Journal of Computer Networks and Communications
Energy-Efficient Wireless Communications with Future Networks and Diverse Devices
Guest Editors: Runhua Chen, Lingjia Liu, Krishna Sayana, and Hongxiang Li Energy-Efficient Wireless Communications with Future Networks and Diverse Devices Journal of Computer Networks and Communications
Energy-Efficient Wireless Communications with Future Networks and Diverse Devices
Guest Editors: Runhua Chen, Lingjia Liu, Krishna Sayana, and Hongxiang Li Copyright © 2013 Hindawi Publishing Corporation. All rights reserved.
This is a special issue published in “Journal of Computer Networks and Communications.” All articles are open access articles distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, pro- vided the original work is properly cited. Editorial Board
A. Annamalai, USA Akhtar Kalam, Australia Rick Stevens, USA Shlomi Arnon, Israel K. Kyamakya, Austria Liansheng Tan, China R. K. Begg, Australia Long Le, USA J. K. Tugnait, USA E. Da Silva, Brazil Khoa Le, Australia Junhu Wang, Australia B. T. Doshi, USA Zhen Liu, USA Ouri Wolfson, USA John Doucette, Canada A. Mostefaoui,´ France Walter Wong, Brazil M. El-Tanany, Canada Peter Muller,¨ Switzerland Tin-Yu Wu, Taiwan Lixin Gao, China Jun Peng, USA Youyun Xu, China Song Han, China Juan Reig, Spain Zhiyong Xu, USA Yueh M. Huang, Taiwan S. K. Sathananthan, Australia Yang Yang , UK Yi Huang, USA J. Seberry, Australia Dongfeng Yuan, China T. Hwang, Taiwan Heidi Steendam, Belgium Contents
Energy-Efficient Wireless Communications with Future Networks and Diverse Devices,RunhuaChen, Lingjia Liu, Krishna Sayana, and Hongxiang Li Volume 2013, Article ID 897029, 2 pages
ECOPS: Energy-Efficient Collaborative Opportunistic Positioning for Heterogeneous Mobile Devices, Kaustubh Dhondge, Hyungbae Park, Baek-Young Choi, and Sejun Song Volume 2013, Article ID 136213, 13 pages
Equalizer’s Use Limitation for Complexity Reduction in a Green Radio Receiver, Salma Bourbia, Daniel Le Guennec, Jacques Palicot, Khaled Grati, and Adel Ghazel Volume 2012, Article ID 794202, 15 pages
PCA-Guided Routing Algorithm for Wireless Sensor Networks, Gong Chen, Liansheng Tan, Yanlin Gong, and Wei Zhang Volume 2012, Article ID 427246, 10 pages
Performance Analysis of the IEEE 802.11s PSM, Mirza Nazrul Alam, Riku Jantti,¨ Jarkko Kneckt, and Johanna Nieminen Volume 2012, Article ID 438654, 14 pages
Effective Stochastic Modeling of Energy-Constrained Wireless Sensor Networks,AliShareefand Yifeng Zhu Volume 2012, Article ID 870281, 20 pages
Energy Efficiency Adaptation for Multihop Routing in Wireless Sensor Networks, Abdellah Chehri and Hussein T. Mouftah Volume 2012, Article ID 767920, 8 pages
Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries, Agnelo Silva, Mingyan Liu, and Mahta Moghaddam Volume 2012, Article ID 757291, 10 pages Hindawi Publishing Corporation Journal of Computer Networks and Communications Volume 2013, Article ID 897029, 2 pages http://dx.doi.org/10.1155/2013/897029
Editorial Energy-Efficient Wireless Communications with Future Networks and Diverse Devices
Runhua Chen,1 Lingjia Liu,2 Krishna Sayana,3 and Hongxiang Li4
1 Wireless Base Station Infrastructure, Texas Instruments Incorporated, Dallas, TX 75243, USA 2 Department of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, KS 66045, USA 3 Standards and Research Lab, Motorola Mobility Incorporated, Libertyville, IL 60048, USA 4 Department of Electrical and Computer Engineering, University of Louisville, Louisville, KY 40292, USA
Correspondence should be addressed to Runhua Chen; [email protected]
Received 11 February 2013; Accepted 11 February 2013
Copyright © 2013 Runhua Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Telecommunication networks are responsible for approxi- The goal of this special issue is to give a comprehensive mately 2% of the global energy consumption. As data traffic overview of the ongoing research on energy-efficient wireless continues to grow due to the proliferation of smart phone communication for future networks and devices, in areas devices, reducing greenhouse emission by improving the net- including energy-efficient communication, smart metering, work energy efficiency is becoming increasingly important. energy harvesting, energy conservation with network coordi- Such improvements may be achieved by advanced system nation, and machine-type communication. We hope that this design at both the network and the mobile terminal sides, will motivate interested researchers to explore and propose although the majority of savings may come from the infras- new ideas in these growingly important areas. The special tructure. For instance, one promising technique for cellular issue begins with a paper coauthored by A. Shareef and network power reduction is through advanced radio resource Y. Zhu discussing a novel evaluation platform for assessing management (RRM) to dynamically switch ON or OFF a energy efficiency of wireless sensor networks. Such a model basestation based on daily traffic variation. By switching is important as it allows for quick and accurate evaluations OFF lightly loaded basestation and offloading the traffic to of different energy consumption algorithms, protocols, and neighboring basestations, significant energy reduction may system designs. In particular, the article proposes a Petri net be possible without compromising the network performance. model-based platform, which is analytically and numerically Improving energy efficiency also needs to consider future shown to outperform the Markov model and programmed networks shifting towards more diversified services. Exem- simulation in terms of evaluation accuracy, with low con- plary application scenarios include smart metering, wire- struct and test simplicity. less sensor monitoring, and machine-to-machine commu- In the article coauthored by A. Chehri and H. Moutfah, nication. These scenarios introduce new traffic behaviors the researchers go into more details on improving the energy inthenetwork,andduetothesmallerpacketsizesand consumption efficiency of wireless sensor networks. As sen- the extremely large number of devices, improving energy sor nodes are usually powered by batteries or other low- efficiency of the network while reducing device cost is vital. energy power resources, optimizing the system performance There is a need for energy-efficient solutions to enable new with power constraint is of practical importance. For that smart and energy-efficient devices to simultaneously share end, the authors propose a green routing protocol relying the network with relatively fewer numbers of conventional on adaptive modulation and power control, which is shown devices that have much larger data and energy consumption to improve the energy efficiency of sensor networks without demands. compromising the QoS constraint of delay and error rate. 2 Journal of Computer Networks and Communications
The paper coauthored by G. Chen et al. investigates a positioning services and the combination methods includ- new routing algorithm for wireless sensor networks (WSNs) ing a received signal strength indicator, 2D trilateration, based on principal component analysis (PCA). By disclosing and available power measurement of mobile devices. The the connection between PCA and K-means, the authors evaluation conducted by the authors shows that ECOPS design a clustering algorithm which efficiently develops a significantly reduces energy consumption and achieves good clustering structure in WSNs. Moreover, as a compression accuracy of a location. method, the paper demonstrates that PCA technique can Energy consumption reduction in the receiver chain also be used in data aggregation for WSNs. It establishes by limiting the use of the equalizer is investigated by S. the explicit procedure of PCA-guided routing algorithm for Bourbia et al. This goal is achieved by making the radio WSNs by incorporating PCA technique into both the data receiver aware of its environment and being able to take aggregating and routing processes. The advantages of the decision to turn on or off the equalizer according to its proposed algorithm are demonstrated by theoretical analyses necessity or not. When the equalizer is off, the computational and simulation results. The simulation results show that complexity is reduced, and the rate of reduction depends the PCA-guided routing algorithm significantly reduces the on the percentage of time during which the component is energy consumption, prolongs the lifetime of network, and disabled. In order to adapt the use of the equalizer, the authors improves network throughput. developed a decision-making technique that provides to the In the following article, A. Silva et al. study new power receiver the capacities of awareness and adaptability to the management techniques to extend as much as possible state of its environment. A technique based on a statistical the lifetime of primary cells (nonrechargeable batteries). modeling of the environment is introduced by defining two By assuming low duty-cycle applications, three power- metrics as channel quality indicators to evaluate the effects management techniques are combined in a novel way to pro- of the intersymbol interferences and the channel fading. The vide an efficient energy solution for wireless sensor networks statistical modeling technique allows the authors to take into nodes or similar communication devices powered by primary account the impact of the uncertainties of the estimated cells. Accordingly, a customized node is designed, and long- metrics on the decision-making process. term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime Acknowledgments can be drastically enhanced. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors The guest editors wish to take the opportunity to thank all (underground communication), and nodes embedded in theauthorswhohavesubmittedtheirpapers.Wealsowishto the structure of buildings, bridges, and roads are some of extend our thanks to the anonymous reviewers for their high- thetargetscenariosforthiswork.Someoftheprovided quality reviews which tremendously helped improve both the guidelines can be used to extend the battery lifetime of content and presentation of the papers in this special issue. communication devices in general. Last but not least, we would like to thank the editorial board M. N. Alam et al. investigate the energy consumption members for their valuable and insightful comments and for the IEEE 802.11s link specific Power Saving Mode (PSM) guidance through the preparation of this special issue. for peer link operation. The study is further extended toa multihop network consisting of eight STAs. They conclude Runhua Chen that at the cost of increased packet delay, the IEEE 802.11s Lingjia Liu PSM operation not only provides significant energy savings, Krishna Sayana but also provides almost the same throughput that the active Hongxiang Li mode operation offers. For a large network, the energy saving could be as high as eighty percent when compared with active mode operation. In the presence of hidden node especially, the PSM can perform much better than an active mode, if the nodes avoid simultaneous operation. Further it is also shown that, by switching to active mode, receiving STAs can reduce the link delay considerably, which points to a clear tradeoff of delay, throughput and energy consumption. The analysis provided can be used to investigate the critical parameters in PSM operation in an 802.11 network. The paper coauthored by K. Dhondge et al. introduces an energy-efficient collaborative and opportunistic position- ing system (ECOPS) for heterogeneous mobile devices. In particular, ECOPS-facilitates mobile devices with estimated locations using Wi-Fi in collaboration with a few available GPS broadcasting devices, in order to achieve high-energy efficiency and accuracy within available energy budget con- straints. ECOPS estimates the location using heterogeneous Hindawi Publishing Corporation Journal of Computer Networks and Communications Volume 2013, Article ID 136213, 13 pages http://dx.doi.org/10.1155/2013/136213
Research Article ECOPS: Energy-Efficient Collaborative Opportunistic Positioning for Heterogeneous Mobile Devices
Kaustubh Dhondge,1 Hyungbae Park,1 Baek-Young Choi,1 and Sejun Song2
1 UniversityofMissouri-KansasCity,546FlarsheimHall,5110RockhillRoad,KansasCity,MO64110,USA 2 Texas A&M University, Fermier Hall 008, 3367 TAMU, College Station, TX 77843, USA
Correspondence should be addressed to Kaustubh Dhondge; [email protected]
Received 16 June 2012; Revised 12 October 2012; Accepted 19 November 2012
Academic Editor: Lingjia Liu
Copyright © 2013 Kaustubh Dhondge et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The fast growing popularity of smartphones and tablets enables us to use various intelligent mobile applications. Asmanyof those applications require position information, smart mobile devices provide positioning methods such as Global Positioning System (GPS), WiFi-based positioning system (WPS), or Cell-ID-based positioning service. However, those positioning methods have different characteristics of energy-efficiency, accuracy, and service availability. In this paper, we present an Energy-Efficient Collaborative and Opportunistic Positioning System (ECOPS) for heterogeneous mobile devices. ECOPS facilitates a collaborative environment where many mobile devices can opportunistically receive position information over energy-efficient and prevalent WiFi, broadcasted from a few other devices in the communication range. The position-broadcasting devices in ECOPS have sufficient battery power and up-to-date location information obtained from accurate but energy-inefficient GPS. A position receiver in ECOPS estimates its location using a combination of methods including received signal strength indicators and 2D trilateration. Our field experiments show that ECOPS significantly reduces the total energy consumption of devices while achieving an acceptable level of location accuracy. ECOPS can be especially useful for unique resource scarce, infrastructureless, and mission critical scenarios such as battlefields, border patrol, mountaineering expeditions, and disaster area assistance.
1. Introduction its high energy consumption, due to the Time To First Fix (TTFF), becomes a significant drawback. WPS approximates Smart mobile devices such as smartphones and tablets are a position from the location information of a nearby wireless rapidly becoming prevalent in our lives. They have spurred a access point (AP) that is stored in the database. Its energy paradigm shift from traditional restricted phone applications efficiency is much better than GPS, and the accuracy is to intelligent mobile applications such as location-based, moderate. As WiFi is a de facto standard in wireless local area context-aware, and situation-aware services. For example, a network (WLAN) communication, it is broadly available on social-network-based traffic information system [1]allows most smart devices. However, the service is limited to indoor each mobile user to report and use real-time traffic informa- orurbanareaswheretheaccesspointsaredenselypopulated. tion, in addition to the archived traffic information from the Cell-ID Positioning provides an approximate location from US Department of Transportation. the serving cell tower, where a cell area range is around As many of those application services require position 100 ∼ 500minurbanareas,butitcanspanupto10Km information, smart mobile devices provide various position- for rural areas. Although this is the most power saving ing services via Global Positioning System (GPS) [2], WiFi- approach, due to a large error range caused by the coarse based positioning system (WPS) [3], or Cell-ID Position- cell tower density, Cell-ID Positioning cannot offer the utility ing [4]. Being dedicated equipment for positioning, GPS of most LBS applications. In addition, mobile devices such becomes available for many smart devices as an additional as the WiFi version of tablets are not fully equipped with feature and is considered to be an accurate and preferred 3G/4G data chips at the present time even though 3G and method for location-based services (LBSs) [5, 6]. However, 4G wireless networks provide enough bandwidth to enable 2 Journal of Computer Networks and Communications
Table 1: Characterization of various positioning methods.
Positioning method Accuracy Energy efficiency Equipment availability Service limitations GPS High (within 10 m) Low Low Indoor and canyon WPS Moderate (within 50 m) Moderate High Coarse AP density area Cell-ID Positioning Low (within 5 Km) High Moderate Rural area explicit support for real-time LBS. We have summarized the scenarios are explained in Section 5.Finally,weconcludethe characteristics of positioning methods ([7]) in Table 1. paper in Section 6. Energy efficiency while maintaining required accuracy for the given service limitations is one of the most critical 2. Application Scenarios issues in mobile devices, due to limited battery life and the Whilesecurityandsocialincentiveissuesarenotinthescope high energy consumption of applications. As different posi- of this paper, the proposed opportunistic and collaborative tioning methods available on a mobile device have different positioning scheme can be especially useful for unique characteristics with respect to accuracy, energy-efficiency, resource scarce and mission critical applications. Such and service availability, there have been several proposals for examples include border patrol, battlefields, mountaineering dynamic selection of a positioning method on an individual expeditions, and disaster area assistance. device. For example, [8] uses an accelerometer for movement For example, suppose a team of border patrol officers is detection to power cycle GPS, if the device is not mobile. searching for an illegal immigrant in the border area. In some However, the effectiveness of most of the existing heuristics areas of rigid terrain, GPS and cellular signals can be lost in is limited by equipment constraints or service availability, as acanyon.Someprojects[14] employ a low-altitude tethered the applications choose a preferred positioning method that aerostat to set up a temporary WiFi hotspot. To help with isavailablewithinanindividualdevice. positioning, a few officers stay at the top of the valley to relay In this paper, we propose ECOPS to facilitate a WiFi their GPS position information to the officers searching down hotspot mode [9]orWiFiDirectmode[10]basedapproxima- in the valley. Such a collaborative positioning is a natural tion in collaboration with a few available GPS broadcasting application scenario of ECOPS. devices under budget constraints. ECOPS is a collaborative In a battlefield scenario, when a platoon is air-dropped positioning method between WiFi and GPS mobile devices, into a war zone, it is nearly impossible to find WPS services in addition to a positioning method selection heuristic within in the surroundings. Even with the availability of technology a mobile device. It can achieve moderate accuracy with low like LANdroids [15] to provide a network in such conditions, energy usage. Although there is a previous collaborative work it is not a simple task. Also, it is crucial for soldiers to have [8] that pairs two devices via Bluetooth to save GPS power accurate location information in the battlefield. In such a sce- cycle, the approach needs both GPS and Bluetooth on both nario, the capabilities of ECOPS can be exploited to maintain devices. Instead, ECOPS supports heterogeneous methods accurate location information while reducing overall energy among mobile devices. There are many mobile devices in- consumption. Although one may not have a strong incentive cluding the majority of current tablets that only support a to take a lead and offer location information for others, basic wireless communication method which is WiFi. The such concerns are lifted immediately if a leadership hierarchy WiFi-only device can obtain position information from a preexists in the application scenario. For instance, when a GPS device with ECOPS. This proposed system can operate platoon is being deployed in a battlefield, the platoon leader opportunistically,whereeachdevicecanresolvethelocation chooses to be the primary location broadcaster using ECOPS via various available methods including trilateration [11]with alongwithafewothersatthetopofthehierarchy.Theother three GPS broadcasting devices and a received signal strength soldiers in the unit are able to estimate their location infor- indicator (RSSI) [12] or approximation with geomagnetic mation based on the geocoordinates they receive from their sensors [13] and a single GPS device without requiring any unit’s command. This will result in fewer devices from the WiFi AP. unit querying satellites for location information and reduce We implemented ECOPS using Android-powered mobile the overall energy consumption. Extending the lifetime of devices such as smartphones and tablets. The evaluation devices during the operation is a mission critical parameter results show that ECOPS significantly saves the total energy as the duration of an operation is not fixed and often tends to consumption of the devices while achieving a good level of be longer than expected. Under the Battlefield Air Targeting location accuracy. In addition, it enables constrained devices Man Aided Knowledge (BATMAN) [16]project,theUnited to enjoy location-based services that would otherwise not be States Air Force is actively seeking to equip their soldiers with possible. modern Android-powered smartphones to obtain accurate The rest of the paper is organized as follows. Potential location information with high energy efficiency. Modified application scenarios are described in Section 2. Section 3 versions of Android [17, 18] enable the desired level of security discusses the existing and state-of-the-art techniques. A for military use. Such projects can benefit greatly by ECOPS. detailed explanation of the proposed system is presented in Another scenario where ECOPS can be extremely use- Section 4. The performance evaluations and experimental ful is during natural calamities. In such cases, emergency Journal of Computer Networks and Communications 3
2 Time and ephemeris 1 data Time, ephemeris, and almanac data
3 Time and ephemeris GPS satellite data Time and ephemeris Smart device data 4 GPS receiver
Figure 1: Illustration of Global Positioning System. responders who are involved in search and rescue missions that is, the ephemeris data. It is absolutely necessary that the can host an ECOPS-based location broadcasting service over GPS receiver has the satellite’s complete copy of the ephemeris WiFi Direct. As they move around the area, victims can use data to determine its position. In case the signal is lost in the their smart devices to either request assistance or transmit middle of acquiring this data, the GPS receiver will have to their locations. discard whatever data was downloaded and start searching for a new satellite signal. 3. Related Work Once the GPS receiver has ephemeris data directly from threeormoresatellites,itcancarryoutvariousmethodsto Positioning schemes on mobile devices have been a long accurately determine its own location. These methods involve standing topic of exploration. This resulted in three main and are not restricted to 3D trilateration, Bancroft’s method, positioning techniques using either the information provided and multidimensional Newton-Raphson calculations. Due bytheGPS,WPS,orCell-IDPositioning.Also,therehave to the high propagation delays, getting the ephemeris and been several research proposals for specific environments. almanac data can take up to 15 minutes for a device just out of the factory, and then around ∼20 seconds after the initial 3.1. Global Positioning System (GPS). The Global Positioning configuration. To expedite this process, some GPS receivers System (GPS) is a satellite navigation system that provides can use multiple channels for faster fixes. Another strategy location and time information anywhere on earth with four is to obtain the ephemeris and almanac data from a faster or more GPS satellite signals. It is originally deployed and network like the cellular network or the internet as in the case maintained by the United States government and is now of a GPS. freely accessible to anyone [2]. The GPS provides very high levelofaccuracy,butsuffersfromahighTTFFduetothe 3.2. WiFi-Based Positioning System (WPS). WPS maintains large distance between the GPS receiver and serving satellites. an extensive database of WiFi access points (APs) along This problem has been somewhat addressed by the use of with their geographic locations [19, 20]. This information has assisted GPS (aGPS) that relies on the cellular or internet to be collected painstakingly over a large duration of time infrastructure to get a faster lock on the serving satellites and is vulnerable to changes in the location of APs or the while obtaining precise time information from the network. discontinuation of their service. The information of APs- Within the navigation message continuously broadcasted SSID and geographic location can be collected manually or in by each of the satellites in the constellation, the GPS receiver amoreautomatedwaybyretrievingtheGPSlocationofsmart looks for three important pieces of data as illustrated in devices connected to the AP and associating that information Figure 1. The first piece of data consists of the GPS date with the AP.Once such a large and dedicated database is ready and time information. It additionally also consists of the and a device is in the vicinity of an AP, or several APs, it can health statistics of the satellite. The ephemeris data forms providetheRSSIvaluesandtheSSIDoftheAPstotheWPS the second important piece and allows the GPS receiver to servers. The WPS servers, based on proprietary techniques, calculatethepositionofthesatelliteandisbroadcastedevery apply filtering approaches and trilateration techniques to this 30 seconds. The ephemeris data is valid for no longer than data and determine the accurate location of the smart device. four hours. The third important piece is the almanac data This geographic location information is then relayed back to which provides approximate information concerning the rest the smart device which can exploit it for various LBSs. The of the satellites. This data is transmitted over 12.5 minutes and illustration of WPS is depicted in Figure 2. is valid for a maximum of 180 days. The almanac data can be While the WPS service approaches work well in terms of obtained from any satellite, and it enables the GPS receiver to energy efficiency [21–23], they are not globally available for determine which particular satellite to search for next. As the users. A solution leveraging the existing infrastructure, such signal from the selected satellite becomes directly available, as APs without requiring any specialized infrastructures for the GPS receiver then downloads the second important data, localization, has been proposed in [24]. However, since this 4 Journal of Computer Networks and Communications
1 SSID and RSSI SSID, RSSI and WPS database build GPS location
WiFi AP
SSID and RSSI WPS servers Device location
WPS data retrieval 2 SSID and RSSI WiFi AP
Figure 2: Illustration of WiFi positioning system.
