Documente Academic
Documente Profesional
Documente Cultură
com
Abstract
Convergecast is a fundamental operation in wireless sensor networks. Existing convergecast solutions have focused on reducing
latency and energy consumption. However, a good design should be compliant to standards, in addition to considering these factors.
Based on this observation, this paper defines a minimum delay beacon scheduling problem for quick convergecast in ZigBee tree-based
wireless sensor networks and proves that this problem is NP-complete. Our formulation is compliant with the low-power design of IEEE
802.15.4. We then propose optimal solutions for special cases and heuristic algorithms for general cases. Simulation results show that the
proposed algorithms can indeed achieve quick convergecast.
Ó 2007 Elsevier B.V. All rights reserved.
0140-3664/$ - see front matter Ó 2007 Elsevier B.V. All rights reserved.
doi:10.1016/j.comcom.2007.12.015
1000 M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011
works [8,9,11,17,20,23]. With the goals of low latency and ZigBee routers, and some ZigBee end devices. Each ZigBee
low energy consumption, Ref. [20] shows how to connect router is responsible for collecting sensed data from end
sensors as a balanced reporting tree and how to assign devices associated with it and relaying incoming data to
CDMA codes to sensors to diminish interference among the sink. According to specifications, a ZigBee router can
sensors, thus achieving energy efficiency. The work [23] announce a beacon to start a superframe. Each superframe
aims to minimize the overall energy consumption under consists of an active portion followed by an inactive portion.
the constraint that sensed data should be reported within On receiving its parent router’s beacon, an end device has
specified time. Dynamic programming algorithms are pro- to wake up for an active portion to sense the environment
posed by assuming that sensors can receive multiple pack- and communicate with its coordinator. However, to avoid
ets at the same time. As can be seen, both [20] and [23] are collision with its neighbors, a router should shift its active
based on quite strong assumptions on communication portion by a certain amount. Fig. 1 shows a possible allo-
capability of sensor nodes and they do not fit into the Zig- cation of active portions for routers A, B, C, and D. The
Bee specification. In [17], the authors propose an energy- collected sensory data of A in the k-th superframe can be
efficient and low-latency MAC, called DMAC. Sensors sent to C in the same superframe. However, because the
are connected by a tree and stay in sleep state for most active portion of B in the k-th superframe appears after
of the time. When sensors change to active state, they are that of C, the collected data of B in the k-th superframe
first set to the receive mode and then to the transmit mode. can only be relayed to C in the (k + 1)-th superframe.
DMAC achieves low-latency by staggering wake-up sched- The report delay from B to C is almost the length of one
ules of sensors at the time instant when their children superframe. The delay can be eliminated if the active por-
switch to the transmit mode. Similar to [17], Ref. [11] tion of B in the k-th superframe appears before that of
arranges wake-up schedule of sensors by taking traffic C. The delay is not negligible because of the low duty cycle
loads into account. Each parent periodically broadcasts design of IEEE 802.15.4. For example, in 2.4 GHz PHY,
an advertisement containing a set of empty slots. Children with 1.56% duty cycle, a superframe can be as long as
nodes request empty slots according to their demands. In 251.658 s (with an active portion of 3.93 s). Clearly, for
[9], the authors propose a distributed convergecast schedul- large-scale WSNs, the convergecast latency could be signif-
ing algorithm. The basic concept is to connect nodes by a icant if the problem is not carefully addressed. The quick
spanning tree. Then the algorithm reduces the tree to multi- convergecast problem is to schedule the beacons of routers
ple lines. For each line, the algorithm schedules nodes’ to minimize the convergecast latency. We prove that this
transmission times in a bottom-up manner. Ref. [8] pre- problem is NP-complete by reducing the 3-CNF-SAT
sents a centralized solution to convergecast. The algorithm problem to it. We show two special cases of this problem
divides nodes into many segments such that the transmis- where optimal solutions can be found in polynomial time
sion of a node in a segment does not cause interference and propose two heuristic algorithms for general cases.
to other transmissions in the same segment. The aim is to To the best of our knowledge, this is the first result that
increase the degree of parallel transmissions to decrease provides convergecast solutions in ZigBee beacon-enabled
latencies. Although these results [8,9,11,17] are designed tree networks.
for quick convergecast, the solutions are not compliant to The rest of this paper is organized as follows. Section 2
the ZigBee standard for the following two reasons. Firstly, briefly introduces IEEE 802.15.4 and ZigBee. The quick
in these works, nodes’ wake/sleep times are dynamically convergecast problem is formally defined in Section 3. Sec-
changed according to their schedules. However, in a Zig- tion 4 presents our scheduling solutions. Simulation results
Bee beacon-enabled tree network, nodes’ wake/sleep times are given in Section 5. Finally, Section 6 concludes this
must be fixed in the way that each router wakes up twice in paper.
