Fast Data Collection in Tree-Based Wireless Sensor Networks PDF
Fast Data Collection in Tree-Based Wireless Sensor Networks PDF
1, JANUARY 2012
Abstract—We investigate the following fundamental question—how fast can information be collected from a wireless sensor network
organized as tree? To address this, we explore and evaluate a number of different techniques using realistic simulation models under
the many-to-one communication paradigm known as convergecast. We first consider time scheduling on a single frequency channel
with the aim of minimizing the number of time slots required (schedule length) to complete a convergecast. Next, we combine
scheduling with transmission power control to mitigate the effects of interference, and show that while power control helps in reducing
the schedule length under a single frequency, scheduling transmissions using multiple frequencies is more efficient. We give lower
bounds on the schedule length when interference is completely eliminated, and propose algorithms that achieve these bounds. We
also evaluate the performance of various channel assignment methods and find empirically that for moderate size networks of about
100 nodes, the use of multifrequency scheduling can suffice to eliminate most of the interference. Then, the data collection rate no
longer remains limited by interference but by the topology of the routing tree. To this end, we construct degree-constrained spanning
trees and capacitated minimal spanning trees, and show significant improvement in scheduling performance over different deployment
densities. Lastly, we evaluate the impact of different interference and channel models on the schedule length.
Index Terms—Convergecast, TDMA scheduling, multiple channels, power control, routing trees.
1 INTRODUCTION
improvements, the simplest among which is an interfer- of aggregated convergecast. In this work, we
ence-aware, minimum-length TDMA scheduling that en- evaluate the behavior of an optimal power control
ables spatial reuse. To achieve further improvement, we algorithm [6] under realistic settings considering the
combine transmission power control with scheduling, and limited discrete power levels available in today’s
use multiple frequency channels to enable more concurrent radios. We find that for moderate size networks of
transmissions. We show that once multiple frequencies are 100 nodes, power control can reduce the schedule
employed along with spatial-reuse TDMA, the data collec- length by 15-20 percent.
tion rate often no longer remains limited by interference but . Evaluation of channel assignment methods. Using
by the topology of the network. Thus, in the final step, we extensive simulations, we show that scheduling
transmissions on different frequency channels is
construct network topologies with specific properties that
more effective in mitigating interference as com-
help in further enhancing the rate. Our primary conclusion
pared to transmission power control. We evaluate
is that combining these different techniques can provide an
the performance of three different channel assign-
order of magnitude improvement for aggregated converge- ment methods: 1) Joint Frequency Time Slot Scheduling
cast, and a factor of 2 improvement for raw-data con- (JFTSS), 2) Receiver-Based Channel Assignment [7], and
vergecast, compared to single-channel TDMA scheduling 3) Tree-Based Multichannel Protocol (TMCP) [8]. These
on minimum-hop routing trees. methods consider the channel assignment problem
Although the techniques of transmission power control at different levels: the link level, node level, or
and multichannel scheduling have been well studied for cluster level. We show that for aggregated conver-
eliminating interference in general wireless networks, their gecast, TMCP performs better than JFTSS and RBCA
performances for bounding the completion of data collec- on minimum-hop routing trees, while performs
tion in WSNs have not been explored in detail in the worse on degree-constrained trees. For raw-data
previous studies. The fundamental novelty of our approach convergecast, RBCA and JFTSS perform better than
lies in the extensive exploration of the efficiency of TMCP, since the latter suffers from interference
transmission power control and multichannel communica- inside the branches due to concurrent transmissions
tion on achieving fast convergecast operations in WSNs. on the same channel.
Besides, we evaluate the impact of routing trees on fast data . Impact of routing trees. We investigate the effect of
collection and to the best of our knowledge, this has not network topology on the schedule length, and show
been the topic of previous studies. As we will discuss in that for aggregated convergecast, the performance
Section 2, some of the existing work had the objective of can be improved by up to 10 times on degree-
minimizing the completion time of convergecasts. How- constrained trees using multiple frequencies as
ever, none of the previous work discussed the effect of compared to that on minimum-hop trees using a
multichannel scheduling together with the comparisons single frequency. For raw-data convergecast, multi-
of different channel assignment techniques and the impact channel scheduling on capacitated minimal span-
of routing trees and none considered the problems of ning trees (CMSTs) can reduce the schedule length
aggregated and raw convergecast, which represent two by 50 percent.
extreme cases of data collection, together. . Impact of channel models and interference. Under
As the new concepts in this paper, we introduce the setting of multiple frequencies, one simplifying
polynomial-time heuristics for TDMA scheduling for both assumption often made is that the frequencies are
types of data collection, i.e., Algorithms 1 and 2, and prove orthogonal to each other. We evaluate this assump-
that they do achieve the lower bound of data collection time tion and show that the schedules generated may
once interference is eliminated. Besides, we elaborate on the not always eliminate interference, thus causing
performance of our previous work, a receiver-based considerable packet losses. We also evaluate and
channel assignment (RBCA) method, and compare its compare the two most commonly used interference
efficiency with other channel assignment methods and models: 1) the graph-based protocol model, and
introduce heuristics for constructing optimal routing trees 2) the Signal-to-Interference-plus-Noise Ratio
to further enhance data collection rate. The following lists (SINR)-based physical model.
our key findings and contributions: The rest of the paper is organized as follows: in Section 2,
. Bounds on convergecast scheduling. We show that we discuss related works. In Section 3, we describe the
if all interfering links are eliminated, the schedule problem formulation and state our assumptions. In Section
length for aggregated convergecast is lower 4, we analyze the lower bounds on the schedule length for
bounded by the maximum node degree in the aggregated and raw convergecast, and propose algorithms
routing tree, and for raw-data convergecast by that achieve the corresponding bounds. In Section 5, we
maxð2nk 1; NÞ, where nk is the maximum number focus on power control and multichannel scheduling as
of nodes on any branch in the tree, and N is the mechanisms to eliminate interference. Section 6 explains the
number of source nodes. We then introduce optimal impact of routing topologies, and Section 7 presents
time slot assignment schemes under this scenario detailed evaluation results. Finally, we draw our conclu-
which achieve these lower bounds. sions in Section 8.
