You are on page 1of 9

Using Quantization to Deploy Heterogeneous Nodes

in Two-Tier Wireless Sensor Networks


Saeed Karimi-Bidhendi, Jun Guo, Hamid Jafarkhani
Center for Pervasive Communications & Computing
University of California, Irvine
Email: {skarimib, guoj4, hamidj}@uci.edu
arXiv:1901.06742v1 [cs.IT] 20 Jan 2019

Abstract—We study a heterogeneous two-tier wireless sensor methods to reduce the energy consumption of radio commu-
network in which N heterogeneous access points (APs) collect nication in the literature: (1) topology control [11], [12], in
sensing data from densely distributed sensors and then forward which unnecessary energy consumption is avoided by properly
the data to M heterogeneous fusion centers (FCs). This hetero-
geneous node deployment problem is modeled as a quantization switching awake and asleep states, (2) energy-efficient routing
problem with distortion defined as the total power consumption protocols [4], [13], that are designed to find an optimal path
of the network. The necessary conditions of the optimal AP and to transfer data, (3) power control protocols [14], [15], that
FC node deployment are explored in this paper. We provide a save communication energy by adjusting the transmitter power
variation of Voronoi Diagram as the optimal cell partition for at each node while keeping reliable communications. Another
this network, and show that each AP should be placed between
its connected FC and the geometric center of its cell partition. In widely used method, Clustering [14], [16], attempts to balance
addition, we propose a heterogeneous two-tier Lloyd algorithm to the energy consumption among sensor nodes by iteratively
optimize the node deployment. Simulation results show that our selecting cluster heads. Unfortunately, above MAC protocols
proposed algorithm outperforms the existing clustering methods bring about a massive number of message exchanges because
like Minimum Energy Routing, Agglomerative Clustering, and the geometry and/or energy information are required during
Divisive Clustering, on average.
Index Terms—quantization, node deployment, heterogeneous
the operation [16]. Also, the node deployment is known and
wireless sensor networks. fixed in the aforementioned energy saving approaches while it
plays an important role in energy consumption of the WSNs.
I. I NTRODUCTION In this paper, we study the node deployment problem in
heterogeneous two-tier WSNs consisting of heterogeneous
Wireless sensor networks (WSNs) have been widely used
APs and heterogeneous FCs, with distortion defined as the
to gather data from the environment and transfer the sensed
total wireless communication power consumption. The optimal
information through wireless channels to one or more fusion
energy-efficient sensor deployment in homogeneous WSNs is
centers. Based on the network architecture, WSNs can be
studied in [1]. However, the homogeneous two-tier WSNs
classified as either non-hierarchical WSNs in which every
in [1] do not address various challenges that exist in the
sensor node has identical functionality and the connectivity
heterogeneous two-tier WSNs, e.g., unlike regular Voronoi
of network is usually maintained by multi-hop wireless com-
diagrams for homogeneous WSNs, the optimal cells in hetero-
munications, or hierarchical WSNs where sensor nodes play
geneous WSNs may be non-convex, not star-shaped or even
different roles as they are often divided into clusters and
disconnected, and the cell boundaries may not be hyperplanes.
some of them are selected as cluster head or relay. WSNs
Another challenge that exists in the heterogeneous two-tier
can also be divided into either homogeneous WSNs [1]–
networks is that unlike the homogeneous case [1], or heteroge-
[4], in which sensors share the same capacity, e.g., storage,
neous one-tier case [17], some nodes may not contribute to the
computation power, antennas, sensitivity etc., or heterogeneous
energy saving. To the best of our knowledge, the optimal node
WSNs where sensors have different capacities [5]–[8].
deployment for energy efficiency in heterogeneous WSNs is
Energy consumption is a key bottleneck in WSNs due to
still an open problem. Our main goal is to find the optimal
limited energy resources of sensors, and difficulty or even
AP and FC deployment to minimize the total communication
infeasibility of recharging the batteries of densely deployed
energy consumption. By deriving the necessary conditions
sensors. The energy consumption of a sensor node comes from
of the optimal deployments in such heterogeneous two-tier
three primary components: communication energy, computa-
WSNs, we design a Lloyd-like algorithm to deploy nodes.
tion energy and sensing energy. The experimental measure-
ments show that, in many applications, the computation energy The rest of this paper is organized as follows: In Section
is negligible when it is compared to communication energy [9], II, we introduce the system model and problem formulation.
[10]. Furthermore, for passive sensors, such as light sensors In Section III, we study the optimal AP and FC deployment.
and acceleration sensors, the sensing energy is significantly A numerical algorithm is proposed in Section IV to minimize
small. Therefore, wireless communication dominates the sen- the energy consumption. Section V presents the experimental
sor energy consumption in practice. There are three primary results and Section VI concludes the paper.
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION sensors
R in one time unit, i.e. the average-receiver-data-rate,
Here, we study the power consumption of the heterogeneous is Rn f (w)dw. It can be reasonably assumed that the AP
two-tier WSNs consisting of three types of nodes, i.e., homo- transmitters only forward sensing data when the collected data
geneous sensors, heterogeneous APs and heterogeneous FCs. comes into the buffer. Therefore, the channel-busy-ratio is pro-
The power consumption models for homogeneous WSNs are portional toR the average-receiver-data-rate,
R and can be written
f (w)dw.T /ζ A f (w)dw
discussed in details in [1]. The main difference in this work as ΓAn =
Rn
T
T (n)
= Rnζ A , where ζTA(n) is
T (n)
is the heterogeneous characteristics of the APs and FCs. For the AP n’s instant-transmitter-data-rate which is determined
the sake of completeness, we describe the system model for by the SNR threshold at the corresponding FC T (n). Hence,
heterogeneous WSNs here in details. Given the target area we can rewrite the average-transmitter-power of AP n as
Ω ⊂ R2 which is a convex polygon including its interior, N A
ηn,T R
PtAn = EtAn ΓAn = ζA
(n)
||pn − qT (n) ||2 Rn f (w)dw, and the
APs and M FCs are deployed to gather data from sensors. T (n)

