. In our case, the mesh network would need to transmit over eight bytes of overhead per RDU packet if we were to use a single format. As a result, given the same network conditions as for the hello packet, the RDU has a length of 27 bytes and 19 bytes for the sensor and mesh networks, respectively.

9.3. Data packets

In the data transmission process, upon receiving a data packet from the previous-hop identifier (PHID), an intermediate node vx εpathvi,vj will set their next-hop based on the next-hop identifier (NHID) provided by the cluster-head in the routing decision update. Data packets will be formed of the transmitting node’s node identifier (NID), originating sensor’s identifier (SSID), request identifier (RID), and the following:

  • Payload information: the gathered sensory information for feedback; and,

  • Transmission priority level (TPL): the priority of the transmission (high or low) for routing preference (optional).

While transmissions from different clusters may be of different priorities, typically transmissions from a given sensor cluster all have the same priority at any given time. Hence, it is optional and configurable for the network scenario in question.

Advertisement

10. Simulation

Our distributed network is formed of a V-sized Ultrawideband (UWB) sensor cluster and a V-sized Zigbee sensor cluster that are connected to a central controlling station via an M-sized overlay mesh network. The network spans a 1 km x 1 km campus area for which V=20sensor nodes (excluding the cluster-head) and M=7mesh nodes. We simulate a small network size without loss of generality. The UWB cluster is focused in a 10 m x 10 m area for a video feedback application, while the Zigbee cluster performs temperature sensing in a 75 m x 75 m area such as a computer server room.

Table 2 summarizes our selection of theα, β, γ, δand ηparameters that have been calibrated for our network scenario.

Sub-Network αβγηδ
UWB 47,000 5.22 409.2 1,000 -
ZigBee 10,000 -7x10-7 1267.8 1,000 0.0517
WiMax 100,000 4.17 125.81 0 -

Table 2.

Selection of Optimization Parameters in the Heterogeneous WSN

In terms of radio design, each Zigbee and UWB nodes uses a single transmit and receive antenna with gains of 0 dBi and 3 dBi, respectively. WiMax mesh nodes have transmit and receive antenna gains of 13 dBi and 16 dBi, respectively. For our operating parameters, we choose F1=F2=Fc=5 as the number of sub-channels in the spectrum band with corresponding bandwidths of w1=75 MHz, w2=12.5kHz and wc=6.25 MHz for UWB, Zigbee and WiMax, respectively. As can be seen in Table 3, UWB sensors also transmit four times the information per transmission than Zigbee sensors.

Sub- Payload Length Packet Length Data Length Packets to Number of Channel Band of
Network l(bytes) m(bytes) (bytes) Transmit, n Channels Bandwidth Operation
UWB 32 38 128 4 5 75 MHz 2.4 - 2.5 GHz
ZigBee 32 38 32 1 5 12.5 kHz 3.0 - 11 GHz
WiMax 48 256 128 or 32 4 or 1 5 6.25 MHz 5.25 - 5.725 GHz

Table 3.

Communication Parameters for Three Sub-Networks

We also select the maximum number of hops K'= 4 for a single candidate path and the energy consumption coefficient ζ= 0.5. According to Oppermann et al., “the amount of energy consumed while listening, receiving, and transitioning to receive mode is similar to that of transmitting, and cannot be ignored" and, as such, ζis selected to divide the total energy consumption evenly between the transmitter and receiver [Oppermann et al., 2004]. The power consumption attributed to transmitting is higher than receiving in the communication between a transmitter and receiver; however, it should be noted that the energy consumed by listening for a transmission may be a dominant source of energy dissipation in these networks [Sadler, 2005, Mergen et al., 2006].

10.1. Energy modeling

Initial energy capacities depend heavily on the energy efficiencies of the communication technology. This is intuitive since each wireless transmission depends on the amount of energy consumed during communication. As a result, we equip sensor and mesh nodes with different energy capacities. The energy efficiencies of Ultrawideband (UWB), Zigbee and WiMax are presented in Table 4, along with the expected data rates of the technologies. We also test our network with arrival rates of sensor node requests of λ1=λ2 = 0.1 requests/minute.

