You are on page 1of 8

Transmission Power Control in MAC Protocols for Wireless

Sensor Networks

Luiz H. A. Correia Daniel F. Macedo Daniel A. C. Silva
lcorreia@dcc.ufmg.br damacedo@dcc.ufmg.br daniacs@dcc.ufmg.br


Aldri L. dos Santos Antonio A. F. Loureiro José Marcos S. Nogueira
aldri@dcc.ufmg.br loureiro@dcc.ufmg.br jmarcos@dcc.ufmg.br
Computer Science Department
Federal University of Minas Gerais
Av. Antônio Carlos, 6627
Belo Horizonte, MG, Brazil

ABSTRACT Keywords
Medium access control (MAC) protocols manage energy con- Transmission power control, wireless sensor networks, me-
sumption on the network element during communication, dium access control
which is the most energy-consuming event on Wireless Sen-
sor Networks (WSNs). One method to mitigate energy con-
sumption is to adjust transmission power. This paper pre- 1. INTRODUCTION
sents two approaches to adjust transmission power in WSNs. Wireless Sensor Networks (WSNs) are a subclass of tra-
The first approach employs dynamic adjustments by ex- ditional mobile ad hoc networks (MANETs), and consist of
change of information among nodes, and the second one a large number of sensor nodes, composed of processor, me-
calculates the ideal transmission power according to sig- mory, battery, sensor devices and transceiver. These nodes
nal attenuation in the link. The proposed algorithms were send monitoring data to an access point (AP), which is res-
implemented and evaluated with experiments, comparing ponsible for forwarding data to the users [7]. Unlike tradi-
their results with B-MAC, the standard MAC protocol in tional ad hoc networks, in general, it is not possible to re-
the Mica Motes 2 platform. Results show that transmission place or recharge node batteries due to the number of nodes
power control is an effective method to decrease energy con- deployed or inhospitable environmental conditions. Hence,
sumption, and incurs in a negligible loss in packet delivery energy conservation is a critical factor in WSNs.
rates. For node distances of 5m, the proposed transmission Severe hardware and energy constraints preclude the use
power control techniques decrease energy consumption by of protocols developed for MANETs, which comparatively
27% over B-MAC. possess more resources. The strict requirements force net-
working protocols to be as much energy-efficient as possi-
ble. Medium access control (MAC) protocols, for example,
Categories and Subject Descriptors modify transceiver parameters or even the topology of the
C.2.1 [Computer-Communication Networks]: Network network in order to reduce the energy consumption. One of
Architecture and Design—Wireless communication those parameters is the transmission power that, besides re-
ducing energy consumption, also provides higher throughput
due to the reduced number of collisions and the establish-
General Terms ment of links with lower bit error rates [5, 8, 9, 15].
Algorithms, Performance, Experimentation Although an effective mechanism to reduce energy con-
sumption, transmission power control is not implemented
∗Also affiliated to Federal University of Lavras, Brazil.
in any existing MAC protocol for WSNs. This occurs due
†Also affiliated to Federal University of Ceará, Brazil. to the highly imprecise nature of readings provided by the
transceiver, and also due to the restricted resources found in
current nodes. Those factors difficult an accurate calcula-
tion of the ideal transmission power. To our knowledge, this
Permission to make digital or hard copies of all or part of this work for is the first paper that performs experiments on transmission
personal or classroom use is granted without fee provided that copies are power control. Current works are limited to simulations,
not made or distributed for profit or commercial advantage and that copies which assume that readings are precise, and the transmis-
bear this notice and the full citation on the first page. To copy otherwise, to sion range can be assigned to any arbitrary value, which is
republish, to post on servers or to redistribute to lists, requires prior specific not the case on real hardware. Our paper considers all those
permission and/or a fee.
MSWiM’05, October 10–13, 2005, Montreal, Quebec, Canada. limitations, since it is based in experiments with production
Copyright 2005 ACM 1-59593-188-0/05/0010 ...$5.00. hardware used by a number of researchers [17, 20, 21, 22].

282
In this paper we propose transmission power control pro- Collision

tocols for WSNs, which can be employed in any existing


MAC protocol. Experiments in the Mica Motes 2 platform
show the efficiency of the protocols proposed for power con-
trol, considering parameters such as energy and throughput. A B C D
The protocols proposed are simple and effective, thus they
could be easily adapted to more resourceful networks, such
as mobile ad hoc networks (MANETs).
This paper is organized as follows. Section 2 presents
the main sources of energy consumption in communication. Transmission using power control
Section 3 presents the related works. The methods proposed Transmission without power control
for transmission power control are described in Section 4.
Section 5 describes the evaluated scenarios and presents the
results. Finally, Section 6 draws the conclusions and future Figure 1: Adjusting transmission power to avoid col-
work. lisions.