Throughout this paper, we assume that N ≥ M . Given the total power consumption at AP transmitters is calculated by
sets of AP and FC indices, i.e., IA = {1, 2, ..., N } and IB = summing the average-transmitter-powers of APs:
{1, 2, ..., M }, respectively, the index map T : IA −→ IB is N
A X
defined to be T (n) = m if and only if AP n is connected P (P, Q, R, T ) = PtAn (1)
to FC m. The AP and FC deployments are then defined by n=1
P = (p1 , ..., pN ) and Q = (q1 , ..., qM ), where pn , qm ∈ R2 XN Z A
ηn,T (n)
denote the location of AP n and FC m, respectively. Through- = ||pn − qT (n) ||2 f (w)dw
out this paper, we assume that each sensor only sends data to n=1 Rn ζTA(n)
one AP. For each n ∈ IA , AP n collects data from sensors
in the region Rn ⊂ Ω; therefore, for each AP deployment P , Second, we consider sensors’ total transmitting power con-
there exists an AP partition R = (R1 , ..., RN ) comprised of sumption. The total amount of data collected from the sensors
disjoint subsets of R2 whose union is Ω. The density of the inside the region [w, w + dw] in one time unit is equal to
data rate from the densely distributed sensors is denoted via a f (w)dw since the density of data rate f (.) is approximately
continuous and differentiable function f : Ω −→ R+ , i.e., the uniform on the extremely small region [w, w +dw]. Therefore,
total amount of dataR gathered from the sensors in region Rn the sum of channel-busy-ratios of sensors in the infinitesimal
S
f (w)dw.T /ζn
in one time unit is Rn f (w)dw [1]. region [w, w + dw] is ΓSn = T = f (w)dw
S
ζn , where ζnS
We focus on the power consumption of sensors and APs, is sensors instant-transmitter-data-rate. We only consider the
since FCs usually have reliable energy resources and their en- homogeneous sensors, i.e., sensors’ antenna gains are identi-
ergy consumption is not the main concern. First, we discuss the cal. Moreover, sensors within [w, w + dw] have approximately
APs’ total power consumption. According toR [8], power at the the same distance to the corresponding AP pn , and thus have
receiver of AP n is modeled as PrAn = ρn Rn f (w)dw, n ∈ the same instant-transmission-power EtSn = ηnS ||w − pn ||2 ,
IA , where ρn is AP n’s power consumption coefficient for where ηnS is a constant determined by sensors’ common
receiving data. For simplicity, we assume APs share the same transmitter antenna gain, AP n’s receiver antenna gain, and
receiving coefficient, i.e., ρn = ρ. Therefore, the sum of power the SNR threshold of AP n. Therefore, the sum of average-
consumption at receivers is a constant and does not affect transmitter-powers within the region [w, w + dw] is equal to
S
ηn 2
the energy optimization and can be ignored in our objective ζnS ||pn − w|| f (w)dw. Since sensors in the region Rn send

function. In what follows, we focus on power consumption at their data to AP n, the sum average-transmitter-powers of
AP transmitters. The average-transmitting-power (Watts) of sensors in the target area Ω can be written as:
AP n is defined to be PtAn = EtAn ΓA n , ∀n ∈ IA , where Etn
A
N Z
X
denotes the instant-transmission-power (Joules/second) of AP S ηnS
n, and ΓA P (P, R) = ||pn − w||2 f (w)dw (2)
n denotes the channel-busy-ratio for the channel of Rn ζnS
n=1
AP n to its corresponding FC, i.e., the percentage of time
that the transmitter forwards data. According to [18, (2.7)], the The two-tier distortion is then defined as the Lagrangian
P An Gt Gr λ2
instant-receive-power through free space is PrAn = r16π 2 d2 , function of Eqs. (1) and (2):
where Gt is the transmitter antenna gain, Gr is the receiver
S A
antenna gain, λ is the signal wavelength, and d is the distance D (P, Q, R, T ) = P (P, R) + βP (P, Q, R, T ) = (3)
between the transmit and receive antennas. Let N0 be the noise XN Z

power. In order to achieve the required SNR threshold γ at an ||pn − w||2 + βbn,T (n) ||pn − qT (n) ||2 f (w)dw
PA Rn
the receivers, i.e., Nr0n = γ, the instant-transmission-power n=1

from AP n to FC T (n) should be set to EtAn = ηn,T A


(n) ||pn − ηA
ηS (n)
2
qT (n) || , where ||.|| denotes the Euclidean distance, ηn,T A where an = ζ nS and bn,T (n) = ζn,TA . Our main objective
(n) n T (n)
is a constant determined by the antenna gain of AP n and in this paper is to minimize the two-tier distortion defined in
the SNR threshold of FC T (n). Since AP n gathers data Eq. (3) over the AP deployment P , FC deployment Q, cell
from the sensors in Rn , the amount of data received from partition R and index map T .
III. O PTIMAL N ODE D EPLOYMENT IN T WO -T IER WSN S not hold for some APs. As an example to show the existence
Let the optimal AP and FC deployments, cell partitions of useless APs in the optimal deployment, consider two APs
and index map be denoted by P ∗ = (p∗1 , ..., p∗N ), Q∗ = and one FC and one-dimensional target region Ω = [0, 1]
(q1∗ , ..., qM