Cell-ID and BTS location Cell-ID and BTS location BTS
BTS
BTS
Figure 3: Illustration of Cell-ID Positioning. localization scheme is limited to the indoors and still relies very low. One cellular tower is often capable for serving up to on infrastructure, such as APs, it cannot be useful outdoors 5Kmradius.Asthislargecellsizeleadstoasignificanterror where the WiFi signals are neither dense enough nor covered. range, other nearby cell tower signals may be used in order to improve the accuracy [4, 25]. Such approaches also exploit the 3.3. Cell-ID Positioning. In Cell-ID Positioning, a mobile fading phenomenon independently or along with predictive device obtains its position from the geographic location of techniques to improve the accuracy of Cell-ID Positioning. its associated base transreceiver station (BTS), with an error However, the accuracy is still limited as the propagation range proportional to the signal strength within a cell. The model needed for the trilateration does not work well, due mobile device can estimate its location as the BTS periodically to complex signal fading behavior over long distances. The broadcasts its Cell-ID along with its location. Once this in- illustration of Cell-ID Positioning is depicted in Figure 3. formation is available to the mobile device, it can use the loca- tion of the BTS as its own location with the error calculated 3.4. Recent Research Proposals. While most of commercial using the propagation model. Another technique that may be approaches heavily depend on infrastructures [3, 26], or use used for cell phones to estimate their location is to observe the extra high-end sensors and exploit the available information delay in receiving a special message broadcasted by the BTS from an individual device [26–28], research proposals mostly from the time it was transmitted. This information is used by aim to improve the positioning accuracy or energy efficiency the mobile device to estimate its distance from the BTS. through algorithmic approaches [8, 23, 24, 29–33]. Notethatacellsizecanbeverylargeespeciallyinrural The work in [31–33]attempttolearnaknownloca- areas and highways where the density of cellular towers is tion from a training phase for a better location accuracy. Journal of Computer Networks and Communications 5
1: check the residual power (𝑝𝑟); 2: if GPS-equipped device & 𝑝𝑟 ≥𝑝min then 3: device becomes 𝑃𝐵 and activates WiFi hotspot; 4: executes CollaborativePB(); 5: else if non-GPS device || 𝑝𝑟 <𝑝min then 6: device becomes PR and executes CollaborativePR(); 7: end if
Algorithm 1: ECOPS: Initial procedure deciding whether a device becomes either a PB or a PR.
The authors of [33] employ indoor positioning, and perform transmitting devices are available, the trilateration technique fingerprinting and training of the known space using mul- achieves pinpoint locating capabilities. tiple sensors in a smartphone such as WiFi radio, cellular The work in [34] proposed to use minimal auxiliary communications radio, accelerometer, and magnetometer. sound hardware for acoustic ranging in order to improve the In order to improve Cell-ID location accuracy in low-end accuracy. The acoustic ranging technique estimates the dis- cell phones where neighboring cell tower information is not tance among peer phones, then maps their locations jointly available, [32] uses RSSI from only the associated cell tower against a WiFi signature map subject to ranging constraints. and leverages the signal strength history to estimate the It is a WPS augmentation technique to improve the accuracy location. The Cell-ID Aided Positioning System (CAPS) [31] over a pure WPS. relies on the continuous mobility and position history of Ourapproachisuniqueinthatweuseacollaborative ausertoobtainbetterlocationaccuracyoverabasiccell approach rather than focusing on the information in an tower-based approach. It uses Cell-ID sequence matching individual device and do not rely on any special hardware or to estimate current position based on the history of Cell- infrastructure such as WPS or Cell-ID Positioning. Note that ID and GPS position sequences that match the current we only use a small amount of GPS information and the WiFi Cell-ID sequence. CAPS assumes that the user moves on the ad hoc mode of mobile nodes. ECOPS is specifically aimed at same routes repeatedly and has the same cellular chip and resource constrained environments such as battlefields where infrastructure availability. GPS is the only available positioning infrastructure, and WiFi A few studies address energy efficiency of smartphones adhocmodeisreadilyavailableinmostmobiledevices using power duty cycling techniques [7, 8, 31]thatuseacom- whileallowinggoodnetworkrange(upto100m).Beside bination of the basic positioning techniques in a smartphone. controlling energy usage and location accuracy, we allow to The authors of [7] use different positioning schemes depend- use heterogeneous mobile device types. ing on the condition, for the purpose of target tracking. In the scheme, energy-efficient but inaccurate Cell-ID Positioning 4. ECOPS Approach orWPSisusedwhenthetargetisdistant,whileaccurate but energy-inefficient GPS is used when the target is close. In this section, we discuss ECOPS algorithms in detail. The rate-adaptive positioning system (RAPS) [8]usesbuilt-in Figure 4 shows an ECOPS deployment example. It consists sensors in a smartphone to determine if the phone has moved of mobile devices with heterogeneous positioning methods beyond a certain threshold and decides whether to turn on available such as GPS, WiFi, and Cell-ID. These devices the GPS or not. RAPS also stores the space-time history of virtuallyestablishanadhocnetworkusingWiFitobuild the user’s movements to estimate how to yield high energy a collaborative positioning environment. In the established efficiency. Another idea presented by the authors involves ECOPSadhocnetwork,adevicemayfunctionaseithera a Bluetooth-based position synchronization (BPS) in which position broadcaster (PB) or a position receiver (PR). A GPS- devices share their location information over a Bluetooth equipped device with sufficient battery life and up-to-date connection. While a Bluetooth connection consumes less location information becomes a candidate for a PB. Other power as compared to a WiFi ad hoc, it also limits the range of devices with no GPS that need current location information communication to less than 10 m. Our work has advantages will become PRs. over the basic BPS technique in several aspects. Not only does Three algorithms are presented for the overall operation aWiFiadhocmodegiveusabetterrange,butwehavealso of the ECOPS. Algorithm 1 describes the initial procedure taken into account the heterogeneity amongst the devices in deciding whether a device becomes a PB or a PR. After the termsofavailabilityofaGPSchiporcellularconnection.We initial decision, Algorithms 2 and 3 depict how the devices in expect all the devices to have at least a WiFi module present ECOPS collaboratively maintain their most updated location onboard. In BPS, once location information is obtained from information as a PB or a PR, respectively. For GPS-equipped a neighboring device, only a fixed error range of 10 m (e.g., devices, the role of the devices can be changed during their same as the range of a typical Bluetooth) is associated with operation according to their residual energy level (i.e., PB ↔ that information. However, in ECOPS we exploit the RSSI PR). As illustrated in Algorithm 1,adevice,onceitstarts values of the connection to determine the accurate distance ECOPS operation, will check the time elapsed since the between the two devices, and when three or more location device got the location information (𝑡𝑒)andresidualpower 6 Journal of Computer Networks and Communications
1: while 𝑝𝑟 ≥𝑝min do 2: listen to connection request from a PR; 3: wait for location request from a PR; 4: if PR requests then 5: check the time elapsed since the device got location information (𝑡𝑒) 𝐼 6: calculate decay; if 𝐼 <𝛼then 7: decay 8: update its GPS location information; 9: 𝑡𝑒 =0; 10: end if 11: end if 12: broadcast current GPS location information; 13: check the residual power (𝑝𝑟); 14: end while 15: execute CollaborativePR();
Algorithm 2: ECOPS: CollaborativePB().
1: while non-GPS device || (GPS-equipped device & 𝑝𝑟 <𝑝min) do 2: sleep until the device needs to update location information 3: numofPBs =0; 4: check the list of available PBs; 5: make connection to each PB and request GPS location information sequentially; 6: calculate the distance to each PB using the obtained RSSI value; 7: set numofPBs to the number of the detected PBs 8: if numofPBs == 1|| one of PBs is within the near field threshold (𝛽 meters) then 9: use the received GPS location information immediately without trilateration; 10: continue; 11: end if 12: if numofPBs == 2 then 13: calculate two possible locations (PR) and get the middle location between the two possible locations; 14: end if 15: if numofPBs >=3then 16: select three PBs randomly and calculate the its cur- rent location (PR) with the GPS coordinates and distance information of the selected PBs; 17: end if 18: if GPS-equipped device then 19: check the residual power (𝑝𝑟); 20: end if 21: end while 22: execute CollaborativePB();
Algorithm 3: ECOPS: CollaborativePR().
𝑝 𝐼 ( 𝑟) to see if it is qualified for being a PB. Since we are looking decay is the level of the validity with respect to time for the for the devices that have the most recent location information location information, defined by with enough residual power, the device with the conditions such as 𝑝𝑟 ≥𝑝min and 𝐼 ≥𝛼canbeaPB,where𝑝min is 𝑡 decay 𝐼 = 100 × (1 − 𝑒 ), the minimum residual energy that a PB has to maintain and decay (1) 𝑡𝑑 Journal of Computer Networks and Communications 7
Emergency LBS Cellular or servers ै responders ै infrastructure WiFi- ங based access ॉ PB ॆ ॠ ॡ ॣ ॥ ॣ ॣ े PB । ॉ PR PB ॣ
PR PR ॢ ै PB GPS WiFi Cell ै WiFi GPS WiFi Cell Figure 5: 2D trilateration. PR PR
to avoid the additional errors that will be induced from PBs GPS WiFi Cell WiFi Cell andfocusonthePR’saccuracy. ECOPS is opportunistic, meaning that getting the most updatedlocationviatrilaterationisnotlimitedbythenumber Component available of available PBs. Supposing that there is only one GPS broadcaster in Figure 5,saynode𝐶, then the center of an Component in use error range of the circle 𝐶3 will become the PR’sapproximated position. Another possible situation is when there are two Figure 4: ECOPS deployment example. PBs, say nodes 𝐴 and 𝐵; then the middle point of two possible points, 𝐷 and 𝐷 ,isselectedasanapproximatedPRlocation. The accuracy of the estimated location will range from one where 𝑡𝑑 is the maximum time in which the location infor- mation is considered to be valid. point where the two circles intersect in the best case to the If a device is equipped with a GPS receiver and satisfies diameter of the smaller circle in the worst case, respectively. In order to get the most accurate location information for the 𝑝min, it can be a PB. Once it becomes a PB, it will start its WiFi hotspot mode and serve the most up-to-date a PR, we need at least three PBs to provide their location location information to a PR when a PR requests the location information obtained from the GPS receiver along with the information. An Android device cannot use the WiFi Internet RSSI values, so that we can build an absolute coordinate system from the relative coordinate system. For example, in service while it is in the WiFi hotspot mode. However, 𝑎 𝑏 𝑐 𝑑 with (Android 4.0), WiFi Direct technology can be used for Figure 5,wecalculatethedistanceparameters , , ,and using the algorithm described in [35] in order to obtain the PBs. In a PB mode with WiFi Direct, the users can enjoy 𝑒 𝑓 𝑒 𝑓 their WiFi Internet service and provide the most up-to-date values of and . We convert the obtained distances and location information simultaneously. The device without a into the unit of the GPS coordinates to get the final calculated GPS coordinate. The distance between two GPS coordinates, GPS receiver will automatically be a PR once it enters ECOPS, ( , ) 𝑒 ( , ) 𝑓 andthensearchforPBsaroundit. lat1 lng1 of and lat2 lng2 of ,iscomputedusingthe As shown in Algorithm 2, once the device enters the PB haversine formula that gives a spherical distance between two points from their longitudes and latitudes [35, 36]. The mode,itplaysaroleofthePBwhileitsatisfiesthe𝑝min constraint.Thethreshold𝛼 is a system parameter that can formula is described in (2)andtheformulaforthevalueof be varied according to the requirement of applications. The dist is shown in (3): tradeoff between location accuracy and energy consumption 𝐹dist (lat1, lng , lat2, lng ) can be adjustable using 𝛼. An application requiring high 1 2 accuracy will select a small amount of 𝛼,butahighvalueof𝛼 = rad 2 deg (𝑎 cos (dist)) × 60 × 1.1515 (2) is used for applications requiring low energy consumption. × 1.609344, 𝐼 The PB will check decay to see if the current location 𝐼 ≥𝛼 dist = sin (deg 2 rad (lat1)) × sin (deg 2 rad (lat2)) information is adequate (e.g., decay ) before broadcasting it. + cos (deg 2 rad (lat1)) × cos (deg 2 rad (lat2)) (3) In Algorithm 3, a PR will collect the possible number of × cos (deg 2 rad (lng − lng )) . GPS coordinates and corresponding RSSI values and apply 1 2 opportunistic localization as illustrated in Figure 5.IfaPR 𝑎 𝑏 𝑐 𝑑 𝛽 Thus, we can calculate relative coordinates ( , , ,and ) finds a PB within the threshold distance ( meters), then a PR as follows: uses the GPS coordinate from a PB as is. The parameter 𝛽 is controllable and users of ECOPS can set it according to their 𝑎=𝐹dist (𝐴 ,𝐴 ,𝐵 ,𝐴 ), preference. Once a PR estimates its location, it can become a lat lng lat lng 𝑏=𝐹 (𝐴 ,𝐴 ,𝐴 ,𝐵 ), PB. However, we do not use those cases in our experiments dist lat lng lat lng 8 Journal of Computer Networks and Communications
𝑐=𝐹 (𝐴 ,𝐴 ,𝐶 ,𝐴 ), dist lat lng lat lng 𝑑=𝐹 (𝐴 ,𝐴 ,𝐴 ,𝐶 ). dist lat lng lat lng (4) Applications The distances (𝑑1, 𝑑2,and𝑑3) between node 𝐷 and other ECOPS Browser LBSs nodes (𝐴, 𝐵,and𝐶) can be derived from the measured RSSI values of node 𝐷, using the formula from the path loss Application frame work propagation model [37]: Resource Location manager manager RSSI =−(10𝑛 ⋅ log 𝑑+L) , (5) 10 Libraries Android runtime whereRSSIisthereceivedpowerwhichisafunctionofthe SQLite SSL distance between the transmitter and the receiver (T-R), 𝑛 DVM is the signal propagation constant (also called propagation Linux kernel 𝑑 exponent), is the T-R separation distance in meters, and GPS driver WiFi driver Cell driver L is the system loss factor. Based on (5), we derived the distance (𝑑) between two devices using the average RSSI value as follows: Location update
(−RSSI−L)/10𝑛 𝑑=10 . (6) Location request
Now, the three circles in Figure 5 can be represented by Location response the following, respectively:
2 2 2 Figure 6: Android module architecture. 𝐶1 :𝑋 +𝑌 =𝑑1 , (7) 𝐶 : (𝑋−𝑎)2 + (𝑌−𝑏)2 =𝑑 2, 2 2 (8) We have implemented ECOPS as an Android applica- 2 2 2 tion for a feasibility test and analysis. Figure 7 shows the 𝐶 : (𝑋−𝑐) + (𝑌−𝑑) =𝑑 , (9) 3 3 screenshots of the ECOPS application. Figure 7(a) displays where the location of node 𝐴 is set to (0, 0). themainscreenthatallowsuserstomanuallyselectan WeobtaintherelativecoordinateofPRnode𝐷 from node ECOPS device option either in PB mode or PR mode, or to 𝐴, (𝑒, 𝑓), by calculating the point where these three circles request the selection automatically based on various param- intersect. In other words, we want to calculate the coordinate eters such as the remaining energy and sensor availabilities. values of 𝑋 and 𝑌 that simultaneously satisfy (7), (8), and (9). Figure 7(b) presents a PB screen that lists the broadcasting We first extend8 ( )and(9) as follows: location information. Figure 7(c) shows a PR screen that lists thereceivedinformationandmeasureddistanceusingthe 2 2 2 2 2 𝐶2 :𝑋 −2𝑎𝑋+𝑎 +𝑌 −2𝑏𝑌+𝑏 =𝑑2 , RSSI value. Although the current implementation is on an (10) application level, as illustrated in Figure 6, it is still capable of 2 2 2 2 2 𝐶3 :𝑋 −2𝑐𝑋+𝑐 +𝑌 − 2𝑑𝑌 +𝑑 =𝑑3 . making the received location information available to other application services. It will eventually be implemented within By applying (7)into(10), the circles 𝐶2 and 𝐶3 can be written the application framework so that other applications can use as the ECOPS services via APIs. 2 2 2 2 𝐶2 :𝑑1 −2𝑎𝑋+𝑎 −2𝑏𝑌+𝑏 =𝑑2 , (11) 5. Experiments 𝐶 :𝑑 2 −2𝑐𝑋+𝑐2 − 2𝑑𝑌2 +𝑑 =𝑑 2. 3 1 3 In this section, we present the evaluation results of ECOPS Finally, the node 𝐷’s coordinate that satisfies the three in terms of energy efficiency and location accuracy. We circles is attained by replacing 𝑋 and 𝑌 with 𝑒 and 𝑓, have implemented an ECOPS Android application and used respectively, in (11). We can formulate the equations in terms several Android smartphones including Samsung Galaxy of 𝑒 and 𝑓 as follows: Nexus S running Android version 2.3.6 and two LG Optimus V running Android version 2.2.2. We have turned the GPS off 𝑑(𝐷 )−𝑏(𝐷 ) on some of the devices to mimic heterogeneous devices. 𝑒= vec 1 vec 2 , 2 (𝑏𝑐 −) 𝑎𝑑 (12) 5.1. Validation of Smartphone GPS Accuracy and Propagation 𝑐(𝐷 )−𝑎(𝐷 ) 𝑓= vec 1 vec 2 , Model. As a first step, we test the accuracy of commodity GPS 2 (𝑎𝑑 −) 𝑏𝑐 receivers on smartphones since they are not dedicated devices like the navigation devices for positioning. We have mea- 2 2 2 2 2 2 2 2 where 𝐷vec 1 =𝑑2 −𝑑1 −𝑎 −𝑏 and 𝐷vec 2 =𝑑3 −𝑑1 −𝑐 −𝑑 . sured the accuracy of smartphones’ GPS, by walking around Journal of Computer Networks and Communications 9
(a) Main menu (b) PB mode (c) PR mode
Figure 7: ECOPS screenshots.
800
600 GPS power up GPS power down
400
Correct path 200
Energy per usage second (mW) WiFi idle state (38 mW/s) Incorrect path by GPS 0 0 10 20 30 40 50 60 Time (s)
GPS only node Figure 8: GPS trace obtained by smartphone. ECOPS PR node
Figure 9: Energy usage: GPS versus ECOPS PR. the Kansas City area while carrying three smartphones. As shown in Figure 8, the GPS collected locations are presented 𝐴 accurately except for a little error between tall buildings factor value ( )issetto30.Fortheindoorenvironment,since (∼10 m). we measured the RSSI between two devices while they were 𝑛 Next,wevalidatethepath loss model for correlation of the in the line-of-sight, we set the system loss factor ( )to0.6. 𝑛 = 1.9 distance between a WiFi signal emitter and receiver with the Fortheoutdoorenvironment,weused . As evidenced measured RSSI values at the signal receiver for both indoor in the figures, we observe that the path loss model works well and outdoor environments. We compared the measured RSSI for us in estimating the distance. value with the theoretical RSSI value from the path loss model. As RSSI values often vary at each time of measurement 5.2. Energy Consumption. We now compare the total energy for a given location, we used an averaged RSSI value with consumption of ECOPS devices to that of devices with multiple samples (e.g., 1,000 samples within a few seconds). GPS only scheme in various settings. First, we compare the In Figures 10 and 11 we compare the measured RSSI with the energy consumption of a node that is ECOPS PR with a theoretical RSSI while varying the distance between PB and node using only GPS at per second granularity as illustrated PR; both inside a building and in outdoor environments are in Figure 9. This power consumption profiling was done shown, respectively. The theoretical RSSI values are derived using PowerTutor [38]. The GPS uses 429 mW/s continuously from (5). The dotted blue line shows the measured average once it is powered up and takes several seconds to power RSSI values, and the solid green line represents the theoretical down which adds up to the energy consumption. Meanwhile, RSSI values at the corresponding distances. The system loss the WiFi module once powered up uses 720 mW/s in an 10 Journal of Computer Networks and Communications
−30 −30
−35 −40
−40 −50
−45 −60 −50 Average RSSI (dBm) RSSI Average Average RSSI (dBm) −70 −55
−60 −80 0 1020304050 0 10 20 30 40 50 Distance between two devices (m) Distance between two devices (m)
Measured RSSI Measured RSSI ćFPSFUJDBM 344* ६ ćFPSFUJDBM 344* ६
Figure 10: Measured RSSI (avg. of 1,000 samples) at various indoor Figure 11: Measured RSSI (avg. of 1,000 samples) at various outdoor spots. spots.