Benefits of Transmission Power Control


Transmission power control allows several improvements in
2. ENERGY CONSUMPTION IN COMMU- the operation of WSNs, such as the establishment of links
NICATION with higher reliability, communication with the minimum
energy cost, and better reuse of the medium.
Among the hardware components in a sensor node, the Links with higher reliability. When used in conjunc-
transceiver [7] is the highest energy consumer. In particular, tion with link reliability assessment algorithms, power con-
the energy consumed by the transceiver is related to events trol techniques can be used to improve the reliability of a
in the communication and network organization. link. Upon detecting that link reliability is below a certain
Communication events. Encompasses events such as threshold, the MAC protocol increases the transmission po-
overhearing (nodes listen to transmissions even if they are wer, lowering the probability of receiving corrupted data.
not the destination of the packet), idle listening (nodes listen Communication at minimum energy cost. When
to the medium awaiting transmissions) collision and trans- communicating at a fixed transmission power, nodes waste
mission synchronization. Overhearing and idle listening are energy since some links already have a high probability of
mitigated by turning the radio periodically off (called duty a successful delivery. Hence, the transmission control algo-
cycles), or when incoming transmissions are not driven to rithm could decrease the transmission power to a level where
the node. Collisions and transmission synchronization are link reliability is still high, but energy consumption is lower.
avoided with the use of backoff techniques, medium reserva- Better reuse of the medium. When nodes communi-
tion and the exchange of messages [3]. cate at the exact power needed to ensure a successful com-
Network organization. Is related to the network to- munication, signal range is nothing broader than it was sup-
pology and the communication pattern (single-hop or multi- posed to. Thus, only nodes which really must share the
hop). The topology can be modified by altering the trans- same space will contend to access the medium, decreasing
mission power. With shorter communication ranges, the the amount of collisions in the network. This reduced num-
probability of hidden terminals [1, 15] and the number of ber of collisions will also enhance network utilization and
collisions [19] is smaller, reducing energy consumption. Net- lower latency times.
work organization can also be changed by topology control
protocols, which turn off nodes producing redundant or un-
necessary data to the application [14]. Thus, as transmis- 3. RELATED WORK
sion power control protocols are complementary to topology Several studies characterized channel propagation in wire-
control protocols, networks striving energy-efficiency should less networks. Lal et al. [10] showed that it is possible to
employ topology control protocols to lessen the amount of identify link reliability using an energy-efficient algorithm.
transmitted data, at the same time transmitting the re- Reijers et al. [18] studied the effect of obstacles and environ-
maining information at the lowest transmission power neces- mental changes on link quality. Also, results showed that
sary to provide an efficient communication among the active propagation is asymmetric and directional. RSSI (Received
nodes. Signal Strength Indicator) readings were found to be ex-
Existing MAC protocols employ energy-saving techniques tremely dependent on environmental conditions, thus should
which operate only over communication events, ignoring net- be used with caution. Given the irregularity of signal propa-
work topology. Transmission power control techniques, how- gation in wireless transmissions, Zhou et al. [23] developed a
ever, can be very effective, as shown in figure 1. In this new propagation model, which closely resembles the results
example, if nodes B and D, at the same time, transmit data obtained from experimental data.
at the typical transmission power (dashed lines) to nodes Gomez and Campbell analyzed the benefits of transmis-
A and C, respectively, a collision will occur at node C. If sion power control in wireless multi-hop networks [5]. The
the transmission power is reduced to the minimum neces- authors showed that per-link range adjustments outperform
sary to reach the destination of the packet (solid lines), no global range transmission adjustments by 50%. Thus, ins-
collisions occur. Besides decreasing the number of collisions, tead of globally defining a transmission range that keeps the
transmission power control has other benefits, detailed be- network connected, wireless networks should adjust trans-
low. mission ranges on each link. Gomez and Campbell also

283
demonstrated that the average traffic capacity per node is −60
Experimental data
constant even if more nodes are added to a fixed area net- −65 Nominal strength
work, if this network employs transmission power control. Average noise

Signal strength (dBm)