each cycle to receive its children’s packets and to transmit
packets to its parent, respectively. The coordinator (resp., 2. Overview of IEEE 802.15.4 and ZigBee standards
an end device) wakes up once to receive its children’s pack-
ets (resp., to transmit packets to its parent). Secondly, the IEEE 802.15.4 [13] specifies the physical and data link
scheduling of [8,9,11,17] is transmission-based, while ours protocols for low-rate wireless personal area networks
are receiving-based. The implication is that the former (LR-WPAN). In the physical layer, there are three fre-
may cause a router to be active multiple times per cycle. quency bands with 27 radio channels. Channel 0 ranges
This is incompatible with the ZigBee specification. from 868.0 to 868.6 MHz, which provides a data rate of
This paper aims at designing quick convergecast solu- 20 kbps. Channels 1 to 10 work from 902.0 to 928.0
tions for ZigBee tree-based, beacon-enabled WSNs. This MHz and each channel provides a data rate of 40 kbps.
work is motivated by the following observations. First, Channels 11 to 26 are located from 2.4 to 2.4835 GHz, each
we see that most related works are not compliant to the with a data rate of 250 kbps.
ZigBee standard. Second, we believe that tree-based topol- IEEE 802.15.4 devices are expected to have limited
ogy is more suitable if power management is a main con- power, but need to operate for a longer period of time.
cern in WSNs. The network scenario is shown in Fig. 1. Therefore, energy conservation is a critical issue. Devices
The network contains one sink (ZigBee coordinator), some are classified as full function devices (FFDs) and reduced
M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011 1001
Sink
C
C
B
B
A
A ZigBee router (FFD)
ZigBee end device (RFD)
Interference neighbor
Schedule
of A CAP report data from CAP report
end devices
Schedule
of B data from CAP data from
end devices end devices
Schedule
of C CAP data from CAP data from
report report
end devices end devices
Schedule
of D CAP report CAP
to sink
k-th superframe (k+1)-th superframe
function devices (RFDs). IEEE 802.15.4 supports star and In a beacon-enabled star network, a device only needs
peer-to-peer topologies. In each PAN, one device is desig- to be active for 2ðBOSOÞ portion of the time. Changing
nated as the coordinator, which is responsible for maintain- the value of ðBO SOÞ allows us to adjust the on-duty
ing the network. A FFD has the capability of serving as a time of devices. However, for a beacon-enabled tree net-
coordinator or associating with an existing coordinator/ work, routers have to choose different times to start their
router and becoming a router. A RFD can only associate active portions to avoid collision. Once the value of
with a coordinator/router and can not have children. ðBO SOÞ is decided, each router can choose from
The ZigBee coordinator defines the superframe structure 2BOSO slots as its active portion. In the revised version
of a ZigBee network. As shown in Fig. 2(a), the structure of of IEEE 802.15.4 [14], a router can select one active por-
superframes is controlled by two parameters: beacon order tion as its outgoing superframe, and based on the active
(BO) and superframe order (SO), which decide the lengths portion selected by its parent, the active portion is called
of a superframe and its active potion, respectively. For a its incoming superframe (as shown in Fig. 2(b)). In an out-
beacon-enabled network, the setting of BO and SO should going/incoming superframe, a router is expected to trans-
satisfy the relationship 0 6 SO 6 BO 6 14. (A non-bea- mit/receive a beacon to/from its child routers/parent
con-enabled network should set BO ¼ SO ¼ 15 to indicate router. When choosing a slot, neighboring routers’ active
that superframes do not exist.) Each active portion consists portions (i.e., outgoing superframes) should be shifted
of 16 equal-length slots, which can be further partitioned away from each other to avoid interference. This work
into a contention access period (CAP) and a contention free is motivated by the observation that the specification does
period (CFP). The CAP may contain the first i slots, and not clearly define how to choose the locations of routers’
the CFP contains the rest of the 16 i slots, where active portions such that the convergecast latency can be
1 6 i 6 16. Slotted CSMA/CA is used in CAP. FFDs reduced. In our work, we consider two kinds of interfer-
which require fixed transmission rates can ask for guaran- ence between routers. Two routers have direct interference
tee time slots (GTSs) from the coordinator. A CFP can if they can hear each others’ beacons. Two routers have
support multiple GTSs, and each GTS may contain multi- indirect interference if they have at least one common
ple slots. Note that only the coordinator can allocate neighbor. Both interferences should be avoided when
GTSs. After the active portion, devices can go to sleep to choosing routers’ active portions. Table 1 lists possible
save energy. choices of ðBO SOÞ combinations.