Standard Energy Efficiency qtvx Standard Data Rate, R
ZigBee 0.5 μJ/bit 250 kbps
UWB 0.01 μJ/bit 500 Mbps
WiMax 7.0 μJ/bit 75 Mbps

Table 4.

Energy Efficiencies and Data Rates for Various Standards [Oppermann et al., 2004] [Baliga et al., 2008]

By considering each hop as a two-stage pipeline, we also implement holding times of 1/μ1=3.04 μsec and 1/μ2=2.43 msec per transmission. Hence, our network models traffic intensities of a1=λ1/μ1 anda2=λ2/μ2.

Table 5 presents the implemented energy capacities in the network for sensors, cluster-heads and mesh relay nodes given our system parameters. These energy capacities are determined as those to reach a one week network lifetime. Hence, we equip UWB and Zigbee nodes with E1=17.5 Jwith E2=69.5J, respectively. The energy capacity of a mesh node is chosen as Em=1kJ. We implement sensor energies slightly under the required levels to analyze the performance of these nodes in the final stages of the network lifetime.

Node Type Required Energy Applied Energy
Capacity Capacity
UWB sensor 17.7 J 17.5 J
Zigbee sensor 69.9 J 69.5 J
Cluster-head (UWB) 750.3 J 1 kJ
Cluster-head (Zigbee) 684.8 J 1 kJ
Mesh relay 646.5 J 1 kJ

Table 5.

Required and Applied Energy Capacities for Various Node Types

10.2. Energy harvesting

The most challenging factor facing the widespread deployment of wireless sensor networks (WSNs) is the power constraint faced by sensors that affects network lifetime and performance. Energy harvesting technologies are a significant enabler for smart routing because they relax the critical power constraint by replenishing energy reserves of sensors over time. This can be achieved by converting energy sources such as kinetic, solar or heat energy into usable battery energy.

The impact of energy harvesting can be observed by comparing the rate of energy replenishment to the rate of energy consumption in the sensor network. Define the rate of energy replenishment as rh in joules per second, or watt. Given an energy consumption rate rc of a sensor, the effect of energy replenishment on network lifetime fits into one of three categories:

  • rh=0
  • if 0 < rh <rc, the network lifetime is prolonged but finite; and,

  • rhrc

From the perspective of resource allocation, the effect of energy harvesting can also be observed by analyzing the network lifetime. The network is able to operate at peak performance as long as sufficient transmission resources are available; this occurs until nodes are unable to maintain a high level of performance because remaining energy capacities are insufficient. Since energy harvesting enables us to prolong the network, it also increases the period of time that the network operates at high levels of throughput performance. We will analyze the impact of the replenishment rate rh on the network lifetime for smart routing.

11. Results

We conduct a performance evaluation of our policy based on the following metrics:

  • Throughput performance;

  • Spectral efficiency;

  • Network lifetime based on finite energy capacity;

  • Application criticality and performance improvement of smart routing vs. minimum energy routing;

  • Blocking probability and its dependency on the number of operating channels in the network; and,

  • Energy harvesting effects on energy capacity and network lifetime for various rates of energy replenishment.

11.1. Total throughput

Table 6 illustrates the ability of the smart routing protocol to meet performance requirements of a number of applications. The Ultrawideband (UWB) cluster, which executes a video monitoring application, achieves total network throughput that varies between 84.4 Mbps and 3.4 Gbps. Meanwhile, the Zigbee cluster achieves a maximum real-time throughput of 794.9 kbps in performing temperature monitoring; recall that Zigbee transmissions are only capable of achieving single throughputs of 250 kbps. The WiMax mesh network, in providing long-haul transmission to the centralized controlling station, achieves total network throughput of between 39.6 and 485.7 Mbps. This result illustrates the suitability of UWB for next-generation wireless sensor networks (WSNs) as UWB expands the range of applications that can be used for state-of-the-art resource management.