−70
This is not true, however, if the transmission range if kept
−75
fixed. For such networks, the capacity decreases when more
nodes are added, since more nodes will interfere with each −80
other. −85
Transmission power control is an active line of study in −90
MANETs. Several MAC protocols employing this technique −95
have been proposed. PCMA (Power Controlled Multiple Ac- −100
cess) is a MAC protocol which provides communication at 0 10 20 30 40 50 60 70 80 90 100
minimum propagation ranges, allowing spatial reuse [15]. Distance (m)
Agarwal et al. proposed a distributed power control algo-
rithm for MANETs [1]. Pires et al. improved this algorithm
by adding a table in each node, which stores the transmis- Figure 2: Received signal strength when varying the
sion power used on previous transmissions [16]. In order distance among nodes.
to mitigate asymmetric links caused by transmission power
variation, Jung & Vaidya proposed that transmission power
should be adjusted for every transmitted byte [8]. Mica Motes 2 platform [6]. The “Nominal strength” curve
The transmission power control techniques developed for shows the expected behavior of the signal, while the “Ex-
MANETs do not apply to WSNs. Since the calculation perimental data” curve shows empirical data. We infer from
performed is complex and imprecise in the transceivers em- those curves that reception strength is inversely proportional
ployed in WSNs, current MAC protocols for WSNs do not to the distance between the transmitter and receiver. The
implement transmission power control [11, 17, 22]. Our im- average noise, however, suffered no significant changes.
plementation of transmission power control improves net- Signal propagation occurs differently for indoor and out-
work operation by minimizing contention and decreasing the door environments, thus propagation models are specific to
amount of energy required for communication. Our solution each type of environment [4, 12]. Although such models can
employs a transmission power calculation adapted to the be used to provide a fair approximation of the ideal trans-
restrictions found in WSNs. Also, we use tables to store the mission power needed to reach a node, those models are too
minimum transmission power, as in current solutions. costly to be executed in a sensor node. Thus, new algo-
rithms, suitable to the scarce resources in WSNs, must be
4. ASSESSING THE IDEAL TRANSMISSION developed. Two methods are described below.
POWER 4.1 Assessing the Ideal Transmission Power
In order to identify the ideal transmission power, nodes Through Node Interaction
must perform calculations based on several readings from
The ideal transmission power can be dynamically deter-
the transceiver and the battery. Those are:
mined by the interaction of nodes. Transceivers transmit
data at only a few power levels. The transceiver used in
• RSSI (Received Signal Strength Indicator): is the sig-
the Mica Motes 2 platform, for example, provides 22 differ-
nal strength measured by the transceiver at its input
ent levels, separated at roughly 1 dBm [2]. The switching
interface. RSSI measurements are used to calculate
between different power levels takes 20 µs. Since the num-
the signal strength when receiving incoming data and
ber of possibilities is quite small, it is possible to iterate
the noise at the medium. Prec,Ptrans
over the available power levels, increasing or decreasing the
• Sensitivity: is the least energetic power level at which transmission power when necessary.
the transceiver is able to detect and decode data cor- The proposed algorithm calculates the ideal transmission
rectly. If any transmission is received at a power level power by repeated refinements, and operates in two phases.
below this limit, data will be garbled. Figure 3 shows the operation of the algorithm. In the first
phase, the ideal transmission power is determined, while
• Battery voltage: RSSI values read from the radio are in the second phase the transmission power is dynamically
calculated with battery voltage as a reference. Thus, in adapted to any environmental change. Initially, the ideal
order to convert any RSSI reading to the actual recep- transmission power is set to the maximum value allowed by
tion power, the voltage at the moment of the reception the transceiver. Nodes wishing to determine the ideal trans-
must be known. Pthres mission power send a power query message (MP Q ) piggy-
backed in data packets at the “current” ideal transmission
In a successful transmission, the received signal strength power, and await for a confirmation of reception, such as
is superior to the average noise at the receiver (the sig- an acknowledgement (ACK) packet. If the reception is con-
nal strength sampled when there are no ongoing transmis- firmed, the transmitter decreases the ideal transmission po-
sions on the medium). Communication quality also de- wer by one level, and sends another MP Q message. When
pends on factors such as distance among the receiver and the reception of a MP Q message is not confirmed, the trans-
the transmitter and the existence of sources of reflection, mitter assumes that the ideal transmission power was found,
refraction and dispersion. Figure 2 presents the received and the second phase of operation starts.
signal strength for transmissions at 5 dBm, when varying In the second phase of the algorithm, nodes use ACKs
the distance among the transmitter and the receiver, in the to determine if the ideal transmission power should be in-