1002 M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011
a Beacon Beacon
CAP CFP
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
SD = aBaseSuperframeDuration×2SO symbols
(Active)
BI = aBaseSuperframeDuration×2BO symbols
Inactive Inactive
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
BI = aBaseSuperframeDuration×2BO symbols
Table 1
Relationship of BO SO, duty cycle, and the number of active portions in a superframe
BO SO 0 1 2 3 4 5 6 7 8 P9
Duty cycle (%) 100 50 25 12.5 6.25 3.13 1.56 0.78 0.39 60.195
Number of active portions (slots) 1 2 4 8 16 32 64 128 256 P512
3. The minimum delay beacon scheduling (MDBS) problem Given a slot assignment for G, the report latency from
node i to node j, where ði; jÞ 2 E, is the number of slots,
This section formally defines the convergecast problem denoted by d ij , that node i has to wait to relay its collected
in ZigBee networks. Given a ZigBee network, we model sensory data to node j, i.e.,
it by a graph G ¼ ðV ; EÞ, where V contains all routers d ij ¼ ðsðjÞ sðiÞÞ mod k: ð1Þ
and the coordinator and E contains all symmetric commu-
nication links between nodes in V. The coordinator also Note that the report latency from node i to node j
serves as the sink of the network. End devices can only ðd ij Þ may not by equal to the report latency from node
associate with routers, but are not included in V. From j to node i ðd ji Þ. Therefore, we can convert G into a
G, we can construct an interference graph GI ¼ ðV ; EI Þ, weighted directed graph GD ¼ ðV ; ED Þ such that each
where edge ði; jÞ 2 EI if there are direct/indirect interfer- ði; jÞ 2 E is translated into two directed edges ði; jÞ
ences between i and j. There is a duty cycle requirement a and ðj; iÞ such that wðði; jÞÞ ¼ d ij and wððj; iÞÞ ¼ d ji .
for this network. From a and Table 1, we can determine The report latency for each i 2 V to the sink is the
the most appropriate value of BO SO. We denote by sum of report latencies of the links on the shortest
k ¼ 2BOSO the number of active portions (or slots) per bea- path from i to the sink in GD . The latency of the con-
con interval. vergecast, denoted as LðGÞ, is the maximum of all
The beacon scheduling problem is to find a slot assign- nodes’ report latencies.
ment sðiÞ for each router i 2 V , where sðiÞ is an integer Definition 1. Given G ¼ ðV ; EÞ, G’s interference graph
and sðiÞ 2 ½0; k 1, such that router i’s active portion is GI ¼ ðV ; EI Þ, and k available slots, the minimum delay
in slot sðiÞ and sðiÞ 6¼ sðjÞ if ði; jÞ 2 EI . Here, the slot assign- beacon scheduling (MDBS) problem is to find an interfer-
ment means the position of the outgoing superframe of ence-free slot assignment sðiÞ for each i 2 V such that the
each router (the position of the incoming superframe, as convergecast latency LðGÞ is minimized.
clarified earlier, is determined by the parent of the router).
Motivated by Brook’s theorem [21], which proves that n To prove that the MDBS problem is NP-complete, we
colors are sufficient to color any graph with a maximum define a decision problem as follows.
degree of n, we would assume that k P DI , where DI is Definition 2. Given G ¼ ðV ; EÞ, G’s interference graph
the maximum degree of GI . GI ¼ ðV ; EI Þ, k available slots, and a delay constraint d,
M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011 1003
CNF-SAT) problem to a special case of the BDBS problem Fig. 3. An example of reduction from the 3-CNF-SAT to the BDBS
in polynomial time. Given any 3-CNF formula C, we will problem.
construct the corresponding G and GI . Then we show that
C is satisfiable if and only if there is a slot assignment for
each i 2 V using no more than k ¼ 3 slots such that vertices xi1 , xi1 , xi2 , and xi2 , i ¼ 1; 2; . . . ; n, the longest report
LðGÞ 6 4 slots. latency will be 4.
Let C ¼ C 1 ^ C 2 ^ ^ C m , where clause C j ¼ xj;1 To prove the if part, we need to show that if C is
_xj;2 _ xj;3 , 1 6 j 6 m, xj;i 2 fX 1 ; X 2 ; . . . ; X n g, and X i 2 satisfiable, there is a slot assignment such that k ¼ 3 and
fxi ; xi g, where xi is a binary variable, 1 6 i 6 n. We first LðGÞ 6 4. Since C satisfiable, there must exist an assign-
construct G from C as follows: ment such that each clause C j , j ¼ 1; 2; . . . ; m, is true. If a
clause C j is true, at least one variable in C j is true.