×104 active state and 38 mW/s when in an idle state. During the 4 experiment, for the same operational time of one minute, an ECOPS PR node uses only 3000 mW of energy in total whereas the GPS-only node uses 7432 mW of total energy. 3 This clearly shows that an ECOPS PR is more energy efficient than a GPS-only node. These values are for an LG Optimus V model in particular, and similar for most smartphones. 2 Next, we contrast the energy consumption of a node that isECOPSPRwithanodeusingonlyGPSwhilevaryingthe operational time with 1 minute increments as illustrated in Figure 12. We do this experiment to analyze the effectiveness 1 of ECOPS over a duration of time. It shows that ECOPS is Energy usage of a device (mW) increasingly energy efficient with the elapsed time over the 0 GPS only scheme. 0 2 4 6 8 10 In Figure 13, we compare the energy consumption of Time (min) nodes that are ECOPS PR with nodes using only GPS while varying the number of devices in the network. We do this GPS only experiment to analyze the energy efficiency of ECOPS as the ECOPS receiver number of devices in the network scales. Note that for the ECOPS PR scheme, the PRs receive GPS data from three PBs Figure 12: Comparison of individual node energy consumption: and their energy consumption is accounted for in the results. GPS versus ECOPS PR. The energy efficiency of ECOPS compared with the GPS only scheme is clear from Figure 13 and becomes increased substantially as the number of devices in the network scales. Figure 14,weplacedthePRdeviceatthecenteroftheareaand moved the other PB devices around multiple locations within 5.3. Location Accuracy. In this section, we evaluate the the soccer field. The PR device computed its location using location accuracy of ECOPS as compared to that of GPS, themeasuredRSSIvalues,andGPScoordinatesfromthePBs, WPS, and Cell-ID Positioning. We tested ECOPS in a soccer and the trilateration technique described in Section 4. field using four smartphones for the accuracy measurements. We have moved the PBs to various places around the Thesoccerfieldwaschosen,sothatwehaveaclearand PR and recorded the PR’s computed locations. As shown unhindered view of the sky, and in turn the experimental in Figure 15,weobservedthatECOPSachievesaminimum results are not influenced by the GPS position errors, and the error range of 2.32 m and a maximum error range of 33.31 m. ECOPS errors are precisely measured. We turned on GPS for While from Figure 16 we can observe that nearly 60% of these three devices and turned it off for a device that acted as the locations are within a 10 m error range and less than 10% have PR.Inordertomeasurethelocationaccuracy,asillustratedin an error range greater than 15 m. The results represent that Journal of Computer Networks and Communications 11
×104 5 Worst case error distance: 33.31 meters
4
3 Actual location of PR: the center of the circle 2
1
Total energy usage of network (mW) energy network of usage Total Best case error distance: 2.32 meters 0 4 6 8 10 12 14 Number of devices Figure 15: Experiment results: points calculated with three GPS GPS only coordinates and RSSI values. ECOPS with three GPS data
Figure 13: Comparison of total energy consumption of nodes (1 min): GPS versus ECOPS. 1 0.9 PR’s computed ECOPS location 0.8 Latitude: 39.035676 Longitude: −94.579716 0.7 0.6 PB1 0.5 Latitude: 39.03597428 Longitude: −94.57989731 PR’s 0.4 actual location: CDF Empirical the center of the circle 0.3 0.2 0.1 PB2 PB3 Latitude: 39.0356522799 0 − Latitude: 39.03565159 0 5 10 15 20 25 30 35 Longitude: 94.5798557997 Longitude: −94.57963596 Error range (m)
Figure 16: Distribution in error range for location estimated by PR. Figure 14: An example of field experiments.
ECOPS can achieve a higher location accuracy than WPS while using less energy than GPS receivers. Also, note that the error ranges we observe here are an amalgamation of the WPS (avg. > 60 m) general GPS receiver error from the PBs and the distance measurement error from the RSSI values. Finally, we compare the errors of different positioning ECOPS (best 2.32 m) methods in Figure 17. As before, a smartphone that needs positioning is located at the center of soccer field. The network positioning API in Android obtains the location ECOPS (worst 33.31 m) information either from WPS or Cell-ID Positioning. In GPS (avg. 2m) GSM (avg. > 3 order to ensure the Cell-ID Positioning in Android, the smartphone acquired the location from network positioning 00 mm) API while turning off the WiFi signal. The location infor- mation received was off by almost 300 m. Together with the location, it also suggested its own estimated error range of Figure 17: Accuracy comparison: ECOPS, GPS, WPS, and GSM- 1,280 m associated with it. Clearly, such information is too based positioning. 12 Journal of Computer Networks and Communications inaccurate to be used in most of LBS application scenarios. [4] E. Trevisani and A. Vitaletti, “Cell-ID location technique, limits As for WPS, the smartphone obtained the location from and benefits: an experimental study,” in 6th IEEE Workshop on Android network positioning API while turning off cellular Mobile Computing Systems and Applications (WMCSA ’04),pp. signal.NotethatWPSisnottypicallyavailableinoutdoor 51–60, December 2004. environment. Thus, we used an average WPS error from what [5] “Google latitude,” 2012, http://www.google.com/latitude. we experimented at multiple locations in Kansas City area [6] “Foursquare,” https://foursquare.com/. whereWPSisavailableandfoundittobe60m.Itisthe [7] U. Bareth and A. Kupper, “Energy-efficient position tracking dotted blue line in Figure 17. While the GPS-based location in proactive location-based services for smartphone environ- information proved to be the most accurate with an error ments,” in Proceedings of the 35th IEEE Annual Computer Soft- range of about 2 m, ECOPS achieved the accuracy ranging ware and Applications Conference (COMPSAC ’11),pp.516–521, from2.32mto33.31m.Thisisbetterthantheperformance Munich, Germany, July 2011. of a WPS and fairly close to GPS accuracy while saving [8] J. Paek, J. Kim, and R. Govindan, “Energy-efficient rate-adaptive energy costs. This encourages us to comment that even when GPS-based Positioning for smartphones,” in Proceedings of the WPS service might be available, using ECOPS will facilitate a 8th Annual International Conference on Mobile Systems, Appli- smartphone to receive more accurate location information at cations and Services (MobiSys ’10), pp. 299–314, New York, NY, thesameenergycost. USA, June 2010. [9] “Android 2. 2 platform highlights—portable hotspot,” http:// developer.android.com/about/versions/android-2.2-highlights 6. Conclusion .html. [10] “Wi-Fi direct,” http://developer.android.com/guide/topics/wire- We have presented an Energy Efficient Collaborative Oppor- less/wifip2p.html. tunistic Positioning System (ECOPS) for heterogeneous [11] Y. Zhang, L. Yang, and J. Chen, RFID and Sensor Networks: Ar- mobile devices. Unlike existing approaches that are seeking chitectures, Protocols, Security and Integrations,CRCPress,New the best available positioning method from an individual York, NY, USA, 20 09. device, ECOPS facilitates collaborative environments among [12] T. Rappaport, Wireless Communications Principles and Practice, a set of mobile devices, and thus mobile devices benefit from Prentice Hall, New York, NY, USA, 1996. their neighboring devices. ECOPS supports heterogeneous [13] “3-Axis geomagnetic sensor for electronic compass,” http:// devices to maximize energy-efficiency, as a device with only developer.android.com/guide/topics/connectivity/wifip2p WiFi can collaborate with a few available GPS broadcasting .html. devices via WiFi hotspot mode or WiFi Direct-based approx- [14]M.Mohorcic,D.Grace,G.Kandus,andT.Tozer,“Broadband imation. A beneficiary device may use one or more locations’ communications from aerial platform networks,”in Proceedings information from neighbors opportunistically, depending on of the 13th IST Mobile and Wireless Communications Summit,pp. their availability. Furthermore, each device improves the 257–261, 2004. received location accuracy via various available methods [15] “LANdroids robot,” 2012, http://www.irobot.com/gi/research/ including trilateration or approximation with geomagnetic AdvancedPlatforms/LANdroidsRobot. sensors. We have implemented an ECOPS prototype appli- [16] “The air force has its own batman,” 2012, http://money.cnn cation on Android 2.3.6 and 2.2.2 and have tested it with com/video/technology/2012/05/18/t-ts-wpafb-batman various types of Android mobile devices. The results show .cnnmoney/. that ECOPS provides accuracy within 10 m for nearly 60% of [17] “U.S. government, military to get secure Android phones,”2012, the location estimates, and within 15 m for more than 90% of http://www.cnn.com/2012/02/03/tech/mobile/government- them. ECOPS also offers significantly more energy efficiency android-phones/index.html. than a GPS-only scheme, while overcoming various service [18] National Security Agency(NSA), “Nsa-grade security enhanced limitations. android source released,” 2012, http://www.androidauthority Future work includes fine-tuning the accuracy by oppor- .com/nsa-grade-securityenhanced-android-source-released- tunistically exploiting other available sensors on mobile 45532/. devices. We also plan to consider strategies for various types [19] “Google maps location based services,” http://support.google of LBSs to improve their utility and energy efficiency. .com/maps/bin/answer.py?hl=en&answer=1725632. [20] “Applelocationbasedservices,” http://www.apple.com/privacy/. [21] B. N. Schilit, A. LaMarca, G. Borriello et al., “Challenge: ubiqui- References tous location-aware computing and the “place lab” initiative,”in Proceedings of the 1st ACM International Workshop on Wireless [1] E. Kwon, S. Song, D. Seo, and I. Jung, “Agent-based on-line Mobile Applications and Services on WLAN Hotspots (WMASH traffic condition and information analysis system for wireless ’03), pp. 29–35, September 2003. V2I communication,” in Proceedings of the 2nd International Conference on Ubiquitous and Future Networks (ICUFN ’10),pp. [22]W.Ho,A.Smailagic,D.P.Siewiorek,andC.Faloutsos,“An 360–365, Jeju Island, Republic of Korea, June 2010. adaptive two-phase approach to WiFi location sensing,” in Proceedings of the 4th Annual IEEE International Conference on [2] “Global positioning system standard positioning service perfor- Pervasive Computing and Communications Workshops (PerCom mance standard,” http://www.gps.gov/technical/ps/2008-SPS- Workshops ’06), pp. 452–456, Pisa, Italy, March 2006. performance-standard.pdf. [23] D. Kelly, R. Behant, R. Villingt, and S. McLoone, “Computa- [3] “Skyhook wireless,” http://www.skyhookwireless.com/. tionally tractable location estimation on WiFi enabled mobile Journal of Computer Networks and Communications 13
phones,”in ProceedingsoftheIETIrishSignalsandSystemsCon- ference (ISSC),2009. [24] K. Chintalapudi, A. P. Iyer, and V. N. Padmanabhan, “Indoor localization without the pain,” in Proceedings of the Mobile Computing and Networking (MobiCom ’10), pp. 173–184, 2010. [25] “Blackberry locate service,” https://developer.blackberry.com/ devzone/develop/platform services/platform locate.html. [26] “Ekahau real time location system (RTLS),” http://www.ekahau .com/products/real-time-location-system/overview.html. [27] “Cisco AeroScout location-based services solution,” http://www .cisco.com/web/strategy/docs/manufacturing/Aeroscout- -Cisco-Brochure.pdf. [28] “Broadcom: new location architecture withBCM4752,” http:// www.broadcom.com/products/features/GNSS.php. [29] F. Schrooyen, I. Baert, S. Truijen et al., “Real time location system over WiFi in a healthcare environment,” Journal on Infor- mation Technology in Healthcare,vol.4,no.6,pp.401–416,2006. [30] A. Ofstad, E. Nicholas, R. Szcodronski, and R. R. Choudhury, “AAMPL: accelerometer augmented mobile phone localiza- tion,” in Proceedings of the 1st ACM International Workshop on Mobile Entity Localization and Tracking in GPS-Less Environ- ments (MELT ’08), pp. 13–18, New York, NY, USA, September 2008. [31] J. Paek, K. H. Kim, J. P. Singh, and R. Govindan, “Energy- efficient positioning for smartphones using cell-ID sequence matching,” in Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services (MobiSys ’11),pp. 293–306, New York, NY, USA, July 2011. [32] M. Ibrahim and M. Youssef, “Ahidden Markov model for local- ization using low-end GSM cell phones,” in IEEE International Conference on Communications (ICC ’11), pp. 1–5, Kyoto, Japan, 2011. [33] E. Martin, O. Vinyals, G. Friedland, and R. Bajcsy, “Precise indoor localization using smart phones,” in Proceedings of the 18th ACM International Conference on Multimedia ACM Multi- media 2010 (MM ’10), pp. 787–790, October 2010. [34] H. Liu, Y. Guan, J. Yang et al., “Push the Limit of WiFi based Localization for Smartphones,”in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (Mobicom ’12),pp.305–316,2012. [35] “Calculating distance between two points given longitude/lat- itude,” http://www.freevbcode.com/ShowCode.asp?ID=5532. [36] R. W.Sinnott, “Virtues of the Haversine,” Sky and Telescope,vol. 68, no. 2, article 158, 1984. [37] K. Aamodt, “Applicationnote AN042 (Rev.1.0),” pp. 7-8, 2006. [38] “PowerTutor,” http://ziyang.eecs.umich.edu/projects/powertu- tor/. Hindawi Publishing Corporation Journal of Computer Networks and Communications Volume 2013, Article ID 794202, 15 pages http://dx.doi.org/10.1155/2013/794202
Research Article Equalizer’s Use Limitation for Complexity Reduction in a Green Radio Receiver
Salma Bourbia,1 Daniel Le Guennec,1 Jacques Palicot,1 Khaled Grati,2 and Adel Ghazel2
1 IETR, Supélec, Campus de Rennes Avenue de la Boulaie, CS 47601, 35576 Cesson-Sévigné Cedex, France 2 SUPCOM, University of Carthage, Cité Technologique des Communications, El Ghazala 2083 Tunis, Tunisia
Correspondence should be addressed to Salma Bourbia; [email protected]
Received 15 June 2012; Accepted 22 November 2012
Academic Editor: Lingjia Liu
Copyright © 2013 Salma Bourbia et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
is work is about reducing energy consumption in the receiver chain by limiting the use of the equalizer. It is to make the radio receiver aware of its environment and able to take decision to turn on or off the equalizer according to its necessity or not. When the equalizer is off, the computational complexity is reduced and the rate of reduction depends on the percentage of time during which this component is disabled. In order to achieve this scenario of adapting the use of the equalizer, we need to develop a decision- making technique that provides the receiver with the capacities of awareness and adaptability to the state of its environment. For this, we improve a technique based on a statistical modeling of the environment by de�ning two metrics as channel quality indicators to evaluate the effect of the intersymbol interferences and the channel fading. e statistical modeling technique allows to take into account the impact of the uncertainties of the estimated metrics on the decision making.
1. Introduction so it can select the recon�gurations that need less amount of energy than others. e requirements in wireless communications are increas- Within this context, we focus in this paper on reduc- ingly growing in terms of services and transmission’s quality. ing energy consumption in the radio receiver through its Technological advances in this sense, either in the nodes or adaptation to its environment. In particular, we are looking in the base stations, have improved the quality of service at the equalizer component and we seek to limit its use in offered to the users of the wireless communication networks. order to reduce energy consumption. e idea is to make the However, these advances are not without side effects; with radio receiver capable of being aware of its environment and this development and with the growing number of mobile deciding to turn off the equalizer when it is not useful and to phones, the wireless communications consume more and turn it on as soon as it becomes necessary, so that the receiver more energy causing so an increase in CO emissions. In front performance does not degrade. e fact to get rid of this of this phenomenon, the solutions that make communica- component for a period of time of the communication should tions less consuming in terms of energy2 are needed for the reduce energy consumption in the receiver chain. So we try also to determine from what period of time, of disabling the preservation of the environment. With this aim, the concept equalizer, can we save energy. of green communications, or green radio, allows to develop e reminder of this paper is organized as follows. Section a radio equipment that consumes less energy. One of the 2 describes some previous works that were looking for the solutions to obtain a green radio is to make it able to adapt same reason of switching off the equalizer. In Section 3 we dynamically to the environment and to use this adaptability in develop the decision-making method for deciding to turn order to reduce energy consumption [1]. In fact, according to off the equalizer. In Section 4 we present the results of the the state of its environment, the radio receiver with cognitive computational complexity reduction and other results of capacities can take some decisions of recon�gurations, and simulation. 2 Journal of Computer Networks and Communications
2. Previous Works on the paths’ energies; in fact, the receiver decides to not equalize the received signal only if the energy of one path is far In the literature, the idea of limiting the use of the equalizer greater than the total energy of the other paths. is criterion during a period of time of the communication is not new; is simple to implement and so the additional computational some previous research works have focused on this for dif- complexity is small [6]. e second criterion (C2) is based on ferent reasons other than the energy consumption reduction. the intersymbol interference contribution in the degradation In fact, we notice this in the work [2] where the authors of the signal. For this, the determination of the path having triedtoadapttheuseoftheequalizertothestateofthe the greatest energy is needed, and the receiver decides to channel in order to avoid the presence of this component not equalize only if the projection of the other paths on in an environment without delay spread distortion as it can the axis de�ned by the greatest energy path is far smaller. cause sensitivity degradation. e proposed solution in this is means that the effect of the intersymbol interference is work consists of two coherent detection algorithms; the �rst negligible. In this work, the authors assumed that the channel contains a decision feedback equalizer and the second is coefficients are perfectly estimated and known; in addition without any equalizer. A detector selection algorithm is used to this, they did not study the impact of the variation of the in order to dynamically select the corresponding detector channel on the decision system. e reduction of the energy depending on whether delay spread distortion is present or consumption by disabling the equalizer was also enhanced not. For this the correlation of the two kinds of detectors in [7] where the authors developed a receiver with hybrid is measured and the selection algorithm chooses the one equalizer and RAKE receiver. e receiver enables or disables that have the greater correlation compared to a threshold. the equalizer according to the performance of the system for e problem of this invention is that the equalizer is always RAKE only and for RAKE with the equalizer. A measure used, but also there is an additional stage of a detector for the channel quality allows to switch between the mode without equalizer; this makes the computational complexity RAKE only and the mode RAKE with the equalizer. For of the solution very high. In [3], the authors proposed a this, two evaluations are taken into consideration� the �rst radio receiver with a selectively disabled equalizer. e aim is the measure of the Signal to Interference plus Noise Ratio of this work is to develop a technique for selectively and (SINR) and the second evaluation determines the speed of automatically disabling the equalizer in particular situations thechannel.Finallywementionthework[8] which proposes in order to avoid a prejudicial impact of the equalization in a technique for selecting between an equalizing demodulator these cases. In particular, the discussed case is to disable the and a nonequalizing demodulator in a receiver. equalizer as long as a spurious signal is present for the FM Although the previous works had the objective of reduc- radio receiver. For this, an equalizer controller compares the ing the energy consumption or the computational complex- RF demodulated signal with a predetermined distribution for ity, none has tackled this notion, not even the existence of the received signal in order to determine if a spurious signal is such a reduction related to their solutions. In our work, we present or not and so to disable or to keep the equalizer. e present precisely some results concerning the rate of the energy consumption aspect was not considered in this work complexity reduction when we limit the use of the equalizer since it was not the essential purpose of the invention. in the receiver chain and also the maximum gains that can e purpose of reducing the energy consumption started be achieved. Moreover, our work will be distinguished from to be highlighted in [4]. In this work, the equalizer is powered the earlier works described above by the decision-making off for reduced power consumption when there is small technique. In fact, we develop a technique that takes into intersymbol interference and it is powered on for better account the uncertainty of the channel quality indicators’ signal reception. e idea is based on the analysis of the values used to decide to disable or keep the equalizer as they received signal quality aer demodulation, by inserting a are estimated unlike the other techniques that ignore this decision circuit at the receiver that compares the quality aspect by assuming a perfect estimate of the metrics [5, 6] or of the demodulated signal to a predetermined threshold. by not considering the impact of these uncertainties on the Basing on a couple of integrator and a low-pass �lter, the decision [7, 8]. decision error estimation of the signal quality is compared to a threshold and the result allows to decide if the quality of the signal is poor or good. According to this decision, the equalizer is powered on or off. In determining the quality 3. A Decision-Making Method to Adapt the Use of the received signal, the authors do not specify whether of the Equalizer the degradation of the signal is due to the intersymbol interference or to other phenomena, but they are relying on Our idea is to statistically model and characterize the radio the total degradation. For the same reason of reducing energy environment by using some techniques of the statistical infer- consumption, [5] proposes a new method, called conditional ence like statistical estimation [9] and statistical detection equalization, which minimizes the power consumption by [10]. �e de�ne for this some metrics in order to evaluate equalizing only when it is most needed. At each time slot, the quality of the channel. Basing on these channel indicators the receiver decides if the equalization is needed or not by and on their statistical characteristics, we can evaluate the de�ning two criteria in order to distinguish between weakly current state of the channel and then decide if the equalizer dispersive channels and dispersive channels in the case of a is necessary in this case or not. e use of the statistical two-path Rayleigh channel. e �rst criterion (C1) is based aspect of the channel quality indicators allows to take into Journal of Computer Networks and Communications 3 account the estimation errors of these metrics in the decision- as follows: making system which affect the decision performance. In the following paragraphs, we present the decision-making 𝐸𝐸퐸𝐸𝐸𝐸𝐸𝐸퐸 𝐸� method based on the statistical modeling of the environment ISI 2 (4) for the scenario of driving the equalizer in the receiver chain. 𝐿𝐿퐿퐿 𝑖𝑖 =𝐸𝐸𝑖𝑖𝑖 ℎ ⋅𝑠𝑠[𝑘𝑘𝑘𝑘�] , where denotes the expectation operation. 3.1. �e�niti�n �� the Channel ��ality In�icat���. e �rst step to do is to de�ne the channel quality indicators that are Assuming that the transmitted symbols are iden- necessarytoevaluatethestateofthechannelandthento tically𝐸𝐸퐸퐸 distributed and independent, the evaluation of the choose between a use of the equalizer or not. We consider expression (4) leads to the following relation 𝑠𝑠𝑠𝑠𝑠 for this a multipath channel from length of with an added Gaussian noise. e received signal is then expressed as in ISI (5) 𝐿𝐿 𝐿𝐿퐿퐿 2 2 𝑖𝑖 (1) = 𝑖𝑖𝑖 ℎ ⋅𝐸𝐸�𝑠𝑠 [𝑘𝑘𝑘𝑘�]] . 𝐿𝐿퐿퐿 3.1.2. In the Rayleigh Channel. e Rayleigh channel does not 𝑖𝑖 contain a direct path, so in order to de�ne the metric SNR 𝑦𝑦 [𝑘𝑘] = ℎ ⋅𝑠𝑠[𝑘𝑘𝑘𝑘�] +𝑏𝑏[𝑘𝑘] , with : the transmitted𝑖𝑖� signal,푖 : the received signal, : the we consider the path that has the highest energy, which means added Gaussian noise, : the coefficients of the highest signal to noise ratio. We denote this path and𝑝𝑝 the multi-path channel. then the metric SNR is expressed in 𝑠𝑠 𝑦𝑦 𝑏𝑏 𝑖𝑖푖푖푖 We assume that theℎ interferences, = (ℎ0,…,ℎ which𝐿𝐿퐿퐿) the signal suffers ℎ from, are limited to the intersymbol interferences caused by 𝑝𝑝 SNR (6) delaydispersionofthemultiplepathsofthechannel.Atthe 2 2 receiver, the signal can be deteriorated by the noise and by the ℎ𝑖𝑖푖푖푖 𝜎𝜎𝑠𝑠 inter-symbol interferences. In order to distinguish between 𝑝𝑝 = 2 , with SNR SNR 𝑏𝑏 SNR the two sources of signal degradation, we are de�ning two 𝜎𝜎 is the signal to noise ratio of the th independent radio metrics. e �rst that we denote SNR 𝑝𝑝 𝑖𝑖 (𝑖𝑖�푖𝑖𝑖𝑖𝑖𝑖�𝑖𝑖 푖 𝑖𝑖푖푖푖� 𝑖𝑖 is the signal-to-noise ratio without taking into account the path.2 2 2 >() = effect of the inter-symbol interferences and the second that𝑝𝑝 (‖ℎ𝑖𝑖erestofthepaths‖ 𝜎𝜎𝑠𝑠 /𝜎𝜎𝑏𝑏)𝑖𝑖 푖 𝑖𝑖푖푖푖 are adding the inter-𝑖𝑖 we denote ISI is the power of the inter-symbol interferences. symbol interferences, so we can de�ne the metric ISI as For this we will consider two cases of the channel: the Rician follows: (ℎ𝑖𝑖)𝑖𝑖 푖 𝑖𝑖푖푖푖 channel and the Rayleigh channel. ISI (7) 𝐿𝐿퐿퐿 3.1.1. In the Rician Channel. Since the Rician channel con- 2 2 tains a direct path, we can express the received signal as in = ℎ𝑖𝑖 ⋅𝐸𝐸�𝑠𝑠 [𝑘𝑘𝑘𝑘�]] . As a conclusion,(𝑖𝑖�푖 if�𝑖𝑖 we consider푖 𝑖𝑖푖푖푖) that the transmitted signal is normalized , then our two channel quality (2) 𝐿𝐿퐿퐿 indicators are expressed2 as follows for the Rician case and the Rayleigh case: (𝜎𝜎𝑠𝑠 = 1) 𝑦𝑦 [𝑘𝑘] =ℎ0𝑠𝑠 [𝑘𝑘] + ℎ𝑖𝑖 ⋅𝑠𝑠[𝑘𝑘𝑘𝑘�] +𝑏𝑏[𝑘𝑘] . SNR evaluates the level𝑖𝑖𝑖 of the degradation of the received signal by the noise and the fading without consid- SNR 𝑝𝑝 2 ering the interferences. is means that we consider only the 0 Rice fading of the signal observed in the direct path . So in this 𝑝𝑝 ℎ 2 = 𝑏𝑏 , case, SNR is de�ned in SNR 𝜎𝜎 0 2 ℎ Rayleigh 𝑝𝑝 ℎ𝑖𝑖푖푖푖 𝑝𝑝 = 2 , (8) SNR (3) 𝑏𝑏 2 2 𝜎𝜎 ISI Rice ℎ0 ⋅𝜎𝜎𝑠𝑠 𝐿𝐿퐿퐿 𝑝𝑝 = 2 , 2 𝜎𝜎𝑏𝑏 𝑖𝑖 with and are, respectively, the variance of the input = 𝑖𝑖𝑖 ℎ , signal and the variance of the noise. Concerning the second 2 2 ISI Rayleigh 𝑠𝑠 𝑏𝑏 𝐿𝐿퐿퐿 metric𝜎𝜎 ISI, we𝜎𝜎 are interested in the term 2 𝑖𝑖 of the relation (2), which describes the phenomenon𝐿𝐿퐿퐿 of = (𝑖𝑖�푖� 𝑖𝑖 푖 𝑖𝑖푖푖푖)ℎ . the inter-symbol interferences. From this expression,∑𝑖𝑖𝑖 ℎ𝑖𝑖 ⋅ we 𝑠𝑠𝑠𝑠𝑠� can In the next paragraphs, we are focusing on the estimation de�ne𝑖𝑖� a new metric ISI to represent the power of the inter- of these metrics derived from the channel estimation, then we symbol interferences as described in (4). We assume that the present our decision system based on the statistical modeling input symbols follow an uniform distribution with mean of the environment.