), R∗ = (R1∗ , ..., RN

) and T ∗ , respectively. In with parameters a1 = b1 = 1, a2 = b2 = 100, β = 1 and
what follows, we determine the properties of such an optimal a uniform density function. We search the optimal deploy-
node deployment (P ∗ , Q∗ , R∗ , T ∗ ) that minimizes the two- ments by Brute-force search. According to our simulation,
tier distortion in (3). Note that the index map only appears in the optimal deployments share the following properties: (i)
the second term of Eq. (3); thus, for any given AP and FC Both FC and AP 1 are placed at the centroid of the target
deployment P and Q, the optimal index map is given by: region, i.e., q1∗ = p∗1 = 0.5; (ii) AP 2’s partition is empty,
i.e., V2 (P ∗ , Q∗ , T[P ∗ ,Q∗ ] ) = ∅. Property (ii) implies that AP
T[P,Q] (n) = arg min bn,m ||pn − qm ||2 (4) 2 does not contribute to the two-tier
m R distortion of optimal node
deployment. Let vn∗ (P, Q, T ) = R∗ f (w)dw be the Lebesgue
Eq. (4) implies that an AP may not be connected to its closest n
measure
R (volume) of the region Rn∗ , and c∗n (P, Q, T ) =
FC due to heterogeneity of the APs and FCs, and to minimize ∗ wf (w)dw
the two-tier distortion, AP n should be connected to FC m that RRn
f (w)dw
be the geometric centroid of the region Rn∗ . When
R∗
minimizes the weighted distance bn,m ||pn −qm ||2 . Inspired by
n
there is no ambiguity, we write vn∗ (P, Q, T ) and c∗n (P, Q, T )
definition of the two-tier distortion in (3), for each n ∈ IA , as vn∗ and c∗n , respectively. Lemma 1 immediately leads to the
the Voronoi cell Vn for AP and FC deployments P and Q, following corollary.
and index map T is defined as: Corollary 1. Let (P ∗ , Q∗ , R∗ , T ∗ ) be the optimal node
deployment forPN APs and M FCs. If M ≤ N , then for
Vn (P, Q, T ) , {w : an ||pn − w||2 + βbn,T (n) ||pn − qT (n) ||2
each m ∈ IB , n:T ∗ (n)=m vn∗ > 0.
≤ ak ||pk − w||2 + βbk,T (k) ||pk − qT (k) ||2 , ∀k 6= n} (5) The proof can be found in Appendix C. The following
Ties are broken in favor of the smaller index to ensure that proposition provides the necessary conditions for the optimal
each Voronoi cell Vn is a Borel set. When it is clear from AP and FC deployments in the heterogeneous two-tier WSNs.
context, we write Vn instead of Vn (P, Q, T ). The collection Proposition 2: The necessary conditions for optimal deploy-
ments in the heterogeneous two-tier WSNs with the distortion
V(P, Q, T ) , (V1 , V2 , ..., VN ) (6) defined in (3) are:
is referred to as the generalized Voronoi diagram. Note that an c∗n + βbn,T ∗ (n) qT∗ ∗ (n)
unlike the regular Voronoi diagrams, the Voronoi cells de- p∗n =
an + βbn,T ∗ (n)
fined in Eq. (5) may be non-convex, not star-shaped or even P ∗ ∗ (9)
∗ n:T ∗ (n)=m bn,m pn vn
disconnected. The following proposition establishes that the qm = P ∗
generalized Voronoi diagram in (6) provides the optimal cell n:T ∗ (n)=m bn,m vn
partitions, i.e., R∗ (P, Q, T ) = V(P, Q, T ). The proof is provided in Appendix D. Corollary 1 implies
Proposition 1: For any partition of the target area Ω such that the denumerator of the second equation in (9) is positive;
as U , and any AP and FC node deployments such as P and thus, qm∗
is well-defined. According to Eq. (9), the optimal
Q and each index map T we have: location of FC m is the linear combination of the locations of
D (P, Q, U, T ) ≥ D (P, Q, V(P, Q, T ), T ) (7) its connected APs, and the optimal location of AP n is on the
segment c∗n qT∗ ∗ (n) . In the next section, we use the properties
The proof is provided in Appendix A. Note that given AP derived in Propositions 1 and 2 and in Eq. (4), and design a
and FC deployments P and Q, the optimal index map and Lloyd-like algorithm to find the optimal node deployment.
cell partitioning can then be determined by Eqs. (4) and (6).
The following lemma demonstrates that in any optimal node IV. N ODE D EPLOYMENT A LGORITHM
deployment (P ∗ , Q∗ , R∗ , T ∗ ), each FC contributes to the total First, we quickly review the conventional Lloyd algorithm.
distortion, i.e., adding an additional FC results in a strictly Lloyd algorithm iterates between two steps: In the first step,
lower optimal two-tier distortion regardless of its weights the node deployment is optimized while the partitioning is
bn,M+1 as long as M < N holds. fixed and in the second step, the partitioning is optimized
Lemma 1: Let (P ∗ , Q∗ , R∗ , T ∗ ) be the optimal node de- while the node deployment is fixed. Although the conventional
ployment for N APs and M FCs. Given an additional FC with Lloyd Algorithm can be used to solve one-tier quantizers or
parameters bn,M+1 for every n ∈ IA , the optimal AP and FC one-tier node deployment problems as shown in [5], it cannot
deployments, index map and cell partitioning are  denoted via be applied to two-tier WSNs where two kinds of nodes are
P ′ = (p′1 , p′2 , ..., p′N ), Q′ = q1′ , q2′ , ..., qM+1

, T ′ and R′ , deployed. Inspired by the properties explored in Section III,
respectively. Assuming M < N , we have: we propose a heterogeneous two-tier Lloyd (HTTL) algorithm
to solve the optimal deployment problem in heterogeneous
D (P ′ , Q′ , R′ , T ′ ) < D (P ∗ , Q∗ , R∗ , T ∗ ) (8)
two-tier WSNs and minimize the two-tier distortion defined in
The proof is provided in Appendix B. While Lemma 1 (3). Starting with a random initialization for node deployment
indicates that each FC contributes to the distortion, same may (P, Q, R, T ) in the target area Ω, our algorithm iterates
between four steps: (i) Update the index map T according Clustering (DC) [19] algorithms. AC and DC are bottom-up
to Eq. (4); (ii) Obtain the cell partitioning according to Eq. and top-down clustering algorithms, respectively. MER is a
(5) and update the value of volumes vn and centroids cn ; combination of Multiplicatively weighted Voronoi Partition
(iii) Update the location of FCs according to Eq. (9); (iv) [20] and Bellman-Ford algorithms [21, Section 2.3.4]. More
Update the location of APs according to Eq. (9). The algorithm details about MER, AC, and DC can be found in [1].
continues until convergence. In Appendix E, we prove that the
two-tier distortion will converge with HTTL algorithm. This
procedure is summarized in Algorithm 1 below.