1. For each clause C j , j ¼ 1; 2; . . . ; m, add a vertex C j in G. According to the reduction, C j can always find an edge
2. For each literal X i , i ¼ 1; 2; . . . ; n, add four vertices xi1 , ðC j ; xi1 Þ or ðC j ; xi1 Þ with wððC j ; xi1 ÞÞ ¼ 1 or wððC j ; xi1 ÞÞ ¼ 1,
xi2 , xi1 , and xi2 in G. where i ¼ 1; 2; . . . ; n. Thus, when C is satisfiable, the
3. Add a vertex t as the sink of G. reporting latency for each clause is 3. This achieves
4. Add edges ðt; xi2 Þ and ðt; xi2 Þ to G, for i ¼ 1; 2; . . . ; n. LðGÞ ¼ 4.
5. Add edges ðxi1 ; xi2 Þ and ðxi1 ; xi2 Þ to G, for i ¼ 1; 2; . . . ; n.
For the only if part, if each vertex C j , j ¼ 1; 2; . . . ; m, can
6. For each i ¼ 1; 2; . . . ; n and each j ¼ 1; 2; . . . ; m, add an
find at least an edge with weight 1 to one of xi1 and xi1 , for
edge ðC j ; xi1 Þ (resp., ðC j ; xi1 Þ) to G if xi (resp., xi ) appears
i ¼ 1; 2; . . . ; n, to achieve a report latency of 3, it must be
in C j .
that each clause has at least one variable to be true. So
formula C is satisfiable. Otherwise, the report latency of C j ,
Then we construct GI as follows.
j ¼ 1; 2; . . . ; m, will be 6. h
1. Add all vertices and edges in G into GI . For example, given C ¼ ðx1 _ x2 _ x3 Þ ^ ðx1 _ x2 _ x3 Þ^
2. Add edges ðxi1 ; xi1 Þ and ðxi2 ; xi2 Þ to GI , for i ¼ 1; 2; . . . ; n. ðx1 _ x2 _ x3 Þ, Fig. 3 shows the corresponding G. The truth
3. Add edges ðC j ; xi2 Þ and ðC j ; xi2 Þ to GI , for i ¼ 1; 2; . . . ; n assignment ðx1 ; x2 ; x3 Þ ¼ ðT ; F ; T Þ makes C satisfiable.
and j ¼ 1; 2; . . . ; m. According to the reduction and the mapping in the above
proof, we can obtain the network G and its slot assignment
Then we build a one-to-one mapping from each truth as shown in Fig. 3 such that LðGÞ ¼ 4.
assignment of C to a slot assignment of G. We establish the
following mapping: 4. Algorithms for the MDBS problem
a 0 1 2 0 1 2 0 1 2 0
t
1
b 0 3
1
t 0 t 3
r1 r1
3 2
3 2
2 size:12 1 size:11
2 1
1 0
r2
l1 r2 1 3
0 3 l1
2 0 2
left g
roup
right
grou
p left group right group
Fig. 4. Examples of optimal slot assignments for regular linear and ring networks ðh ¼ 2Þ. Dotted lines mean interference relations.
for each vertex v, sðvÞ ¼ ðk0 þ 1Þ mod k, where k0 is the slot equal to 1 in step 3 in most of the cases except when two
assigned to v’s child. special nodes are visited. This gives an asymptotically opti-
mal algorithm, as proved in the following theorem.
Theorem 2. For a regular linear network, if k P h þ 1, the
above slot assignment achieves a report latency of j V j 1, Theorem 3. For a regular ring network, assuming that
which is optimal. k P 2h and bjV j1
2 c P 2h, the above slot assignment achieves
a report latency LðGÞ ¼ bjV j1
2 c þ h, which is optimal within a
Proof. Clearly, the slot assignment is interference-free. factor of 1.5.
Also the report latency of j V j 1 is clearly the lower
Proof. We first identify three nodes on the ring (refer to
bound. h
Fig. 4(b)):
For a regular ring network, we first partition vertices
excluding t into left and right groups as illustrated in l1 : the bottom node in the left group.
Fig. 4(b) such that the left group consists of the sink node r1 : the first node in the right group.
t and bjV j1
2
c other nodes counting counter clockwise from t, r2 : the node that is h hops from l1 counting counter
and the right group consists of those djV j1
2
e nodes counting clockwise.
clockwise from t. Now we consider the ring as a spanning
tree with t as the root and left and right groups as two lin- The report latency of each node can be analyzed as
ear paths. Assuming that bjV j1
2
c P 2h and k P 2h, the slot follows. The parent of node x is denoted by parðxÞ.