. Evaluation of power control under realistic setting.
It was shown recently [5] that under the idealized
setting of unlimited power and continuous range,
2 RELATED WORK
transmission power control can provide an un- Fast data collection with the goal to minimize the schedule
bounded improvement in the asymptotic capacity length for aggregated convergecast has been studied by us
88 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 1, JANUARY 2012
in [7] and [9], and also by others in [5], [10], and [11]. In [7], However, TreeMAC operates on a single channel and
we experimentally investigated the impact of transmission achieves 1=3 of the maximum throughput similar to the
power control and multiple frequency channels on the bounds presented by Gandham et al. [1] since the sink can
schedule length, while the theoretical aspects were dis- receive every three time slots.
cussed in [9], where we proposed constant factor and The problem of minimizing the schedule length for raw-
logarithmic approximation algorithms on geometric net- data convergecast on single channel is shown to be NP-
works (disk graphs). Raw-data convergecast has been complete on general graphs by Choi et al. [13]. Maximizing
studied in [1], [12], [13], and [14], where a distributed time the throughput of convergecast by finding a shortest-length,
slot assignment scheme is proposed by Gandham et al. [1] conflict-free schedule is studied by Lai et al. [14], where a
to minimize the TDMA schedule length for a single channel. greedy graph coloring strategy assigns time slots to the
The problem of joint scheduling and transmission power senders and prevents interference. They also discussed the
control is studied by Moscibroda [5] for constant and impact of routing trees on the schedule length and proposed a
uniform traffic demands. Our present work is different routing scheme called disjoint strips to transmit data over
from the above in that we evaluate transmission power different shortest paths. However, since the sink remains as
control under realistic settings and compute lower bounds the bottleneck, sending data over different paths does not
on the schedule length for tree networks with algorithms to reduce the schedule length. As we will show in this paper, the
achieve these bounds. We also compare the efficiency of improvement due to the routing structure comes from using
different channel assignment methods and interference capacitated minimal spanning trees for raw-data converge-
models, and propose schemes for constructing specific cast, where the number of nodes in a subtree is no more than
routing tree topologies that enhance the data collection rate half the total number of nodes in the remaining subtrees.
for both aggregated and raw-data convergecast. The use of multiple frequencies has been studied
The use of orthogonal codes to eliminate interference has extensively in both cellular and ad hoc networks; however,
been studied by Annamalai et al. [10], where nodes are in the domain of WSN, there exist a few studies that utilize
assigned time slots from the bottom of the tree to the top such multiple channels [8], [17], [18]. To this end, we evaluate the
that a parent node does not transmit before it receives all the efficiency of three particular schemes that treat the channel
packets from its children. This problem and the one assignment at different levels.
addressed by Chen et al. [11] are for one-shot raw-data
convergecast. In this work, since we construct degree-
constrained routing topologies to enhance the data collection
3 MODELING AND PROBLEM FORMULATION
rate, it may not always lead to schedules that have low We model the multihop WSN as a graph G ¼ ðV ; EÞ, where
latency, because the number of hops in a tree goes up as its V is the set of nodes, and E ¼ fði; jÞ j i; j 2 V g is the set of
degree goes down. Therefore, if minimizing latency is also a edges representing the wireless links. A designated node
requirement, then further optimization, such as constructing s 2 V denotes the sink. The euclidean distance between two
bounded-degree, bounded-diameter trees, is needed. A nodes i and j is denoted by dij . All the nodes except s are
study along this line with the objective to minimize the sources, which generate packets and transmit them over a
maximum latency is presented by Pan and Tseng [15], where routing tree to s. We denote the spanning tree on G rooted
they assign a beacon period to each node in a Zigbee network at s by T ¼ ðV ; ET Þ, where ET E represents the tree
during which it can receive data from all its children. edges. Each node is assumed to be equipped with a single
For raw-data convergecast, Song et al. [12] presented a half-duplex transceiver, which prevents it from sending and
time-optimal, energy-efficient packet scheduling algorithm receiving packets simultaneously. We consider a TDMA
with periodic traffic from all the nodes to the sink. Once protocol where time is divided into slots, and consecutive
interference is eliminated, their algorithm achieves the slots are grouped into equal-sized nonoverlapping frames.
bound that we present here; however, they briefly mention We use two types of interference models for our
a 3-coloring channel assignment scheme, and it is not clear evaluation: the graph-based protocol model and the SINR-
whether the channels are frequencies, codes, or any other based physical model. In the protocol model, we assume
method to eliminate interference. Moreover, they assume a that the interference range of a node is equal to its
simple interference model where each node has a circular transmission range, i.e., two links cannot be scheduled
transmission range and cumulative interference from simultaneously if the receiver of at least one link is within
concurrent multiple senders is avoided. Different from the range of the transmitter of the other link. In the physical
their work, we consider multiple frequencies and evaluate model, the successful reception of a packet from i to j
the performance of three different channel assignment depends on the ratio between the received signal strength at
methods together with evaluating the effects of transmis- j and the cumulative interference caused by all other
sion power control using realistic interference and channel concurrently transmitting nodes and the ambient noise
models, i.e., physical interference model and overlapping level. Thus, a packet is received successfully at j if the
channels and considering the impact of routing topologies. signal-to-interference-plus-noise ratio, SINRij , is greater
Song et al. [12] extended their work and proposed a TDMA- than a certain threshold , i.e.,
based MAC protocol for high-data-rate WSNs in [16].