Algorithm 1 HTTL Algorithm


Input: Weights {an }n∈IA and {bn,m }n∈IA ,m∈IB . ǫ ∈ R+ .
Output: Optimal node deployment (P ∗ , Q∗ , R∗ , T ∗ ).
1: Randomly initialize the node deployment (P, Q, R, T ).
2: do
3: Compute the two-tier distortion Dold = D(P, Q, R, T ).
4: Update the index map T according to Eq. (4).
5: Update the AP partitioning R by selecting its nth region (a) (b)
as the generalized Voronoi region in (5).
6: Calculate the volumes {vn }n∈IA and centroids {cn }n∈IA
of the AP partitioning R. P
n:T (n)=m bn,m pn vn
7: For each m ∈ IB , move the FC m to P bn,m vn .
n:T (n)=m
a c +βb q
8: For each n ∈ IA , move the AP n to n nan +βbn,T (n) T (n)
n,T (n)
.
9: Update the two-tier distortion Dnew = D(P, Q, R, T ).
10: While DoldD−D
old
new
≥ǫ
11: Return: The node deployment (P, Q, R, T ).

V. E XPERIMENTS (c) (d)


We provide the experimental results in two heterogeneous Fig. 1: AP and FC deployments of different algorithms with β =
two-tier WSNs: (i) WSN1: A heterogeneous WSN including 1 0.25 in WSN1. (a) MER. (b) AC (c) DC. (d) HTTL.
FC and 20 APs; (ii) WSN2: A heterogeneous WSN including Figs. 1a, 1b, 1c, and 1d show final deployments of the
4 FCs and 20 APs. We consider the same target domain Ω as four algorithms (MER, AC, DC, and HTTL) in WSN1. The
in [1], [6], i.e., Ω = [0, 10]2. The data rate density function is multi-hop paths are denoted by blue dotted lines. As expected
set to a uniform function, f (ω) = R 1dA = 0.01. To evaluate from Proposition 2, every AP is placed on the line between

the performance, 10 initial AP and FC deployments on Ω are the connected FC and geometric center of its cell by running
generated randomly, i.e, every node location is generated with HTTL Algorithm. In addition, the HTTL Algorithm deploys
uniform distribution on Ω. In order to make a fair comparison weak APs close to the FC while strong APs are placed
to prior works, similar to the experimental setting in [1], [6], on outer regions. Figs. 2a, 2b, 2c, and 2d illustrate the
the maximum number of iterations is set to 100, FCs, APs, and final deployments of MER, AC, DC, and HTTL, in WSN2,
geometric centroid of AP cells are denoted, respectively, by respectively. Intuitively, strong FCs provide service to more
colored five-pointed stars, colored circles, and colored crosses. APs compared to weak FCs in both AC and HTTL Algorithms.
Other parameters are provided in Table I. According to the Moreover, by HTTL Algorithm, strong APs cover larger target
parameters in Table I, we divide APs into two groups: strong regions compared to weak APs in Fig. 2d.
APs (n ∈ {1, . . . , 10}) and weak APs (n ∈ {11, . . . , 20}). Figs. 3a and 3b show the weighted power comparison
Similarly, FCs are divided in strong FCs (m ∈ {1, 2}) and of different algorithms in WSN1 and WSN2. Obviously,
weak FCs (m ∈ {3, 4}). To distinguish strong APs (or FCs) our proposed algorithm, HTTL, outperforms the other three
and weak APs (or FCs), we denote strong and weak nodes by algorithms in both WSN1 and WSN2. In particular, the energy
solid and hollow symbols, respectively. consumption gap between HTTL and other three algorithms
increases as the FC energy consumption becomes more im-
TABLE I: Simulation Parameters portant (β increases).
Parameters a1:10 a11:20 b1:4,1:2 b1:4,3:4 b5:20,1:2 b5:20,3:4
Values 1 2 1 2 2 4 VI. C ONCLUSION
Like the experiments in [1], we compare the weighted power A heterogeneous two-tier network which collects data from
of our proposed algorithm with Minimum Energy Routing a large-scale wireless sensor to heterogeneous fusion centers
(MER) [18], Agglomerative Clustering (AC) [19], and Divisive through heterogeneous access points is discussed. We studied
A PPENDIX A

For U = (S1 , S2 , ..., SN ), The left hand side of (7) can be


written as:
N Z
X
D(P, Q, U, T ) = (an ||pn − w||2
n=1 Sn

+ βbn,T (n) ||pn − qT (n) ||2 )f (w)dw


XN Z
≥ min(aj ||pj − w||2
Sn j
n=1
(a) (b) + βbj,T (j) ||pj − qT (j) ||2 )f (w)dw
Z
= min(aj ||pj − w||2
Ω j

+ βbj,T (j) ||pj − qT (j) ||2 )f (w)dw


XN Z
= min(aj ||pj − w||2
Vn j
n=1
+ βbj,T (j) ||pj − qT (j) ||2 )f (w)dw
XN Z
= (an ||pn − w||2
n=1 Vn

(c) (d)
+ βbn,T (n) ||pn − qT (n) ||2 )f (w)dw
Fig. 2: AP and FC deployments of different algorithms with β = = D(P, Q, V, T ) (10)
0.25 in WSN2. (a) MER. (b) AC (c) DC. (d) HTTL.
Hence, the generalized Voronoi diagram is the optimal parti-
tion for any given deployment (P, Q, T ). 