assignment works as follows:
A1. For each node i in the left group except the sink t, the
1. The bottom node in the left group is assigned to slot 0. latency from i to parðiÞ is 1.
2. All other nodes in the left group are assigned with slots in a A2. The latency from r1 to t is h.
bottom-up manner. For each node i in the left group, we A3. For each node i next to r1 in the right group but
let sðiÞ ¼ ðj þ 1Þ mod k, where j is the slot of i’s child. before r2 (counting clockwise), the latency from i to
3. Nodes in the right group are assigned with slots in a top- parðiÞ is 1.
down manner. For each node i in the right group, we let A4. The latency from r2 to parðr2 Þ is 1 if the ring size is
sðiÞ ¼ ðj cÞ mod k, where j is the slot assigned to i’s even; otherwise, the latency is 2.
parent and c is the smallest constant (1 6 c 6 k) that A5. For each node i in the right group that is a
ensures that sðiÞ is not used by any of its interference descendant of r2 , the report latency from i to parðiÞ
neighbors that have been assigned with slots. is 1.
It is not hard to prove the slot assignment is interfer- It is not hard to prove that A1, A2, and A3 are true. To
ence-free because nodes receives slots sequentially and we see A4 and A5, we make the following observations. The
have avoided using the same slots among interfering neigh- function pari ðxÞ is to apply i times the parðÞ function on
bors. Although this is a greedy approach, we show that c is node x. Note that par0 ðxÞ means x itself.
M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011 1005
O1. When the ring size is even, the equality phase 2. We traverse vertices of T in a bottom-up manner.
sðpari1 ðl1 ÞÞ ¼ sðpari ðr2 ÞÞ holds for i ¼ 1; 2; . . . ; For these vertices in depth d, we first sort them
bjV j1
2
c h 1. More specifically, this means that (i) according to their degrees in GI in a descending
l1 and parðr2 Þ will receive the same slot, (ii) parðl1 Þ order. Then we sequentially traverse these vertices
and par2 ðr2 Þ will receive the same slot, etc. This can in that order. For each vertex v in depth d visited,
be proved by induction by showing that the i-th we compute a temporary slot number tðvÞ for v as
descendant of t in the right group will be assigned follows.
the same slot as the ðh þ i 1Þ-th descendant of t in 1. If v is a leaf node, we set tðvÞ to the minimal non-neg-
the left group (the induction can go in a top-down ative integer l such that for each vertex u that has been
manner). This property implies that when assigning visited and ðu; vÞ 2 EI , (tðuÞ mod k) 6¼ l.
a slot to r2 in step 3, c ¼ 1 in case that the ring size 2. If v is an in-tree node, let m be the maximum of the
is even. Further, r2 and its descendants will be numbers that have been assigned to v’s children, i.e.,
sequentially assigned to slots k 1, k 2, . . ., k h, m ¼ maxftðchildðvÞÞg, where childðvÞ is the set of v’s
which implies that c ¼ 1 when doing the assignments children. We then set tðvÞ to the minimal non-negative
in step 3. So properties A4 and A5 hold for the case integer l > m such that for each vertex u that has been
of an even ring. visited and ðu; vÞ 2 EI , (tðuÞ mod k) 6¼ ðl mod kÞ.
O2. When the ring size is odd, the equality After every vertex v is visited, we make the assignment
sðpari ðl1 ÞÞ ¼ sðpari ðr2 ÞÞ holds for i ¼ 1; 2; . . . ; sðvÞ ¼ tðvÞ mod k.
bjV j1c h. This means that (i) parðl1 Þ and parðr2 Þ will phase 3. In this phase, vertices are traversed sequentially
2
receive the same slot, and (ii) par2 ðl1 Þ and par2 ðr2 Þ from t in a top-down manner. When each
will receive the same slot, etc. Again, this can be vertex v is visited, we try to greedily find a new slot
proved by induction as in O1. This property implies l such that (sðparðvÞÞ l) mod k < ðsðparðvÞÞ
that c ¼ 2 when assigning a slot to r2 in step 3, and sðvÞÞ mod k, such that l 6¼ sðuÞ for each
c ¼ 1 when assigning slots to descendants of r2 . So ðu; vÞ 2 EI , if possible. Then we reassign sðvÞ ¼ l.
properties A4 and A5 hold for the case of an odd
ring. Note that in phase 2, a node with a higher degree
means that it has more interference neighbors, implying
The equality of slot assignments pointed out in O1 and that it has less slots to use. Therefore, it has to be
O2 is illustrated in Fig. 4(b) by those numbers in gray assigned to a slot earlier. Also note that, the number
nodes. In summary, the report latency of the left group is tðvÞ is not a modulus number. However, in step 2 of phase
bjV j1 2, we did check that if tðvÞ is converted to a slot number,
2 c. When the ring size is even, the report latency of
the right group is the number of nodes in this group, jV2 j, no interference will occur. Intuitively, this is a temporary
plus the extra latency h 1 incurred at r1 . So slot assignment that will incur the least latency to v’s chil-
LðGÞ ¼ jV2 j þ h 1 ¼ bjV j1 dren. At the end, tðvÞ is converted to a slot assignment
2 c þ h. When the ring size is
odd, the report latency of right group is the number sðvÞ. Phase 3 is a greedy approach to further reduce the
of nodes in this group, jV j1 report latency of routers. For example, Fig. 5(a) shows
2 , plus the extra latency h 1
incurred at r1 and the extra latency 1 incurred at r2 . So the slot assignment after phase 2. Fig. 5(b) indicates that
LðGÞ ¼ bjV j1 B, C, and D can find another slots and their report laten-
2 c þ h.