284
First phase of
the algorithm
Second phase
of the algorithm
• The received signal must be higher than the noise sam-
pled at the receiver (the base noise, or NB ) by a certain
P TX =
Standard P
threshold (SIN Rthreshold ), as described in equation
TX Send data
messages at No 4. This is needed to correctly differentiate data from
P TX
noise.
Pthres = SIN Rthreshold × NB
Send M PQ at Prec = PT Xmin ≥ (4)
P TX No GA→B
L D consective LI consective
No
This method works as follows. Nodes periodically sample
msgs msgs not
ACK’d? ACK’d?
M PQ ACK’d?
Yes Yes
the signal strength when no transmissions occur, in order to
Yes Decrease P TX Increase P TX
determine the base noise (NB ). If node A wishes to com-
Decrease P TX
one power
level
one power
level
municate with node B, it transmits a packet to B at the
one power
level
standard transmission power (PT X ). When B receives the
packet from A, it determines the received signal strength
(PRX , or reception power) and calculates the ideal trans-
Figure 3: Operation of the interactive algorithm. mission power (PT Xideal ) from A to B using equation 5.
This calculation outputs the transmission value that satis-
fies equations 3 and 4. Next, B sends the calculated power
creased or decreased. If a number of consecutive transmis- to A, which will transmit subsequent messages to B at this
sions are not confirmed with ACKs (this number is called power level. In order to dynamically adjust the ideal power
the increase threshold level, or LI ), the ideal transmission transmission, node A always sends in its packets to B at
power is increased one level. Since the noise can also de- the current transmission power. B, in turn, recalculates the
crease due to environmental changes, communication can ideal transmission power, and sends this value to A piggy-
also improve, thus the transmission power is lowered if a backed in the ACK messages.
certain number of consecutive messages are successfully re- Neural Network instead of constant
ceived (this number is called the decrease threshold level, or ţ
packet exchange
ű
LD ). The values of LI and LD must be adjusted according RXthreshold SIN Rthreshold × NB
PT Xideal = max , (5)
to the typical throughput of the application, avoiding that GA→B GA→B
the algorithm reacts too late to variations in link reliabil-
ity when the throughput is low, or that such changes are The ideal transmission power is directional, that is, it de-
too frequent when the throughput is high. The algorithm pends on the direction of the communication. However, the
treats node failures and transmission failures as being the attenuation from A to B (GA→B , or gain) is considered to
same, since the use of ACKs to assess link reliability does be symmetric in our calculations. The transmission power
not allow a distinction of such events. Broadcast packets must ensure that the signal is received in B without er-
are always transmitted at a fixed power, since those packets rors. For this purpose, some values must be determined
are not acknowledged. empirically, such as radio sensitivity (RXthreshold ) and the
SIN Rthreshold , since they vary for each transceiver.
4.2 Assessing the Ideal Transmission Power Sensor nodes provide integer values as output for RSSI
Through Signal Attenuation readings, which must be converted to values in dBm. Since
The ideal transmission power can also be calculated as a current sensor nodes do not perform floating point arith-
function of signal attenuation, and must satisfy the following metics, the calculation must be made with integers, compro-
conditions [15]1 : mising its precision. Besides, readings from the transceiver
and battery vary over time, thus the calculation must be
• The transmission power must lie within the boundaries adjusted to avoid subtle variations. The challenge of calcu-
imposed by the transceiver (equation 1): lating the transmission power through attenuation resides
in defining a precise, stable and efficient algorithm, which
PT Xlower ≤ PT Xmin ≤ PT Xupper (1)
can be implemented with the operations provided by the
micro-controller.
• The transmission power must compensate the attenua-
tion imposed by the propagation of the signal from the 4.3 Storing the Ideal Transmission Power
sender (node A) to the receiver (node B), guaranteeing To communicate at the ideal transmission power without
that the received signal power is higher than the min- requiring a calculation before every packet transmission, the
imum desired sensitivity of the radio (RXthreshold ). protocol stores the current ideal transmission for each neigh-
This attenuation is asymmetric, and is inferred by the bor node [16]. Thus, nodes first query their tables in order
transmitted and the received power (equation 2): to detect if the ideal transmission power was already cal-
culated. If it was, then data will be sent at this power. If
PRX it was not, the power transmission calculation is executed,
GA→B = (2)
PT X and the result is stored on the table for future use. Table
Thus, the ideal transmission power must satisfy equa- 1 shows the fields stored in the table. Each node stores the
tion 3: ideal transmission power, coded as the bit configuration that
RXthreshold must be fed into the radio in order to transmit at the ideal
PT Xmin ≥ (3)
GA→B power (P otT x). A control variable (N oReduce) indicates
if the ideal power has been calculated, while the Addr field
1
The relations are expressed in mW for clarity. stores the MAC address of the neighbor.

