skip to main content
research-article

Concurrent Low-power Listening: A New Design Paradigm for Duty-cycling Communication

Authors Info & Claims
Published:08 December 2022Publication History
Skip Abstract Section

Abstract

In this article, we explore a new design paradigm of duty-cycling mechanism that supports low-power devices to fully turn channel contention into transmission opportunities. To achieve this goal, we propose Concurrent Low-power Listening (CLPL) to enable contention-tolerant and concurrent media access control (MAC) for widely deployed low-power devices. The fundamental principle behind CLPL is that frequency modulated receiver can reliably demodulate the strongest signal even if cochannel interference and noise exist. By using CLPL, a sender inserts a series of tailor-made signals (namely, wake-up signal) between adjacent data frames to awaken appointed receiver, making it capable to receive the next data frame. According to system-defined maximum transmission power level, CLPL adopts an adaptive algorithm to adjust the transmission power of wake-up signals so that its signal strength is above receiver sensitivity and will not interfere with the other data frames in transit. By exploiting the spatial-temporal correlation, we further develop a light-weight wake-up signal detection method to enable a waiting sender to accurately identify the current channel condition. Then, it schedules the sender’s data frame transmissions by overlapping with those wake-up signals, without conflicting with existing data frame transmissions. We have implemented the prototype of CLPL and conducted extensive experiments on a real testbed. In comparison with the state-of-the-art low-power MAC schemes, such as ContikiMAC, A-MAC, BoX-MAC, and opportunistic scheme ORW, CLPL can improve the throughput by 2–6 times and halve the end-to-end transmission delay.

