Professional Documents
Culture Documents
Sensor Networks
∗
Luiz H. A. Correia Daniel F. Macedo Daniel A. C. Silva
lcorreia@dcc.ufmg.br damacedo@dcc.ufmg.br daniacs@dcc.ufmg.br
†
Aldri L. dos Santos Antonio A. F. Loureiro José Marcos S. Nogueira
aldri@dcc.ufmg.br loureiro@dcc.ufmg.br jmarcos@dcc.ufmg.br
Computer Science Department
Federal University of Minas Gerais
Av. Antônio Carlos, 6627
Belo Horizonte, MG, Brazil
ABSTRACT Keywords
Medium access control (MAC) protocols manage energy con- Transmission power control, wireless sensor networks, me-
sumption on the network element during communication, dium access control
which is the most energy-consuming event on Wireless Sen-
sor Networks (WSNs). One method to mitigate energy con-
sumption is to adjust transmission power. This paper pre- 1. INTRODUCTION
sents two approaches to adjust transmission power in WSNs. Wireless Sensor Networks (WSNs) are a subclass of tra-
The first approach employs dynamic adjustments by ex- ditional mobile ad hoc networks (MANETs), and consist of
change of information among nodes, and the second one a large number of sensor nodes, composed of processor, me-
calculates the ideal transmission power according to sig- mory, battery, sensor devices and transceiver. These nodes
nal attenuation in the link. The proposed algorithms were send monitoring data to an access point (AP), which is res-
implemented and evaluated with experiments, comparing ponsible for forwarding data to the users [7]. Unlike tradi-
their results with B-MAC, the standard MAC protocol in tional ad hoc networks, in general, it is not possible to re-
the Mica Motes 2 platform. Results show that transmission place or recharge node batteries due to the number of nodes
power control is an effective method to decrease energy con- deployed or inhospitable environmental conditions. Hence,
sumption, and incurs in a negligible loss in packet delivery energy conservation is a critical factor in WSNs.
rates. For node distances of 5m, the proposed transmission Severe hardware and energy constraints preclude the use
power control techniques decrease energy consumption by of protocols developed for MANETs, which comparatively
27% over B-MAC. possess more resources. The strict requirements force net-
working protocols to be as much energy-efficient as possi-
ble. Medium access control (MAC) protocols, for example,
Categories and Subject Descriptors modify transceiver parameters or even the topology of the
C.2.1 [Computer-Communication Networks]: Network network in order to reduce the energy consumption. One of
Architecture and Design—Wireless communication those parameters is the transmission power that, besides re-
ducing energy consumption, also provides higher throughput
due to the reduced number of collisions and the establish-
General Terms ment of links with lower bit error rates [5, 8, 9, 15].
Algorithms, Performance, Experimentation Although an effective mechanism to reduce energy con-
sumption, transmission power control is not implemented
∗Also affiliated to Federal University of Lavras, Brazil.
in any existing MAC protocol for WSNs. This occurs due
†Also affiliated to Federal University of Ceará, Brazil. to the highly imprecise nature of readings provided by the
transceiver, and also due to the restricted resources found in
current nodes. Those factors difficult an accurate calcula-
tion of the ideal transmission power. To our knowledge, this
Permission to make digital or hard copies of all or part of this work for is the first paper that performs experiments on transmission
personal or classroom use is granted without fee provided that copies are power control. Current works are limited to simulations,
not made or distributed for profit or commercial advantage and that copies which assume that readings are precise, and the transmis-
bear this notice and the full citation on the first page. To copy otherwise, to sion range can be assigned to any arbitrary value, which is
republish, to post on servers or to redistribute to lists, requires prior specific not the case on real hardware. Our paper considers all those
permission and/or a fee.
MSWiM’05, October 10–13, 2005, Montreal, Quebec, Canada. limitations, since it is based in experiments with production
Copyright 2005 ACM 1-59593-188-0/05/0010 ...$5.00. hardware used by a number of researchers [17, 20, 21, 22].