A lower bound on the report latency of this problem cies are decreased. This phase can reduce LðGÞ in some
is the maximum number of nodes in each group cases.
excluding t. Applying bjV j1 The computational complexity of this algorithm is
2 c as a lower bound and
using the fact that bjV j1 c P 2h, LðGÞ will be smaller analyzed below. In phase 1, the complexity of construct-
2
than 1:5 bjV j1 c, which implies the algorithm is opti- ing a BFS tree is Oðj V j þ j E jÞ. In phase 2, the cost of
2 2
mal within a factor of 1.5. Note that the condition sorting is at most Oðj V j Þ and the computational cost to
bjV j1 compute tðvÞ for each vertex v is bounded by OðkDI Þ,
2 c P 2h is to guarantee that t will not locate within
h hops from r2 . Otherwise, the observation O2 will not where DI is the degree of GI . So the time complexity
2
hold. h of phase 2 is Oðj V j þ kDI j V jÞ. Phase 3 performs a
similar procedure as phase 2, so its time complexity is
4.2. A centralized tree-based assignment scheme also OðkDI j V jÞ. Overall, the time complexity is
2
Oðj V j þ kDI j V jÞ.
Given G ¼ ðV ; EÞ, GI ¼ ðV ; EI Þ, and k, we propose a
centralized slot assignment heuristic algorithm. Our algo- 4.3. A distributed assignment scheme
rithm is composed of the following three phases:
In this section, we propose a distributed slot assignment
algorithm. Each node has to compute its direct as well as
phase 1. From G, we first construct a BFS tree T rooted at indirect interference neighbors in a distributed manner.
sink t. To achieve this, we will refer to the heterogeneity approach
1006 M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011
1. Node v sends an association request to the beacon 5.1. Comparison of different convergecast algorithms
sender.
2. If v fails to associate with the beacon sender, it stops the We compare the proposed slot assignment algorithms
procedure and waits for other beacons. against a random slot assignment (denoted by RAN)
3. If v successfully associates with a parent node parðvÞ, it scheme and a greedy slot assignment (denoted by GDY)
computes the smallest positive integer l such that scheme. In RAN, the slot assignment starts from the sink
ðsðparðvÞÞ lÞ mod k 6¼ sðuÞ for all ðu; vÞ 2 EI and and each router, after associating with a parent router, sim-
sðuÞ 6¼ NULL. Then v chooses sðvÞ ¼ ðsðparðvÞÞ lÞ ply chooses any slot which has not been used by any of its
mod k as its slot. interference neighbors. In GDY, routers are given a
4. Then, v broadcasts HELLOs including its slot assign- sequence number in a top-down manner. The sink sets its
ment sðvÞ for a time period twait . If it finds that slot to k 1. Then the slot assignment continues in
sðvÞ ¼ sðuÞ for any ðu; vÞ 2 EI , v has to change to a sequence. For a node i, it will try to find a slot
new slot if one of the following rules is satisfied and goes sðiÞ ¼ sðjÞ l mod k, where j is the predecessor of i and l
back to step 3. is the smallest integer letting sðiÞ is the slot which does
(a) Node u has more interference neighbors than v. not assign to any of i’s interference neighbors. In the sim-
(b) Node u and v have the same number of interference ulations, routers are randomly distributed in a circular
neighbors but the depth of u is lower than v, i.e., u is region of a radius r and a sink is placed in the center.
closer to the sink than v. Our centralized tree-based scheme and distributed slot
(c) Node u and v have the same number of interference assignment scheme are denoted as CTB and DSA, respec-
neighbors and they are at the same depth but the u’s tively. We compare the report latency LðGÞ (in terms of
ID is smaller than v’s. slots).
Fig. 6 shows some slot assignment results of CTB and
DSA when r = 35 m and k ¼ 64. Devices are randomly dis-
1
The depth of a node is the length of the tree path from the root to the tributed. The transmission range of routers is set to 20 m.
node. The root node is at depth zero. In this case, CTB performs better than DSA.