A PPENDIX B
103 103
MER
MER
AC
AC
DC
Given N APs and M FCs (M < N ), first we demon-
DC
HTTL
HTTL
strate
 that there
 exists an optimal node deployment such as
Weighted Power

Weighted Power

102 102
b b b b
P , Q, R, T in which each FC has at most one connected
AP at the same location, i.e., for each m ∈ IB , the cardinality
101 101
of the set {n|Tb(n) = m, pbn = qbm } is less than or equal to 1.
For this purpose, we consider an optimal node deployment
100
-4 -2 0 2 4
100
-4 -2 0 2 4 (P ∗ , Q∗ , R∗ , T ∗ ) and assume that there exist at least two
log2 ( ) log2 ( )
distinct indices n1 , n2 ∈ IA and an index m ∈ IB such that
(a) (b)
T ∗ (n1 ) = T ∗ (n2 ) = m, and p∗n1 = p∗n2 = qm ∗
. Without loss
Fig. 3: The weighted power comparison of different Algorithms. (a)
WSN1. (b) WSN2. of generality, we can assume that an1 ≤ an2 . We have:
Z
Dn1 = (an1 ||p∗n1 − w||2
R∗
n1
the minimum power that ensures reliable communication on ∗ 2
+ βbn1 ,m ||p∗n1 − qm || )f (w)dw
such two-tier networks and modeled it as a quantization Z

problem. Different from the homogeneous two-tier networks, = an1 ||p∗n1 − w||2 f (w)dw (11)
a novel Voronoi Diagram is proposed to provide the best R∗
n1

cell partition for the heterogeneous network. The necessary


conditions of optimal node deployment imply that every access Z
point should be placed between its connected fusion center Dn2 = (an2 ||p∗n2 − w||2
and the geometric center of its cell partition. By defining an R∗
n2
appropriate distortion measure, we proposed a heterogeneous ∗ 2
+ βbn2 ,m ||p∗n2 − qm || )f (w)dw
two-tier Lloyd Algorithm (HTTL) to minimize the distortion. Z

Simulation results show that HTTL algorithm greatly saves the = an2 ||p∗n2 − w||2 f (w)dw (12)
weighted power or energy in a heterogeneous two-tier network. R∗
n2

Hence, we have: region B(x, ǫ) = w ∈ Ω ||w − x|| ≤ ǫ has positive volume,
R
Z i.e., B(x,δ) f (w)dw > 0. Given 0 < ǫ < δ, assume that:

Dn1 + Dn2 = an1 ||p∗n1 − w||2 f (w)dw
R∗
n1
bn
B(x, ǫ) ⊂ R (15)
Z

+ an2 ||p∗n2 − w|| 2
f (w)dw for some n ∈ IA ; therefore, the  contribution  of the region
R∗
Z n2
B(x, ǫ) to the total distortion D Pb , Q,
b R,
b Tb is equal to:

≥ an1 ||p∗n1 − w||2 f (w)dw Z  
Z
R∗
n1 pn − w||2 + βbn,Tb(n) ||b
an ||b pn − qbTb(n) ||2 f (w)dw
 B(x,ǫ)
+ an1 ||p∗n1 − w||2 f (w)dw (16)
R∗
Z n2 As ǫ −→ 0, (16) can be approximated as:
 Z
= an1 ||p∗n1 − w||2 f (w)dw (13)
R∗
n1
S
R∗
n2
∆n × f (w)dw (17)
B(x,ǫ)
Eq. (13) implies  
S that if we update the cell partition for AP where ∆n = an ||b pn − x||2 + βbn,Tb(n) ||b
pn − qbTb(n) ||2 . If
n1 to be Rn∗ 1 Rn∗ 2 , and place the AP n2 to an arbitrary
location different from qm ∗
with a corresponding zero volume we set p′′k = qM+1
′′
= x and Rk′′ = B(x, ǫ) and T ′′ (k) = M +1,
cell partition, the resulting distortion will not increase, and then the contribution of the region B(x, ǫ) to the total distor-
the obtained node deployment is also optimal. Note that in tion D (P ′′ , Q′′ , R′′ , T ′′ ) is equal to:
this newly obtained optimal distortion, AP n2 is not in the Z

same location as FC m anymore. This procedure is continued ak ||p′′k − w||2 + βbk,M+1 ||p′′k − qM+1
′′
||2 f (w)dw
B(x,ǫ)
until we reach an optimal deployment in which each FC has Z

at most one connectedAP upon it.Let us denote this optimal = ak ||x − w||2 f (w)dw (18)
node deployment via Pb , Q, b R,
b Tb . B(x,ǫ)