282
In this paper we propose transmission power control pro- Collision
283
demonstrated that the average traffic capacity per node is −60
Experimental data
constant even if more nodes are added to a fixed area net- −65 Nominal strength
work, if this network employs transmission power control. Average noise
284
First phase of
the algorithm
Second phase
of the algorithm
• The received signal must be higher than the noise sam-
pled at the receiver (the base noise, or NB ) by a certain
P TX =
Standard P
threshold (SIN Rthreshold ), as described in equation
TX Send data
messages at No 4. This is needed to correctly differentiate data from
P TX
noise.
Pthres = SIN Rthreshold × NB
Send M PQ at Prec = PT Xmin ≥ (4)
P TX No GA→B
L D consective LI consective
No
This method works as follows. Nodes periodically sample
msgs msgs not
ACK’d? ACK’d?
M PQ ACK’d?
Yes Yes
the signal strength when no transmissions occur, in order to
Yes Decrease P TX Increase P TX
determine the base noise (NB ). If node A wishes to com-
Decrease P TX
one power
level
one power
level
municate with node B, it transmits a packet to B at the
one power
level
standard transmission power (PT X ). When B receives the
packet from A, it determines the received signal strength
(PRX , or reception power) and calculates the ideal trans-
Figure 3: Operation of the interactive algorithm. mission power (PT Xideal ) from A to B using equation 5.
This calculation outputs the transmission value that satis-
fies equations 3 and 4. Next, B sends the calculated power
creased or decreased. If a number of consecutive transmis- to A, which will transmit subsequent messages to B at this
sions are not confirmed with ACKs (this number is called power level. In order to dynamically adjust the ideal power
the increase threshold level, or LI ), the ideal transmission transmission, node A always sends in its packets to B at
power is increased one level. Since the noise can also de- the current transmission power. B, in turn, recalculates the
crease due to environmental changes, communication can ideal transmission power, and sends this value to A piggy-
also improve, thus the transmission power is lowered if a backed in the ACK messages.
certain number of consecutive messages are successfully re- Neural Network instead of constant
ceived (this number is called the decrease threshold level, or ţ
packet exchange
ű
LD ). The values of LI and LD must be adjusted according RXthreshold SIN Rthreshold × NB
PT Xideal = max , (5)
to the typical throughput of the application, avoiding that GA→B GA→B
the algorithm reacts too late to variations in link reliabil-
ity when the throughput is low, or that such changes are The ideal transmission power is directional, that is, it de-
too frequent when the throughput is high. The algorithm pends on the direction of the communication. However, the
treats node failures and transmission failures as being the attenuation from A to B (GA→B , or gain) is considered to
same, since the use of ACKs to assess link reliability does be symmetric in our calculations. The transmission power
not allow a distinction of such events. Broadcast packets must ensure that the signal is received in B without er-
are always transmitted at a fixed power, since those packets rors. For this purpose, some values must be determined
are not acknowledged. empirically, such as radio sensitivity (RXthreshold ) and the
SIN Rthreshold , since they vary for each transceiver.
4.2 Assessing the Ideal Transmission Power Sensor nodes provide integer values as output for RSSI
Through Signal Attenuation readings, which must be converted to values in dBm. Since
The ideal transmission power can also be calculated as a current sensor nodes do not perform floating point arith-
function of signal attenuation, and must satisfy the following metics, the calculation must be made with integers, compro-
conditions [15]1 : mising its precision. Besides, readings from the transceiver
and battery vary over time, thus the calculation must be
• The transmission power must lie within the boundaries adjusted to avoid subtle variations. The challenge of calcu-
imposed by the transceiver (equation 1): lating the transmission power through attenuation resides
in defining a precise, stable and efficient algorithm, which
PT Xlower ≤ PT Xmin ≤ PT Xupper (1)
can be implemented with the operations provided by the
micro-controller.