TreeMAC considers the differences in load at different Pi gij
levels of a routing tree and assigns time slots according to SINRij ¼ P ; ð1Þ
k6¼i Pk gkj þ N
the depth, i.e., the hop count, of the nodes on the routing
tree, such that nodes closer to the sink are assigned more where Pi is the transmitted signal power at node i, N is the
slots than their children in order to mitigate congestion. ambient noise level, and gij is the propagation attenuation
INCEL ET AL.: FAST DATA COLLECTION IN TREE-BASED WIRELESS SENSOR NETWORKS 89
(link gain) between i and j. We use a simple distance operating frequency, channel scheduling can be coupled
dependent path-loss model to calculate the link gains as with time slot scheduling as it is the case with the JFTSS
gij ¼ d
ij , where the path-loss exponent is a constant
algorithm (Section 5.2.1) or first channels are assigned and
between 2 and 6, whose exact value depends on external then time slot scheduling continues as in the case of RBCA
conditions of the medium (humidity, obstacles, etc.), as well explained in Section 5.2.3. However, the TMCP algorithm
as the sender-receiver distance. We assume that the level of (Section 5.2.2) considers tree construction and channel
interference is static and does not change over time. For assignment jointly and then does the scheduling of time slots.
simplicity and ease of illustration, we use the protocol
model in all the figures. 4 TDMA SCHEDULING OF CONVERGECASTS
We study aggregated convergecast in the context of
periodic data collection where each source node generates a In this section, we first focus on periodic aggregated
packet at the beginning of every frame, and raw-data convergecast and then on one-shot raw-data convergecast.
convegecast for one-shot data collection where each node Our objective is to calculate the minimum achievable
has only one packet to send. We assume that the size of each schedule lengths using an interference-aware TDMA pro-
packet is constant. Our goal is to deliver these packets to the tocol. We first consider the case where the nodes commu-
sink over the routing tree as fast as possible. More nicate on the same channel using a constant transmission
specifically, we aim to schedule the edges ET of T using a power, and then discuss improvements using transmission
minimum number of time slots while respecting the power control and multiple frequencies in the next section.
following two constraints: 4.1 Periodic Aggregated Convergecast
. Adjacency constraint. Two edges ði; jÞ 2 ET and In this section, we consider the scheduling problem where
ðk; lÞ 2 ET cannot be scheduled in the same time packets are aggregated. Data aggregation is a commonly
slot if used technique in WSN that can eliminate redundancy and
T they are adjacent to each other, i.e., if minimize the number of transmissions, thus saving energy
fi; jg fk; lg 6¼ . This constraint is due to the half-
duplex transceiver on each node which prevents it and improving network lifetime [19]. Aggregation can be
performed in many ways such as by suppressing duplicate
from simultaneous transmission and reception.
messages; using data compression and packet merging
. Interfering constraint. The interfering constraint de-
techniques; or taking advantage of the correlation in the
pends on the choice of the interference model. In the
sensor readings.
protocol model, two edges ði; jÞ 2 ET and ðk; lÞ 2 ET
We consider continuous monitoring applications where
cannot be scheduled simultaneously if they are at 2-
perfect aggregation is possible, i.e., each node is capable of
hop distance of each other. In the physical model, an aggregating all the packets received from its children as
edge ði; jÞ 2 ET cannot be scheduled if the SINR at well as that generated by itself into a single packet before
receiver j is not greater than the threshold . transmitting to its parent. The size of aggregated data
Since we consider data collection to be periodic in transmitted by each node is constant and does not depend
aggregated convergecast, each of the edges in ET is on the size of the raw sensor readings. Typical examples of
scheduled only once within each frame, and this schedule such aggregation functions are MIN, MAX, MEDIAN,
is repeated over multiple frames. Thus, a pipeline is COUNT, AVERAGE, etc.
established after a certain frame, and then onward the sink In Figs. 1a and 1b, we illustrate the notion of pipelining
continues to receive aggregated packets from all the source in aggregated convergecast and that of a schedule length on
nodes once per frame. We explain further details about the a network of six source nodes. The solid lines represent tree
pipelining in the next section. On the other hand, in one-shot edges, and the dotted lines represent interfering links. The
data collection for raw-data convergecast, the edges in ET numbers beside the links represent the time slots at which
may be scheduled multiple times and no pipelining takes the links are scheduled to transmit, and the numbers inside
place. We use the terms link scheduling and node scheduling the circles denote node ids. The entries in the table list the
interchangeably as they are equivalent in our case. Note that nodes from which packets are received by their correspond-
the two other scenarios, which we do not consider in this ing receivers in each time slot. We note that at the end of
paper due to space constraints, are one-shot aggregated frame 1, the sink does not have packets from nodes 5 and 6;
convergecast and periodic raw-data convergecast. however, as the schedule is repeated, it receives aggregated
The key difference in terms of scheduling between packets from 2, 5, and 6 in slot 2 of the next frame. Similarly,
periodic and one-shot data collection is that a node in the the sink also receives aggregated packets from nodes 1 and
periodic case does not have to wait for data from its children 4 starting from slot 1 of frame 2. The entries f1; 4g and
before being scheduled. This is because a link is scheduled f2; 5; 6g in the table represent single packets comprising
only once within each frame and each node generates a packet aggregated data from nodes 1 and 4, and from nodes 2, 5,
in the beginning of every frame, so a pipelining is eventually and 6, respectively. Thus, a pipeline is established from
established. However, in the case of one-shot data collection, frame 2, and the sink continues to receive aggregated
a node needs to wait for data from its children before being packets from all the nodes once every six time slots. Thus,
scheduled, which we refer to as the causality constraint. the minimum schedule length is 6.