Network Maximum Total Minimum Total Mean Total Standard Variance
Throughput Throughput Throughput Deviation
UWB Cluster 3.4 Gbps 84.4 Mbps 1.8 Gbps 112.2 Mbps 1.3 x 1016
ZigBee Cluster 794.9 kbps 240.1 kbps 770 kbps 2.2 kbps 5.0 x 106
WiMax Mesh 485.7 Mbps 39.6 Mbps 331.5 Mbps 10 Mbps 1.6 x 1013

Table 6.

Throughput Statistics

11.2. Spectral efficiency

Spectral efficiency provides an accurate metric to compare our three communication technologies in terms of the attainable transmission rate per Hz. This is presented in Figure 10 in units of bits/s/Hz. Zigbee provides an effective spectral efficiency of 250 kbps/2.5 MHz = 0.1 bits/s/Hz, Ultrawideband (UWB) attains an effective spectral efficiency of 480 Mbps/500 MHz = 0.96 bits/s/Hz, and WiMax provides improved spectral efficiency of roughly 75 Mbps/20 MHz = 3.75 bits/s/Hz over full channel bandwidths.

Figure 10.

Spectral Efficiency (bits/s/Hz) over One Week Network Lifetime

11.3. Network lifetime

While the smart routing protocol indeed provides throughput performance benefits, we also analyze the ability of the policy to conserve energy and meet a desired network lifetime of one week. This enables us to evaluate whether the policy successfully meets both performance and energy conservation requirements.

Figure 11(a) presents the average remaining energy capacities of Ultrawideband (UWB) sensors, Zigbee sensors and the WiMax mesh nodes. The UWB and Zigbee sensors are able to survive for roughly the one week network lifetime, with the outages occurring just before the end of the simulation. At the end of the simulation, the WiMax mesh network has roughly 34% of its mean battery energy remaining.

Figure 11.

Comparison of Remaining Battery Energies vs. Network Lifetime

These results meet our network lifetime expectations based on the initial energy capacities in Table 5. For example, we would expect that both the UWB and Zigbee clusters would lose connectivity in the last few hours of the network lifetime. We would also expect the mesh network to maintain roughly one-third of its energy capacity at the end of the simulation. This result is significant as it shows that we can indeed design wireless sensor networks (WSNs) to plan for predictable network lifetimes, while achieving significant throughput performance.

Figure 11(b) illustrates the remaining energy capacities in the final twelve hours of the simulation and the first nodes in each cluster to fully lose connectivity. Based on the initial energy capacities selected, the UWB cluster gave us almost two extra hours of connectivity over the Zigbee network. In terms of the first node outages, node 12 from the Zigbee cluster was the first node to lose connectivity; its remaining battery energy was just under that of the mean from the Zigbee cluster at 20:15. For the UWB cluster, node 6 experienced the first node outage and followed the mean battery energy of the UWB cluster quite strictly at 22:00.

11.4. Application criticality

The impact of application criticality on throughput performance is presented in Table 7 by comparing the performance of the smart routing protocol to minimum energy routing. Smart routing selects candidate nodes that are best able to satisfy both performance and energy conservation requirements given current network conditions. While smart routing is able to achieve total network throughput that varies between 84.4 Mbps and 3.4 Gbps, minimum energy routing only achieves throughputs of 49.2 Mbps to 501.2 Mbps. This is due to minimum energy routing basing its resource allocation decisions solely on ensuring minimum energy consumption; while lower resource consumption certainly has a positive effect on increasing network lifetime, minimum energy routing gives no consideration to the impact of resource allocation on application performance. As we observe in this performance evaluation, applications that have high performance demands require greater resources and, as a result, have shorter network lifetimes; energy-conserving systems, on the other hand, allocate resources to prolong the network lifetime at the expense of application performance.

Routing Policy Maximum Total Minimum Total Mean Total Standard Variance
Throughput Throughput Throughput Deviation
Smart Routing 3.4 Gbps 84.4 Mbps 1.8 Gbps 112.2 Mbps 1.3 x 1016
Minimum Energy 501.2 Mbps 49.2 Mbps 327.3 Mbps 20.8 Mbps 4.3 x 1014
Routing

Table 7.