M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011 1007
k = 64 k = 64
L(G)=19 L(G)=22
a b
300 300
Average L(G)
150 150
CTB
DSA
100 100 RAN
GDY
50 50
0 0
30 40 50 60 70 80 90 100 110 17 18 19 20 21 22 23 24 25 26
Network radius (m) Transmission range (m)
c 700
d 5000
4500
600
4000 CTB
DSA
500 3500 RAN
Average L(G)
Average L(G)
GDY
3000
400
2500
300
CTB 2000
DSA
200 RAN 1500
GDY
1000
100
500
0 0
200 300 400 500 600 700 800 900 1.56 0.78 0.39 0.195 0.098
Number of ZigBee routers Network duty cycle (%)
the goodput can up to 98% and the report can arrive to the each sensors is 3 m and each event is a disk of a radius
sink more quickly. of 5 m. A sensor can detect an event if its sensing range
overlaps with the disk of that event. Each router has an
5.3. Event-driven reporting scenarios 1 KB buffer. When a sensor detects an event, it only tries
to report that event once. All other settings are the same
In the following, we assume that sensors’ reporting as those in Section 5.2.
activities are triggered by events occurred at random loca- Fig. 12 shows the simulation results when k = 1/5s, 1/
tions in the network with a rate k. The sensing range of 15s, and 1/30s. From Fig. 12(a), we can observe that when
M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011 1009
a b
160 100 10
Theoretical
60 40 4
30 3
40
20 2
20 10 1
0 0 0
8 9 10 11 12 13 14 8 9 10 11 12 13 14
BO BO
Fig. 9. Simulations considering buffer limitation and contention effects: (a) Theoretical vs. actual report latencies and (b) goodput, channel utilization, and
number of dropped frames.
Active portion:
25 3.932 s 3.932 s 3.932 s
20
15
10
0
134 135 136 137 138 139 385 386 387 388 389 390 391 636 637 638 639 640 641 642 643
time (s)
Fig. 10. A log of the number of frames received by a sink’s child router when BO ¼ 14.
BO is small, the report latency can not achieve to the the- 6. Conclusions
oretical value. This is because that an active portion is too
small to accommodate all reports from sensors, thus In this paper, we have defined a new minimum delay
lengthening the report latency. When BO becomes larger, beacon scheduling (MDBS) problem for convergecast with
the theoretical and actual curves would meet. However, the restrictions that the beacon scheduling must be compli-
the good put will degrade, as shown in Fig. 12(b). This is ant to the ZigBee standard. We prove the MDBS problem
because reports are likely to be dropped due to buffer over- is NP-complete and propose optimal solutions for special
flow. How to determine a proper BO, which can contain cases and two heuristic algorithms for general cases. Simu-
most of the reports and guarantee low latency, is an impor- lation results indicate the performance of our heuristic
tant design issue for such scenarios. algorithms decrease only when the number of interference
1010 M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011
a 160 b 100 2
Theoretical
80 50 1
60 40
30
40 0.5
20
20 10
0 0 0
10 30 50 70 90 10 30 50 70 90
Compression rate (%) Compression rate (%)
Fig. 11. Simulations considering data compression: (a) Theoretical vs. actual report latencies and (b) goodput, channel utilization, and number of dropped
frames.
a 40 b 100
35 Theoretical
90
L(G) x slot-size (in second)
Actual(λ=1/5s)
Actual(λ=1/15s) 80
30 Actual(λ=1/30s)
70
Goodput (%)
25 60
20 50
15 40
30
10
20 λ=1/5s
λ=1/15s
5 10 λ=1/30s
0 0
7 8 9 10 11 12 7 8 9 10 11 12
BO BO
Fig. 12. Simulation results of event-driven scenarios: (a) theoretical vs. actual report latencies and (b) goodput.
neighbors is increased. Compared to the random slot [3] Design and construction of a wildfire instrumentation system using
assignment and greedy slot assignment scheme, our heuris- networked sensors. Available from: <http://firebug.sourceforge.net/>.
[4] Habitat monitoring on great duck island. Available from: <http://
tic algorithms can effectively schedule the ZigBee routers’ www.greatduckisland.net/technology.php>.
beacon times to achieve quick convergecast. In the future, [5] Jennic JN5121. Available from: <http://www.jennic.com/>.
it deserves to consider extending this work to an asynchro- [6] Motes, smart dust sensors, wireless sensor networks. Available from:
nous sleep scheduling to support energy-efficient converge- <http://www.xbow.com/>.
cast in ZigBee mesh networks. [7] S.-J. Baek, G. de Veciana, X. Su, Minimizing energy consumption in
large-scale sensor networks through distributed data compression and
hierarchical aggregation, IEEE Journal on Selected Areas in Com-
Acknowledgements munications 22 (6) (2004) 1130–1140.