𝑠𝑠𝑠𝑠𝑠 4 Journal of Computer Networks and Communications
3.2. Estimation of the Channel Quality Indicators. Since the e parameter represents the step size and has an in�uence metrics ISI and SNR are based on the channel coefficients on the convergence of the algorithm. , their estimation needs an algorithm for channel All these techniques𝜇𝜇 are with pilot symbols, which causes estimation. Many techniques𝑝𝑝 for channel estimation are a bad impact on the useful throughput, unlike the blind tech- (ℎproposed𝑖𝑖)𝑖𝑖푖푖푖푖푖𝑖𝑖푖푖 in the literature; we can distinguish blind tech- niques that are without pilot symbols. As one of these blind niques, techniques with pilot symbols, adaptive techniques, methods, we can mention the constant modulus algorithm. and nonadaptive techniques. In our case we search for Constant Modulus Algorithm [13, 14].Itisalsoanadaptive one technique that provides a less estimation error and algorithm but blind, which tries to minimize the cost function a less computational complexity. For this, we propose a with , CMA , comparison between some techniques of estimation and we 2 2 . 4 2 select the one that presents the best compromise between 𝐽𝐽𝐽퐽𝐽𝐽en𝑛𝑛| − the𝐶𝐶� } updated𝐶𝐶 𝐶𝐶𝐶𝐶𝐶𝐶 channel/𝐸𝐸 coefficient𝐸𝐸𝐸 𝑉𝑉𝑛𝑛 = estimationℎ (𝑛𝑛�𝑛𝑛(𝑛𝑛 is� the less mean-squared error of the estimation and the less expressed𝑌𝑌𝑛𝑛 푖 푦𝑦𝑦𝑦𝑦𝑦𝑦𝑦� in 𝑦𝑦𝑦𝑦𝑦𝑦𝑦𝑦�푦 computational complexity expressed in terms of the number of multiplication operations in the algorithm. CMA CMA (13) 2 LS (Least-Squared) Channel Estimation [11]. Itisanon- ℎen( from𝑛𝑛𝑛) the= ℎ obtained(𝑛𝑛) − values𝜇𝜇𝜇𝜇 (𝑛𝑛 of) 𝑉𝑉𝑛𝑛 , we𝑉𝑉𝑛𝑛 can − deduce𝐶𝐶 . the adaptive algorithm that is based on a known training estimation of our metrics ISI and SNR as follows: sequence from the transmitted signal. For each received 𝑖𝑖 ℎ frame, a training matrix is de�ned as follows: 𝑝𝑝
SNR 2 𝑀𝑀 0 Rice (9) 𝑝𝑝 ℎ = 2 , 𝑚𝑚𝐿𝐿 ⋯𝑚𝑚0 𝜎𝜎𝑏𝑏 𝑀𝑀� ⋮ ⋱⋮ , SNR 2 where is the number of𝑃𝑃푃 the𝑃𝑃𝑃 pilot symbols.𝑃𝑃𝑃 𝑖𝑖푖푖푖 Rayleigh 𝑚𝑚 ⋯𝑚𝑚 ℎ (14) e LS estimation is a minimization of the quadratic 𝑝𝑝 = 2 , 𝜎𝜎𝑏𝑏 error: 𝑃𝑃 ISI 𝐿𝐿𝐿 Rice 2 argmin LS 𝑖𝑖 2 (10) = 𝑖𝑖푖푖 ℎ , ISI ℎ = 𝑦𝑦 𝑦𝑦𝑦� 𝐿𝐿𝐿 Rayleigh 2 𝐻𝐻 −1 𝐻𝐻 = ℎ𝑖𝑖 . where and are,= respectively,𝑀𝑀 𝑀𝑀 𝑀𝑀 the𝑦𝑦� hermitien and the In order to select the(𝑖𝑖푖푖푖𝑖𝑖 best channel 푖𝑖𝑖푖푖푖� estimation algorithm inverse matrices𝐻𝐻 and−1 is the vector of the channel coefficients. for us, we dress, in Figures 1 and 2, the mean-squared () () Error curves of the estimation of ISI and SNR by using the Technique by Intercorrelation.ℎ It is an estimation method methods LS, LMS, CMA, and inter-correlation. Since we are that we have developed by inspiring from [12]. Its idea is in an environment variable in time, we will study𝑝𝑝 the effect based on the intercorrelations between the transmitted pilot of the variation, of the inter-symbol interferences, and of the symbols, with delay, and the received symbols. In fact, the fading, on the estimates of ISI and SNR . For this, we draw intercorrelation product between the received symbol the curves MSE ISI ISI , MSE ISI SNR , and and the transmitted symbol delayed by 𝑝𝑝 is expressed as 𝑦𝑦푦𝑦𝑦푦 MSE SNR ISI , MSE SNR SNR . e curves 𝑝𝑝 𝑠𝑠𝑠𝑠𝑠𝑠𝑠� 𝑖𝑖 푖 �푖푖 푖 푖 𝑖𝑖푖푖� of simulation are( not) depending= 𝑓𝑓� ) on the( type) = of the𝑓𝑓� channel.) In another( side,𝑝𝑝) = as𝑓𝑓 we� search) also( for𝑝𝑝 algorithms)=𝑓𝑓� with𝑝𝑝) minimum ∗ computational complexity, we determine the equations of (11) 𝐸𝐸 𝑠𝑠[𝑘𝑘𝑘𝑘�] ⋅𝑦𝑦[𝑘𝑘] the complexity of the estimation of ISI and SNR with each 𝐿𝐿𝐿 technique. For this, we present in Tables 1 and 2 the com- ∗ putational complexity CC of the estimation operations𝑝𝑝 that =𝐸𝐸𝑠𝑠[𝑘𝑘𝑘𝑘�] ℎ𝑖𝑖 ⋅𝑠𝑠[𝑘𝑘𝑘𝑘�] +𝑏𝑏[𝑘𝑘] =ℎ𝑖𝑖. In practice 𝑖𝑖푖푖 is approximated with a �nite we de�ne as the number of the operations of multiplication. number of symbols that represent the training sequence; this Basing on the two criteria (MSE and complexity), we will ∗ choose the channel estimation algorithm. provides an estimated value of the coefficients, that is, . 𝐸𝐸퐸𝐸𝐸𝐸𝐸𝐸𝐸𝐸𝐸� ⋅ 𝑦𝑦푦𝑦𝑦푦푦 We denote by LMS (Least Mean-Squared) Channel Estimation. It is an 𝑖𝑖 LS LMS CMA inter adaptive algorithm that is based on the stochastic gradient.ℎ (i) Metric , Metric , Metric , and Metric : the Assuming the error of the adaptive �lter at the instant time estimated value of the metric Metric by using the such as LMS , the update of the channel channel estimation algorithm LS, LMS, CMA, and coefficients𝑒𝑒 estimation is𝑇𝑇 expressed in inter-correlation. Metric can be ISI or SNR , 𝑛𝑛 𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒𝑒ℎ (𝑛𝑛𝑛𝑛�(𝑛𝑛� (ii) :thenumberofthepilotsymbolsforthenonblind 𝑝𝑝 LMS LMS (12) algorithms, 𝐻𝐻 𝑃𝑃 ℎ (𝑛𝑛𝑛) = ℎ (𝑛𝑛) + 𝜇𝜇𝜇𝜇 (𝑛𝑛) 𝑠𝑠 (𝑛𝑛) . Journal of Computer Networks and Communications 5
Mean squared error of ISI estimation Mean squared error of ISI estimation 0.014 0.08
0.012 0.07
0.06 0.01 0.05 0.008 0.04 MSE MSE 0.006 0.03 0.004 0.02 0.002 0.01
0 0 −24 −22 −20 −18 −16 −14 −12 −10 −8 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 Exact value of ISI (dB) &YBDU WBMVF PG 4/3८ E# LS technique Intercorrelation technique LS technique Intercorrelation technique LMS technique CMA technique LMS technique CMA technique
(a) MSE ISI ISI (b) MSE ISI SNR
𝑝𝑝 () = 𝑓𝑓� ) F 1: Mean squared error of ISI. () = 𝑓𝑓� )
.FBOTRVBSFEFSSPSPG4/3८ FTUJNBUJPO .FBOTRVBSFEFSSPSPG4/3८ FTUJNBUJPO 0.35 8
0.3 7
6 0.25 5 0.2 4 MSE MSE 0.15 3
0.1 2
0.05 1 0 0 −24 −22 −20 −18 −16 −14 −12 −10 −8 5.6 5.8 6 6.2 6.4 6.6 6.8 7 7.2
Exact value of ISI (dB) &YBDU WBMVF PG 4/3८ E# LS technique Intercorrelation technique LS technique Intercorrelation technique LMS technique CMA technique LMS technique CMA technique
(a) MSE SNR ISI (b) MSE SNR SNR
𝑝𝑝 𝑝𝑝 𝑝𝑝 ( ) = 𝑓𝑓� ) F 2: Mean squared error of SNR . ( ) = 𝑓𝑓� )
𝑝𝑝
(iii) : the number of the received symbols considered in It is true that, unlike the algorithms with pilot sym- the estimation for the blind algorithm, bols, the blind algorithm CMA allows a throughput more 𝑁𝑁 interesting. But this technique is very sensitive to both the (iv) : the length of the channel. intersymbol interferences and the channel fading. In fact according to the curves of MSE in Figures 1(a) and 2(a), it In particular,𝐿𝐿 for the values , , and , is clear that the higher the value of ISI, the higher the mean- LMS CMA we found CCISI operations, while CCISI squared error of estimation with CMA technique. Similarly, LS inter we notice from Figures 1(b) and 2(b) that the mean squared operations, CCISI operations,𝑃𝑃�푃푃𝑁𝑁 and𝑁� CCISI 𝐿𝐿�퐿 operations. = 224 = 1184 error of this technique increases while the SNR is degraded.
= 13104 = 79 𝑝𝑝 6 Journal of Computer Networks and Communications
T 1: Computational complexity of ISI estimation. parameters of a set of observations whereas the parametric method estimates only the statistical parameters when the Method of ISI estimation Computational complexity distribution of the observations is known. In our case the LS LS ISI CCISI analysis that we perform on the estimation of our radio LMS LMS2 2 ISI CCISI metrics ISI and SNR shows that a Gaussian distribution CMA =CMA 2𝑃𝑃𝑃𝑃 +𝑃𝑃𝑃𝑃�𝑃𝑃�푃𝑃𝑃푃푃푃𝑃𝑃 𝐿𝐿퐿 𝐿 ISI CCISI represents well the distributions of the observations provided 𝑝𝑝 inter =2𝐿𝐿𝐿𝐿𝐿𝐿𝐿𝐿𝐿𝐿2 by the sensors of the metrics, and therefore the parametric ISI CCinter ISI= 𝑁𝑁𝑁𝑁𝑁 +𝐿𝐿�𝐿𝐿𝐿퐿𝐿𝐿𝐿𝐿 method is enough to determine the statistical parameters of these observations. So, since the information about the =2𝐿𝐿𝐿�𝑖𝑖𝑖 (𝑃𝑃 푃 𝑃𝑃푃 distributions of the observed metrics is known, we do T 2: Computational complexity of SNR estimation. not need the nonparametric method especially if it adds complexity to estimate these distributions. Method of 𝑝𝑝 Computational complexity ML ML ML ML SNR estimation We denote by SNR SNR and ISI ISI the LS LS SNR𝑝𝑝 CCSNR statistical parameters (mean𝑝𝑝 and variance)𝑝𝑝 of SNR and ISI. LMS LMS2 2 𝑁𝑁�𝜇𝜇 , 𝜎𝜎 ) 𝑁𝑁�𝜇𝜇 , 𝜎𝜎 ) 𝑝𝑝 CC By applying the parametric technique, maximum𝑝𝑝 likelihood SNR𝑝𝑝 SNR CMA CMA= 2𝑃𝑃𝑃𝑃 +2+𝑃𝑃𝑃𝑃�푃𝑃𝑃푃푃푃𝑃𝑃 𝐿𝐿퐿 estimator, we �nd the expressions following: 𝑋𝑋 𝑋𝑋 SNR𝑝𝑝 CCSNR 𝑝𝑝 inter =2𝐿𝐿𝐿𝐿𝐿𝐿𝐿� CCinter 2 SNR𝑝𝑝 𝑝𝑝 SNR ML = 𝑁𝑁𝑁𝑁𝑁 +𝐿𝐿�퐿𝐿� SNR SNR 𝑝𝑝 𝑛𝑛 𝑝𝑝 =𝑃𝑃�푃 𝑖𝑖 𝑝𝑝 1 𝑝𝑝 Furthermore this method has a computational complexity 𝜇𝜇 = 𝑥𝑥 , 𝑛𝑛 𝑖𝑖�푖 relatively high compared to the other methods. ML ML SNR SNR SNR Concerning the estimation technique by intercorrela- 𝑛𝑛 2 𝑖𝑖 tions, although it is the least complex one, it presents an 𝑝𝑝 1 𝑝𝑝 𝑝𝑝 (15) 𝜎𝜎 = 𝑖𝑖�푖𝑥𝑥 − 𝜇𝜇 , increased MSE especially in Figures 1(a), 1(b) and 2(b). 𝑛𝑛ML𝑛 ISI ISI Finally, the LS technique has a good performance of esti- 𝑛𝑛 mation, but it is the most complex one. In conclusion, 1 𝑖𝑖 in this comparison, the LMS technique seems to be the 𝜇𝜇 = 𝑥𝑥 , 𝑛𝑛 𝑖𝑖�푖 most compatible in the compromise (estimation perfor- ML ML ISI ISI ISI mance/complexity). In addition, it is an adaptive algorithm 𝑛𝑛 2 that is very adapted to the change of the radio channel. So in 1 𝑖𝑖 𝜎𝜎 = 𝑥𝑥 − 𝜇𝜇 . our simulations, we choose to use the LMS algorithm for the So, aer realizations𝑛𝑛𝑛 of𝑖𝑖�푖 and ,weobtainthe estimation of SNR and ISI. SNR ISI 𝑖𝑖 𝑖𝑖 estimated values of our metrics, as described𝑝𝑝 in 𝑝𝑝 𝑛𝑛 𝑥𝑥 ML 𝑥𝑥 3.3. Statistical Modeling of the Environment and Decision SNR SNR Making. In this section, we will describe the method that we (16) 𝑝𝑝 ML 𝑝𝑝 have developed in order to determine the decision rule to ISI = 𝜇𝜇ISI , make decision for using or not using the equalizer from the statistical modeling of the environment [15]. By using these estimated = 𝜇𝜇 values. and their statistical We consider SNR (resp., ISI) one estimation of the parameters, we try to evaluate the channel quality and to 𝑖𝑖 𝑖𝑖 determine the decision rule for deciding whether the equal- SNR (resp., ISI) in𝑝𝑝 the instant ,givenbythesen- sor algorithms selected𝑥𝑥 in Section𝑥𝑥 . en the vectors izer is necessary or unnecessary. For this. e evaluation of the channel quality indicators is performed by asserting or 𝑝𝑝 (resp., ) represent esti- SNR SNR ISI 𝑖𝑖ISI refuting some general hypothesis. e objective is to decide 1 𝑛𝑛 1 𝑛𝑛3.2 mations𝑝𝑝 of SNR𝑝𝑝 (resp., ISI), with SNR (resp., between the two actions: (𝑥𝑥 ,…,𝑥𝑥 ) (𝑥𝑥 ,…,𝑥𝑥 ) 𝑖𝑖 𝑛𝑛 ISI ) being identically distributed and𝑝𝑝 independent turn-off-the-equalizer 𝑝𝑝 (𝑥𝑥 )𝑖𝑖𝑖𝑖𝑖𝑖� following𝑖𝑖 the same distribution as a random variable SNR (17) (𝑥𝑥 )𝑖𝑖𝑖𝑖𝑖𝑖� 1 turn-on-the-equalizer (resp., ISI). 𝑝𝑝 𝐴𝐴 ∶ , In order to characterize statistically our channel quality𝑋𝑋 It is necessary𝐴𝐴 to0 ∶ determine the situations. of the environ- indicators𝑋𝑋 SNR and ISI, we have to determine the densities ment where is possible and those where is possible. of probability of the variables SNR and ISI. From the In fact, according to the state of ISI and SNR , we con�rm 𝑝𝑝 if the received1 signal is deteriorated by the noise0 only, by statistical inference theory, two classes𝑝𝑝 of techniques are 𝐴𝐴 𝐴𝐴 proposed in order to estimate the𝑋𝑋 density of𝑋𝑋 probability of a the inter-symbol interferences only, or by both𝑝𝑝 of them. e random variable given its realizations; for this, we mention evaluation of this state is done according to the thresholds the parametric estimation techniques and the nonparametric of performance SNR and ISI which we de�ned as the values estimation techniques [9, 10]. e nonparametric method of SNR and ISI for a minimum bit error rate BER . estimates both the distribution shape and the statistical While the value𝜆𝜆 of SNR is𝜆𝜆 normalized by the standard used−3 𝑝𝑝 = 10 𝜆𝜆 Journal of Computer Networks and Communications 7 in the communication, there is no indication about the value (iv) is a �xed probability of false alarm. In our simula- of ISI. In our work, we determined this threshold by taking tions, we �x this value to . the best measured value of ISI that provides BER . 𝛼𝛼 𝜆𝜆According to the values of ISI and SNR , we can−3 de�ne 1% three states of the environment. Table 3 presents these= 10 states is decision rule is de�ned in such a way that takes into 𝑝𝑝 with the corresponding actions for each one. account the impact of the uncertain measures of SNR and When the power of the inter-symbol interference is ISI on the decision thresholds. greater than ISI, the signal is affected and the equalizer is Now in order to determine the theoretical performance𝑝𝑝 necessary to reduce the inter-symbol interference. In the case of this decision system, we express the probabilities of false where SNR SNR, we choose to keep the equalizer because, 𝜆𝜆 alarm FA and correct decision de�ned as follows: despite the fact that the BER still above , the equalizer will 𝑝𝑝 reduce it anyway.< 𝜆𝜆 e case where we can decide−3 to turn off the 𝑃𝑃 𝑃𝑃𝐷𝐷 equalizer is when the signal is not deteriorated10 neither by the noise nor by the inter-symbol interferences. FA Accept is true To translate this evaluation, statistically, and deduce the 1 decision rule of our decision system, we construct the binary 𝐻𝐻 𝑃𝑃 =𝑃𝑃 hypothesis test described in (18), where corresponds to 0 ISI SNR 𝐻𝐻 SNR ISI the decision to turn off the equalizer and the hypothesis SNR for the decision to turn it on. 𝐻𝐻1 𝑝𝑝 𝐾𝐾 =𝑃𝑃 ≥𝐾𝐾 , ≤ 𝑝𝑝 𝐻𝐻0 SNR SNR ISI ISI SNR or ISI ISI (18) (21) 𝐻𝐻1 SNR∶ 𝑝𝑝 ≥𝜆𝜆SNR ,or ISI≤𝜆𝜆 ISI, < 𝜆𝜆 >𝜆𝜆 , Accept is true e resolution0 of this𝑝𝑝 hypothesis test leads to the decision 𝐻𝐻 ∶ < 𝜆𝜆 >𝜆𝜆 . 