To summarize the steps in our design, we start with tree
construction and then continue with interference-aware 4.1.1 Lower Bound on Schedule Length
scheduling. If the nodes can control their transmission We first consider aggregated convergecast when all the
power, scheduling phase is coupled with a transmission interfering links are eliminated by using transmission power
power control algorithm. If the nodes can change their control or multiple frequencies. Although the problem of
90 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 1, JANUARY 2012
Fig. 1. Aggregated convergecast and pipelining: (a) Schedule length of 6 in the presence of interfering links. (b) Node ids from which (aggregated)
packets are received by their corresponding parents in each time slot over different frames. (c) Schedule length of 3 using BFS-
TIMESLOTASSIGNMENT when all the interfering links are eliminated.
minimizing the schedule length is NP-complete on general To illustrate, we show the same network of Fig. 1a in Fig. 1c
graphs, we show in the following that once interference is with all the interfering links removed, and so the network is
eliminated, the problem reduces to 1 on a tree, and can be scheduled in three time slots.
solved in polynomial time. To this end, we first give a lower Although BFS-TIMESLOTASSIGNMENT may not be an
bound on the schedule length, and then propose a time slot approximation to ideal scheduling under the physical
assignment scheme that achieves the bound. interference model, it is a heuristic that can achieve the
Lemma 1. If all the interfering links are eliminated, the schedule lower bound if all the interfering links are eliminated.
length for aggregated convergecast is lower bounded by ðT Þ, Therefore, together with a method to eliminate interference,
where ðT Þ is the maximum node degree in the routing tree T . the algorithm can optimally schedule the network.
Proof. If all the interfering links are eliminated, the Theorem 1. If all the interfering links are eliminated, the
scheduling problem reduces to 1 on a tree. Now since schedule length for aggregated convergecast achieved by BFS-
each of the tree edges needs to be scheduled only once TIMESLOTASSIGNMENT is the minimum, i.e., ðT Þ.
within each frame, it is equivalent to edge coloring on a Proof. The proof is by induction on i. Let T i ¼ ðV i ; ETi Þ
graph, which needs number of colors at least equal to the denote the subtree of T in the ith iteration constructed in
maximum node degree. u
t the BFS order, where ETi comprises all the edges that are
assigned a slot, and V i comprises the set of nodes on which
Once all the interfering links are eliminated, concurrency the edges in ETi are incident. Note that, jETi j ¼ i, because at
is still limited by the adjacency constraint due to the half- every iteration, exactly one edge is assigned a slot. For
duplex transceivers, which prevents a parent from trans- i ¼ 1, clearly the number of slots used is 1, equal to ðT 1 Þ.
mitting when it is already receiving from its children, or Now, assume that the number of slots NðiÞ needed to
when its parent is transmitting. schedule the edges in T i is ðT i Þ. In the ði þ 1Þst
iteration, after assigning a slot to the next edge in BFS
4.1.2 Assignment of Time Slots
order, the number of slots needed in T iþ1 can either
Given the lower bound ðT Þ on the schedule length in the remain the same as before, or increase by 1. Thus,
absence of interfering links, we now present a time slot
assignment scheme in Algorithm 1, called BFS-TIMESLO- Nði þ 1Þ ¼ maxfNðiÞ; NðiÞ þ 1g: ð2Þ
TASSIGNMENT, that achieves this bound.
If it remains the same, Nði þ 1Þ is still the maximum
Algorithm 1. BFS-TIMESLOTASSIGNMENT degree of T iþ1 at end of ði þ 1Þst iteration. Otherwise, if it
1. Input: T ¼ ðV ; ET Þ increases by 1, the new edge must be incident on a node
2. while ET 6¼ do v , common to both T i and T iþ1 , such that the number of
3. e next edge from ET in BFS order incident edges on v that were already assigned a time
4. Assign minimum time slot t to edge e respecting slot at the end of ith iteration was ðT i Þ. This is so
adjacency and interfering constraints because in the BFS traversal, all the edges incident on a
5. ET ET n feg node are assigned a slot first before moving on to the
6. end while next node, and because the slot assigned to the new edge
is the minimum possible that is different from all that
In each iteration of BFS-TIMESLOTASSIGNMENT (lines 2- already assigned to the edges incident on v until the ith
6), an edge e is chosen in the Breadth First Search (BFS) iteration. Thus, at the end of ði þ 1Þst iteration, the
order starting from any node, and is assigned the minimum number of slots used NðiÞ þ 1 is equal to the number of
time slot that is different from all its adjacent edges assigned edges incident on v which, in turn, equals
respecting interfering constraints. Note that, since we ðT iþ1 Þ. This proves the inductive step. Therefore, it
evaluate the performance of this algorithm also for the case holds at every iteration of the algorithm until the end
when the interfering links are present, we check for the when i ¼ jV j 2, yielding a schedule length equal to the
corresponding constraint in line 4; however, when inter- maximum degree ðT Þ ¼ ðT jV j1 Þ. Now, since assign-
ference is eliminated this check is redundant. The algorithm ing different time slots to the adjacent edges of T is
runs in OðjET j2 Þ time and minimizes the schedule length equivalent to edge coloring T , which requires at least
when there are no interfering links, as proved in Theorem 1. ðT Þ colors, the schedule length is minimum. u
t
INCEL ET AL.: FAST DATA COLLECTION IN TREE-BASED WIRELESS SENSOR NETWORKS 91
root of j is chosen, P and the inequality still holds higher than what is required by the threshold value, it
because nj 1 k1 i¼1 ni 1 (since nj ¼ nk 1). should decrease its power and if it is below the threshold, it
. Top-subtree k does not have the largest number of should increase its transmission power, within the available
remaining packets, implying that there were other range of power levels on the radio. If all the nodes meet
top-subtrees with an equal number of packets left the interfering constraint, the algorithm proceeds with the
as k in slot t. Then, the root of a new largest top- schedule calculation for the next time slot. On the other
subtree j P is chosen, and the inequality holds since hand, if the maximum number of iterations is reached and
nj 1 k1 i¼1 ni 1 (since nj ¼ nk ). there are nodes which cannot meet the interfering con-
Thus, the algorithm keeps the inequality as an straint, the algorithm excludes the link with minimum
invariant, and there always exists a top-subtree that can SINR from the schedule and restarts the iterations with the
be alternatelyPscheduled with the largest top-subtree. new subset of nodes. The power control phase is repeated
k1 until an admissible transmission scenario is found.