REFERENCES

  1. Aguayo Daniel, Bicket John, Biswas Sanjit, Judd Glenn, and Morris Robert. 2004. Link-level measurements from an 802.11 b mesh network. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. 121132.Google ScholarGoogle Scholar
  2. Atzori Luigi, Iera Antonio, and Morabito Giacomo. 2010. The Internet of Things: A Survey. Comput. Netw. 54, 15 (2010), 27872805.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Cao Zhichao, Wang Jiliang, Liu Daibo, Ma Qiang, Miao Xin, and Mao Xufei. 2020. Chase++: Fountain-enabled fast flooding in asynchronous duty cycle networks. IEEE/ACM Trans. Netw. 29, 1 (2020), 410422.Google ScholarGoogle Scholar
  4. Chen Haiming, Zhang Zhaoliang, Cui Li, and Huang Changcheng. 2016. NoPSM: A concurrent MAC protocol over low-data-rate low-power wireless channel without PRR-SINR model. IEEE Trans. Mobile Comput. 16, 2 (2016), 435452.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chen Yongrui, Wang Shuai, Li Zhijun, and He Tian. 2020. Reliable physical-layer cross-technology communication with emulation error correction. IEEE/ACM Trans. Netw. 28, 2 (2020), 612624.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Du Wan, Liando Jansen Christian, Zhang Huanle, and Li Mo. 2016. Pando: Fountain-enabled fast data dissemination with constructive interference. IEEE/ACM Trans. Netw. 25, 2 (2016), 820833.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Dunkels Adam. 2011. The ContikiMAC radio duty cycling protocol. Technical Report T2011:13, Swedish Institute of Computer Science.Google ScholarGoogle Scholar
  8. Dutta Prabal, Dawson-Haggerty Stephen, Chen Yin, Liang Chieh-Jan Mike, and Terzis Andreas. 2012. A-MAC: A versatile and efficient receiver-initiated link layer for low-power wireless. ACM Trans. Sensor Netw. 8, 4 (2012), 129.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Luis T. Eirich, N. Sornin, and M.. 2015. LoRa Specification 1.0. https://lora-alliance.org/wp-content/uploads/2020/11/2015_-_lorawan_specification_1r0_611_1.pdf.Google ScholarGoogle Scholar
  10. Ferrari Federico, Zimmerling Marco, Thiele Lothar, and Saukh Olga. 2011. Efficient network flooding and time synchronization with glossy. In Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks. IEEE, 7384.Google ScholarGoogle Scholar
  11. Gnawali Omprakash, Fonseca Rodrigo, Jamieson Kyle, Moss David, and Levis Philip. 2009. Collection tree protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems. 114.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Instruments T.. 2007. CC2420 data sheet. Retrieved from https://www.ti.com/lit/ds/symlink/cc2420.pdf.Google ScholarGoogle Scholar
  13. Jain Kamal, Padhye Jitendra, Padmanabhan Venkata N., and Qiu Lili. 2005. Impact of interference on multi-hop wireless network performance. Wireless Netw. 11, 4 (2005), 471487.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Joo Changhee, Lin Xiaojun, Ryu Jiho, and Shroff Ness B.. 2015. Distributed greedy approximation to maximum weighted independent set for scheduling with fading channels. IEEE/ACM Trans. Netw. 24, 3 (2015), 14761488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kashyap Anand, Ganguly Samrat, and Das Samir R.. 2007. A measurement-based approach to modeling link capacity in 802.11-based wireless networks. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking. 242253.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Landsiedel Olaf, Ghadimi Euhanna, Duquennoy Simon, and Johansson Mikael. 2012. Low power, low delay: Opportunistic routing meets duty cycling. In Proceedings of the ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN’12). IEEE, 185196.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Li Zonghui, Wan Hai, Pang Zaiyu, Chen Qiubo, Deng Yangdong, Zhao Xibin, Gao Yue, Song Xiaoyu, and Gu Ming. 2019. An enhanced reconfiguration for deterministic transmission in time-triggered networks. IEEE/ACM Trans. Netw. 27, 3 (2019), 11241137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Liu Daibo, Cao Zhichao, He Yuan, Ji Xiaoyu, Hou Mengshu, and Jiang Hongbo. 2019. Exploiting concurrency for opportunistic forwarding in duty-cycled IoT networks. ACM Trans. Sensor Netw. 15, 3 (2019), 133.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Liu Xi, Sheth Anmol, Kaminsky Michael, Papagiannaki Konstantina, Seshan Srinivasan, and Steenkiste Peter. 2009. DIRC: Increasing indoor wireless capacity using directional antennas. In Proceedings of the ACM SIGCOMM Conference on Data Communication. 171182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Lowe Premesh S., Scholehwar Timo, Yau Jimmy, Kanfoud Jamil, Gan Tat-Hean, and Selcuk Cem. 2017. Flexible shear mode transducer for structural health monitoring using ultrasonic guided waves. IEEE Trans. Industr. Inform. 14, 7 (2017), 29842993.Google ScholarGoogle ScholarCross RefCross Ref
  21. Lu Jiakang and Whitehouse Kamin. 2009. Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks. IEEE.Google ScholarGoogle Scholar