1 rule to decide to disable the equalizer, and this occours by 𝐷𝐷 𝐻𝐻 𝑃𝑃 =𝑃𝑃 1 identifying new thresholds ISI and SNR since the quantities SNR 𝐻𝐻 ISI ISI ISI and SNR are the estimated values and not the exact SNR SNR values. For this, we use the technique𝐾𝐾 𝐾𝐾 of the Neyman Pearson 𝑝𝑝 𝐾𝐾 𝑝𝑝 =𝑃𝑃 ≥𝐾𝐾 , ≤ 𝑝𝑝 test and we are relying on the statistical characteristics of ISI the metrics estimated and modeled previously. e technique SNR ISI of the Neyman Pearson consists of choosing the hypothesis which has the highest probability of correct decision under ≥𝜆𝜆 , ≤𝜆𝜆 . the constraint of a false alarm less than which is the maximum probability of the false alarm tolerated for the By introducing the terms , , and as described in decision system and �xed in advance. According𝛼𝛼 to this Figure 3, we developed these probabilities′ and′ we found the method,thereisnoindicationabouthowtosetthevalueof following relations: 𝑑𝑑1 𝑑𝑑1 𝑑𝑑2 𝑑𝑑2 . e result is presented in (19), where is the decision rule to decide to turn off the equalizer: 𝛼𝛼 𝛿𝛿1 SNR SNR ISI ISI (19) FA ML ML 1 𝑝𝑝 SNR 𝛿𝛿 ∶ ≥𝐾𝐾 SNR, ≤𝐾𝐾 , 𝑑𝑑1 −1 SNR SNR 𝑝𝑝 𝑝𝑝 𝑃𝑃 = 1−𝐹𝐹 +𝐹𝐹 (𝛼𝛼) 𝜎𝜎 −1 (20) 𝜎𝜎 /√𝑛𝑛 𝐾𝐾 =𝜆𝜆 + ML 𝐹𝐹 (𝛼𝛼) , ML ′ ISI√𝑛𝑛 −1 ISI 2 ISI ISI 𝑑𝑑 (22) ×𝐹𝐹𝐹𝐹 (𝛼𝛼) − , 𝜎𝜎 −1 𝜎𝜎 /√𝑛𝑛 where 𝐾𝐾 =𝜆𝜆 + 𝐹𝐹 (𝛼𝛼) , 2 √𝑛𝑛 ML ′ −1 SNR 1 (i) is the inverse function of and 𝐷𝐷 𝑑𝑑 𝑃𝑃 = 1−𝐹𝐹𝐹𝐹 (𝛼𝛼) − 𝑝𝑝 −1 is the distribution function of 2 𝜎𝜎 /√𝑛𝑛 the𝐹𝐹𝑥𝑥 standard normal.−𝑡𝑡 /2 𝐹𝐹 𝐹𝐹�𝐹𝐹𝐹� ML 2 ISI (ii) ∫−∞is(1/ the√2Π)𝑒𝑒 number of𝑑𝑑𝑑𝑑 the realizations of the metrics’ −1 𝑑𝑑2 × 𝐹𝐹 𝐹𝐹 (𝛼𝛼) + . estimation. 𝜎𝜎 /√𝑛𝑛 (iii) SNR𝑛𝑛 and ISI are Gaussian random variables with From these expressions we can determine the conditions meansneartotherealvaluesofSNR and ISI and 𝑝𝑝 on the value of (number of the metrics’ estimations used with variances, respectively, ML and ML SNR 𝑝𝑝 ISI to one decision) in order to get situations where we start to 2 2 (Figure 3), 𝑝𝑝 have a probability𝑛𝑛 of correct decision equal to 1 (no errors of (𝜎𝜎 ) /𝑛𝑛 (𝜎𝜎 ) /𝑛𝑛 8 Journal of Computer Networks and Communications decision) (23),andtogetsituationswherewestarttohavea T 3: Decided actions of recon�guration. probability of false alarm equal to 0 (24). State of the metrics Decided actions ML SNR SNR SNR Keep the equalizer SNR 𝑝𝑝 ′ 𝑝𝑝 SNR Disable the equalizer 𝜎𝜎 𝑑𝑑1 (23) ISI < 𝜆𝜆 ML ≤ , 𝑝𝑝 ISI ISI SNR ≥𝜆𝜆 √𝑛𝑛 2 SNR Keep the equalizer ISI ≤𝜆𝜆 𝑝𝑝 ISI 𝜎𝜎 𝑑𝑑2 ≥𝜆𝜆 ML ≤ , √SNR𝑛𝑛 2 >𝜆𝜆 T 4: Parameters of the channels. 𝑝𝑝 1 𝜎𝜎 𝑑𝑑 (24) fr ms, MHz ML ≤ , ISI Channel (Rice or Rayleigh) Hz Km/h Condition on √𝑛𝑛 2 𝑝𝑝 ′ Slow channel 𝑇𝑇 =1 𝑓𝑓 = 1800 𝜎𝜎 𝑑𝑑2 𝑓𝑓𝑑𝑑( ) 𝑣𝑣� ) 𝑛𝑛 ≤ . Fast channel 4. Simulation Results√𝑛𝑛 2 10 6 𝑛𝑛 𝑛𝑛𝑛 100 60 𝑛𝑛 𝑛𝑛� 4.1. Proposed Solutions for Driving the Equalizer. In the If is the number of the training symbols in one frame implementation of the decision-making method to drive the necessary for the metrics’ estimations, then the number of equalizer, we have thought of two solutions for this. e the estimated values considered for one decision is de�ned as �rst solution is described in Figure 4(b); this solution starts 𝑃𝑃 in with a decision making block which contains our treatments, 𝑛𝑛 of metrics’ estimations and decision making rule, which we developed previously in Section 3. According to the output PF (28) of this block, the equalizer is turned off or on. In the second fr 𝑇𝑇𝑐𝑐 solution, described in Figure 4(c), we keep constantly the 𝑛𝑛� 𝑟𝑟 < 𝑃𝑃 . calculation of the vector of coefficients of the equalizer’s FIR For simulations, we consider a multipath𝑇𝑇 channel variable . Aer this, according to the output of the decision block, in time with length equal to . We will consider �rst the case we turn off or on the equalizer’ FIR. With this solution, we of a Rician channel and then the Rayleigh channel. For each case, we simulate the scenario of decision making to drive 𝑊𝑊aim to avoid a suspected delay of the equalizer when it is re- 5 launched especially in a channel that varies in time. the equalizer by using �rst solution 1 and second solution 2 described in Figures 4(b) and 4(c).Atthesametime,wewill 4.2. Decision-Making Result in a Time-Variable Channel. take two examples of each channel: a slow varying channel Since we are in a time-varying channel, the decision of the and a fast varying channel. e conditions of simulation are receiver to turn off or on the equalizer must follow in real time described in Table 4. the variation of the channel’s state. So we have to determine the constraint on the number of metrics’ estimated values 4.2.1. A Case of Rician Channel. e two examples of the that allows to make decision without any delay. For this, we Rician channel that we are using are represented in Figure 5 consider a mobile equipment with a speed equal to ,ina which describes the behavior of the channel’s paths in time multipath channel with a Doppler frequency described in when it varies slowly (Figure 5(a))andrapidly(Figure 5(b)). (25): 𝑣𝑣 We present also in Figures 6(a) and 6(b) the bit error rate at 𝑓𝑓𝑑𝑑 the receiver, without the equalizer, of the two examples of the (25) channel. e results given by the decision-making block are presented in Figures 7(a) and 7(b);theoutputofthisblock with : the speed of light, 𝑑𝑑 : the𝑣𝑣 carrier𝑝𝑝 frequency. 𝑓𝑓 = ∗𝑓𝑓 , is “1” when the decision is to turn off the equalizer and “0” e time of coherence of𝑐𝑐 the channel is de�ned as the 𝑝𝑝 when the decision is to turn it on. e decision block starts period𝑐𝑐 of time where the𝑓𝑓 channel does not change, and it is to deliver the results aer the reception of frames, the time expressed in required for booting the system of decision. As we can see fortheslowchannel(Figure 7(a)), the decision3 is following (26) the state of the channel described by the BER; the equalizer 1 isturnedoffwhentheBERislessthanorequalto from In order to follow the variation𝑐𝑐 of the channel, the deci- 𝑇𝑇 = 𝑑𝑑 . the th received frame to the th received frame. We note sion time must be before the time𝑓𝑓 of coherence. Assuming −3 fr also that the decision makes some false alarms especially for to be the transmission time of one frame, then the decision 10 the frame4 numbers and ,41 in fact, although these frames making must be done aer a number of frames, , which𝑇𝑇 veri�es the following condition: are received by a BER equal to , the decision is to turn 𝑟𝑟 ontheequalizer.Butthesefalsealarmsarenotaffectingthe42 43 𝐹𝐹 −3 (27) performance of the system, because10 the BER will be under fr . Our decision method can also follow the change of 𝑇𝑇𝑐𝑐 𝐹𝐹𝑟𝑟 < . −3 𝑇𝑇 10 Journal of Computer Networks and Communications 9
ǯ ॕ\ॎक़ॎॎक़ॎǮ ö ॎक़ॎ^ ॕ\ॎक़ॎॎक़ॎǮ ॎक़ॎ^ ॕ\4॓3८4/3ॕ4/3^ ॕ\4॓ǯ3८4/3ॕ÷4/3^
4/3 ॎक़ॎ ॎक़ॎ ॎक़ॎ 4/3८ 4/3८
ங ங ॣ ॣ ॣ ॣ (a) Distribution of SNR (b) Distribution of ISI
𝑝𝑝 F 3:Distributions of the estimated metrics SNR and ISI.
𝑝𝑝 Noise
ॶ ६ ॷ ६ Equalizer $IBOOFM ् ॸ ड़
(a)
Equalizer Noise ॷ ६ ड़ ॶ ६ ॷ ६ Metrics’ estimation $IBOOFM ् ॸ Decision making ॷ ६ Without equalizing
(b) LMS Noise ड़ ॷ ६ ॶ ६ FIR for Channel ॷ ६ equalizing ् ॸ Metrics’ estimation Decision making ॷ ६ Without equalizing
: is the vector of the coefficients ड़ of the FIR equalizer (c)
F 4: (a) Conventional equalizer, (b) solution 1, and (c) solution 2.
Multipath fading components Multipath fading components 5 5 0 0 −5 −5 −10 −15 −10 −20 −15 −25 −20 −30 Components (dB) Components Components (dB) Components −35 −25 −40 −30 −45 0 5 10 15 20 25 30 35 40 45 50 0 5 10 15 20 25 30 35 40 45 50 Time (ms) Time (ms)
(a) Slow Rician channel (b) Fast Rician channel
F 5: VariationsoftheRicianchannel:changeofthe5pathsintime. 10 Journal of Computer Networks and Communications
× 10−3 BER without equalization 15 × 10−3 BER without equalization 18 16 14 10 12 10 BER
BER 8 5 6 4 2 0 0 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rician channel (b) Fast Rician channel
F 6: BER without equalizer in the Rician channel.
Decision-making results Decision-making results 2 2
1.5 1.5
1 1
0.5 0.5
0 Decision block output block Decision
0 output block Decision
−0.5 −0.5
−1 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rician channel (b) Fast Rician channel
F 7: Decision-making results for the Rician channel; “1” equalizer off, “0” equalizer on.
→ → the channel even if it is fast (Figure 7(b)), in fact this is is launched. During this time, the channel changes and the because we are taking which veri�es the constraint equalization will not be efficient. is is why in Figures 8(a) (28). and 8(b) the BER aer equalization still degraded in solution e two solutions of𝑛𝑛 con�guring 푛푛푛 the decision scenario, 1, whereas for solution 2 (Figures 9(a) and 9(b)), the BER aer discussed above, are providing the same decision results, equalization is always less than . since the same decision-making method is used. However, Although solution 1 of driving−3 the equalizer is less the equalization performance aer the decision-making dif- efficient in a variable channel, it1 allows0 to reduce the compu- fers from one solution to another. We present in Figures tational complexity more than solution 2. In fact we present 8 and 9 the BER aer the decision making scenario with the results of the computational complexity reduction in orwithouttheequalizerforbothsolutionsandforboth Table 5 which describes for each example of channel and examples of channels. We notice that the performance of for each solution the percentage of the complexity reduction the equalization in solution 2 is better than that in solution compared to the permanent use of the equalizer. We specify 1. Indeed, this is explained by the fact that in solution 1 when the equalizer is turned on, there is a period of time that, in determining the computational complexity of the during which the calculation of the equalizer’s coefficients scenario of driving the equalizer, we include the treatments
𝑊𝑊 Journal of Computer Networks and Communications 11
× 10−3 BER after the scenario of driving the equalizer in solution 1 BER after the scenario of driving the equalizer in solution 1 14 0.05
12 0.045 0.04 10 0.035 8 0.03 6 0.025 BER BER 0.02 4 0.015 2 0.01 0 0.005 0 −2 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rician channel (b) Fast Rician channel
F 8: Performance of the system aer decision making for the Rician channel with solution 1: errors of the equalizer due to its interruptions and reinitializations.
× 10−3 BER after the scenario of driving the equalizer in solution 2 × 10−3 BER after the scenario of driving the equalizer in solution 2 4 3.5 3.5 3 3 2.5
2.5 2 1.5 2
BER 1
1.5 BER 0.5 1 0 0.5 −0.5
0 −1 −1.5 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rician channel (b) Fast Rician channel
F 9: Performance of the system aer decision making for the Rician channel with solution 2: no errors of the equalizer; the BER is always . −3 < 10 that we perform to make the decisions (estimation of the in the Rice case. We can see this in Table 6 where the rate of metrics, modeling, and decision rule). time for turning off the equalizer is less than that of the Rician channel described in Table 5. We notice in Figure 13(b) that the �nal BER is sometimes 4.2.2. A Case of a Rayleigh Channel. For the simulation of this scenario in the case of a Rayleigh channel, we assume greater that , but this is not due to an error of decision. the same conditions of mobility as described in Table 4 for In fact, if we observe−3 clearly the curves, the BER is degraded the Rician channel. e two examples of the Rayleigh channel while the equalizer10 functions (decision output = 0), this that we used are presented in Figure 10.Asinthecaseofthe meansthatthisbiterrorrateisnotduetotheinter-symbol Rician channel, the results of decision making are presented interferences but rather to the strong attenuation of the path in Figures 11, 12, 13 and 14. From these �gures, we can notice (SNR degraded). Despite this, the equalizer has contributed that for the same channel’s mobility conditions, the Rayleigh to the reduction of the BER even if it remains higher than 𝑝𝑝 channel is harder than the Rician channel; there is a less . is statement �usti�es the channel evaluation that we chance of turning off the equalizer in the Rayleigh case than made−3 in developing our decision making method (Table 3) 10 12 Journal of Computer Networks and Communications
Multipath fading components Multipath fading components 5 0 5 0 −5 −5 −10 −10 −15 −15 −20 −20 −25 −25 Components (dB) Components Components (dB) Components −30 −30 −35 −35 −40 −40 0 5 10 15 20 25 30 35 40 45 50 0 5 10 15 20 25 30 35 40 45 50 Time (ms) Time (ms)
(a) Slow Rayleigh channel (b) Fast Rayleigh channel
F 10: Variations of the Rayleigh channel: change of the 5 paths in time.
BER without equalization BER without equalization 2 1 0.9 1.5 0.8 0.7 1 0.6 0.5 0.5 BER BER 0.4 0 0.3 0.2 −0.5 0.1
−1 0 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rayleigh channel (b) Fast Rayleigh channel
F 11: Variation of the BER at the receiver for the Rayleigh channel.
Statistical decision making 2 Statistical decision making 2
1.5 1.5
1 1
0.5 0.5
0 0 Decision block output block Decision Decision block output block Decision
−0.5 −0.5
−1 −1 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rayleigh channel (b) Fast Rayleigh channel
F 12: Decision-making results for the rayleigh channel; “1” equalizer off, “0” equalizer on.
→ → Journal of Computer Networks and Communications 13
T 5: Computational complexity reduction for the rician channel.
Solution 1 Solution 2 Slow channel Fast channel Slow channel Fast channel Rate of time of turning off the equalizer Percentage of the complexity reduction 80.8% 34.04% 80.8% 34.04% T 6: Computational71.99% complexity reduction25.31% for the rayleigh channel.68.15% 23.53%
Solution 1 Solution Slow channel Fast channel Slow channel Fast channel Rate of time of turning off the equalizer 2 Percentage of the complexity reduction 63.82% 17.02% 63.82% 17.02% × 10−3 BER after the scenario of driving the equalizer55.01% in solution 1 BER8.34% after the scenario of driving51.91% the equalizer in solution7.31% 1 0.7 6 0.6 5 0.5 4 0.4 3 BER
BER 0.3 2 0.2
1 0.1
0 0 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rayleigh channel (b) Fast Rayleigh channel
F 13: Performance of the system aer decision making for the rayleigh channel with solution 1: errors of the equalizer due to its interruptions and reinitializations.