• The transmission power must compensate the attenua-
tion imposed by the propagation of the signal from the 4.3 Storing the Ideal Transmission Power
sender (node A) to the receiver (node B), guaranteeing To communicate at the ideal transmission power without
that the received signal power is higher than the min- requiring a calculation before every packet transmission, the
imum desired sensitivity of the radio (RXthreshold ). protocol stores the current ideal transmission for each neigh-
This attenuation is asymmetric, and is inferred by the bor node [16]. Thus, nodes first query their tables in order
transmitted and the received power (equation 2): to detect if the ideal transmission power was already cal-
culated. If it was, then data will be sent at this power. If
PRX it was not, the power transmission calculation is executed,
GA→B = (2)
PT X and the result is stored on the table for future use. Table
Thus, the ideal transmission power must satisfy equa- 1 shows the fields stored in the table. Each node stores the
tion 3: ideal transmission power, coded as the bit configuration that
RXthreshold must be fed into the radio in order to transmit at the ideal
PT Xmin ≥ (3)
GA→B power (P otT x). A control variable (N oReduce) indicates
if the ideal power has been calculated, while the Addr field
1
The relations are expressed in mW for clarity. stores the MAC address of the neighbor.
285
the needs of the application. We conducted empirical mea-
Table 1: Fields stored and their memory consump- surements to determine some parameters used in B-MAC-
tion in the Mica Motes 2 platform. PC. Those measurements are briefly described below.
Field Size Description
P otT x 1 byte Ideal Tx. power
Interactive method (B-MAC-PCI). The ideal values
N oReduce 1 byte Ideal Tx. power already calculated? for LI (number of ACKs lost to increase the transmission
Addr 2 bytes MAC address of the neighbor power) and LD (number of ACKs received to decrease the
transmission power) were adjusted to minimize packet losses,
as shown in figure 4. When increasing LD , less packets
Since the noise is dynamic, and nodes may move or leave are lost, but the method responds slowly to environmental
the network, entries on the table are invalidated if no trans- changes. For LI , the behavior is the opposite. LI should
missions occur after some time. This avoids that nodes be set to a small value, since it responds rapidly to varia-
transmit data at the wrong power after extended periods tions in the noise. Figures 5 and 6 show the behavior of
of silence. the transmission power when varying LD and LI , respec-
tively. Figure 5 shows that higher values of LD keep the
5. EVALUATION transmission power more stable, while smaller values of LI
increase energy consumption, since the transmission power
To evaluate the efficiency of the proposed transmission
is more easily and frequently increased, as shown in Figure
power control techniques, we conducted experiments in the
6. For small values of LI , errors in bursts might significantly
Mica Motes 2 platform, modifying its standard MAC proto-
increase the transmission power.
col, called B-MAC, to transmit packets at the ideal trans-
mission power. The version employing the iterative method
is called B-MAC-PCI, while the version employing the atte- 70%
LI = 1
nuation method is called B-MAC-PCA. 60% LI = 2
LI = 3
50% LI = 4
5.1 B-MAC Protocol
286
−6 100
LI = 1
LI = 4 90
−8
Figure 6: Transmission power behavior when vary- Figure 7: Average delivery rate.
ing LI .
287
90
No Preamble
the expected value, and the average error is slightly higher
80 CRC than the error incurred in rounding, which is the minimum
70 amount of error expected in such calculations. We also ran
60 the calculation in a simulator for the processor found in the
Packets lost (%)
50 Mica Motes 2 platform. Results for 20,480 runs of the code
40 with no compiler optimizations showed that the calculation
30 takes 834.17 cycles (208.54µs) on average. We chose not to
20
use any compiler optimization, since initial testing showed
10
that the compiler was artificially speeding up the calculation
by storing frequently used values. Compiler optimizations,
0
0 5 10 15 20 25 however, may be valuable in a real implementation.
Distance among receiver and transmitter nodes (m)
Property Value
Figure 9: Cause of packet losses in B-MAC. Number of runs 7929
Average error 0.2887 dBm
Maximum error 0.7526 dBm
22 Minimum error 0.0013 dBm
20
18 First quartile of the error 0.1178 dBm
Packets lost (%)
288
8. REFERENCES E. Brewer, and D. Culler. TinyOS: An operating
[1] S. Agarwal, S. Krishnamurthy, R. Katz, and S. Dao. system for wireless sensor networks. In W. Weber,
Distributed power control in ad hoc wireless networks. J. Rabaey, and E. Aarts, editors, Ambient Intelligence.
In Personal and Indoor Mobile Radio Communication Springer-Verlag, New York, NY, 2004.
(PIMRC), volume 2, pages 59–66. IEEE, October [14] Michaela Cardei and Jie Wu. Energy-Efficient
2001. Coverage Problems in Wireless Ad Hoc Sensor
[2] CC 1000. Chipcon corporation. CC1000 low power Networks. Journal of Computer Communications on
FSK transceiver. http://www.chipcon.com, March Sensor Networks, 2004.