Throughput Statistics of Smart Routing vs. Minimum Energy Routing

11.5. Blocking probability

Figure 12(a) illustrates the dependency between the network blocking probability and the number of operating channels for the smart routing protocol. This shows that, as the number of operating channels increases, the blocking probability decreases according to a logarithmic relationship. However, as the traffic intensity ρand the number of channels increases, the blocking probability decreases at a slower rate. Figure 12(a) also illustrates that the blocking probability decreases as the traffic intensity decreases, which is expected. The sharpness of the drop for a traffic intensity ρ= 1E-6 can be attributed to the near-zero blocking probability at extremely low traffic intensities.

Figure 12.

Relationship Between Number of Operating Channels F and the Blocking Probability

Figure 12(b) illustrates the relationship between the blocking probability and traffic intensity separately for Ultrawideband (UWB) and Zigbee forF=5, F=10and F=20channels. Given the same traffic intensity and number of operating channels, the UWB cluster has a blocking probability that is approximately 2% lower than Zigbee on average forF=5. For F=10andF=20, UWB also has a lower blocking probability than Zigbee but the improvement decreases as the number of channels is increased. This bodes well for next-generation commercial applications for wireless sensor networks (WSNs) that use UWB as the communication technology of choice.

11.6. Energy harvesting

Figure 13.

Energy Dissipation and Impact of Energy Harvesting

The impact of energy harvesting on energy capacity is illustrated in Figure 13. Figure 13(a) presents the energy dissipation of a single Ultrawideband (UWB) node with no energy harvesting for the one week network lifetime. Two energy states are observed - sleep state and transmission state. In the sleep state, the impact on energy capacity is a regular dissipation of energy due to the sensor operating in a low power state. In the transmission state, we observe a sharp decrease in energy capacity for the duration of the transmission. The energy dissipation during the transmission state is positively correlated to the energy efficiency of the technology. For the given energy capacity E1=17.5 Jfor UWB nodes presented in Table 5, we compute the rate of energy consumption as rc=28.6μW.

Figure 13(b) presents the impact of energy harvesting on the UWB node’s energy capacity. We compare the energy capacity with rh=0 μWwith replenishment rates rh=22μW, 25 μWand 30μW. For the first two cases, we observe an increase in the energy capacity over time and, hence, a prolonged network lifetime. However, the network lifetime is finite. This is observed for all cases where 0 < rh <rc. For rh=30μW, however, we seemingly have 100% energy capacity and hence an unlimited network lifetime. This is intuitive since the rate of energy replenishment is greater than the rate of consumption. In this case, the network is self-sustaining and can theoretically last forever.

12. Conclusions and future research

This chapter presented the smart routing protocol for large-scale networks that enables for the deployment of wireless sensor networks (WSNs) in geographically distributed locations of interest. Smart routing is based on performance measure and energy optimization using cross-layer considerations of the protocol stack. We presented the performance improvement of smart routing over minimum power routing in these distributed networks to illustrate the benefit of the smart routing protocol for enabling next-generation commercial applications. By doing so, we also presented the impact of application criticality on performance and network lifetime. Applications that have high performance demands require greater resources and, as a result, have shorter network lifetimes; energy-conserving systems, on the other hand, allocate resources to prolong network lifetime at the expense of performance.

We also covered energy harvesting and its impact on resource allocation. We determined that, since sensors are able to operate at peak performance as long as sufficient resources are available, energy harvesting enables us to maintain this level of performance for a longer period of time. If the replenishment rate rh is greater than or equal to the consumption raterc, the network is self-sustaining and can theoretically survive on its own.

Future research shall explore a number of areas to further the smart routing protocol:

  • Software Radio Modeling: Quantify the impact of packet conversion on energy reserves for multiple technologies including WiMax, WiFi, Ultrawideband (UWB) and Zigbee;

  • Distributed Source Coding (DSC): Design algorithms to reduce the amount of data that is routed from sensor networks based on the compression of multiple correlated sensor measurements. In this manner, energy may be conserved while maintaining performance;

  • Sensor Localization: Design sensor localization methods that are either triangulation-based or use a third-tier of nodes in the network, such as anchors, for which positions are known in the field. This reduces the dependency of the policy on GPS, until sensors equipped with GPS are made more readily available; and

  • Optimization Metrics: Model additional performance metrics such as delay, and additional physical (PHY) layer parameters such as bandwidth and modulation.

