skip to main content
research-article

Accounting for Reliability in Unacknowledged Time-Constrained WSNs

Published:31 August 2019Publication History
Skip Abstract Section

Abstract

Wireless sensor networks typically consist of nodes that collect and transmit data periodically. In this context, we are concerned with unacknowledged communication, such as where data packets are not confirmed upon successful reception. This allows reducing traffic on the communication channel—neither acknowledgments nor retransmissions are sent—and results in less overhead and less energy consumption, which are meaningful goals in the era of the Internet of Things. However, packets can be lost, and hence we do not know how long it takes to convey data from one node to another, which hinders any form of real-time operation and/or quality of service. To overcome this problem, we propose a medium access control protocol, which consists of transmitting each packet at a random instant but within a specified time interval from the last transmission. In contrast to existing approaches from the literature, the proposed medium access control can be configured to meet reliability requirements—given by the probability that at least one data packet reaches its destination within a specified deadline—in the absence of acknowledgments. We illustrate this and other benefits of the proposed approach based on detailed OMNeT++ simulations.

References

  1. IEEE. {n.d.}. Standard for Low-Rate Wireless Networks, IEEE 802.15.4-2015. IEEE.Google ScholarGoogle Scholar
  2. G. Anastasi, M. Conti, and M. Di Francesco. 2011. A comprehensive analysis of the MAC unreliability problem in IEEE 802.15.4 wireless sensor networks. IEEE Transactions on Industrial Informatics 7 (2011), 52--65.Google ScholarGoogle ScholarCross RefCross Ref
  3. Björn Andersson, Nuno Pereira, and Eduardo Tovar. 2007. Delay-bounded medium access for unidirectional wireless links. In Proceedings of the International Conference on Real-Time Networks and Systems (RTNS’07).Google ScholarGoogle Scholar
  4. Simone Brienza, Manuel Roveri, Domenico De Guglielmo, and Giuseppe Anastasi. 2016. Just-in-time adaptive algorithm for optimal parameter setting in 802.15.4 WSNs. ACM Transactions on Autonomous and Adaptive Systems 10 (2016), 27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Celada-Funes, D. Alonso-Roman, C. Asensio-Marco, and B. Beferull-Lozano. 2014. A reliable CSMA protocol for high performance broadcast communications in a WSN. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’14).Google ScholarGoogle Scholar
  6. Behnam Dezfouli, Marjan Radi, Kamin Whitehouse, Shukor Abd Razak, and Hwee-Pink Tan. 2014. CAMA: Efficient modeling of the capture effect for low power wireless networks. ACM Transactions on Sensor Networks 11 (2014), 20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bernhard Firner, Chenren Xu, Richard Howard, and Yanyong Zhang. 2010. Multiple receiver strategies for minimizing packet loss in dense sensor networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mohammad Hossein Sedighi Gilani, Iman Sarrafi, and Maghsoud Abbaspour. 2013. An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks. Ad Hoc Networks 11 (2013), 1297--1304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. De Guglielmo, F. Restuccia, G. Anastasi, M. Conti, and S. K. Das. 2016. Accurate and efficient modeling of 802.15.4 unslotted CSMA/CA through event chains computation. IEEE Transactions on Mobile Computing 15 (2016), 2954--2968. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Maxim Integrated. {n.d.}. MAX2837 Datasheet. Retrieved July 23, 2019 from https://datasheets.maximintegrated.com/en/ds/MAX2837.pdf.Google ScholarGoogle Scholar
  11. Eugène David Ngangue Ndih and Soumaya Cherkaoui. 2016. Adaptive 802.15.4 backoff procedure to survive coexistence with 802.11 in extreme conditions. In Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC’16).Google ScholarGoogle Scholar