285
the needs of the application. We conducted empirical mea-
Table 1: Fields stored and their memory consump- surements to determine some parameters used in B-MAC-
tion in the Mica Motes 2 platform. PC. Those measurements are briefly described below.
Field Size Description
P otT x 1 byte Ideal Tx. power
Interactive method (B-MAC-PCI). The ideal values
N oReduce 1 byte Ideal Tx. power already calculated? for LI (number of ACKs lost to increase the transmission
Addr 2 bytes MAC address of the neighbor power) and LD (number of ACKs received to decrease the
transmission power) were adjusted to minimize packet losses,
as shown in figure 4. When increasing LD , less packets
Since the noise is dynamic, and nodes may move or leave are lost, but the method responds slowly to environmental
the network, entries on the table are invalidated if no trans- changes. For LI , the behavior is the opposite. LI should
missions occur after some time. This avoids that nodes be set to a small value, since it responds rapidly to varia-
transmit data at the wrong power after extended periods tions in the noise. Figures 5 and 6 show the behavior of
of silence. the transmission power when varying LD and LI , respec-
tively. Figure 5 shows that higher values of LD keep the
5. EVALUATION transmission power more stable, while smaller values of LI
increase energy consumption, since the transmission power
To evaluate the efficiency of the proposed transmission
is more easily and frequently increased, as shown in Figure
power control techniques, we conducted experiments in the
6. For small values of LI , errors in bursts might significantly
Mica Motes 2 platform, modifying its standard MAC proto-
increase the transmission power.
col, called B-MAC, to transmit packets at the ideal trans-
mission power. The version employing the iterative method
is called B-MAC-PCI, while the version employing the atte- 70%
LI = 1
nuation method is called B-MAC-PCA. 60% LI = 2
LI = 3
50% LI = 4
5.1 B-MAC Protocol

Packets lost (%)


The B-MAC protocol was tailored to event-driven appli- 40%
cations [17], and aims to be energy-efficient, avoid collisions 30%
and be simple, reducing code size. In order to broaden its 20%
applicability, B-MAC provides interfaces to reconfigure most
10%
of its parameters.
Since B-MAC does not employ channel reservation (RTS/ 0%
1 2 3 4 8
CTS messages), the protocol mitigates collisions with an
LD
heuristic called CCA (Clear Channel Assessment), which is
used to identify transmissions in the medium. This heuristic
periodically samples the signal strength when there are no Figure 4: Average packet losses when varying LD
ongoing transmissions in order to determine the maximum and LI .
noise level (the base noise). If the sampled signal strength is
higher than the base noise, the protocol detects an ongoing
transmission. −6
LD = 1
Idle-listening is minimized with the use of a duty cy- −8 LD = 8
Transmission power (dBm)

cle. Nodes periodically sample the channel, using the CCA


−10
heuristic, to check for transmissions. If a transmission is
identified, nodes enter the reception mode. To ensure that −12
every packet sent is received by all nodes, preambles must −14
be as long as the inactive period of the duty cycle. This
−16
asynchronous channel listening method is called LPL (Low
Power Listening). −18
−20
5.2 B-MAC-PC Protocols 20 40 60 80 100 120
The B-MAC-PC protocol was implemented in the TinyOS Packets sent
operating system [13], over the B-MAC protocol. In order to
further increase energy savings, power control information is Figure 5: Transmission power behavior when vary-
piggy-backed in data and acknowledgement (ACK) packets. ing LD .
The power control information increased the data packet
size by 3 bytes (one byte for the transmitted power, and 2 Attenuation method (B-MAC-PCA). The values of
bytes for the sender address). ACK packets are increased in RXthreshold and SIN Rthreshold were defined in experiments
5 bytes (2 bytes for the sender address, another 2 bytes for where we varied the distance between nodes from 5 to 100m
the receiver address, and one byte for the ideal transmission in increments of 5m, in an outdoor area free of obstacles. We
power). employed two mica2 motes elevated 1.5m from the ground,
Besides transmitting additional fields at each packet, B- transmitting data packets at 5dBm in 100ms intervals. The
MAC-PC employs a transmission power table, described in empirical data was fed into the Friis formula [4], in order to
section 4.3. This table stores information of up to 20 neigh- identify the values of RXthreshold and SIN Rthreshold which
bors. As nodes might not send unicast messages to every best matched the expected values. The theoretical values
neighbor, the size of the table can be reduced according to and the empirical data are shown in figure 2. From this