× 10−3 BER after the scenario of driving the equalizer in solution 2 BER after the scenario of driving the equalizer in solution 2
2 0.7 1.5 0.6 1 0.5 0.5 0.4 0 BER BER − 0.5 0.3
−1 0.2
− 1.5 0.1 −2 0 5 10 15 20 25 30 35 40 45 50 5 10 15 20 25 30 35 40 45 50 Number of received frames Number of received frames
(a) Slow Rayleigh channel (b) Fast Rayleigh channel
F 14: Performance of the system aer decision making for the rayleigh channel with solution 2. 14 Journal of Computer Networks and Communications
Rate of the computational complexity reduction for solution 1 (ii) : the computational complexity of the added treat- 100 ments necessary for the decision making method
tr ॢ (metrics𝐶𝐶 estimation, modeling, decision rule); this ॗ 80 value depends on the width of the window of obser- vations, , considered for the decision, 60 (iii) : the total computational complexity of the sce- nario of𝑛𝑛 driving the equalizer, 𝑑𝑑 40 (iv) 𝐶𝐶 : the rate of time during which the equalizer is turned off 𝑡𝑡 20 (v) 𝑅𝑅 : the rate of the computational complexity reduc- tion. 𝑐𝑐 0 In a𝑅𝑅 period of time of a communication, during which the equalizer is turned off with a percentage of time of , the total −20 computational complexity is reduced by compared 3FEVDUJPO PG UIF DPNQVUBUJPOBM DPNQMFYJUZ 0 10 20 30 40 50 60 70 80 90 100 with the complexity of the permanent use of the𝑅𝑅𝑡𝑡 equalizer. So we can express as follows:𝑑𝑑 𝑐𝑐 5JNF PG EJTBCMJOH UIF FRVBMJ[FS ॗॲ 𝐶𝐶 𝑅𝑅 Simulation result 𝑑𝑑 eq (29) Theoretical result 𝐶𝐶 On the other hand,𝑑𝑑 the total𝑐𝑐 complexity of the scenario F 15: Computational complexity reduction with solution 1. contains the complexity𝐶𝐶 = of1−𝑅𝑅 the added𝐶𝐶 . treatments of the decision-making method and the complexity of the equalizer when it is turned on. So we can also express differently as Rate of the computational complexity reduction for solution 2 in 90 𝑑𝑑 80 𝐶𝐶 eq (30) 70 60 From (29)and(30𝑑𝑑 ), wetr conclude𝑡𝑡 that 𝐶𝐶 =𝐶𝐶 + 1−𝑅𝑅 𝐶𝐶 . ॢ 50 ॗ (31) 40 eq eq 30 We deduce then the𝑐𝑐 expressiontr of the complexity𝑡𝑡 reduction 20 as follows: 1−𝑅𝑅 𝐶𝐶 =𝐶𝐶 + 1−𝑅𝑅 𝐶𝐶 . DPNQMFYJUZ 10 0 (32) Reduction of the computational the of Reduction −10 eq 0 10 20 30 40 50 60 70 80 90 100 𝐶𝐶tr From this equation,𝑅𝑅𝑐𝑐 we=𝑅𝑅 can𝑡𝑡 − conclude. that we begin to 5JNF PG EJTBCMJOH UIF FRVBMJ[FS ॗॲ reduce the complexity when𝐶𝐶 Simulation result Theoretical result (𝑅𝑅𝑐𝑐 > 0) (33) F 16: Computational complexity reduction with solution 2. eq 𝐶𝐶tr Wenotice also that the maximum𝑅𝑅𝑡𝑡 > reduction. of the complexity for the considered communication𝐶𝐶 is concerning the act of keeping the equalizer when the signal (34) to noise ratio is degraded. eq 𝐶𝐶tr We plot in Figures𝑅𝑅15𝑐𝑐푐푐푐and=1−16 the curves. of 4.3. Computational Complexity Reduction. We are interested theoretically as in (32) and by simulations,𝐶𝐶 �rst in the case of in this section to the study of the computational complexity solution1andtheninthecaseofsolution2. 𝑅𝑅𝑐𝑐 = 𝑓𝑓𝑓𝑓�𝑡𝑡) reduction through the scenario of driving the equalizer. e For solution 1, we begin to reduce the complexity of goal is to determine, for a period of time of a communication, the receiver when we turn off the equalizer during at least from what percentage of time without the equalizer we begin of the communication period, whereas for solution to reduce the complexity, and also what is the maximum gain 2 this value is . When the receiver decides to turn in complexity. For this, we will �rst determine the theoretical 8.66%off the equalizer during the whole communication period, equation of the computational complexity reduction, and it can reduce the9.36% complexity by in solution 1 and then we will compare this with the result of simulation. in solution 2. As a result, solution 1 is better in We denote terms of computational complexity91.1% reduction; however, the 86.4%equalization’s performance in this solution is less efficient (i) eq: the computational complexity of the permanent thanthatinthecaseofsolution2mainlywhenthechannel use of the equalizer, varies quickly. 𝐶𝐶 Journal of Computer Networks and Communications 15
5. Conclusion References
eworkpresentedinthispaperisapartofthegreen [1] J. Palicot, “Cognitive radio: an enabling technology for the communication, it consists of reducing energy consumption green radio communications concept,” in Proceedings of the within the receiver by making it able to adapt dynamically to ACM International Wireless Communications and Mobile Com- the changes of its environment. For this, we are particularly puting Conference (IWCMC ’09), pp. 489–494, June 2009. interested in adapting the use of the equalizer in the receiver [2] H. L. Kazecki, S. H. Goode, D. W. Denis, J. C. Baker, K. chain according to the state of the channel. In fact, it is to L. Baum, and B. D. Mueller, Method for Channel Adaptive make the receiver able to choose to turn on or off the equalizer Detecting/Equalize, 1993. as it is necessary or not. e purpose of dispensing with this [3] Su et al., “Radio receiver with selectively disabled equalizer,” component, for a period of time, was to reduce the energy 2009, US007627030B2. consumed in the receiver chain. To achieve this objective, it [4] Furya et al., “Low power consumption receiver with adaptive was necessary that we develop a method of decision making equalizer,” 1994, US005363411A. for the receiver so it can be aware of its environment and [5] L. Husson and J. C. Dany, “A new method for reducing the able to make the right decision concerning the presence of power consumption of portable handsets in TDMA Mobile sys- the equalizer. So we de�ned a technique of decision making tems: conditional equalization,” IEEE Transactions on Vehicular Technology, vol. 48, no. 6, pp. 1936–1945, 1999. based on statistical modeling of the environment. Within this method, we de�ned two metrics as channel quality [6] L. Husson, Evaluation par le recepteur de la qualite du signal reu dans les systemes de radiocommunication avec les mobiles et indicators (SNR andISI)usedtoevaluatethestateofthe ameliorations des performances par l egalisation conditionnelle channel with respect to the intersymbol interferences and the [Ph.D. thesis], University of Paris XI, France, 1998. channel fading. ese𝑝𝑝 metrics are then statistically modeled [7] Black, M. A. Howard et al., “Communication receiver with by determining their respective densities of probability from hybrid equalizer,” 2010, US007646802B2. the sets of their estimated values. is statistical model is used [8] Porter et al., Receiver having Equalizing Demodulator and Non- in order to construct a statistical decision rule to decide to Equalizing Demodulator and Method for Controlling the Same, turn off the equalizer. is decision rule is de�ned to take 2006. into account the impact of the uncertain measures of the [9] I. J. Myung, “Tutorial on maximum likelihood estimation,” metrics on the decision thresholds. Once the decision method Journal of Mathematical Psychology, vol. 47, no. 1, pp. 90–100, developed, we applied it to adapt the use of the equalizer 2003. by proposing two solutions to drive this component. In the [10] M. Lejeune, Statistique: La orie et Ses Applications, Springer, �rst solution, the receiver decides to turn off the equalizer, 2004. according to the result of the decision rule, and decides to [11] S. M. Kay, Fundamentals of Statistical Signal Processing: Estima- turn it on by restarting it. While in the second solution, we tion eory, Prentice-Hall, 1993. kept constantly the calculation of the equalizer’s coefficients. [12] G. Montalbano, “SIR Estimation techniques,” 2011, US, By adopting the adaptive algorithm of channel estimation 7941099B2. LMS, we have simulated these two solutions in the case [13] S. Borching, Blind channel esatimation using redundant pre- of a time-varying multipath channel (Rice and Rayleigh). coding: new algorithms, analysis and theory [Ph.D. thesis], We have concluded, �rst, that the rate of reduction of California Institute of Technology, 2008. the computational complexity within the limitation of the [14] C. R. Johnson Jr., P. Schniter, T. J. Endres, J. D. Behm, D. R. equalizer use is a linear function of the percentage of time Brown, and R. A. Casas, “Blind equalization using the constant during which this component is off. Second, we have noticed modulus criterion: a review,” Proceedings of the IEEE, vol. 86, that the �rst solution to adapt the use of the equalizer reduces no. 10, pp. 1927–1949, 1998. the complexity more than the second solution; in fact, for [15] S. Bourbia, D. Le Guennec, K. Grati, and A. Ghazel, “Statistical a period of time according to the reception of 50 frames, decision making method for cognitive radio,” in Proceedings of we begin to reduce the computational complexity when the the International Conference on Telecommunications (ICT ’12), equalizer is off for at least of the total period, whereas 2012. this percentage is for the second solution. However, the equalizer in the second8.66% solution is more efficient, in fact, unlike the �rst solution,9.36% when this component is turned on itisnotrestartedbecauseofthepermanentpresenceofthe equalizer’s coefficients, this allows to avoid the delay in this operation when it begins to operate, especially when the channel varies rapidly. We notice also that the smaller the size of the equalizer, the less the delay caused by the calculation of the coefficients, and so the gap between the two solutions will be reduced. Within the same goal of reducing energy consumption in the radio receiver, we seek, in a future work, to treat other situations, of the adaptation of the receiver to the environment, that allow to reduce the computational complexity of the receiver chain. Hindawi Publishing Corporation Journal of Computer Networks and Communications Volume 2012, Article ID 427246, 10 pages doi:10.1155/2012/427246
Research Article PCA-Guided Routing Algorithm for Wireless Sensor Networks
Gong Chen, Liansheng Tan, Yanlin Gong, and Wei Zhang
Department of Computer Science, Central China Normal University, Wuhan 430079, China
Correspondence should be addressed to Liansheng Tan, [email protected]
Received 13 August 2012; Revised 24 October 2012; Accepted 11 November 2012
Academic Editor: Hongxiang Li
Copyright © 2012 Gong Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
An important performance concern for wireless sensor networks (WSNs) is the total energy dissipated by all the nodes in the network over the course of network lifetime. In this paper, we propose a routing algorithm termed as PCA-guided routing algorithm (PCA-RA) by exploring the principal component analysis (PCA) approach. Our algorithm remarkably reduces energy consumption and prolongs network lifetime by realizing the objective of minimizing the sum of distances between the nodes and the cluster centers in a WSN network. It is demonstrated that the PCA-RA can be efficiently implemented in WSNs by forming a nearly optimal K-means-like clustering structure. In addition, it can decrease the network load while maintaining the accuracy of the sensor measurements during data aggregating process. We validate the efficacy and efficiency of the proposed algorithm by simulations. Both theoretical analyses and simulation results demonstrate that this algorithm can perform significantly with less energy consumption and thus prolong the system lifetime for the networks.
1. Introduction sumption, prolonging the network lifetime, and increasing the network throughput. Network researchers have studied a Wireless sensor networks (WSNs) [1] consist of battery- great variety of routing protocols in WSNs differing based on powered nodes which inherit sensing, computation, and the application and network architecture. As demonstrated wireless communication capabilities. Although there have in [2, 3], it can be classified into four categories: flit, been significant improvements in processor design and hierarchical clustering, location-based routing, and QoS- computing issues, limitations in battery provision still exist, based routing. The current routing protocols have their bringing energy resource considerations as the fundamental own design trade-offs between energy and communication challenge in WSNs. Consequently, there have been active research efforts devoted to lifting the performance limi- overhead savings, as well as the advantages and disadvantages tations of WSNs. These performance limitations include of each routing technique. network throughput, energy consumption and, network life- As per the representative hierarchical clustering pro- time. Network throughput typically refers to the maximum tocol, low energy adaptive clustering hierarchy (LEACH) amount of packets that can be successfully collected by the [4] has simplicity, flexibility, and scalability because its cluster heads (CHs) in the network, energy consumption manipulations rely on randomized rotation of the cluster refers to the minimize energy dissipation that nodes in heads (CHs), but its features of unregulated distribution, the network consume, and network lifetime refers to the unbalanced clustering structure, uniform initial energy, maximum time limit that nodes in the network remain alive and so on, hinder its performance. Based on LEACH, until one or more nodes drain up their energy. there are many variants, such as [5–8]. LEACH-E [5] Theroutingalgorithmshavebeenspecificallydesigned more likely selects the nodes with higher energy as the for WSNs because the energy optimization is an essential CHs. LEACH-C [5] analytically determines the optimum design issue. A good routing scheme is helpful in improving number of CHs by taking into account the energy spent these performance limits such as reducing the energy con- by all clusters. PEGASIS [6], TEEN [7], and ATEEN [8] 2 Journal of Computer Networks and Communications improve the energy consumption by optimizing the data networks, namely, a base station (BS), the cluster-head nodes transmission pattern. HEED [9] is a complete distributed (CHNs), and the ordinary sensor nodes (OSNs). routing protocol which has different clustering formations For each cluster of sensor nodes, there is one a CHN, and cluster-heads selecting measures. These protocols have which is different from an OSN in terms of functions. The many restrictive assumptions and applicable limitations, so primary functions of a CHN are (1) data aggregation for it has great improvement space and extensibility. The rapid data measurements from the local clusters of OSNs and development of wireless communications technology, and (2) relaying the aggregated information to the BS. For data the miniaturization and low cost of sensing devices, have fusion, a CHN analyzes the content of each measurement accelerated the development of wireless sensor networks it receives and exploits the correlation among the data (WSNs) [10, 11]. As in [12], Zytoune et al. proposed a measurements. An CHN has a limited lifetime, so we uniform balancing energy routing protocol (UBERP). The need consider rotating the CHNs to balance to the energy BP K-means [13]andBSK-means [14] can improve the consumption. structure of clusters and perform better load-balance and less The third component is the BS. We assume that there is energy consumptions. HMP-RA [15] proposes a solution to sufficient energy resource available at the BS and thus there address this issue through a hybrid approach that combines is no energy constraint at the BS. two routing strategies, flat multihop routing and hierarchical multihop routing. ESCFR and DCFR can map small changes 2.2. The Energy Consumption Model. We compute the energy in nodal remaining energy to large changes in the function consumption using the first-order radio model [5]. The value and consider the end-to-end energy consumption and equations, which are used to calculate transmission costs and nodal remaining energy [16]. Biologically inspired intelligent receiving costs for an L-bit message to cross a distance d,are algorithms build a hierarchical structure on the network shown below, for different kinds of traffic, thus maximizing network ⎧ ⎪ 2 utilization, while improving its performance [17]. In the case ⎨⎪L Eelec + εfsd , d 2.1. The Network Model. Let us consider a two-tier architec- 3.1. Notations. Let X ={x1, x2, ..., xn} represents the ture for WSNs. Figure 1 shows the physical network topology location coordinate matrix of a set of n sensors, Y = for such a network. There are three types of nodes in the {y1, y2, ..., yn} represents the centered data matrix, where Journal of Computer Networks and Communications 3 Ordinary sensor nodes (OSNs) Base station (BS) Cluster-head nodes (CHNs) Figure 1:Physicaltopologyfortwo-tierwirelesssensornetworks. = − yi xi x, which defines the centered distance vector column errors. We define the squared distance between sensor nodes = wise, and x i xi/n is the mean vector column wise of X and cluster centers as matrix. K Let M ={m1, m2 ···mp} be a group of measurements 2 JK = (xi − mk) , (5) collecting from the sampling period. Each sensor generates a k=1 i∈Ck stream of data. Let DN×P be a matrix with elements Dij,1 = i n,1 j p, being the measurement taken by sensor where mk xi∈Ck xi/nk is the center of cluster Ck and nk i at point j.LetQN×P be a centered matrix with elements is the number of sensor nodes in Ck. Given the fact that by = − = qij dij di./n, di. j dij. minimizing the distance between sensor nodes and cluster centers, the energy consumption can be effectively reduced. Our clustering algorithm is thus designed to be capable of 3.2. PCA-Guided Clustering Model. We define the equation minimizing the above metric J . for the SVD of matrix Y [22] as follows: K For the sake of convenience, let us start with the case of K = 2. To obtain the explicit expression for Jk, letting = Y λkukvk. (2) 2 = − k d Cp, Cl xi xj (6) i∈Cp j∈Cl The covariance matrix (ignoring the factor 1/n)is be the sum of squared distances between two clusters Cp and C , after some algebra one obtains the following: − T − = T l (xi x) (xi x) Y Y. (3) i d(C1, C1) d(C2, C2) J2 = + , (7) 2n1 2n2 The principal components vk are eigenvectors satisfying where n1 and n2 are the numbers of sensor nodes in C1 and T C2, n is the total number of sensor nodes; therefore, we get T 2 Y uk Y Yvk = λ vk, vk = . (4) n = n + n . k λ2 1 2 k If denoting T 3.2.1. K-Means Clustering Model. According to [23, 24], we i y yi d(C1, C1) d(C2, C2) d(C1, C2) y2 = i = + + , (8) find the PCA dimension reduction automatically by per- n 2n2 2n2 n2 forming data clustering according to the K-means objective function [25, 26]. Using K-means algorithm, it can form a = n1n2 d(C1, C2) − d(C1, C1) − d(C2, C2) JD 2 2 2 ,(9) better cluster structure by minimizing the sum of squared n n1n2 n1 n2 4 Journal of Computer Networks and Communications we thus have 3.2.2. PCA-Guided Relaxation Model. In [24], it proves that 1 d(C , C ) d(C , C ) d(C , C ) the relaxation solution of JD can get via the principal ny2 − J = n 1 1 + 2 2 + 1 2 2 D 2n2 2n2 n2 component. It sets the cluster indicator vector to be 1 ( , ) ( , ) ⎧ − n1n2 d C1 C2 − d C1 C1 ⎪ n 2 2 ⎪ 2 ∈ 2 n n1n2 n ⎨ ,ifi C1 1 nn1 (13) q(i) = ⎪ n − d(C2, C2) ⎩⎪− 1 ∈ 2 ,ifi C2. n2 nn2 d(C , C ) d(C , C ) d(C , C ) The indicator vector satisfies the sum-to-zero and nor- = 1 1 + 2 2 + 1 2 malization conditions. Consider the squared distance matrix 2n 2n n 2 T H = (hij), where hij =xi − xj . q Hq =−JD is easily − 2n1n2d(C1, C2) n1n2d(C1, C1) observed. + 2 2nn1n2 2nn1 n1n2d(C2, C2) (1) The First Relaxation Solution. Let q take any value in + 2 2nn2 [−1, 1]; the solution of minimization of J(q) = qT Hq/qT q is given by the eigenvector corresponding to the lowest = d(C1, C1) n1n2d(C1, C1) = + 2 eigenvalue of the equation Hz λz. 2n 2nn1 d(C , C ) n n d(C , C ) + 2 2 + 1 2 2 2 2 (2) TheSecondRelaxationSolution. Let H = (hij), where the 2n 2nn2 element is given by d(C , C ) 2n n d(C , C ) + 1 2 − 1 2 1 2 n 2nn1n2 n d(C , C ) n d(C , C ) = 1 1 1 + 2 1 1 hi. h.j h.. 2nn1 2nn1 hij = hij − − + , n n n2 (14) n d(C , C ) n d(C , C ) + 2 2 2 + 1 2 2 2nn2 2nn2 (n1 + n2)d(C1, C1) (n2 + n1)d(C2, C2) = = = = + in which, hi. j hij, h.j i hij, h.. ij hij. 2nn1 2nn2 T T After computing, we have q Hq = q Hq =−JD, then d(C1, C1) d(C2, C2) relaxing the restriction q, the desired cluster indicator vector = + = J2. 2n1 2n2 is the eigenvector corresponding to the lowest eigenvalue of (10) Hz = λz. That is 2 1 J2 = ny − JD, (11) (3) The Third Relaxation Solution. With some algebra, we 2 can obtain H =−2Y T Y. Therefore, the continuous solution where y2 is a constant and it denotes the distance between for cluster indicator vector is the eigenvector corresponding to the largest eigenvalue of the covariance matrix Y T Y which the sensor nodes and the center for all nodes; thus min (JK ) by definition, is precisely the principal component v1. is equivalent to max (JD), and because the two resulting clusters are as separated and compact as possible. Because the averaged intracluster distance is greater than the sum of the 3.2.3. PCA-Guided Clustering Model. According to the men- averaged intercluster distances, that is tioned above, for K-means clustering where K = 2, the continuous solution of the cluster indicator vector is the d(C1, C2) d(C1, C1) d(C2, C2) − − > 0. (12) principal component v , that is, clusters C and C are given n n n2 n2 1 1 2 1 2 1 2 by From (9), it is seen that JD is always positive. This is to say, evidenced from (11), for K = 2 minimization of cluster ={ | ≤ } ={ | } objective function JK is equivalent to maximization of the C1 i v1(i) 0 , C2 i v1(i) > 0 . (15) distance objective JD, which is always positive. When K>2, we can do a hierarchical divisive clustering, = where each step using the K 2 is a clustering procedure. We can consider using PCA technology to clustering sensor This procedure can get an approximated K-means clustering nodes for WSNs. It near minimizes the sum of the distances structure. between the sensor nodes and cluster centers. Journal of Computer Networks and Communications 5 Example 1. Let us assume in a WSN there are 20 sensors where distributed in the network. X represents the 2D coordinate matrix. = T Z w1 Q. (20) X = 29.471, 4.9162, 69.318, 65.011, 98.299, 55.267, 40.007, 19.879, 62.52, 73.336, The CHs only send three packets about Z, wk, and the mean vector column-wise G of D matrix to the base station: 37.589, 0.98765, 41.986, 75.367, 79.387, 91.996, 84.472, 36.775, 62.08, 73.128; = = di. = (16) G gi , di. dij. (21) 19.389, 90.481, 56.921, 63.179, 23.441, p j 54.878, 93.158, 33.52, 65.553, 39.19, Because the mean vector column-wise G is subtracted by 62.731, 69.908, 39.718, 41.363, 65.521, the CHs prior to the aggregation of its value, the base station can add back after the computation of the approximation. 83.759, 37.161, 42.525, 59.466, 56.574 . Example 2. If the CH collects the matrix D as follow: Compute the eigenvector of the matrix, Y T Y, that is, the principal component v : 1 ⎡ ⎤ 20.320.220.820.320.320.420.520.4 T = − − ⎢ ⎥ v1 0.11623, 0.47282, 0.10624, 0.058301, ⎢20 4203206204204205206205⎥ ⎢ ...... ⎥ ⎢ ⎥ ⎢20.220.120.420.220.220.320.420.3⎥ 0.40896, 0.0013808, −0.20539, −0.22552, ⎢ ⎥ ⎢20.320.220.820.320.320.420.520.4⎥ ⎢ ⎥ ⎢20.320.220.820.320.320.420.520.4⎥ 0.033439, 0.17823, −0.15446, −0.45626, D = ⎢ ⎥, (17) ⎢20.420.320.620.420.420.520.620.5⎥ ⎢ ⎥ ⎢ ⎥ − ⎢20.220.120.420.220.220.320.420.3⎥ 0.067391, 0.18908, 0.16501, 0.22147, ⎢ ⎥ ⎢20.320.220.820.320.320.420.520.4⎥ ⎣20 3202208203203204205204⎦ 0.2697, −0.11445, 0.04397, 0.13673 ...... 20.220.120.420.220.220.320.420.3 (22) If v1(i) 0, sensor i belongs to C1, otherwise it belongs to C2. We depicted the above clustering results into Figure 2. When K>2, we do a hierarchical divisive clustering, Then the CH can compute the matrix Q and the principal where each step uses the K = 2 clustering procedure. components w1, In summary, a PCA-guided clustering model can be used to form a nearly optimal K-means-like clustering structure. = T = − − Z w1 Q 0.26306, 0.56555, 0.93394, 3.3. PCA-Guided Data Aggregating Model. As mentioned −0.26306 −0.26306, 0.039433, above, DN×P represents the data measurement matrix col- lected from the sampling period by the cluster heads. Q is acenteredmatrixaboutD. 