2005. [15] J. P. Monks. Transmission Power Control for
[3] L. H. A. Correia, D. F. Macedo, A. L. dos Santos, Enhancing the performance of wireless packet data
J. M. Nogueira, and A. A. F. Loureiro. A taxonomy networks. Doctor of philosophy, University of Illinois
for medium access control protocols in wireless sensor at Urbana-Champaign, 2001.
network. Annals of telecommunications, 2005. to [16] A. A. Pires, J. F. de Rezende, and C. Cordeiro.
appear. ALCA: A new scheme for power control on 802.11 ad
[4] H. T. Friis. A note on a simple transmission formula. hoc networks. In IEEE International Symposium on a
Proc. IRE, 34:254–256, 1946. World of Wireless, Mobile and Multimedia Networks
[5] J. Gomez and A. T. Campbell. A case for (WoWMoM), pages 475–477, June 2005.
variable-range transmission power control in wireless [17] J. Polastre, J. Hill, and D. Culler. Versatile low power
multihop networks. In Proceedings of the IEEE media access for wireless sensor networks. In
INFOCOM, volume 2, pages 1425–1436, March 2004. Proceedings of the 2nd international conference on
[6] J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and Embedded networked sensor systems, pages 95–107.
K. Pister. System architecture directions for ACM Press, 2004.
networked sensors. In ASPLOS-IX: Proceedings of the [18] N. Reijers, G. Halkes, and K. Langendoen. Link layer
ninth international conference on Architectural measurements in sensor networks. In 1st IEEE Int.
support for programming languages and operating Conference on Mobile Ad hoc and Sensor Systems
systems, pages 93–104. ACM Press, 2000. (MASS ’04), Oct 2004.
[7] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and [19] S. Tilak, N. B. Abu-Ghazaleh, and W. Heinzelman.
E. Cayirci. A Survey on Sensor Networks. IEEE Infrastructure Trade-offs Sensor Networks. In First
Communications, 40(8):102–114, 2002. International Workshop on Wireless Sensor Networks
[8] E.-S. Jung and N. H. Vaidya. A power control MAC and Applications, Electrical and Computer
protocol for ad hoc networks. In Proceedings of the 8th Engineering, 2002.
annual international conference on Mobile computing [20] A. Woo and D. E. Culler. A transmission control
and networking, pages 36–47. ACM Press, 2002. scheme for media access in sensor networks. In Mobile
[9] P. Karn. A New Channel Access Protocol for Packet Computing and Networking, pages 221–235, 2001.
Radio. In American Radio Relay League – 9th [21] A. Woo, T. Tong, and D. Culler. Taming the
Computer Networking Conference, April 1990. underlying challenges of reliable multihop routing in
[10] D. Lal, A. Manjeshwar, F. Herrmann, sensor networks. In Proceedings of the first
E. Uysal-Biyikoglu, and A. Keshavarzian. international conference on Embedded networked
Measurement and characterization of link quality sensor systems, pages 14–27. ACM Press, 2003.
metrics in energy constrained wireless sensor [22] W. Ye, J. Heidemann, and D. Estrin. An
networks. In IEEE GLOBECOM, pages 172–187, energy-efficient mac protocol for wireless sensor
December 2003. networks. In Proceedings of the IEEE INFOCOM,
[11] K. Langendoen and G. Halkes. Energy-efficient pages 1567–1576, New York, NY, USA, June 2002.
medium access control. In R. Zurawski, editor, [23] G. Zhou, T. He, S. Krishnamurthy, and J. A.
Embedded Systems Handbook. CRC Press, 2005. Stankovic. Impact of radio irregularity on wireless
[12] W. C. Lee. Mobile Communications Engineering. sensor networks. In Proceedings of the 2nd
McGraw-Hill Professional, 1982. international conference on Mobile systems,
applications, and services, pages 125–138. ACM Press,
[13] P. Levis, S. Madden, J. Polastre, R. Szewczyk,
2004.
K. Whitehouse, A. Woo, D. Gay, J. Hill, M. Welsh,
289