When nk ¼ 1, i¼1 ni 1 ¼ 1, which means that there are
two packets left at two different top-subtrees that can be
5.2 Multichannel Scheduling
scheduled in alternate slots. Since this inequality holds for
all the N steps, the sink always finds a top-subtree to Multichannel communication is an efficient method to
receive packets from, and therefore it takes N slots. eliminate interference by enabling concurrent transmissions
Moreover, Lemma 1 implies that a top-subtree becomes over different frequencies [21]. Although typical WSN radios
eligible after a transmission because its root is filled up in operate on a limited bandwidth, their operating frequencies
the next slot. Therefore, the theorem follows. u
t can be adjusted, thus allowing more concurrent transmis-
sions and faster data delivery. Here, we consider fixed-
bandwidth channels, which are typical of WSN radios, as
5 IMPACT OF INTERFERENCE opposed to the possibility of improving link bandwidth by
So far, we have focused on computing spatial-reuse TDMA consolidating frequencies. In this section, we explain three
schedules where transmissions take place on the same channel assignment methods that consider the problem at
frequency at a constant transmission power. In this section, different levels allowing us to study their pros and cons for
we focus on different methods to mitigate the effects of both types of convergecast. These methods consider the
interference on the schedule length. First, we discuss the channel assignment problem at different levels: the link level
benefits of using transmission power control and explain (JFTSS), node level (RBCA), or cluster level (TMCP).
the basics of a possible algorithm. Then, we discuss the
advantages of using multiple channels by considering three 5.2.1 Joint Frequency Time Slot Scheduling
different channel assignment schemes. JFTSS offers a greedy joint solution for constructing a
maximal schedule, such that a schedule is said to be
5.1 Transmission Power Control maximal if it meets the adjacency and interfering constraints,
In wireless networks, excessive interference can be elimi- and no more links can be scheduled for concurrent
nated by using transmission power control [6], [20], i.e., by transmissions on any time slot and channel without
transmitting signals with just enough power instead of violating the constraints. Approximation bounds on JFTSS
maximum power. To this end, we evaluate the impact of for single-channel systems and its comparison with multi-
transmission power control on fast data collection using channel systems are discussed in [22] and [23], respectively.
discrete power levels, as opposed to a continuous range JFTSS schedules a network starting from the link that has
where an unbounded improvement in the asymptotic the highest number of packets (load) to be transmitted.
capacity can be achieved by using a nonlinear power When the link loads are equal, such as in aggregated
assignment [5]. We first explain the basics of one particular convergecast, the most constrained link is considered first,
algorithm that we use in our evaluations in Section 7. i.e., the link for which the number of other links violating
The algorithm proposed by ElBatt and Ephremides [6] is the interfering and adjacency constraints when scheduled
a cross layer method for joint scheduling and power control simultaneously is the maximum. The algorithm starts with
and it is an optimal distributed algorithm to improve the an empty schedule and first sorts the links according to the
throughput capacity of wireless networks. The goal is to loads or constraints. The most loaded or constrained link in
find a TDMA schedule that can support as many transmis- the first available slot-channel pair is scheduled first and
sions as possible in every time slot. It has two phases: 1) added to the schedule. All the links that have an adjacency
scheduling and 2) power control that are executed at every constraint with the scheduled link are excluded from the list
time slot. First, the scheduling phase searches for a valid of the links to be scheduled at a given slot. The links that do
transmission schedule, i.e., largest subset of nodes, where no not have an interfering constraint with the scheduled link
node is to transmit and receive simultaneously, or to can be scheduled in the same slot and channel whereas the
receive from multiple nodes simultaneously. Then, in the links that have an interfering constraint should be sched-
given valid schedule, the power control phase iteratively uled on different channels, if possible. The algorithm
searches for an admissible schedule with power levels chosen continues to schedule the links according to the most
to satisfy all the interfering constraints. In each iteration, the loaded (or most constrained) metric. When no more links
scheduler adjusts the power levels depending on the can be scheduled for a given slot, the scheduler continues
current RSSI at the receiver and the SINR threshold with scheduling in the next slot. Fig. 4a shows the same tree
according to the iterative rule: Pnew ¼ SINR Pcurrent . Accord- given in Fig. 1a which is scheduled according to JFTSS
ing to this rule, if a node transmits with a power level where aggregated data are collected. JFTSS starts with link
94 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 1, JANUARY 2012
Fig. 6. Scheduling on minimum-hop trees with and without power Fig. 7. Scheduling on minimum-hop trees with multiple channels:
control: (a) Aggregated convergecast. (b) Raw-data convergecast. (a) Aggregated convergecast. (b) Raw-data convergecast.