0.34193, 0.039433 , The vector {wk}1≤ ≤ is the principal components k N = satisfying w1 0.39468, 0.21031, 0.21031, 0.39468, T QQ wk = λkwk. (18) 0.39468, 0.21031, 0.21031, 0.39468, Because in most cases there exist high correlations 0.39468, 0.21031 , between sensor measurements, good approximations to sensor measurements can be obtained by relying on few prin- G = 20.4, 20.462, 20.262, 20.4, 20.4 cipal components. The first principal component accounts for as much of the variability in the data as possible, so 20.462, 20.262, 20.4, 20.4, 20.262 , we can find the first principal component vector w1,such (23) that their projection data can effectively express the original measurements. Approximations Q to Q are obtained by then the packet about Z, w1,andG are delivered to the base = T = Q w1w1 Q w1Z, (19) station. The base station will compute the approximation Q. 6 Journal of Computer Networks and Communications After adding back the subtracted mean value G,wecan obtain: ⎡ ⎤ 20.296 20.177 20.769 20.296 20.296 20.414 20.535 20.416 ⎢ ⎥ ⎢20 407 20 344 20 659 20 407 20 407 20 471 20 534 20 471⎥ ⎢ ...... ⎥ ⎢ ⎥ ⎢20.207 20.144 20.459 20.207 20.207 20.271 20.334 20.271⎥ ⎢ ⎥ ⎢20.296 20.177 20.769 20.296 20.296 20.414 20.535 20.416⎥ ⎢ ⎥ ⎢20.296 20.177 20.769 20.296 20.296 20.414 20.535 20.416⎥ D = ⎢ ⎥. (24) ⎢20.407 20.344 20.659 20.407 20.407 20.471 20.534 20.471⎥ ⎢ ⎥ ⎢ ⎥ ⎢20.207 20.144 20.459 20.207 20.207 20.271 20.334 20.271⎥ ⎢ ⎥ ⎢20.296 20.177 20.769 20.296 20.296 20.416 20.535 20.416⎥ ⎣20.296 20.177 20.769 20.296 20.296 20.416 20.535 20.416⎦ 20.207 20.144 20.459 20.207 20.207 20.271 20.334 20.271 4. PCA-Guided Routing Algorithm According to the average energy dissipated per round, Solution Strategies the scope of the clusters’ number can be estimated when it is the most energy efficient. In [4, 13, 14], the authors In Section 3, we have actually proposed a PCA-guided clus- use the average energy dissipated per round to obtain the tering and data aggregating model for routing optimization optimal cluster number. Based on this methodology, here in problem in WSNs by theoretical analyses and numerical this paper, we study the appropriate upper limit of the cluster examples. The following steps provide an overview of the nodes to perform the clusters splitting and thus extend this solution strategy. methodology. 4.1. Initialization Stage. In the first stage, we assume that a Example 3. If we assume the number of sensor nodes is 100, set of N location coordinates are gathered at the base station. the average energy dissipated per round as the number of clusters is varied between 1 and 20. Figure 3 shows that it The base station computes the first principal component v1. is most energy efficient when there are between 3 and 5 The two clusters C1 and C2 are determined via v1 according to (15) by the BS. clusters in the 100-node network. We define that the most appropriate number of clusters is varied from 3 to 5 because 4.2. Clusters Splitting Stage. When the number of sensor (Eround(3) − Eround(min)) nodes is huge, two clusters are not enough and can induce the < 0.03, Eround(min) energy consume rapidly, considering splitting these clusters (28) whose memberships are more than the CH can support. (E (5) − E (min)) round round < 0.03. If there are K clusters, there are on average N/K nodes per Eround(min) cluster (one CH node and non-CH nodes). We define that We obtain that the appropriate upper limit of the cluster Ave = N/K. (25) nodes is 100/3 = 34. If the number of cluster nodes is more than 34, the PCA- We can estimate the average energy dissipated per round guided clustering algorithm will implement to split it. to get the most energy efficient number of the clusters as follows: 4.3. Cluster Balancing Stage. We use the BS running the PCA- guided clustering algorithm to divide sensor nodes based Eround = k(ECH + Enon-CH) on the geographical information. We get K clusters from N N nodes in the field rapidly and form better clusters by = k lE − 1 + alE + alε d4 elec k elec mp toBS (26) dispersing the CHs throughout the network. Now let us introduce the basic idea of the cluster N − 2 balancing stage. Above, we get the number of clusters if + 1 lEelec + lεfsdtoCH . K k there are N nodes. We define the average node number per cluster as Ave. The cluster-balanced step is added in each The notation and definition of the parameters in (26)are iteration process. If |C | > Ave, 1 ≤ j ≤ K, the BS computes described as Table 1. j dist(s , u ), where s ∈ C ,j = q and |C | < Ave. This means We can get i q i j / q to compute the distances between the nodes and each cluster 2 2 center whose cluster’s node number is less than Ave. The = 4 M N − M Eround l (2N + k)Eelec +3kεmpdtoBS + εfs εfs . BS gets si if its value is minimum and adjusts the node into 2π k 2π the corresponding cluster computed. After implementing the (27) cluster-balanced step, the BS limit the node number in each Journal of Computer Networks and Communications 7 Table 1: Parameter description. Parameters Head description k The number of the clusters N Thetotalnumberofthesensornodes Eelec The energy consumption per bit when sending and receiving l The sending data bit εmp/εfs The energy consumption about the amplifier a The data aggregating rate. It is application specific, where we assume a = 3asmentionedinSection 2. = dtoBS The average distance between the CHs and the BS. We assume it 75 m The average distance between the CHs and the non-CH nodes. From [5], we obtain d = (1/2π)(M2/k), in which, M d toCH toCH denotes the area of this field. 100 0.14 90 0.13 80 0.12 70 0.11 60 C1 C2 0.1 50 K = 3 0.09 Kopt = 4 40 0.08 30 energy disspiation per round Average 20 2 4 6 8 10 12 14 16 18 20 Number of clusters 10 0 102030405060708090100 Figure 3: Average energy dissipation per round with varying the number of clusters. Figure 2: The clustering structure for 20 sensor nodes. rank the matrix Y for each cluster and section the sensor nodes which is the nearest to the cluster centers. cluster and change the clusters unequal distribution in the 4.5. Data Aggregating Stage. The sensor nodes begin to space of nodes originally. transfer the data to the cluster heads after finishing the cluster formation. The cluster heads collect the measurements from Example 4. Figure 4 gives an example to illustrate how the the sensor nodes and then compute the first principal cluster-balanced step works. In this example, if we only component w1 (as (18)), the mean vector G (as (21)), and consider the geographical information of sensor nodes while Z (as (20)). They can be delivered to the base station with using PCA-guided splitting algorithm, the sensor nodes s1 a constant packet size for each cluster head. At last, the base to s1 should belong to the C1. However, the nodes in C1 are station will compute the approximate measurements by these more than Ave(=5). Thus, this scenario motivates the cluster- packets. balanced step. To have a balance among all the clusters, in our method, we suggest that the sensor s6 should be grouped into 4.6. The Description for PCA-Guided Routing Algorithm. The C2 because its distance is nearest to C2. We obtain the final procedure taken by the base station is as follows. balanced cluster structure by a serial standard PCA-guided splitting stage and the cluster balancing stage. Step 1: compute the first principal component v1, Step 2: according to (15), the two clusters C1 and C2 are determined via v1. 4.4. Cluster Heads Selecting Stage. After the base station Step 3: compute Eround and get the appropriate upper divides the appropriate clusters using PCA technique, it limit of the cluster nodes. needs to select the optimal cluster heads in these clusters. Step 4: while the cluster node number are more than Assume that the initial energy is same, the base station can the appropriate upper limit. 8 Journal of Computer Networks and Communications S7 C2 S9 S1 S3 S6 S8 S10 S4 S2 C1 S5 Figure 4: An example of the cluster balancing stage. Step 5: compute a new v1 for the cluster. 100 Step 6: repeat Step 2 and Step 3. 90 Step 7: end 80 70 Step 8: if needed, implement the cluster balancing stage. 60 Step 9: select the cluster heads. 50 40 Step 10: compute w1 (according to (18)), G (accord- ing to (21)), and Z (according to (20)) for the 30 approximate measurements. 20 10 5. Simulation Results 0 0 20 40 60 80 100 To evaluate the performance of PCA-RA, we simulate it, LEACH and LEACH-E, using a random 100-node network. Figure 5: The clustering structure for using LEACH. The BS is located at (50, 150) in a 100 × 100 m2 field. Figures 5 and 6 show the clustering structure for using LEACH and PCA-RA. Comparing Figures 5 and 6, one finds Note that the survey nodes in each round are NSi;each that each cluster is as compact as possible, and the cluster node can send Di data. Then, the maximum throughput can heads locate more closely to the cluster centers by using PCA- be expressed as follows; RA. This gives us an intuition that it is more efficient to balance the load of network and to even distribute the nodes T max Throughput = NS · D . (29) among clusters by using PCA-RA. PCA-RA i i i=1 The benefits of using PCA-RA are further demonstrated in Figures 7 and 8, where we compare the network per- From Figure 7, the Tmax for PCA-RA are more than the formance of network lifetime and throughput under the Tmax for LEACH and LEACH-E. Then, ThroughputPCA-RA > PCA-RA with that under LEACH and LEACH-E. Figure 7 ThroughputLEACH and ThroughputPCA-RA > Through- shows the total number of nodes that remain alive over the putLEACH-E. simulation time, while the first dead node remains alive for For example, under the given test data, there are 60.456∗ a more long time in PCA-RA, this is because PCA-RA takes 103 bits data sent in whole network lifetime with PCA-RA. into account the structure of clusters and the location of the And there are 33.394 ∗ 103 bits and 28.235 ∗ 103 bits by cluster heads. Figure 8 shows that PCA-RA sends much more using LEACH-E and LEACH, respectively. The mathematics data in the simulation time than LEACH and LEACH-E. demonstrates that PCA-RA has 80.01% increase about Journal of Computer Networks and Communications 9 100 100 90 90 80 80 70 70 60 60 50 50 40 40 Throughput 30 30 20 20 10 10 0 0 0 50 100 150 200 250 300 350 400 0 20 40 60 80 100 Rounds Figure 6: The clustering structure for using PCA-RA. LEACH LEACH-E PCA-RA 100 Figure 8: Throughput using LEACH, LEACH-E, and PCA-RA. 90 80 Table 2: A numerical example. 70 60 Parameters K-means PCA-RA 50 Square error 34392.980 38405.656 The first node dead time 88 rounds 99 rounds 40 30 The number ofThe number survive nodes 20 In Figure 9, we simulate the sensor nodes collecting the 10 measurements about temperature in some regions. Assume that the base station receive the packets from the cluster 0 0 50 100 150 200 250 300 head in two minutes interval. Figure 9 demonstrates the Rounds approximations obtained by the base station about a certain sensor node in some intervals. LEACH LEACH-E PCA-RA 6. Conclusions Figure 7: System lifetime using LEACH, LEACH-E and PCA-RA. In this paper, we propose the PCA-guided routing algorithm for WSNs. By disclosing the connection between PCA and K-means, we design a clustering algorithm by utilizing PCA throughput compared with LEACH-E and 114.12% increase technique which efficiently develops a clustering structure in about throughput compared with LEACH. WSNs. Moreover, as a compression method, we demonstrate PCA-RA is a centralized algorithm, and the complexity that the PCA technique can be used in data aggregation for and communication cost of PCA-RA mostly happen in BS. WSNs as well. We establish the explicit procedure of PCA- About the balance structure stage, we think the effect on time guided routing algorithm for WSNs by incorporating PCA complexity is small and consider that the time complexity is technique into both the data aggregating and routing process. comparable to LEACH-C. The advantages of the proposed algorithm are demonstrated Table 2 displays the network lifetime (in terms of the time through both theoretical analyses and simulation results. that the first node becoming dead) and the resulted square The simulation results show that the PCA-guided routing error function of the senor node structure under K-means algorithm significantly reduces the energy consumption, algorithms and PCA-RA. prolongs the lifetime of network, and improves network From Table 2, we can find that K-means algorithm can throughput when compared with LEACH and LEACH-E. get a minimum square error. Because of the cluster-balanced Further, it keeps the accuracy about the measurements while step, PCA-RA can get a bigger square error, but the sensor reducing the network load. nodes can survive a longer time. This implies that one can Future research will focus on the distributed strategies reach a certain tradeoff between the total spatial distance of of PCA-guided data aggregation and will investigate the sensor structure and the network lifetime. The suboptimal performance of PCA-RA with different values of parameter solution in PCA-RA can achieve such tradeoff. K. 10 Journal of Computer Networks and Communications ffi 20.34 [9] O. Younis and S. Fahmy, “HEED: a hybrid, energy-e cient, distributed clustering approach for ad hoc sensor networks,” 20.33 IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366– 20.32 379, 2004. 20.31 [10] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network 20.3 survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. 20.29 [11] M. Tubaishat and S. Madria, “Sensor networks: an overview,” 20.28 Temperature IEEE Potentials, vol. 22, no. 2, pp. 20–23, 2003. 20.27 [12] O. Zytoune, M. El Aroussi, and D. Aboutajdine, “A uniform 20.26 balancing energy routing protocol for wireless sensor net- works,” Wireless Personal Communications,vol.55,no.2,pp. 20.25 147–161, 2010. 20.24 [13] L. S. Tan, Y. L. Gong, and G. Chen, “A balanced parallel 2 4 6 8 10 12 14 16 18 20 22 clustering protocol for wireless sensor networks using K- NodeID means techniques,” in Proceedings of the IEEE 2nd Interna- tional Conference on Sensor Technologies and Applications,pp. Approximations 300–305, Cap Esterel, France, August 2008. Actual results [14] Y. L. Gong, G. Chen, and L. S. Tan, “A balanced serial K-means Figure 9: Approximation obtained for the sensor nodes. based clustering protocol for wireless sensor networks,” in Proceedings of the 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, October 2008. Acknowledgments [15] A. Abdulla, H. Nishiyama, and N. Kato, “Extending the life- time of wireless sensor networks: a hybrid routing algorithm,” The work described in this paper was supported by the Computer Communications, vol. 35, no. 9, pp. 1056–1063, National Natural Science Foundation of China under Grant 2012. no. 61070197 and by self-determined research funds of [16] A. F. Liu, J. Ren, X. Li, and Z. C. Xuemin, “Design principles CCNU from the colleges’ basic research and operation of and improvement of cost function based energy aware routing MOE under Grant CCNU11A01017. algorithms for wireless sensor networks,” Computer Networks, vol. 56, no. 7, pp. 1951–1967, 2012. [17] L. Cobo, A. Quintero, and S. Pierre, “Ant-based routing References for wireless multimedia sensor networks using multiple QoS metrics,” Computer Networks, vol. 54, no. 17, pp. 2991–3010, [1] I. F. Akyildiz, W. L. Su, Y. Sankarasubramaniam, and E. 2010. Cayirci, “A survey on sensor networks,” IEEE Communications [18] S. He, J. Chen, Y. Sun, D. K. Y. Yau, and N. K. Yip, “On optimal Magazine, vol. 40, no. 8, pp. 102–114, 2002. information capture by energy-constrained mobile sensors,” [2] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wire- IEEE Transactions on Vehicular Technology,vol.59,no.5,pp. less sensor networks: a survey,” IEEE Wireless Communications, 2472–2484, 2010. vol. 11, no. 6, pp. 6–28, 2004. [19] X. Cao, J. Chen, C. Gao, and Y. Sun, “An optimal control [3] Y. Tang, M. T. Zhou, and X. Zhang, “Overview of routing method for applications using wireless sensor/actuator net- protocols in wireless sensor networks,” Journal of Software, vol. works,” Computers and Electrical Engineering,vol.35,no.5, 17, no. 3, pp. 410–421, 2006. pp. 748–756, 2009. [4] W. Heinzelman, A. Chanrakasan, and H. Balakrishnan, [20] J. Shlens, “A tutorial on principal component analysis,” “Energy-efficient communication protocol for wireless micro- December 2005, http://www.snl.salk.edu/∼shlens/pca.pdf. sensor networks,” in Proceedings of the 33rd Hawaii Interna- [21] D. P. Berrar, W. Dubitzky, and M. Granzow, in APractical tional Conference on System Sciences, vol. 2, pp. 1–10, January Approach to Microarray Data Analysis, pp. 91–109, Norwell, 2000. Mass, USA, 2003. [5] W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, [22] G. Golub and C. Van Loan, Matrix Computation,Baltimore, “An application-specific protocol architecture for wireless Md, USA, 3rd edition, 1996. microsensor networks,” IEEE Transactions on Wireless Com- [23] H. Zha, C. Ding, M. Gu, X. F. He, and H. Simon, “Spectral munications, vol. 1, no. 4, pp. 660–670, 2002. relaxation for K-means clustering,” in Proceedings of the [6] S. Lindsey and C. Raghavendra, “PEGASIS: power-efficient Advances in Neural Information Processing Systems (NIPS ’01), gathering in sensor information systems,” in Proceedings of the vol. 14, pp. 1057–1064, 2002. IEEE Aerospace Conference, vol. 3, pp. 1125–1130, 2002. [24] C. Ding and X. F. He, “K-means clustering via principal com- [7] A. Manjeshwar and D. P. Agarwal, “TEEN: a routing protocol ponent analysis,” in Proceedings of the International Conference for enhanced efficiency in wireless sensor networks,” in on Machine Learning (ICML’04), p. 29, Alberta, Canada, July Proceedings of the 15th International Conference on Parallel and 2004. Distributed Processing Symposium, pp. 2009–2015, April 2002. [25] S. P. Lloyd, “Least squares quantization in PCM,” IEEE [8] A. Manjeshwar and D. P.Agarwal, “APTEEN: a hybrid protocol Transactions on Information Theory, vol. 28, no. 2, pp. 129– for efficient routing and comprehensive information retrieval 137, 1982. in wireless sensor networks,” in Proceedings of the 15th [26] J. Ham and M. Kamber, Data Mining: Concepts and Tech- International Conference on Parallel and Distributed Processing niques, Morgan Kaufman Publishers, 2nd edition, 2006. Symposium, pp. 195–202, 2002. Hindawi Publishing Corporation Journal of Computer Networks and Communications Volume 2012, Article ID 438654, 14 pages doi:10.1155/2012/438654 Research Article Performance Analysis of the IEEE 802.11s PSM Mirza Nazrul Alam,1 Riku Jantti,¨ 1 Jarkko Kneckt,2 and Johanna Nieminen3 1 Department of Communications and Networking, Aalto University School of Electrical Engineering, Otakaari 5A, 02150 Espoo, Finland 2 Nokia Corporation, Nokia Research Center, Otaniementie 19b, 02150 Espoo, Finland 3 TeliaSonera, Sturenkatu 16, 00510 Helsinki, Finland Correspondence should be addressed to Mirza Nazrul Alam, mirza.alam@aalto.fi Received 15 June 2012; Accepted 18 October 2012 Academic Editor: Krishna Sayana Copyright © 2012 Mirza Nazrul Alam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. With the introduction of IEEE 802.11 power save mode (PSM), a lot of work has been done to enhance the energy saving ability of the wireless nodes. The ultimate goal of the research is to make the networking equipment carbon neutral and prolong the lifetime of the energy limited device for various applications; in some cases it is a trade-off between energy efficiency and delay. However, few studies have been made until now in the area of IEEE 802.11s based link specific power mode. The essence of this method is the ability of a node to maintain different power modes with its different peer nodes at the same time. A new peer service period (PSP) mechanism is also proposed in IEEE 802.11s amendment for transmitting to a receiver operating in PSM. In this paper the performance of the link specific power mode is studied for a single- and a multilink network in terms of energy, delay throughput, and sleep duration. It is found that at small load the energy saving could be as high as eighty percent when compared with the active mode operation. A stochastic model, based on discrete time discrete state Markov chain, is developed for one peer link operation to study the system behavior closely during PSM operation. 1. Introduction a significant portion of the total energy consumption. Therefore in PSM, the node avoids unnecessary operation From the last decade, the deployment of mobile wireless in idle state and when a node neither receives nor transmits devices has been rising by leaps and bounds in varieties it switches to the sleep state. The sleep state consumes the of applications, such as in data access purpose, in wireless lowest amount of energy. As an example, the current drawn automation and control, making Voice over Internet Pro- by the Lucent IEEE 802.11 WaveLan card, for transmit, tocol (VoIP) calls, and in other QoS sensitive applications. receive, idle, and sleep modes is 284, 190, 156, and 10 mA, However, these mobile devices are battery powered and respectively [1]. In basic PSM operation the destined packets have limited amount of operational time. As the batteries are temporarily buffered by the transmitter station (STA) ffi are limited resource of energy, devising an e cient energy and are later delivered to the destination. The packets are saving protocol is now a critical issue for battery-constrained transmitted in burst at some agreed-upon intervals. When wireless devices. Generally, a significant amount of energy the queue of the transmitter STA becomes empty, it switches of a wireless node is dissipated in wireless radios. During to doze sate. normal operation a radio typically undergoes the following With the introduction of IEEE 802.11 PSM operation three states: transmitting, receiving, and idle state. The [2], a lot of work has been done to reduce the energy transmitting state consumes the highest amount of energy consumption of the nodes while maintaining the QoS for since the major portion of the energy is dissipated in power variousapplications[3–5]. However, few studies have been amplifier. In the idle state the radio obtains transmission made until now in the area of IEEE 802.11s based link specific opportunities (TXOPs) and is capable to start receiving the power mode. In this scheme, a mesh STA creates links with transmissions. The idle state consumes a little bit less energy peer mesh STAs and maintains a link specific power mode than receiving state but in the long run this state contributes towards each peer. A mesh STA also tracks the power mode 2 Journal of Computer Networks and Communications of each peer mesh STA and exchanges data frames with only It is assumed in both [11, 12] that the polling message from peer mesh STAs. Three link specific power modes are defined the STA has negligible impact and the AP always transmits and they are active, light sleep, and deep sleep. The power a fixed amount of packets within one beacon interval. Chao modes of peerings are independent and a mesh STA may et al. [1]andMemarzadehetal.