  12. Philip Parsch and Alejandro Masrur. 2015. A reliability-aware medium access control for unidirectional time-constrained WSNs. In Proceedings of the International Conference on Real Time and Networks Systems (RTNS’15). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Philip Parsch and Alejandro Masrur. 2017. A reliable MAC for delay-bounded and energy-efficient WSNs. In Proceedings of the 23rd IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’17).Google ScholarGoogle ScholarCross RefCross Ref
  14. W. B. Pottner, S. Schildt, D. Meyer, and L. Wolf. 2011. Piggy-backing link quality measurements to IEEE 802.15.4 acknowledgements. In Proceedings of the IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS’11). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Rhee. 2015. Wireless Transceiver Circuits: System Perspectives and Design Aspects. CRC Press, Boca Raton, FL. https://books.google.de/books?id=7FC3BgAAQBAJ.Google ScholarGoogle Scholar
  16. Malcolm Sellars and Demos Kostas. 2000. Comparison of QPSK/QAM OFDM and Spread Spectrum for the 2-11 GHz PMP BWAS. Technical Report. Adaptive Broadband Corp.Google ScholarGoogle Scholar
  17. B. Shrestha, E. Hossain, and K. W. Choi. 2014. Distributed and centralized hybrid CSMA/CA-TDMA schemes for single-hop wireless networks. IEEE Transactions on Wireless Communications 13 (2014), 4050--4065.Google ScholarGoogle ScholarCross RefCross Ref
  18. Texas Instruments. {n.d.}. CC2420 Datasheet. Retrieved July 23, 2019 from http://www.ti.com/lit/ds/symlink/cc2420.pdf.Google ScholarGoogle Scholar
  19. Texas Instruments. {n.d.}. CC2545 Datasheet. Retrieved July 23, 2019 from http://www.ti.com/lit/ds/symlink/cc2545.pdf.Google ScholarGoogle Scholar
  20. A. Varga. 2001. The OMNeT++ discrete event simulation system. In Proceedings of the European Simulation Multiconference (ESM’01).Google ScholarGoogle Scholar
  21. M. Weisenhorn and W. Hirt. 2005. Uncoordinated rate-division multiple-access scheme for pulsed UWB signals. IEEE Transactions on Vehicular Technology 54 (2005), 1646--1662.Google ScholarGoogle ScholarCross RefCross Ref
  22. Y. Zhang, B. Firner, R. Howard, R. Martin, N. Mandayam, J. Fukuyama, and C. Xu. 2017. Transmit only: An ultra low overhead MAC protocol for dense wireless systems. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP’17).Google ScholarGoogle Scholar
  23. Y. Zhang, Y. Zhou, L. Gao, Y. Qian, J. Li, and F. Shu. 2017. A blind adaptive tuning algorithm for reliable and energy-efficient communication in IEEE 802.15.4 networks. IEEE Transactions on Vehicular Technology 66 (2017), 8605--8609.Google ScholarGoogle ScholarCross RefCross Ref
  24. J. Zhao, C. Qiao, R. S. Sudhaakar, and S. Yoon. 2013. Improve efficiency and reliability in single-hop WSNs with transmit-only nodes. IEEE Transactions on Parallel and Distributed Systems 24 (2013), 520--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Zhuo, Z. Wang, Y. Q. Song, Z. Wang, and L. Almeida. 2016. A traffic adaptive multi-channel MAC protocol with dynamic slot allocation for WSNs. IEEE Transactions on Mobile Computing 15 (2016), 1600--1613.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Accounting for Reliability in Unacknowledged Time-Constrained WSNs

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Cyber-Physical Systems
            ACM Transactions on Cyber-Physical Systems  Volume 3, Issue 3
            Special Issue on Real Time Aspects in CPS and Regular Papers (Diamonds)
            July 2019
            269 pages
            ISSN:2378-962X
            EISSN:2378-9638
            DOI:10.1145/3356396
            • Editor:
            • Tei-Wei Kuo
            Issue’s Table of Contents

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 31 August 2019
            • Revised: 1 July 2018
            • Accepted: 1 July 2018
            • Received: 1 September 2017
            Published in tcps Volume 3, Issue 3

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format