varying between 3 and 4, which is typical for indoor 7.1.2 Raw-Data Convergecast
environments. We also use the physical interference model For raw-data convergecast, we observe in Fig. 6b that the
and simulate the behavior of CC2420 radios that are used schedule length increases as the network gets sparser on
on Telosb and TmoteSky motes and are capable of minimum-hop trees. This is counterintuitive because in
operating on 16 different frequencies. The transmission sparse networks, the reuse of slots should be higher which
power can be adjusted between 24 and 0 dBm over eight would reduce the schedule length. However, as the network
different levels, and the SINR threshold is set to ¼ 3 dB.1 gets sparser, the number of nodes that can directly reach the
We first evaluate the schedule length for single-channel
sink decreases and packets have to be relayed over more
TDMA, and then its improvement using transmission
hops. Thus, more packets need to be scheduled than in a
power control, multiple channels, and routing trees.
single hop. We see that the number of packets to be scheduled
7.1 Impact of Transmission Power Control increases faster than the reuse ratio. In the densest setting
We investigate two cases: 1) when nodes transmit at where all the nodes can directly reach the sink, the schedule
maximum power, and 2) when nodes adjust their length is 99, which is equal to the number of sources.
transmission power according to the algorithm described With power control, we observe a reduction in the
in Section 5.1. In both cases, nodes communicate on the schedule length in Fig. 6b as some of the interfering links
same channel and use minimum-hop routing trees. In the are eliminated, thus increasing slot reusability. When
first case, time slots are assigned according to BFS- ¼ 3:0, most of the interference can be eliminated by
TIMESLOTASSIGNMENT for aggregated data, and accord- power control, and beyond which the structure of the
ing to LOCAL-TIMESLOTASSIGNMENT for raw data. In the routing tree, especially the number of nodes nk on the
second case, we follow the scheduling rules in [6]. largest branch with ð2nk 1Þ > N, becomes the bottleneck.
However, for 3:5, power control cannot always elim-
7.1.1 Aggregated Convergecast inate interference as networks get sparser and nodes tend to
Fig. 6a shows the variation of schedule length with density transmit at their maximum power.
for different values of on minimum-hop trees. We
observe that the schedule length decreases as the deploy- 7.2 Impact of Multichannel Scheduling
ment gets sparser. This happens because at low densities, In this section, we analyze the performance of the channel
the interference is less, and so more concurrent transmis- assignment methods discussed in Section 5.2. We use
sions can take place. In the densest deployment (L ¼ 20) CC2420 radios that have 16 channels in the 2.4 GHz range,
when all the nodes are within the range of each other, the with adjacent channels overlapping according to the
sink is the only parent, and the network is scheduled in rejection and blocking values given in the data sheet.
99 time slots regardless of power control. However, in We assume that the nodes transmit at maximum power and
sparser scenarios, using power control, the network can be use minimum-hop trees. In TMCP and RBCA, time slots are
scheduled with fewer time slots as the level of interference assigned according to BFS-TIMESLOTASSIGNMENT for
goes down. We achieve a 10-20 percent reduction in
aggregated convergecast and LOCAL-TIMESLOTASSIGN-
schedule length for the best case.
MENT for raw-data convergecast. The path-loss exponent
We also observe that power control is more effective in
is taken as 3.5.
reducing the schedule length for denser deployments than
in sparser ones where the results tend to be similar. This is 7.2.1 Aggregated Convergecast
due to the discrete power levels and limited power range.
Comparing the plots in Figs. 7a and 6a, we observe that the
Moreover, due to the 95 dBm threshold for the transcei-
channel assignment methods achieve schedule lengths that
vers to be able to decode a signal successfully, further
are shorter than those achieved by power control. While it’s
power reduction is limited.
true that power control helps in reducing the effects of
1. Due to variation in signal strength, a fading margin can be included interference, this gain is limited due to the discrete levels and
such that some of the packets can still be captured if the RSSI is slightly limited range of transmission power (e.g., CC2420 has eight
lower than the threshold. Such a model [26] can easily be incorporated in
our experiments, in which case retransmissions of lost packets should also different power levels between 0 and 24 dBm). In sparse
be considered in calculating the schedule length. deployments, nodes cannot reduce their transmit power
INCEL ET AL.: FAST DATA COLLECTION IN TREE-BASED WIRELESS SENSOR NETWORKS 97
8 CONCLUSIONS
In this paper, we studied fast convergecast in WSN where
nodes communicate using a TDMA protocol to minimize
Fig. 9. (a) Scheduling on degree-constrained minimum-hop trees. the schedule length. We addressed the fundamental
(b) Scheduling on CMST. limitations due to interference and half-duplex transceivers
on the nodes and explored techniques to overcome the
the protocol model may result in serious interference, and same. We found that while transmission power control
adjacent channel interference cannot always be ignored. helps in reducing the schedule length, multiple channels are
more effective. We also observed that node-based (RBCA)
7.3 Impact of Routing Trees and link-based (JFTSS) channel assignment schemes are
In the preceding sections, we observed that although more efficient in terms of eliminating interference as
interference can be substantially eliminated by using power compared to assigning different channels on different
control and multiple channels, connectivity of the tree still branches of the tree (TMCP).