286
−6 100
LI = 1
LI = 4 90
−8

Transmission power (dBm)

Average delivery rate (%)


80
−10
70
−12 60
−14 50
40
−16
30
−18 B−MAC−PCI
20 B−MAC−PCA
−20 B−MAC
10
20 40 60 80 100 120 4 6 8 10 12 14 16 18 20
Packets sent Distance among receiver and transmitter nodes (m)

Figure 6: Transmission power behavior when vary- Figure 7: Average delivery rate.
ing LI .

tances of 15m or more, the standard transmission power is


experiment we determined SIN Rthreshold as 10 dBm, and barely enough to reach the nodes (as shown in Figure 7),
RXthreshold as -85 dBm. thus BMAC’s link quality decreases. In those distances, B-
MAC-PC increases the transmission power in order to main-
5.3 Experimental Results tain an acceptable link quality, also increasing the energy
consumed. However, this increase is compensated by a much
We measured the behavior of B-MAC and B-MAC-PC
higher packet delivery rate.
when varying the distance between the receiver and the
transmitter. Our experiment consisted of two Mica Motes
2 nodes. The first node sent 400 messages destined to the 4

second node, at a rate of four messages per second. The 3


2

Transmission power (dBm)


experiments were made in an outdoor area, free of any ob-
1
stacles. We chose to use only two nodes in order to avoid in-
0
terference with other nodes. Nodes were placed 71cm above
−1
the ground to avoid reflection and absorption phenomena.
−2
Node distance was varied from 5 to 20 meters. LI was set −3
to one, and LD was set to eight. In B-MAC, we employed −4 B−MAC−PCI
the standard transmission power, which is 0 dBm. All the −5 B−MAC−PCA
results are presented as an average of five independent ex- B−MAC
−6
periments, with confidence interval of 95%. 4 6 8 10 12 14 16 18 20
Figure 7 shows the delivery rates for the protocols. Both Distance among receiver and transmitter nodes (m)

the attenuation method (B-MAC-PCA) and the iterative


method (B-MAC-PCI) sustained nearly constant delivery Figure 8: Average transmission power.
rates when varying the distance among nodes. The iter-
ative method was the most stable, yielding approximately The causes of packet losses in B-MAC and in B-MAC-PC
87.5% of packets delivered. The attenuation method deliv- are shown in Figures 9 and 10, respectively. In B-MAC,
ered from 79% up to 86% of the packets. B-MAC results, for distances up to 10m, half of the lost packets are due to
on the other hand, are dependent on the distance among CRC errors, and the other half is lost because the preamble
nodes. It ranges from an outstanding 98.5%, when nodes are is not detected. When distance increases, the most impor-
5m apart from each other, to 14.2% for 20m of separation. tant cause of packet losses is preamble decoding. When
This is mostly due to the reception power, which increases analysing the results for B-MAC-PC (Figure 10), we iden-
the bit error rate of the channel. For distances of 25 meters tified that a lost preamble is the most significant cause of
(not shown), the transmission power in B-MAC is insuffi- packet losses, accounting for roughly 76% of the total in
cient, and no packets are received, while both B-MAC-PC the iterative method (“I” bars), and 66% of all losses in the
protocols kept their delivery rates intact. When compared attenuation method (the “A” bars). Thus, both B-MAC and
to B-MAC in distances of 5 and 10m, however, both power B-MAC-PC would benefit from a preamble seek algorithm
control methods achieved lower delivery rates. This is due more resilient to bit errors.
to the transmission power adjustment algorithms, and will The attenuation and iterative methods showed frequent
be explained later on this section. variations in the transmission power, as shown in Figure 11.
Figure 8 presents the transmission power. For distances On the attenuation method, the transmission power varies
of 5 and 10 meters, B-MAC-PCI and B-MAC-PCA decrease on each packet, and is subject to sudden variations in noise
the standard transmission power from 0 dBm to -5.7 dBm and medium attenuation, which might cause transmission
and -4.7 dBm, respectively. Meanwhile, B-MAC still trans- errors. The iterative method, on the other hand, always
mits at the standard power, consuming more energy. The tries to reduce the transmission power when LD ACKs are
use of lower transmission power allows energy savings of received. This, however, might not be a wise decision if the
27% and 21% over B-MAC when using B-MAC-PCI and B- transmission power is already close to the base noise. In
MAC-PCA, for a distance of 5m. For a distance of 10m, those situations, future versions of the algorithm will stop
this economy drops to 6.9% and 8%, respectively. For dis- decrementing the transmission power. Ideally, the transmis-