  22. Ma Xiaoyuan, Zhang Peilin, Liu Ye, Boano Carlo Alberto, Kim Hyung-Sin, Wei Jianming, and Huang Jun. 2020. Harmony: Saving concurrent transmissions from Harsh RF interference. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’20). IEEE, 10241033.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mao Xufei, Miao Xin, He Yuan, Li Xiang-Yang, and Liu Yunhao. 2012. CitySee: Urban CO 2 monitoring with sensors. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’12). IEEE, 16111619.Google ScholarGoogle Scholar
  24. Moss David and Levis Philip. 2008. BoX-MACs: Exploiting physical and link layer boundaries in low-power networking. Comput. Syst. Lab. Stanford Univ. 64, 66 (2008), 120.Google ScholarGoogle Scholar
  25. Pearson K.. 1895. Notes on regression and inheritance in the case of two parents. Proc. Roy. Soc. London 58 (1895), 240–242.Google ScholarGoogle Scholar
  26. Polastre Joseph, Hill Jason, and Culler David. 2004a. Versatile low-power media access for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. 95107.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Polastre Joseph, Hill Jason, and Culler David. 2004b. Versatile low-power media access for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. 95107.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Qiu Lili, Zhang Yin, Wang Feng, Han Mi Kyung, and Mahajan Ratul. 2007. A general model of wireless interference. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking. 171182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Raddatz Hannes, Wall Arne, and Timmermann Dirk. 2018. SafeBase: A security framework for smart home systems based on smart metering infrastructure. In Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN’18). 276277.Google ScholarGoogle Scholar
  30. Reis Charles, Mahajan Ratul, Rodrig Maya, Wetherall David, and Zahorjan John. 2006. Measurement-based models of delivery and interference in static wireless networks. ACM SIGCOMM Comput. Commun. Rev. 36, 4 (2006), 5162.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Rhee Injong, Warrier Ajit, Min Jeongki, and Xu Lisong. 2009. DRAND: Distributed randomized TDMA scheduling for wireless ad hoc networks. IEEE Transactions on Mobile Computing 8, 10 (2009), 13841396.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Roberts Lawrence G.. 1975. ALOHA packet system with and without slots and capture. ACM SIGCOMM Comput. Commun. Rev. 5, 2 (1975), 2842.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Rostami Mohammad, Gummeson Jeremy, Kiaghadi Ali, and Ganesan Deepak. 2018. Polymorphic radios: A new design paradigm for ultra-low-power communication. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. 446460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Sha Mo, Xing Guoliang, Zhou Gang, Liu Shucheng, and Wang Xiaorui. 2009. C-mac: Model-driven concurrent medium access control for wireless sensor networks. In Proceedings of the IEEE Conference on Communications Workshops (INFOCOM’09). IEEE, 18451853.Google ScholarGoogle ScholarCross RefCross Ref
  35. Society IEEE Computer. 2003. IEEE Standard 802.15.4. Retrieved from https://standards.ieee.org/findstds/standard/ 802.15.4-2015.html.Google ScholarGoogle Scholar
  36. Society IEEE Computer. 2005. IEEE Standard 802.15.1. Retrieved from https://standards.ieee.org/findstds/standard/ 802.15.1-2005.html.Google ScholarGoogle Scholar
  37. Son Dongjin, Krishnamachari Bhaskar, and Heidemann John. 2006. Experimental study of concurrent transmission in wireless sensor networks. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems. 237250.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Vutukuru Mythili, Jamieson Kyle, and Balakrishnan Hari. 2008. Harnessing exposed terminals in wireless networks. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI’08). USENIX Association.Google ScholarGoogle Scholar
  39. Zheng Xiaolong, Cao Zhichao, Wang Jiliang, He Yuan, and Liu Yunhao. 2017. Interference resilient duty cycling for sensor networks under co-existing environments. IEEE Trans. Commun. 65, 7 (2017), 29712984.Google ScholarGoogle ScholarCross RefCross Ref
  40. Zhou Siwang, Lian Yi, Liu Daibo, Jiang Hongbo, Liu Yonghe, and Li Keqin. 2022. Compressive sensing based distributed data storage for mobile crowdsensing. ACM Trans. Sensor Netw. 18, 2 (2022), 121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Zhou Xia, Zhang Zengbin, Wang Gang, Yu Xiaoxiao, Zhao Ben Y., and Zheng Haitao. 2013. Practical conflict graphs for dynamic spectrum distribution. In Proceedings of the ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems. 516.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Concurrent Low-power Listening: A New Design Paradigm for Duty-cycling Communication

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 19, Issue 1
        February 2023
        565 pages
        ISSN:1550-4859
        EISSN:1550-4867
        DOI:10.1145/3561987
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 December 2022
        • Online AM: 4 March 2022
        • Accepted: 2 February 2022
        • Revised: 18 November 2021
        • Received: 30 June 2021
        Published in tosn Volume 19, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format