skip to main content
research-article

Adaptive instantiation of the protocol interference model in wireless networked sensing and control

Published: 31 January 2014 Publication History

Abstract

Interference model is the basis of MAC protocol design in wireless networked sensing and control, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengths of both the physical and the protocol interference models, we analyze how network traffic, link length, and wireless signal attenuation affect the optimal instantiation of the protocol model. We also identify the inherent trade-off between reliability and throughput in the model instantiation. Our analysis sheds light on the open problem of efficiently optimizing the protocol model instantiation. Based on the analytical results, we propose the physical-ratio-K (PRK) interference model as a reliability-oriented instantiation of the protocol model. Via analysis, simulation, and testbed-based measurement, we show that PRK-based scheduling achieves a network throughput very close to (e.g., 95%) what is enabled by physical-model-based scheduling while ensuring the required packet delivery reliability. The PRK model inherits both the high fidelity of the physical model and the locality of the protocol model, thus it is expected to be suitable for distributed protocol design. These findings shed new light on wireless interference models; they also suggest new approaches to MAC protocol design in the presence of uncertainties in network and environmental conditions as well as application QoS requirements.

References

[1]
A. Arora and R. Ramnath, et al. 2005. Exscal: Elements of an extreme scale wireless sensor network. In Proceedings of the IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.
[2]
F. Baccelli and B. Blaszczyszyn. 2010. Stochastic geometry and wireless networks (volume 2): Applications. Found. Trends Network. 4, 1--2, 1--312.
[3]
D. M. Blough, S. Das, G. Resta, and P. Santi. 2008. A framework for joint scheduling and diversity exploitation under physical interference in wireless mesh networks. In Proceedings of the International Conference on Mobile Ad-hoc and Sensor Systems.
[4]
G. Brar, D. M. Blough, and P. Santi. 2006. Computationally efficient scheduling with the physical interference model for throughput improvement in wireless mesh networks. In Proceedings of the Annual International Conference on Mobile Computing and Networking.
[5]
G. Brar, D. M. Blough, and P. Santi. 2008. The SCREAM approach for efficient distributed scheduling with physical interference in wireless mesh networks. In Proceedings of the IEEE International Conference on Distributed Computing Systems.
[6]
D. Chafekar, V. A., Kumar, M. V. Marathe, S. Parthasarathy, and A. Srinivasan. 2008. Approximation algorithms for computing capacity of wireless networks with sinr constraints. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies.
[7]
X. Che, X. Ju, and H. Zhang. 2011. The case for addressing the limiting impact of interference on wireless scheduling. In Proceedings of the Annual International Conference on Network Protocols.
[8]
K. Chintalapudi and L. Venkatraman. 2008. On the design of mac protocols for low-latency hard real time latency applications over 802.15.4 hardware. In Proceedings of the International Symposium on Information Processing in Sensor Networks.
[9]
J. I. Choi, M. Jain, M. A. Kazandjieva, and P. Levis. 2010. Granting silence to avoid wireless collisions. In Proceedings of the Annual International Conference on Network Protocols.
[10]
S. Gollakota and D. Katabi. 2008. ZigZag decoding: Combating hidden terminals in wireless networks. In Proceedings of the ACM SIGCOMM Data Communications Festival.
[11]
P. Gupta and P. R. Kumar. 2000. The capacity of wireless networks. IEEE Trans. Inf. Theory 46, 2.
[12]
D. Halperin, T. Anderson, and D. Wetherall. 2008. Taking the sting out of carrier sense: Interference cancellation for wireless LANs. In Proceedings of the Annual International Conference on Mobile Computing and Networking.
[13]
J. Hellerstein, Y. Diao, S. Parekh, and D. M. Tilbury. 2004. Feedback Control of Computing Systems. Wiley-IEEE Press.
[14]
IEEE 802.15.4. 2006. Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANS). IEEE Std 802.15.4-2006.
[15]
ISA SP100.11A. http://www.isa.org//MSTemplate.cfm?MicrositeID=1134\&CommitteeID=6891.
[16]
C. Joo, X. Lin, and N. B. Shroff. 2008. Understanding the capacity region of the greedy maximal scheduling algorithm in multi-hop wireless networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies.
[17]
B. Katz, M. Volker, and D. Wagner. 2008. Link scheduling in local interference models. In Proceedings of the International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics.
[18]
L. B. Le, E. Modiano, C. Joo, and N. B. Shroff. 2010. Longest-queue-first scheduling under SINR interference model. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing.
[19]
L. E. Li, R. Alimi, D. Shen, H. Viswanathan, and Y. R. Yang. 2010. A general algorithm for interference alignment and cancellation in wireless networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies.
[20]
H. Ma, H. M. Alazemi, and S. Roy. 2005. A stochastic model for optimizing physical carrier sensing and spatial reuse in wireless ad hoc networks. In Proceedings of the International Conference on Mobile Ad-hoc and Sensor Systems.
[21]
R. Maheshwari, J. Cao, and S. Das. 2009. Physical interference modeling for transmission scheduling on commodity wifi hardware. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies miniconference.
[22]
R. Maheshwari, S. Jain, and S. Das. 2008. A measurement study of interference modeling and scheduling in lowpower wireless networks. In Proceedings of the ACM Conference on Embedded Networked Sensor Systems.
[23]
R. Menon, R. M. Buehrer, and J. H. Reed. 2006. Impact of exclusion region and spreading in spectrum-sharing ad hoc networks. In Proceedings of the ACM Workshop on Technology and Policy for Accessing Spectrum.