287
90
No Preamble
the expected value, and the average error is slightly higher
80 CRC than the error incurred in rounding, which is the minimum
70 amount of error expected in such calculations. We also ran
60 the calculation in a simulator for the processor found in the
Packets lost (%)
50 Mica Motes 2 platform. Results for 20,480 runs of the code
40 with no compiler optimizations showed that the calculation
30 takes 834.17 cycles (208.54µs) on average. We chose not to
20
use any compiler optimization, since initial testing showed
10
that the compiler was artificially speeding up the calculation
by storing frequently used values. Compiler optimizations,
0
0 5 10 15 20 25 however, may be valuable in a real implementation.
Distance among receiver and transmitter nodes (m)
Property Value
Figure 9: Cause of packet losses in B-MAC. Number of runs 7929
Average error 0.2887 dBm
Maximum error 0.7526 dBm
22 Minimum error 0.0013 dBm
20
18 First quartile of the error 0.1178 dBm
Packets lost (%)

16 Median of the error 0.2342 dBm


14
12
10
Table 2: Precision of the transmission power calcu-
8 lation.
6
4
0 5 10 15 20 25
Distance among receiver and transmitter nodes (m) 6. CONCLUSIONS AND FUTURE WORK
No Preamble (I) Among the tasks performed by sensor nodes, communi-
CRC (I)
No Preamble (A) cation consumes most of the energy. Thus, medium ac-
CRC (A)
cess control protocols for Wireless Sensor Networks (WSNs)
must employ energy-saving algorithms. Transmission po-
Figure 10: Cause of packet losses in B-MAC-PC wer control is one such mechanism, however it has not been
(interactive and attenuation). used in WSNs due to the limitations imposed by the sensor
nodes. This paper presented and evaluated, through simu-
lations and experiments, two transmission control methods
sion power would change only when a significant variation in
developed for WSNs. Those methods allow the definition
noise occurs, that is, the methods should be less susceptible
of new protocols, which increase network lifetime and per-
to ephemeral variations. We plan to incorporate concepts
formance by adjusting the transmission power in order to
from signal filtering disciplines in the algorithm to avoid fre-
spend the minimum amount of energy needed to reach the
quent transmission power variations. This is a challenging
receiver with a good communication quality. Results showed
task, as signal filter algorithms must be small and efficient
that transmission power control is an effective method to de-
in order to run in the restricted processors found in current
crease energy consumption, and incurs in a negligible loss in
sensor nodes.
packet delivery rates.
As future work, we intend to perfect the transmission po-
5 wer algorithms in order to avoid frequent transmission po-
4 wer variations. Also, results showed that the use of differ-
Transmission power (dBm)

3 ent preamble sizes and various preamble identification algo-


2 rithms might decrease packet losses. The transmission po-
1 wer control technique may benefit from channel reservation,
0 exploring RTS/CTS messages to improve the performance
−1 of the transmission power calculation. Finally, the proposed
−2 algorithms will be evaluated in more diverse conditions, such
−3 Iterative method as scenarios with mobility, and harsher indoor and outdoor
Attenuation method
−4 environments.
0 50 100 150 200 250 300 350 400
Packet number
7. ACKNOWLEDGEMENTS
Figure 11: Transmission power variation in time. The development and studies described in this paper were
completed as part of Sensornet project (www.sensornet.dcc.
ufmg.br), funded by CNPq/Ministry of Science and Techno-
5.4 Simulation Results logy/Brazil (Scientific and Technological Development Coun-
The precision of the attenuation calculation was evalu- cil). Some scholarships were given by CAPES/Ministry of
ated in a PC, using logs from previous experiments. Since Education/Brazil (Coordination for the Improvement of Hi-
nodes do not support floating point operations, the calcu- gher Education Personnel Foundation).
lation must be made with integers. Table 2 shows that re-
sults calculated in the node using integers are very close to