limits the performance. In the following, we discuss the Once interference is completely eliminated, we proved
improvements with routing tress. that with half-duplex radios, the achievable schedule length
is lower bounded by the maximum degree in the routing
7.3.1 Aggregated Convergecast on Degree-Constrained tree for aggregated convergecast, and by maxð2nk 1; NÞ
Trees for raw-data convergecast. Using optimal convergecast
Fig. 9a shows the variation of schedule length with density scheduling algorithms, we showed that the lower bounds
when the maximum tree degree is 3 (in sparser scenarios, are achievable once a suitable routing scheme is used.
with a maximum degree of 2, it was not always possible to Through extensive simulations, we demonstrated up to an
construct connected topologies). The top two lines are for order of magnitude reduction in the schedule length for
nodes transmitting at maximum power, and nodes using aggregated, and a 50 percent reduction for raw-data
power control. The bottom two lines are for JFTSS and convergecast. In future, we will explore scenarios with
RBCA. When nodes transmit with maximum power, we variable amounts of data and implement and evaluate the
observe a reduction in the schedule length in dense combination of the schemes considered.
deployments as compared to non-degree-constrained trees
shown in Fig. 6a. We also notice further improvement with REFERENCES
power control in denser deployments than in sparser ones. [1] S. Gandham, Y. Zhang, and Q. Huang, “Distributed Time-Optimal
When nodes are assigned channels using RBCA, we see a Scheduling for Convergecast in Wireless Sensor Networks,”
factor of more than 2 reduction in the schedule length in Computer Networks, vol. 52, no. 3, pp. 610-629, 2008.
[2] K.K. Chintalapudi and L. Venkatraman, “On the Design of MAC
dense deployments (L < 120), as compared to that using Protocols for Low-Latency Hard Real-Time Discrete Control
RBCA on minimum-hop spanning trees. We also observe Applications over 802.15.4 Hardware,” Proc. Int’l Conf. Information
that the schedule lengths are much larger than the Processing in Sensor Networks (IPSN ’08), pp. 356-367, 2008.
maximum degree in the routing tree for dense deploy- [3] I. Talzi, A. Hasler, G. Stephan, and C. Tschudin, “PermaSense:
Investigating Permafrost with a WSN in the Swiss Alps,” Proc.
ments, as compared to those in sparse scenarios (L 120).
Workshop Embedded Networked Sensors (EmNets ’07), pp. 8-12, 2007.
Considering deployments at different densities, routing [4] S. Upadhyayula and S.K.S. Gupta, “Spanning Tree Based
over minimum-hop degree-constrained spanning trees Algorithms for Low Latency and Energy Efficient Data Aggrega-
together with RBCA achieves an order of magnitude tion Enhanced Convergecast (DAC) in Wireless Sensor Net-
works,” Ad Hoc Networks, vol. 5, no. 5, pp. 626-648, 2007.
improvement than routing over minimum-hop spanning
[5] T. Moscibroda, “The Worst-Case Capacity of Wireless Sensor
trees while transmitting at maximum power. When we use Networks,” Proc. Int’l Conf. Information Processing in Sensor
JFTSS, the schedule length is close or equal to the maximum Networks (IPSN ’07), pp. 1-10, 2007.
degree since it can handle interference using multiple [6] T. ElBatt and A. Ephremides, “Joint Scheduling and Power
Control for Wireless Ad-Hoc Networks,” Proc. IEEE INFOCOM,
channels more effectively by reusing and assigning them to
pp. 976-984, 2002.
the links instead of the receivers. [7] Ö. Durmaz Incel and B. Krishnamachari, “Enhancing the Data
Collection Rate of Tree-Based Aggregation in Wireless Sensor
7.3.2 Raw-Data Convergecast on CMST Networks,” Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and
Ad Hoc Comm. and Networks (SECON ’08), pp. 569-577, 2008.
Fig. 9b shows the variation of schedule length on CMST. [8] Y. Wu, J.A. Stankovic, T. He, and S. Lin, “Realistic and Efficient
The impact of such routing trees is more prominent in Multi-Channel Communications in Wireless Sensor Networks,”
sparser networks (L 200) than routing over minimum- Proc. IEEE INFOCOM, pp. 1193-1201, 2008.
hop spanning trees (Fig. 7b). When L < 200, the length is [9] A. Ghosh, Ö. Durmaz Incel, V.A. Kumar, and B. Krishnamachari,
“Multi-Channel Scheduling Algorithms for Fast Aggregated
bounded by N. Beyond this point, it is almost always not Convergecast in Sensor Networks,” Proc. IEEE Int’l Conf. Mobile
possible to construct trees where the constraint 2nk 1 < N Adhoc and Sensor Systems (MASS ’09), pp. 363-372, 2009.
INCEL ET AL.: FAST DATA COLLECTION IN TREE-BASED WIRELESS SENSOR NETWORKS 99
[10] V. Annamalai, S.K.S. Gupta, and L. Schwiebert, “On Tree-Based Özlem Durmaz Incel received the BSc and
Convergecasting in Wireless Sensor Networks,” Proc. IEEE MSc degrees in computer engineering from the
Wireless Comm. and Networking Conf. (WCNC ’03), vol. 3, Yeditepe University, Turkey, in 2002 and 2005,
pp. 1942-1947, 2003. respectively. She received the PhD degree in
[11] X. Chen, X. Hu, and J. Zhu, “Minimum Data Aggregation Time computer science from the University of
Problem in Wireless Sensor Networks,” Proc. Int’l Conf. Mobile Ad- Twente, Netherlands, in March 2009. She is
Hoc and Sensor Networks (MSN ’05), pp. 133-142, 2005. currently a postdoctoral researcher in the
[12] W. Song, F. Yuan, and R. LaHusen, “Time-Optimum Packet Networking Laboratory (NETLAB) of Bogazici
Scheduling for Many-to-One Routing in Wireless Sensor Net- University, Turkey. Her dissertation is focused
works,” Proc. IEEE Int’l Conf. Mobile Ad-Hoc and Sensor Systems on efficient data collection in wireless sensor
(MASS ’06), pp. 81-90, 2006. networks and was entitled “Multi-Channel Wireless Sensor Networks:
[13] H. Choi, J. Wang, and E. Hughes, “Scheduling for Information Protocols, Design and Evaluation.” She was a visiting student in the
Gathering on Sensor Network,” Wireless Networks, vol. 15, pp. 127- Autonomous Networks Research Group of the University of Southern
140, 2009. California as part of her PhD studies from 2007-2008.