[8] H. Choi, J. Wang, E.A. Hughes, Scheduling on sensor hybrid
network, in: Proceedings of IEEE International Conference on
Y.-C. Tseng’s research is co-sponsored by Taiwan MoE
Computer Communications and Networks (ICCCN), San Diego,
ATU Program, by NSC Grants 93-2752-E-007-001-PAE, USA, 2005.
96-2623-7-009-002-ET, 95-2221-E-009-058-MY3, 95-2221- [9] S. Gandham, Y. Zhang, Q. Huang, Distributed minimal time
E-009-060-MY3, 95-2219-E-009-007, 95-2218-E-009-209, convergecast scheduling in wireless sensor networks, in: Proceedings
and 94-2219-E-007-009, by Realtek Semiconductor Corp., of IEEE International Conference on Distributed Computing Systems
(ICDCS), Lisboa, Portugal, 2006.
by MOEA under Grant No. 94-EC-17-A-04-S1-044, by
[10] D. Ganesan, B. Greenstein, D. Perelyubskiy, D. Estrin, J.
ITRI, Taiwan, by Microsoft Corp., and by Intel Corp. Heidemann. An evaluation of multiresolution storage for sensor
networks, in: Proceedings of ACM International Conference on
Embedded Networked Sensor Systems (SenSys), Los Angeles,
References USA, 2003.
[11] B. Hohlt, L. Doherty, E. Brewer, Flexible power scheduling for sensor
[1] Chipcon CC2420DBK. Available from: <http://www.chipcon.com/>. networks, in: Proceedings of ACM/IEEE International Conference
[2] Dust network Inc. Available from: <http://dust-inc.com/flash- on Information Processing in Sensor Networks (IPSN), Berkeley,
index.shtml>. USA, 2004.
M.-S. Pan, Y.-C. Tseng / Computer Communications 31 (2008) 999–1011 1011
[12] Y.-K. Huang, A.-C. Pang, T.-W. Kuo, AGA: adaptive GTS [17] G. Lu, B. Krishnamachari, C.S. Raghavendra, An adaptive energy-
allocation with low latency and fairness considerations for IEEE efficient and low-latency MAC for data gathering in wireless sensor
802.15.4, in: Proceedings of IEEE International Conference on networks, in: Proceedings of IEEE International Parallel and
Communications (ICC), Istanbul, Turkey, 2006. Distributed Processing Symposium (IPDPS), New Mexico, USA,
[13] IEEE standard for information technology – telecommunications and 2004.
information exchange between systems – local and metropolitan area [18] Y.-C. Tseng, S.-P. Kuo, H.-W. Lee, C.-F. Huang, Location tracking
networks specific requirements part 15.4: wireless medium access in a wireless sensor network by mobile agents and its data fusion
control (MAC) and physical layer (PHY) specifications for low-rate strategies, The Computer Journal 47 (4) (2004) 448–460.
wireless personal area networks (LR-WPANs), 2003. [19] Y.-C. Tseng, M.-S. Pan, Y.-Y. Tsai, Wireless sensor networks for
[14] IEEE standard for information technology – telecommunications and emergency navigation, IEEE Computer 39 (7) (2006) 55–62.
information exchange between systems – local and metropolitan area [20] S. Upadhyayula, V. Annamalai, S.K.S. Gupta, A low-latency and
networks specific requirements part 15.4: wireless medium access energy-efficient algorithm for convergecast in wireless sensor net-
control (MAC) and physical layer (PHY) specifications for low-rate works, in: Proceedings of IEEE Global Telecommunications Confer-
wireless personal area networks (LR-WPANs) (revision of IEEE Std ence (Globecom), San Francisco, USA, 2003.
802.15.4-2003), 2006. [21] D.B. West, Introduction to Graph Theory, Prentice Hall, 2001.
[15] Q. Li, M. DeRosa, D. Rus, Distributed algorithm for guiding [22] M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, S.
navigation across a sensor network, in: Proceedings of ACM Singh, Exploiting heterogeneity in sensor networks, in: Proceedings of
International Symposium on Mobile Ad Hoc Networking and IEEE INFOCOM, Miami, USA, 2005.
Computing (MobiHoc), Maryland, USA, 2003. [23] Y. Yu, B. Krishnamachari, V.K. Prasanna, Energy-latency tradeoffs
[16] C.-Y. Lin, W.-C. Peng, Y.-C. Tseng, Efficient in-network moving for data gathering in wireless sensor networks, in: Proceedings of
object tracking in wireless sensor networks, IEEE Transactions on IEEE INFOCOM, Hong Kong, 2004.
Mobile Computing 5 (8) (2006) 1044–1056. [24] ZigBee specification version 2006, ZigBee document 064112, 2006.