288
8. REFERENCES E. Brewer, and D. Culler. TinyOS: An operating
[1] S. Agarwal, S. Krishnamurthy, R. Katz, and S. Dao. system for wireless sensor networks. In W. Weber,
Distributed power control in ad hoc wireless networks. J. Rabaey, and E. Aarts, editors, Ambient Intelligence.
In Personal and Indoor Mobile Radio Communication Springer-Verlag, New York, NY, 2004.
(PIMRC), volume 2, pages 59–66. IEEE, October [14] Michaela Cardei and Jie Wu. Energy-Efficient
2001. Coverage Problems in Wireless Ad Hoc Sensor
[2] CC 1000. Chipcon corporation. CC1000 low power Networks. Journal of Computer Communications on
FSK transceiver. http://www.chipcon.com, March Sensor Networks, 2004.
2005. [15] J. P. Monks. Transmission Power Control for
[3] L. H. A. Correia, D. F. Macedo, A. L. dos Santos, Enhancing the performance of wireless packet data
J. M. Nogueira, and A. A. F. Loureiro. A taxonomy networks. Doctor of philosophy, University of Illinois
for medium access control protocols in wireless sensor at Urbana-Champaign, 2001.
network. Annals of telecommunications, 2005. to [16] A. A. Pires, J. F. de Rezende, and C. Cordeiro.
appear. ALCA: A new scheme for power control on 802.11 ad
[4] H. T. Friis. A note on a simple transmission formula. hoc networks. In IEEE International Symposium on a
Proc. IRE, 34:254–256, 1946. World of Wireless, Mobile and Multimedia Networks
[5] J. Gomez and A. T. Campbell. A case for (WoWMoM), pages 475–477, June 2005.
variable-range transmission power control in wireless [17] J. Polastre, J. Hill, and D. Culler. Versatile low power
multihop networks. In Proceedings of the IEEE media access for wireless sensor networks. In
INFOCOM, volume 2, pages 1425–1436, March 2004. Proceedings of the 2nd international conference on
[6] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and Embedded networked sensor systems, pages 95–107.
K. Pister. System architecture directions for ACM Press, 2004.
networked sensors. In ASPLOS-IX: Proceedings of the [18] N. Reijers, G. Halkes, and K. Langendoen. Link layer
ninth international conference on Architectural measurements in sensor networks. In 1st IEEE Int.
support for programming languages and operating Conference on Mobile Ad hoc and Sensor Systems
systems, pages 93–104. ACM Press, 2000. (MASS ’04), Oct 2004.
[7] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and [19] S. Tilak, N. B. Abu-Ghazaleh, and W. Heinzelman.
E. Cayirci. A Survey on Sensor Networks. IEEE Infrastructure Trade-offs Sensor Networks. In First
Communications, 40(8):102–114, 2002. International Workshop on Wireless Sensor Networks
[8] E.-S. Jung and N. H. Vaidya. A power control MAC and Applications, Electrical and Computer
protocol for ad hoc networks. In Proceedings of the 8th Engineering, 2002.
annual international conference on Mobile computing [20] A. Woo and D. E. Culler. A transmission control
and networking, pages 36–47. ACM Press, 2002. scheme for media access in sensor networks. In Mobile
[9] P. Karn. A New Channel Access Protocol for Packet Computing and Networking, pages 221–235, 2001.
Radio. In American Radio Relay League – 9th [21] A. Woo, T. Tong, and D. Culler. Taming the
Computer Networking Conference, April 1990. underlying challenges of reliable multihop routing in
[10] D. Lal, A. Manjeshwar, F. Herrmann, sensor networks. In Proceedings of the first
E. Uysal-Biyikoglu, and A. Keshavarzian. international conference on Embedded networked
Measurement and characterization of link quality sensor systems, pages 14–27. ACM Press, 2003.
metrics in energy constrained wireless sensor [22] W. Ye, J. Heidemann, and D. Estrin. An
networks. In IEEE GLOBECOM, pages 172–187, energy-efficient mac protocol for wireless sensor
December 2003. networks. In Proceedings of the IEEE INFOCOM,
[11] K. Langendoen and G. Halkes. Energy-efficient pages 1567–1576, New York, NY, USA, June 2002.
medium access control. In R. Zurawski, editor, [23] G. Zhou, T. He, S. Krishnamurthy, and J. A.
Embedded Systems Handbook. CRC Press, 2005. Stankovic. Impact of radio irregularity on wireless
[12] W. C. Lee. Mobile Communications Engineering. sensor networks. In Proceedings of the 2nd
McGraw-Hill Professional, 1982. international conference on Mobile systems,
applications, and services, pages 125–138. ACM Press,
[13] P. Levis, S. Madden, J. Polastre, R. Szewczyk,
2004.
K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh,

289

You might also like