Since M < N and each FC has at most one AP upon it, The below equation for the ratio of distortions in (17) and (18)
there exists an index k ∈ IA such that pbk 6= qbTb(k) . In order to R 
ak B(x,ǫ) ||x − w||2 f (w)dw
show that the optimal two-tier distortion with N APs and M + lim R =0 (19)
1 FCs is less than that of N APs and M FCs, it is sufficient ǫ−→0 ∆n × B(x,ǫ) f (w)dw
to construct a node deployment with N APs and M + 1 FCs implies that there exists an ǫ∗ ∈ (0, δ) such that the con-
′′ ′′ ′′ ′′
such as (P , Q , R , T ) that achieves lower distortion than tribution of the region B(x, ǫ∗ ) to the total distortion  in
D Pb, Q, b R, b Tb . For each n ∈ IA , let vbn denote the volume ′′ ′′ ′′ ′′
D (P , Q , R , T ) will be less than that of D P , Q, R, T . b b b b
R
of the region R bn , i.e., vbn = b f (w)dw. We consider two Hence, we set P ′′ = (p′′1 , p′′2 , ..., p′′N ) where p′′i = pbi for i 6= k,
Rn 
different cases: (i) If vbk > 0, then we set P ′′ = Pb, Q′′ = and p′′k = x. Also, we set Q′′ = qb1 , qb2 , ..., qbM , qM+1 ′′
=x .
′′
qb1 , qb2 , ..., qbM , qM+1 b and T ′′ (n) = Tb(n) for
= pbk , R′′ = R The partitioning R′′ = (R1′′ , ..., RN ′′
) is defined as Ri′′ = R bi
′′ bn − B(x, ǫ∗ ).
n 6= k and T (k) = M + 1. Note that for i 6= k and i 6= n, Rk′′ = B(x, ǫ∗ ) and Rn′′ = R
Z   Finally, we set T ′′ (i) = Tb(i) for i 6= k and T ′′ (k) = M +1. As
ak ||b pk − w||2 + βbk,Tb(k) ||b pk − qbTb(k) ||2 f (w)dw mentioned earlier,
 the two-tier
′′
 distortion D (P , Q , R , T )
′′ ′′ ′′
Rbk
Z b b b b
is less than D P , Q, R, T . Note that if the region B(x, ǫ) is

> ak ||b pk − w||2 f (w)dw (14) a subset of more than one region, Eqs. (15) to (17) and (19)
b
Z Rk can be modified accordingly and a similar argument can be
′′

= ak ||b pk − w||2 + βbk,M+1 ||b pk − qM+1 ||2 f (w)dw made to show that the resulting distortion will be improved in
bk
R the new deployment, and the proof is complete. 
implies that in the new deployment (P ′′ , Q′′ , R′′ , T ′′ ), the
A PPENDIX C
contribution of the AP k to the total distortion has decreased.
Since the contribution of other APs to the distortion  has not
 Assume that there exists an index m ∈ IB in
changed, we have D (P ′′ , Q′′ , R′′ , T ′′ ) < D Pb , Q, b R,
b Tb S optimal node
the deployment (P ∗ , Q∗ , R∗ , T ∗ ) such that

and the proof is complete. (ii) If vbk = 0, n:T ∗ (n)=m Rn has zero volume. Consider the node de-
 then AP k does ployment (P ′ , Q′ , R′ , T ′ ) where P ′ = P ∗ , Q′ =
not contribute to the optimal distortion D Pb, Q, b R,
b Tb , and
q1∗ , ..., qm−1
∗ ∗
, qm+1 ∗
, ..., qM , R′ = R∗ and T ′ (i) = T ∗ (i)
it can be placed anywhere within the target region Ω. Since for indices i ∈ IA such that T ∗ (i) 6= m. Note that for indices
the set {b
p1 , ..., pbN , qb1 , ..., qbM } has zero measure, clearly there i ∈ IA such that T ∗ (i) = m, we can define T ′ (i) arbitrarily
exists a point x ∈ Ω and a threshold δ ∈ R+ such that because the corresponding regions Ri′ have zero volume. Since
B (x, δ) = {w ∈ Ω|kx − wk ≤ δ} does not include any point S ∗
n:T ∗ (n)=m Rn has zero volume, we have:
from the set {b p1 , ..., pbN , qb1 , ..., qbM }. Since f (.) is positive,
continuous and differentiable over Ω, for each 0 < ǫ < δ the D (P ′ , Q′ , R′ , T ′ ) = D (P ∗ , Q∗ , R∗ , T ∗ ) (20)
which is in contradiction with Lemma 1 since the optimal Therefore, the pairwise Voronoi region Vij is derived:
node deployment (P ∗ , Q∗ , R∗ , T ∗ ) for N APs and M FCs 
has not improved the node deployment (P ′ , Q′ , R′ , T ′ ) for N 
 HS(Aij , Bij ) , ai = aj


APs and M − 1 FCs in terms of distortion. Hence the proof 

B(cij , rij ) , ai > aj , Lij ≥0
is complete.  Vij = Ω ∩ ∅ , ai > aj , Lij <0, (28)