[24]
T. Moscibroda, R. Wattenhofer, and Y. Weber. 2006. Protocol design beyond graph based models. In Proceedings of the ACM Workshop on Hot Topics in Networks.
[25]
Net. 2008. NetEye testbed. http://neteye.cs.wayne.edu/neteye/home.php.
[26]
W. Niu, J. Li, and T. Talty. 2008. Intra-vehicle UWB channel measurements and statistical analysis. In Proceedings of the IEEE Global Telecommunications Conference.
[27]
T. Rappaport. 2002. Wireless Communications. Prentice-Hall, Upper Saddle River, NJ.
[28]
I. Rhee, A. Warrier, J. Min, and L. Xu. 2006. DRAND: Distributed randomized TDMA scheduling for wireless ad hoc networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing.
[29]
M. Sha, G. Xing, G. Zhou, S. Liu, and X. Wang. 2009. C-MAC: Model-driven concurrent medium access control for wireless sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies.
[30]
G. Sharma, R. R. Mazumdar, and N. B. Shroff. 2006. On the complexity of scheduling in wireless networks. In Proceedings of the Annual International Conference on Mobile Computing and Networking.
[31]
G. Sharma, N. Shroff, and R. Mazumdar. 2006. Maximum weighted matching with interference constraints. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications.
[32]
Y. Shi, Y. T. Hou, J. Liu, and S. Kompella. 2009. How to correctly use the protocol interference model for multi-hop wireless networks. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing.
[33]
K. Sohrabi, B. Manriquez, and G. J. Pottie. 1999. Near ground wideband channel measurement. In Proceedings of the IEEE Semiannual Vehicular Technology Conference.
[34]
D. Stoyan, W. S. Kendall, and J. Mecke. 1995. Stochastic Geometry and Its Applications. Wiley.
[35]
T. Tabet and R. Knopp. 2004. Spatial throughput of multi-hop wireless networks under different retransmission protocols. In Proceedings of the Allerton Conference on Communication, Control, and Computing.
[36]
F. Tobagi and L. Kleinrock. 1975. Packet switching in radio channels: Part II--the hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Trans. Commun. 23, 12, 1417--1433.
[37]
W. Wang, Y. Wang, X.-Y. Li, W.-Z. Song, and O. Frieder. 2006. Efficient interference-aware TDMA link scheduling for static wireless networks. In Proceedings of the Annual International Conference on Mobile Computing and Networking.
[38]
S. Weber, X. Yang, J. G. Andrews, and G. De Veciana. December 2005. Transmission capacity of wireless ad hoc networks with outage constraints. IEEE Trans. Inf. Theory 51, 12.
[39]
G. Werner-Allen, P. Swieskowski, and M. Welsh. 2005. Motelab: A wireless sensor network testbed. In Proceedings of the International Symposium on Information Processing in Sensor Networks.
[40]
WirelessHART. http://www.hartcomm.org/protocol/wihart/wireless_technology.html.
[41]
K. Yedavalli and B. Krishnamachar. 2008. Enhancement of the IEEE 802.15.4 MAC protocol for scalable data collection in dense sensor networks. In Proceedings of the International Symposium on Modeling and Optimizationin Mobile, Ad Hoc, and Wireless Networks.
[42]
Y. Yi, G. D. Veciana, and S. Shakkottai. 2007. On optimal MAC scheduling with physical interference model. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies.
[43]
L. Ying and S. Shakkottai. 2009. Scheduling in mobile ad hoc networks with topology and channel-state uncertainty. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies.
[44]
H. Zhang, A. Arora, and P. Sinha. May 2009. Link estimation and routing in sensor network backbones: Beacon-based or data-driven? IEEE Trans. Mob. Comput. 8, 5, 653--667.
[45]
H. Zhang, A. Arora, Y. ri Choi, and M. Gouda. 2007. Reliable bursty convergecast in wireless sensor networks. Elsevier Computer Communi. 30, 13. (Special Issue on Sensor-Actuator Networks).
[46]
H. Zhang, X. Che, X. Liu, and X. Ju. 2012. Adaptive instantiation of the protocol interference model in wireless networked sensing and control. Tech. rep. WSU-CS-DNC-TR-12-01, Wayne State University. https://sites.google.com/site/dnctrs/DNC-TR-12-01.pdf.
[47]
H. Zhang, C. Li, X. Liu, Y. Chen, X. Che, F. Lin, L. Y. Wang, and G. Yin. 2013. PRK-based scheduling for predictable link reliability in wireless networked sensing and control. Tech. rep. DNC-TR-12-02, Wayne State University. https://sites.google.com/site/dnctrs/DNC-TR-12-02.pdf.
[48]
Y. Zhang and A. K. Brown. 2008. Data rate for ds-uwb communication systems in wireless personal area networks. In Proceedings of the IEEE International Conference on Ultra-Wideband.
[49]
G. Zhou, T. He, S. Krishnamurthy, and J. Stankovic. 2006. Models and solutions for radio irregularity in wireless sensor networks. ACM Trans. Sen. Netw. 2, 2.
[50]
G. Zhou, T. He, J. A. Stankovic, and T. Abdelzaher. 2005. RID: Radio interference detection in wireless sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies.
[51]
M. Zuniga and B. Krishnamachari. 2007. An analysis of unreliability and asymmetry in low-power wireless links. ACM Trans. Sen. Netw. 3, 2.

Cited By

View all

Index Terms

  1. Adaptive instantiation of the protocol interference model in wireless networked sensing and control

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 10, Issue 2
      January 2014
      609 pages
      ISSN:1550-4859
      EISSN:1550-4867
      DOI:10.1145/2575808
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 31 January 2014
      Accepted: 01 March 2013
      Revised: 01 August 2012
      Received: 01 October 2011
      Published in TOSN Volume 10, Issue 2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Wireless interference model
      2. analysis
      3. control theory
      4. local adaptation
      5. measurement
      6. physical model
      7. protocol model
      8. reliability
      9. simulation
      10. throughput

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 06 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media