References

  1. 1. ZhangH.HouJ. C.2005Maintaining Sensing Coverage and Connectivity in Large Sensor Networks, Ad Hoc & SensorWireless Networks. j. 1(1-2): 89-124.
  2. 2. CheekirallaS.EngelsD. W.2005A Functional Taxonomy of Wireless Sensor Network Devices, 2nd International Conference on Broadband Networks.j. 2949956
  3. 3. OppermannI.StoicaL.RabbachinA.ShelbyZ.HaapolaJ.2004UWB Wireless Sensor Networks: UWEN-A Practical Example,IEEE Communications Magazinej. 42(12): S27S32.
  4. 4. ChehriA.FortierP.TardifP. M.2009Cross-Layer Link Adaptation Design for UWB-Based Sensor NetworksElsevier. j. 32(13-14):1568 EOF1575 EOF
  5. 5. YinX.ZhouX.LiZ.LiS.2010Cross-Layer Based Rate Control for Lifetime Maximization in Wireless Sensor NetworksAdvances in Grid and Pervasive Computing. j. 140149
  6. 6. ZhouH. Y.LuoD. Y.GaoY.ZuoD. C.2011Modeling of Node Energy Consumption for Wireless Sensor Networks,Wireless Sensor Network. j. 311823
  7. 7. MadanR.CuiS.LalS.GoldsmithA.2006Cross-Layer Design for Lifetime Maximization in Interference-Limited Wireless Sensor NetworksIEEE Transactions on Wireless Communications. j. 51131423152
  8. 8. KrogsveenE.WangC.OienG. E.LindforsS.2007Energy-Efficient Adaptive Route Configuration in Short-Range Wireless Ad-Hoc NetworksIn: Patzold M, Jiang Y, Zhang Y, editors. Proceedings of 4th International Symposium on Wireless Communication Systems. Trondheim: IEEE. 292296
  9. 9. WangQ.Abu-RgheffM. A.2003Cross-Layer Signalling for Next-Generation Wireless Systems. In: IEEE Wireless Communications and Networking Conference. New Orleans: IEEE. 2108489
  10. 10. WangC.YinL.OienG. E.2009Adaptive Route Configuration for Increased Energy Efficiency inWireless Sensor Networks. In: Proceedings of 5th International Conference on Broadband Communications, Networks and Systems. London: IEEE. 1623
  11. 11. SrivastavaV.MotaniM. (2005) Cross-Layer Design: A Survey and the Road Ahead, IEEE Communications Magazine. j. 43 12 112119 .
  12. 12. IEEE 802.15.3b WPAN Task Group2006Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPANs) Amendment 1: MAC Sublayer.
  13. 13. IEEE 802.15.4 WPAN Task Group2006IEEE Standard for Local and Metropolitan Area Networks- Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs).
  14. 14. IEEE 802.16 Network Management Task Group2004IEEE Standard for Local and Metropolitan Area Networks- Part 16: Air Interface for Fixed Broadband Wireless Access Systems.
  15. 15. WanQ.WangC.2011Design of 3.1-10.6 GHz Ultra-Wideband CMOS Low Noise Amplifier with Current Reuse TechniqueAEU-International Journal of Electronics and Communications. j. 651210061011
  16. 16. SadlerB.M(2005Fundamentals of Energy-Constrained Sensor Network SystemsIEEE Aerospace and Electronic Systems Magazinej. 2081735
  17. 17. MergenG.ZhaoQ.TongL. (2006) Sensor Networks with Mobile Access: Energy and Capacity Considerations, IEEE Transactions on Communications. j. 54 11 20332044 .
  18. 18. BaligaJ.AyreR.SorinW. V.HintonK.TuckerR. S.2008Energy Consumption in Access Networks, Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference, 2008. j. 213

Written By

Omar M. Sheikh and Samy A. Mahmoud

Submitted: 07 December 2011 Published: 06 September 2012