 B c (cij , rij ) , ai < aj , Lij ≥0


A PPENDIX D  R2 , ai < aj , Lij <0
First, we study the shape of the Voronoi regions in (5). Let where B c (cij , rij ) is the complementary of B(cij , rij ). Note
B(c, r) = {ω|kω − ck ≤ r} be a disk centered at c with radius that for two distinct indices such as i, j ∈ IA , if ai > aj and
r in two-dimensional space. In particular, B(c, r) = ∅ when Lij < 0, then two regions Ω ∩ B(cij , rij ) and ∅ differ only
r ≤ 0. Let HS = {ω|Aω + B ≤ 0} be a half space, where in one point, i.e., cij . Similarly, for ai < aj and Lij < 0, two
A ∈ R2 is a vector and B ∈ R is a constant. For i, j ∈ IA , regions Ω ∩ B c (cij , rij ) and Ω differ only in one point cij .
we define Hence, if we define:
" #
Vij (P, Q, T ) , {ω|ai ||pi − w||2 + βbi,T (i) ||pi − qT (i) ||2 ≤ \ \
Vk = B(cki , rki )
aj ||pj − w||2 + βbj,T (j) ||pj − qT (j) ||2 } i:ak >ai
(21) " #
to be the pairwise Voronoi region of AP i where only AP \ \
HS(Aki , Bki )
i and j are considered. Then, AP hT i’s Voronoi iregion can
T "
i:ak =ai
#
be represented as Vi (P, Q) = V
j6=i ij (P, Q) Ω. Let \ \
c
(ωx , ωy ), (pix , piy ), and (pjx , pjy ) be the coordinates of ω, pi B (cki , rki ) Ω (29)
and pj , respectively. Expanding the inequality in (21) results i:ak <ai
in
then two regions V k and Vk differ only in finite number of
(ai − aj )(ωx2 + ωy2 ) − 2(ai pix − aj pjx )ωx points. As a result, integrals over both V k and Vk have the
same value since the density function f is continuous and
− 2(ai piy − aj pjy )ωy + ai kpi k2 − aj kpj k2 (22)
2 2
differentiable, and removing finite number of points from the
+ βbi,T (i) kpi −qT (i) k − βbj,T (j) kpj −qT (j) k ≤0 integral region does not change the integral value. Note that if
Vk is empty, the Proposition 1 in [5] holds since the integral
When ai = aj , the pairwise Voronoi region is a half space, i.e.,
over an empty region is zero. If Vk is not empty, the same
Vij = {Aij ω + Bij ≤ 0}, where Aij = aj pj − ai pi and Bij =
arguments as in Appendix A of [5] can be replicated since
(ai ||pi ||2 −aj ||pj ||2 +βbi,T (i) ||pi −qT (i) ||2 −βbj,T (j) ||pj −qT (j) ||2 )
2 . V k in (29) is similar to Eq. (31) in [5].
When ai > aj , Vij is represented as: Using parallel axis theorem, the two-tier distortion can be
written as:
(ω − cij )2 ≤ Lij . (23) N Z 
X
D (P, Q, V, T ) = an ||pn − w||2
When ai < aj , Vij is represented as: n=1 Vn

(ω − cij )2 ≥ Lij , (24) + βbn,T (n) ||pn − qT (n) ||2 f (w)dw
N Z
X
where
= an ||cn − w||2 f (w)dw
  n=1 Vn
ai pix − aj pjx ai piy − aj pjy ai p i − aj p j
cij = , = + an ||pn − cn ||2 vn
ai − aj ai − aj ai − aj 
(25) + βbn,T (n) ||pn − qT (n) ||2 vn (30)
ai aj kpi − pj k2
Lij = 2
(ai − aj ) Using Proposition 1 in [5], since the optimal deployment
bi,T (i) kpi −qT (i) k2 − bj,T (j) kpj −qT (j) k2 (P ∗ , Q∗ ) satisfies zero gradient, we take the partial derivatives
−β× (26) of Eq. (30) as follows:
(ai − aj )
∂D h i
∗ ∗ ∗ ∗ ∗
For Lij ≥ 0, we define the radius rij as: = 2 a n (p n − c n ) + βb n,T ∗ (n) (p
n − qT ∗ (n) ) vn = 0
∂p∗n
(p ∂D X

Lij , Lij ≥ 0 ∗
=2 βbn,m (qm − p∗n )vn∗ = 0 (31)
rij = (27) ∂qm ∗
n:T (n)=m
0, Lij < 0
By solving Eq. (31), we have the following necessary condi- For each index n ∈ IA and the corresponding index m =
tions: T (n), we can rewrite the contribution of AP n to the total
distortion as:
an c∗n + βbn,T ∗ (n) qT∗ ∗ (n) Z
p∗n = (32) 
an + βbn,T ∗ (n) an ||pn − w||2 + βbn,m ||pn − qm ||2 f (w)dw
P ∗ ∗ Rn
∗ n:T ∗ (n)=m bn,m pn vn Z  2
qm = P (33) (an w + βbn,m qm )
n:T ∗ (n)=m bn,m vn
∗ = (an + βbn,m ) pn −
Rn an + βbn,m

and the proof is complete.  βan bn,m
+ ||w − qm ||2 f (w)dw
an + βbn,m
A PPENDIX E Z  2
a2n (an + βbn,m ) pn − βbn,m qm
= − w

In what follows, we demonstrate that none of the four steps Rn an + βbn,m an

in the HTTL algorithm will increase the two-tier distortion. βan bn,m
+ ||w − qm ||2 f (w)dw
Given P , Q and R, updating the index map T according to an + βbn,m
(4) minimizes the total distortion, i.e., the two-tier distortion Z   2
a2n (an + βbn,m ) pn − βbn,m qm
will not increase by the first step. Moreover, given P , Q and = − cn

Rn an + βbn,m an
T , Proposition 1 indicates that updating R according to (5)  
βan bn,m
and (6) gives the best partitioning; thus, the second step of + ||cn − w||2 + ||w − qm ||2 f (w)dw
the HTTL algorithm will not increase the distortion. Below an + βbn,m
Z  2
equality follows from straightforward algebraic calculations an
= ||cn − w||2
and we omit the proof here: Rn a n + βb n,m
X X 2

an cn + βbn,m qm
bn,m vn ||pn − qm ||2 = bn,m vn (||pn − qm ||2
+ (an + βbn,m ) pn −
an + βbn,m
n:T (n)=m n:T (n)=m 
′ βan bn,m
+ ||qm − qm ||2 ) (34) + 2
||w − qm || f (w)dw
an + βbn,m
P Z

for qm
bn,m pn vn
= Pn:T (n)=m bn,m vn . The contribution of FC m to a2n
n:T (n)=m
= ||cn − w||2 f (w)dw
the total distortion can then be rewritten as: an + βbn,m Rn
X Z + (an + βbn,m )||pn − p′n ||2 vn
 Z
an ||pn − w||2 + βbn,m ||pn − qm ||2 f (w)dw βan bn,m
Rn + ||w − qm ||2 f (w)dw (37)
n:T (n)=m
Z an + βbn,m Rn
X
= an ||pn − w||2 f (w)dw a c +βb
where p′n = n ann +βbn,m m q
. Note that the first equality in
Rn n,m
n:T (n)=m (37) comes from (36), and the third equality follows from the
 