[14] N. Lai, C. King, and C. Lin, “On Maximizing the Throughput of
Convergecast in Wireless Sensor Networks,” Proc. Int’l Conf. Amitabha Ghosh received the BS degree in
Advances in Grid and Pervasive Computing (GPC ’08), pp. 396-408, physics from the Indian Institute of Technology
2008. Kharagpur, India, in 1996, and the ME degree
[15] M. Pan and Y. Tseng, “Quick Convergecast in ZigBee Beacon- in computer science and engineering from the
Enabled Tree-Based Wireless Sensor Networks,” Computer Comm., Indian Institute of Science, Bengaluru, in 2000.
vol. 31, no. 5, pp. 999-1011, 2008. He received the PhD degree in electrical
[16] W. Song, H. Renjie, B. Shirazi, and R. LaHusen, “TreeMAC: engineering from the University of Southern
Localized TDMA MAC Protocol for Real-Time High-Data-Rate California in August 2010. Between 2000 and
Sensor Networks,” J. Pervasive and Mobile Computing, vol. 5, no. 6, 2004, he worked for Alcatel-Lucent and
pp. 750-765, 2009. Honeywell on GSM/GPRS networks and wire-
[17] G. Zhou, C. Huang, T. Yan, T. He, J. Stankovic, and T. Abdelzaher, less ad hoc networks. He is currently a postdoctoral researcher at
“MMSN: Multi-Frequency Media Access Control for Wireless Princeton University. His research interest is in design and analysis
Sensor Networks,” Proc. IEEE INFOCOM, pp. 1-13, 2006. of algorithms for scheduling, routing, and power control for cellular
[18] Y. Kim, H. Shin, and H. Cha, “Y-MAC: An Energy-Efficient Multi- and wireless sensor networks.
Channel MAC Protocol for Dense Wireless Sensor Networks,”
Proc. Int’l Conf. Information Processing in Sensor Networks (IPSN ’08), Bhaskar Krishnamachari received the BE
pp. 53-63, Apr. 2008. degree in electrical engineering from The Cooper
[19] B. Krishnamachari, D. Estrin, and S.B. Wicker, “The Impact of Union in 1998, and the MS and PhD degrees in
Data Aggregation in Wireless Sensor Networks,” Proc. Int’l Conf. electrical engineering from Cornell University in
Distributed Computing Systems Workshops (ICDCSW ’02), pp. 575- 1999 and 2002, respectively. He is an associate
578, 2002. professor in the Ming Hsieh Electrical Engineer-
[20] J. Zander, “Performance of Optimum Transmitter Power Control ing Department at the University of Southern
in Cellular Radio Systems,” IEEE Trans. on Vehicular Technology, California Viterbi School of Engineering. His
vol. 41, no. 1, pp. 57-62, Feb. 1992. research interests are in the design and perfor-
[21] P. Kyasanur and N.H. Vaidya, “Capacity of Multi-Channel mance analysis of protocols for next-generation
Wireless Networks: Impact of Number of Channels and Inter- wireless networks. He received the US National Science Foundation
faces,” Proc. ACM MobiCom, pp. 43-57, 2005. CAREER Award in 2004.
[22] G. Sharma, R.R. Mazumdar, and N.B. Shroff, “On the Complexity
of Scheduling in Wireless Networks,” Proc. ACM MobiCom, Krishnakant Chintalapudi received the MS
pp. 227-238, 2006. degree in electrical engineering from Drexel
[23] X. Lin and S. Rasool, “A Distributed Joint Channel-Assignment, University and the PhD degree in computer
Scheduling and Routing Algorithm for Multi-Channel Ad-Hoc science from the University of Southern
Wireless Networks,” Proc. IEEE INFOCOM, pp. 1118-1126, 2007. California. He is currently working as an
[24] C.H. Papadimitriou, “The Complexity of the Capacitated Tree associate researcher at Microsoft Research,
Problem,” Networks, vol. 8, no. 3, pp. 217-230, 1978. India. His research interests include delay-
[25] H. Dai and R. Han, “A Node-Centric Load Balancing Algorithm sensitive and fault-tolerant wireless sensor
for Wireless Sensor Networks,” Proc. IEEE Conf. Global Telecomm. networks, high-data-rate wireless sensor net-
(GlobeCom ’03), pp. 548-552, 2003. work applications, hybrid sensor networks, and
[26] M. Zuniga and B. Krishnamachari, “An Analysis of Unreliability wireless control and automation.
and Asymmetry in Low-Power Wireless Links,” ACM Trans.
Sensor Networks, vol. 3, no. 2, p. 7, 2007.
[27] J. Grönkvist and A. Hansson, “Comparison between Graph-Based
and Interference-Based STDMA Scheduling,” Proc. ACM Mobi- . For more information on this or any other computing topic,
Hoc, pp. 255-258, 2001. please visit our Digital Library at www.computer.org/publications/dlib.