[13]proposedaquorum operate in different power modes for each peering [6]. A peer based energy conserving protocol for a single hop MANET. service period (PSP), an agreed contiguous time period, is A quorum set is a set of time frames wherein a node must used to exchange buffered frames in a link if the receiver STA wake up. Any two nodes can wake up and meet each other at operates in PSM; that is, it operates in light sleep or in deep some time frame defined in the set. During the nonquorum sleep mode for the link. The IEEE 802.11s has proposed its time frames, nodes are allowed to remain in sleep state to own guideline to initiate, maintain, and terminate a PSP. save their energy. Lee and Kim [14] used the Kalman filter to In this paper the performance of the IEEE 802.11s predict the best Announcement Traffic Indication Message PSM for one peer link operation in a single 20 MHz (ATIM) window size to increase the time spent in doze state. channel is first studied both numerically and analytically. Almost all the sleep/wake-up based power saving Several mathematical models are developed to validate the schemes that have been proposed yet mainly address the simulation output such as the batch size, packet delay, sleep following aspects of the IEEE 802.11 PSM. These are the duration, and energy for one peer link. Later the simulation effective notification in traffic indication map (TIM) field study is extended for a multihop network consisting of 8 or the efficient scheduling of data frames in the queue STAs.Itisfoundthatatlowtraffic rate the percentage [9, 10], traffic shaping to create burst when necessary [7, 8], of average energy saving could be as high as 79% when ATIM window size adjustment [14], asynchronous wake- compared to active mode operation. The results indicate that up of STAs [1, 13, 15], Unscheduled Power Save Delivery the total energy consumption depends on the independent (UPSD) [3, 4], and so forth. However, few papers are found power modes of the STAs for their link as well as the to focus on the IEEE 802.11s based link specific power mode application trafficrates. operation. In this paper the performance of the link specific The rest of the paper is organized as follows. Previous power modes is studied from the energy efficiency point of works done on the IEEE 802.11 PSM are presented in view. Section 2.InSection 3 the PSM link concept in the IEEE 802.11s and the frame exchange methods in PSM are discussed. The setup for the experiment is addressed in 3. IEEE 802.11s System Section 4. The overall operation of the implementation, In this section the IEEE 802.11s PSM link concept as well especially the batch scheduling and sleep/wake-up method, as the frame transmission and reception method in a link in are explored in Section 5. The mathematical model for power save mode is introduced. one peer link operation is introduced in Section 6.The simulation results for one peer link are validated in Section 7. The simulation result of a multihop network is examined in 3.1. The PSM Link Concept in IEEE 802.11s. The most Section 8. A summary is drawn in Section 9. significant point of the 802.11s PSM operation is the STA’s link specific power mode. A mesh STA creates a link and maintains a link specific power mode towards each peer 2. Previous Works STA. It also tracks the power mode of each peer and only Krashinsky and Balakrishnan [7] proposed an algorithm exchanges data frames with its peer. A link consists of two called bounded slow down (BSD) to save energy for web mesh STAs and both STAs have their own independent power traffic. It bounds the delay to a user specified value while mode for each other. A STA can operate in any of the three expending minimum energy. The sleep duration is adapted power modes for a link. These modes are active, light sleep, and deep sleep. A single mesh STA can serve its various peers depending on the previous activity. Another solution for ff the same kind of problem is done by Yan et al. [8]where in di erent power mode at the same time. In Figure 1,STA energy is saved in two steps: by switching to doze state A is in active mode for both link-X and link-Y. STA C is in during inactive periods and by controlling the trafficflow deep sleep mode for link-Y and link-Z. The same STA B is by declaring enough buffer space in the TCP ACK packet in light sleep mode for link-X and in deep sleep mode for when necessary. It creates burst of data flow from the AP link-Z. In light sleep mode for a link, a PSM STA wakes up towards the STA and shortens the total transmission time. periodically to listen to all the beacons of the peer STA. On Zhu and Cao [9] proposed a rate based scheduling algorithm the other hand, in deep sleep mode for a link a PSM STA for streaming traffic where the AP will decide the service may not wake up to listen to all the beacons. In active mode order of the flows. Gan and Lin [10] proposed a power operation, a STA remains in awake state all the time. If a STA conservation scheme to optimally schedule the awake time works in either light sleep or deep sleep mode for any of its of the STAs to reduce the contention. Lei and Nilsson [11] peer links, the STA will alternate between awake and doze modeled the queue for the infrastructure mode to predict states for that link, as determined by the frame transmission the system performance if the configuration parameters are and reception rules [6]. known. Baek and Bong [12] later extended this work and derived the exact average value of the Percentage of Time a 3.2. Frame Transmission and Reception Method. In previous station stays in the Doze state (PTD) and variance of delay. section the concept of link specific power modes and how Journal of Computer Networks and Communications 3 PS mode (A→B) PS mode (B→A) doze state just after the awake window. A PSM STA can Active Light sleep transmitframestoitsactivemodepeeratanytimewithout establishing any PSP. However, frame transmission towards Link-X A B a PSM peer will never take place arbitrarily. A PSP should be established before any transmission towards the PSM peer takes place. Figure 2 shows the activity of the mesh STAs A, B, and C during frame exchange. As STA B is in light sleep mode for STA A, it wakes up prior to every TBTT of STA A to listen C) C) → → to A’s beacons. It may not hear all the beacons of STA C since Z Y it acts in deep sleep mode for peer STA C. STA A will remain in awake state all the time as it serves its links in active mode. Link- Link- C In Figure 2, mesh STAs B and C transmit their buffered frame PS mode (B Deep sleep Active PS mode (A to active mesh STA A directly without initiating any PSP. On the other hand, transmission of buffered packet towards PSM PS mode (C→A) PS mode (C→B) Deep sleep Deep sleep STAs B or C takes place only after the initiation of PSP as described before. Figure 1: Link specific power modes of three mesh STAs. STA A is in active mode. STAs B and C are in PSM. 4. Implementation and Experimental Setup these modes affect the internal power states of a mesh In order to evaluate the performance, the IEEE 802.11s STA were introduced. In this section the transmission and PSM related operations such as beacon management, PSP ffi ff reception method of frames in PSM will be examined. Unlike protocol, PSM e cient queue, and peer specific bu ers 802.11, beacons of the mesh STAs are not synchronized in on top of the queue are implemented in the extended 802.11s, rather evenly distributed. Every STA in a network version [16] of Network Simulator NS-2. The details of the has its own Targeted Beacon Transmission Time (TBTT) as implementations are out of the scope of this paper. In the illustrated in Figure 2. The Mesh Beacon Collision Avoidance simulations, the UDP packet size is 1 KB and the beacon ffi (MBCA) mechanism detects and mitigates the collisions interval is 102.4 ms or 100 time unit (TU). The tra cis among beacon frames in the network [6]. The Mesh Poisson distributed and the access mechanism is DCF. The Coordinated Channel Access (MCCA) enables mesh STAs to propagation model is taken as free space to observe the MAC reserve transmission time to increase transmission efficiency. performance. Thus, packets are lost only for collision. During the PSM operation, a STA wakes up for a fraction of a The transmission time reservations avoid hidden terminals millisecond before its own TBTT for safety purpose. In this and in forwarding operation, the time may be reserved for paper this duration before TBTT is called safety margin. If both transmission and reception of the forwarded data. All ffi there is no transmission, the transmitter goes to doze state this coordination improves network e ciency. However, the just after the awake window. In the experiment, safety margin details of this mechanism are outside the scope of this paper. is 0.1024 ms and awake-window duration is 5 ms. Therefore, ff In IEEE 802.11s, multiple STAs can transmit in di erent time the maximum duration of sleep possible within a beacon within one beacon interval duration. It obviously increases interval is around 97.29 ms (102.4ms− 5ms− 0.1024 ms = the network throughput. Each mesh STA maintains a Time 97.29 ms). The necessary parameters used to measure the 64 Synchronization Function (TSF) timer with modulus 2 performance are given in Table 1. [6]. The beacon frames contain a copy of its TSF timer. In The experiment is carried out for one peer link and for PSM, a mesh STA first enters the awake state prior to its a multihop network separately. In one peer link scenario every TBTT and remains in awake state for an awake-window therearetwoSTAs;oneSTAoperatesastransmitterand duration as shown in Figure 2. After hearing the beacon, another as receiver. For a multihop scenario the network the corresponding peer STA triggers the beaconing STA to consists of eight STAs. Two linear data flows consisting of 4 initiate a PSP. A PSP is a contiguous period of time during which the buffered frames are transmitted to the PSM mesh STAs are placed across each other as shown in Figure 15.The STAs. A mesh STA announces the presence of buffered data mathematical modeling and the validation of the simulation in the beacon’s TIM element in its own TBTT. A trigger results for one peer link operation are explored in Sections 6 might be a mesh data or mesh null packet which should and 7,respectively.InSection 8 the simulation results for a be acknowledged. After receiving the trigger, the beaconing multihop network are discussed. STA starts to transmit the buffered packet one by one. The PSP will be terminated after a successfully acknowledged data 5. The Batch Scheduling Method frame or a mesh null frame with the End of Service Period (EOSP) bit set to 1 from the transmitter of the PSP [6]. In this section, the overall system response of the imple- The awake state could be extended if any PSP is initiated mentation, that is, the batch scheduling process and the within the awake-window duration. In this case, a STA will corresponding sleep/wake-up event, are explained. In the remain in awake state until the PSP is terminated successfully. new queuing system, there are separate temporary buffer If no PSP is initiated, the mesh STA should return to spaces for all PSM peer STAs as shown in Figure 3.The 4 Journal of Computer Networks and Communications Beacon period A Beacon Data ACK ACK Trigg Data Data ACK B PSP Listening A No PSP AC→PSM Awake window PSM→AC Trigg ACK C Data Listening B No PSP Listening A PSP PSM→AC PSM→PSM Figure 2: The internal states of mesh STAs during frame transmission and reception. A is in active mode. B and C are in PSM. STA’s power modestolinksaregiveninFigure 1. Table 1: Simulation parameters. LL Parameters Values TX state power 1.327 W IFQ RX state power 0.967 W Idle state (neither TX nor RX state) power 0.844 W Doze state power 0.066 W Active peer’s Energy per switching 0.422 mJ data path Switching time, from doze to idle state 250 μs PSM peer’s data PSM peer’s Beacon transmission interval 102.4 ms Mac queue Data transmission Rate 6 Mbps logic Packet size 1000 Byte MAC Beacon frame size 272 Byte Mac TX logic PSP trigger frame size 28 Byte Awake-window duration 5 ms PHY Safety margin or wake-up before TBTT 0.1024 ms DIFS 34 μs Figure 3: A simplified diagram of new queuing system where MAC μ SIFS 16 s maintains individual queue for each of its PSM link or peers. CW slot duration 9 μs CWmin 15 Prior to every PSP, the buffered packets are moved to the MAC transmission queue as a group or batch before queue-logic unit first stores the incoming packet from LL delivering them one by one. After this batch a null packet to the exact peer specific buffer in MAC. When MAC wakes with EOSP field set to 1 is placed as an indication of the uptotransmititsownbeacon,itfirstchecksallofitspeer end of an individual batch in this implementation. The specific buffers to see whether any stored packet exists. If transmitter STA remains in active state as long as it has so, the STA declares those peers’ identities in its beacon’s frames in the transmission queue to deliver or it successfully TIM element. However, there is no intermediate buffer for receives the ACK to the last frame. The receiver STA also the data destined to the active mode peers. This data is remains in active state until it receives the end trigger directly transferred to the final transmission queue as shown frame. The total batch service time may take several beacon in Figure 3. intervals. New data packets destined to the STA, to which Journal of Computer Networks and Communications 5 a PSP is ongoing, will not be set immediately to the MAC transmission queue; rather these will be stored in the peer x3 ff x specific bu er and will be delivered in another PSP. However, ) 1 t ( Beacons in the implementation, if the arrived frame is destined to U x some other mesh STA with whom no PSP currently exists, 2 the transmitter can establish a new PSP. A STA can continue several PSP operations in parallel with its peer STAs, but not Service period t more than one PSP with a particular peer STA according to Busy period for Sleep the current implementation. batch 1 t An example of this operation is given in Figure 4 for Batch arrival in ffi B21 B22 B23 transmission a single link. Here STA1 is generating tra c and has only queue one peer link with STA2. STA2 is working in light sleep mode for the link and receiving frames from STA1. The busy Figure 4: Batch arrival process in STA1 queue for a single peer. B21 period, service period, and sleep duration of STA1 during denotes the first batch for STA2. Similarly B23 is the third batch for the operation are depicted in Figure 4. Batches B21, B22, and STA2. B23 are transferred to the queue of STA1 from its temporary buffer after successful initiation of PSP at 1st, 3rd, and 4th beacon, respectively. Here batch Bxy means that this batch ) Beacons is destined to STAx and the batch number for this station x t ( is y. Suppose B21, B22, and B23 batches have service times U x1, x2, and x3, respectively. The service rate in Figures 4 and 5 is considered 1 sec/sec and therefore the unfinished work Service period t t t U(t) decreases with slope equal to −1. It is shown in Figure 4 Busy period Sleep that no batches arrive in the transmission queue just after t the 2nd, 5th, and 6th beacons. One good reason for this is Batch arrival in B21 B31B22 B32 B23 that the STA1 did not send any indication of buffered packet transmission queue in these beacons as the PSP with STA2 is still continuing. Figure 5: Batch arrival process in STA1 queue for a two peers. B21 Let us consider another scenario where STA1 is connected denotes the first batch for STA2. Similarly B32 is the second batch with another station STA3 and is also generating trafficfor for STA3. it, therefore it has two peers, STA2 and STA3. The activities of STA1 queue in this scenario are depicted in Figure 5. At the first beacon a PSP is established with STA2 and the flows. However, the fairness considerations are outside the batch B21 is transferred to the transmission queue in STA1. scope of this paper. Similarly, after beacon 2, another batch B31 is transferred to the queue from its temporary buffer. The batch B31 will 6. Modeling One Peer Link Operation be placed behind the batch B21. The batches are transferred to the queue after being triggered by the corresponding In this section, the dynamic that affects the energy-related receiver STA. It should be noted that although a PSP is issues in a network is observed closely. In order to do this, progressing with STA2, a new PSP with STA3 is established a mathematical model based on discrete time discrete state after beacon 2 and at this moment STA1 has two parallel Markov chain is developed for one peer link operation. The PSPs, one with STA2 and another with STA3. As shown in modelislaterusedinSection 7 to validate the simulation Figure 5 the first PSP ends at time t after delivering all the output. There are two STAs in this modeling; one STA packets to STA2. A little bit different situation occurs after operates as a transmitter and another as a receiver. announcing the existence of buffered frame for both stations In this modeling, several assumptions are made. It is in beacon 4. Here STA3 wins to send the PSP trigger first assumed that the transmitter STA operates in deep sleep and the batch B32 is transferred to the queue for immediate mode for the link. The transmitter only wakes up before transmission. STA1 also receives the trigger from STA2 after its own TBTT to transmit and does not wake up to hear few milliseconds due to contention and subsequently the receiver’s beacon. However, the receiver STA wakes up batch B23 is transferred to the transmission queue and placed periodically to hear the transmitter’s beacon. As there is behind the previous batch B32. Like before the system will no need to declare the presence of buffered trafficinits start to serve the batch B23 at time t after emptying the own TBTT for this typical scenario, the receiver STA does previous batch B32 as shown in Figure 5. In the current not wake up to transmit its own beacon. After successful implementation a STA can maintain N links and therefore transmission of a batch the transmitter goes to sleep if the in case of N parallel PSPs the batch scheduling process in remaining time to the next wake-up is greater than zero. The the MAC transmission queue will be the same as explained transmission time of beacon and PSP trigger is ignored in above. The primary concern of this paper is to evaluate this modeling. As propagation model is free space, there is no the performance of the proposed 802.11s PSM from the packet loss in the channel for a single transmitter. The buffers energy efficiency point of view. Flow control and scheduling are large enough so that the probability of packet loss due to methods could be utilized to maintain fairness among the buffer overflow is negligible in this region of operation. 6 Journal of Computer Networks and Communications Poisson packet arrival in peer specific buffer that the batch size is not growing without bound. Then the probability that the size of batch k is j conditioned that the size of batch k − 1wasi can be written as n i T max ( ) 1 j pij = [λTn] exp[−λTn]Pr N(i) = n , (2) j! n=nmin(i) k −1 k k +1 k +2 n a = {aX/T} n a = {a X Figure 6: The system observation instants are given by k. The batch where min( ) ceil and max( ) ceil ( + /T} transmission time is shown by hatched region. CWmin) denote the minimum and maximum number of data frames needed to serve batch of size a,respectively.The steady state probability distribution of the batch πj size can 6.1. Modeling Batch Size Distribution in Steady State. Assume be solved from the following set of linear equations: thatpacketlengthisfixed.LetX denote the deterministic part of the packet transmission time X = DIFS + Data + SIFS + ACK. Due to the contention based access the total ∞ πj = πi pij j = ... transmission time of a packet p is random variable Xp = , 0, 1, 2, (3) j= 0 X + Cp where Cp ∼ U(0, CWmin) is uniform random variable corresponding to the contention window length. ∞ 1 = πi. The total transmission time of a batch of a packets is B (a) = (4) j=0 aX Δ a Δ a = a−1 C + ( )where ( ) p=0 p denotes the additional transmission time due to contention process. Let FΔ,a(t) denote the cumulative probability density (CDF) function In practice, the buffer size is constrained. Let a denote the Δ a F t max of ( ). Closed form solution of Δ,a( ) is known [17], but maximum MAC buffer size in terms of packets. Now the state F t for large a it has numerical problems. In this paper Δ,a( ) space of the Markov chain can be truncated and standard is approximated by truncated Gaussian CDF. The details linear algebraic methods can be used to solve πj . of this approximation can be found from the appendix. The approximation is based on two observations. Firstly, the central limit theorem states that sum of i.i.d. random 6.2. Modeling Sleep Segment Distribution. Let’s assume that variables approaches to Gaussian distribution when number the size of the random part due to CW, Δ (a), is always of variables a grows. Secondly, it is known that 0 ≤ Δ (a) ≤ less than a beacon period. The ground of this assumption a × CWmin. is that even for a very big size batch, suppose 300 packets, Let T be beacon interval. New batch can only start in the maximum backoff time that may come is 300 × 15 × the beginning of a beacon interval. Hence, there is idle time 0.009 = 40.5 ms, less than the beacon interval of 102.4 ms. = = I(a) = N(a)T − B(a) between the end of the batch and Here CWmin 15 and slot size 0.009 ms as given in Table 1. beginning of the next batch. The random variable N (a) = Therefore, the transmission time of a batch of size a will n a n a = n a ceil{B (a)/T} denotes the number of beacon intervals needed occupy either min( )or max( ) min( )+1numbers to serve the batch. Let us define I(a; n) = nT − aX.The of beacon periods as shown in Figure 7. Now the size of a probability that the transmission of a packet spans over n sleep segment depends on at which point an ongoing batch beacon intervals can now be expressed as transmission ends inside a beacon interval or the time left for the next wake-up. Therefore any one of the following three Pr N (a) = n = Pr (n − 1)T < B (a) ≤ nT cases may arise: (i) a batch transmission may end within the (1) safety margin before beacon nmin(a)ornmax(a); (ii) it may = F I a n − F I a n − . Δ,a( ( ; )) Δ,a( ( ; 1)) endwithinanawakewindowafterbeaconnmin(a)ornmax(a); (iii) it may end neither within awake window nor within Now the batch size distribution could be characterized. The system is observed at each TBTT after a successful safety margin as shown in Figure 7. transmission of a batch. The observation instants are shown The transmitter can be put to sleep for the duration of by k in Figure 6. The accumulated packets or a new batch the idle time I(a). Let s(a) be the sleep duration after the are transferred to the MAC transmission queue from the successful transmission of batch of size a. The above three temporary buffer before transmission at each observation cases are analyzed below for a>0. instant. Assume that packets arrive according to Poisson process with rate λ.Leta k bethebatchsizeatkth instant. Case 1. Let the transmission end within the safety margin The batch size a k depends only on the size of the previous window x before beacon nmin(a)orbeaconnmax(a), that is, batch a k−1. Hence the batch size process fulfils Markov in region C or F as shown in Figure 7. The corresponding property. Assume that the arrival rate is small enough such sleep duration here will be zero because the time left for Journal of Computer Networks and Communications 7 nmin(a) + 1th beacon interval nmin(a)th beacon interval n(a)th beacon n(a) + 1th beacon Δ˜ a Fixed part, aX ( ) ADB C E F Sleep Transmission yzx z x Figure 7: The safety margin and awake-window area are shown by deep hatched and light hatched, respectively. Here T = 102.4ms, y = 5ms,x = 0.1024 ms, and z = 97.29 ms. Based on awake window and safety margin beacon interval n(a)andn(a) + 1 are divided into 6 regions A to F. The deterministic part and indeterministic part of a transmission is also shown here separately. the next wake-up is zero. Therefore the probability that the From (5), (6), and (7) and from the total probability theorem sleep duration is zero, for all size of batches, Pr s ≤ s Pr s(a) = 0 | a = a = Pr I (a) ≤ x ⎧a ⎪ max ⎪ = FΔ a(n (a)T − aX) ⎪ Pr s(i) ≤ s | a = i , min ⎪ ⎨ i=1 (8) − F n a T − aX − x = s i = | a = i a = i s