X parallel axis theorem. Now, given Q, R and T , the first and
′ 2
+β bn,m vn  ||qm − qm || third terms in (37) are constant and moving pn toward p′n will
n:T (n)=m not increase the second term in (37). Hence, the fourth step of
 
the HTTL algorithm will not increase the total distortion either.
X
′ 2 So, the HTTL algorithm generates a sequence of positive
+β bn,m vn ||pn − qm || (35)
n:T (n)=m non-increasing distortion values and thus, it converges. Note
that if distortion remains the same after an iteration of the
Now, given P , R and T , the first and third terms in right hand algorithm, it means that non of the four steps have decreased

side of (35) are constant and moving qm toward qm will not distortion and the algorithm has already reached an optimal
increase the distortion in (35). Therefore, the third step of the deployment. 
HTTL algorithm will not increase the total two-tier distortion
as well. ACKNOWLEDGMENT
The following equation can be easily verified using straight- This work was supported in part by the NSF Award CCF-
forward algebraic computations and we omit the proof here: 1815339.

an ||pn − w||2 + βbn,m ||pn − qm ||2 R EFERENCES


2
(an w + βbn,m qm ) [1] J. Guo, E. Koyuncu, and H. Jafarkhani “A source coding perspective on

= (an + βbn,m ) pn − node deployment in two-tier networks,” IEEE Trans. on Commun., vol.
an + βbn,m
66, no. 7, pp. 3035 - 3049, Feb. 2018.
βan bn,m [2] J. Cortés, S. Martínez, and F. Bullo, “Spatially-distributed coverage
+ ||w − qm ||2 (36) optimization and control with limited-range interactions,” ESAIM, vol.
an + βbn,m 11, no. 4, pp. 691–719, Oct. 2005.
[3] A. Chunawale and S. Sirsikar, “Minimization of average energy consump-
tion to prolong lifetime of Wireless Sensor Network,” in GCWCN, pp.
244 - 248, Dec. 2014.
[4] M. Benaddy, B. El Habil, M. El Ouali, O. El Meslouhi and S. Krit, “A
mutlipath routing algorithm for wireless sensor networks under distance
and energy consumption constraints for reliable data transmission,” in
ICEMIS, May 2017.
[5] J. Guo and H. Jafarkhani, “Sensor deployment with limited communica-
tion range in homogeneous and heterogeneous wireless sensor networks,”
IEEE Trans. Wireless Commun., vol.15, no. 10, pp. 6771 - 6784, Oct.
2016.
[6] J. Guo, P. Walk, and H. Jafarkhani, “Quantizers with param-
eterized distortion measures,” in DCC, Mar. 2019, available at
https://arxiv.org/abs/1811.02554.
[7] M. Noori and M. Ardakani “Design of Heterogeneous Sensor Networks
with Lifetime and Coverage Considerations,” IEEE Wireless Commun.
Lett., vol. 1, no. 3, pp. 193-196, Mar. 2012.
[8] Y. T. Hou, Y. Shi, H. D. Sherali, and F. Midkiff, “On Energy Provisioning
and Relay Node Placement for Wireless Sensor Networks,” IEEE Trans.
Wireless Commun., vol. 5, no. 5, pp. 2579-2590, Sept. 2005.
[9] G. Anastasi, M. Conti, M. D. Francesco, and A. Passarella, “Energy
Conservation in Wireless Sensor Networks: A Survey” Ad Hoc Networks,
vol. 7, no. 3, pp. 537-568, May. 2009.
[10] M. A. Razzaque and S. Dobson, “Energy-Efficient Sensing in Wireless
Sensor Networks Using Compressed Sensing,” Sensors, vol. 14, no. 2,
pp. 2822-2859, 2014.
[11] X. Li, Y. Mao, and Y. Liang, “A Survey on Topology Control in Wireless
Sensor Networks,” in ICARCV, pp. 251-255, Dec. 2008.
[12] X. Zhou and W. Qiu, “Sensor Network Energy Saving Sleep Scheduling
Algorithm Research,” in ICT, pp. 1-5, May. 2014.
[13] J. Hao, G. Duan, B. Zhang, and C. Li, “An energy-efficient on-demand
multicast routing protocol for wireless ad hoc and sensor networks,” in
GLOBECOM, pp. 4650 - 4655, Dec. 2013.
[14] V. Kawadia and P. R. Kumar, “Power Control and Clustering in Ad Hoc
Networks,” in INFOCOM, Apr. 2003.
[15] S. Narayanaswamy, V. Kawadia, R. S. Sreenivas, and P. R. Kumar,
“Power Control in Ad-Hoc Networks: Theory Architecture Algorithm
and Implementation of the COMPOW Protocol,” in EW, pp. 156-162,
Feb. 2002.
[16] O. Younis and S. Fahmy, “Distributed clustering in Ad-Hoc Sensor
Networks: A Hybrid Energy-Efficient Approach,” in INFOCOM, vol. 1,
pp. 629-640, Mar. 2004.
[17] E. Koyuncu and H. Jafarkhani, “On the minimum average distortion
of quantizers with index-dependent distortion measures,” IEEE Trans. on
Signal Processing, vol. 65, no. 17, pp. 4655-69, Sept. 2017.
[18] A. Goldsmith, “Wireless Communications,” New York, NY: Cambridge
University Press, 2005.
[19] J. Han, M. Kamber and J. Pei, Data Mining: Concepts and Techniques,
San Francisco, CA: Morgan Kaufmann, 2011.
[20] A. Okabe, B. Boots, K. Sugihara, and S. N. Chiu, Spatial Tessellations:
Concepts and Applications of Voronoi Diagrams, 2nd ed., New York:
John Wiley & Sons, 2000.
[21] J. Bang-Jensen and G. Gutin, Digraphs: Theory, Algorithms and Appli-
cations, 1st ed., London: Springer, 2000.

You might also like