Minimum Energy Reliable Multipath Ad Hoc Networks Petar Djukic and Shahrokh Valaee The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toronto, 10 King’s College Road, Toronto, ON, M5S 3G4, Canada e-mail:{djukic,valaee}@comm.utoronto.ca Abstract— We give an edge-based mechanism to provide reliable transport services and minimize the total energy in ad hoc networks. The implementation is based on path diversification, which uses spatial diversity in the network through multipath routing, and erasure codes to provide guaranteed reliability. We use a cross-layer design where higher network layers use information about packet loss and energy consumption to distribute the load in the network. We find a lower bound on the reliability in the network and use it to allocate network resources to minimize energy while the reliability of the network is guaranteed.

I. I NTRODUCTION Ad hoc networks have unreliable end-to-end connections and limited battery power. The unreliable end-to-end connections make it difficult to provide QoS guarantees, such as maximum packet loss. The limited battery power makes it even harder to provide guaranteed QoS since any scheme that provides QoS guarantees must take into account its impact on the energy consumption in the network. In this paper, we give an edge-based mechanism that can guarantee maximum packet loss (reliability). In order to limit the impact of the mechanism on energy consumption, we minimize the total energy each connection must use to achieve the level of reliability requested by that connection. The difficulty in implementing end-to-end QoS in ad hoc networks comes from unreliable connections due to channel characteristics and node mobility. For example, TCP algorithm is ineffective in cellular wireless networks [1] and in ad hoc networks due to high packet loss rates [2]; reliability is difficult to maintain with routing alone due to high node mobility [3]; and QoS reservation schemes are also ineffective due to node mobility [4]. We use path diversification as a more robust way to deal with the reliability problems in ad hoc networks. II. PATH D IVERSIFICATION Path diversification uses multiple parallel paths and erasure codes to provide reliability in the network. The mechanism encodes the data packets into fragments with an erasure code and distributes the fragments on multiple parallel paths in the network. The erasure code allows the destination node to reassemble the packets even if some of the fragments are lost. Path diversification allows us to use a cross-layer approach to provide end-to-end QoS in ad hoc networks. First, it uses spatial diversity available in relatively dense ad hoc networks to increase robustness of packet transmissions

Connection Source P

Connection Sink P

Mi = M + K

1 2 M .. . Data ··· S M 1 K . Parity .. Source K

i

Zi ≥ M

M1

3 1 Z1 5 2 4 Z2

M2

.. .

D Mn

M + K . . . i Zn Destination

Probing: Ei , qi , Mith

Fig. 1.

DM

Path Diversification

through multipath routing protocols [5]. Second, it uses crosslayer information collection to optimize the operation of the scheme in terms of reliability and energy consumption. In path diversification, the source node encodes each packet of M fragments into M + K fragments of the original data and parity, using a linear erasure code [6]. The destination can recover the packet if it receives more than M fragments. In addition to the erasure code, the source node also transmits the fragments over multiple parallel paths. In order to maximize spatial diversity in the network, we assume that the paths are chosen so that they have no nodes or edges in common (i.e. the paths are arc-disjoint ). We illustrate how path diversification works in Fig. 1. The connection supplies a packet of size bM bits every DM seconds. The source node splits the packet into M fragments each with size b and generates K parity fragments, also with size b. The source node distributes the fragments on the n paths available for transmission, and transmits Mi fragments on path i. In this paper, we will show that path diversification provides an effective way to increase reliability. III. N ETWORK M ODEL AND A SSUMPTIONS We envision path diversification as a sub-layer of the network layer in which routing is implemented with a multipath routing protocol [5]. The network layer provides an interface which allows the path diversification module to access multiple paths in the network. The connections interact with the path diversification module to transmit their packets. The module allows specification of the level of reliability, , and the maximum cost the connection is willing to pay for the reliability, the overhead K. The path diversification module node uses

this information when it allocates the fragments on the paths to minimize energy consumption. In the rest of this section, we introduce network parameters and quantities we will use for optimizations in Section IV.

path before the energy on the path runs out: ) ( (k) Ei (e) . Mi = min (k) 1≤k≤ni bei

A. Network Reliability (Packet Loss)

We denote with Me the vector of maximum number of fragments that we can transmit on each path, i.e. Me = (e) (e) (e) [M1 , M2 , .., Mn ]T .

We define the level of network reliability. Psucc , as the probability that a packet can be reconstructed at the receiver. We use the Poisson cumulative distribution function (c.d.f) [7] to derive the lower bound on Psucc 1 : Q(m, K) ≤ Psucc ≤ Q(m, K) + where, Q(m, K) =

K X e−λ(m) [λ(m)]j j=0

j!

n Mi X 2 ln (qi ) 2 i=1

and λ(m) = −

n X

(1)

Mi ln[qi ],

i=1

(2) and pi is the probability that a fragment will be lost in a transmission on path i and qi = 1 − pi . The upper bound in (1) is quite loose, especially if the total number of fragments M + K is large. However, in practice we would only be interested in fairly high values of Q(m, K) which would make the actual error quite small. For example, if Q(m, K) = 0.999, the error can be at most 10−3 regardless of the upper bound in (1). B. Energy Consumption in the Network We assume that every node in the network has the ability to measure the average amount of energy it uses to transmit a bit (k) of information ei and the amount of available energy on the (k) node Ei , where we have indexed the node as “node k on path (k) i”. In order to simplify the optimization, we assume that ei (k) and Ei do not change during the packet transmission. For example, each node in the network can assign a constant power level and the amount of energy available to each connection. The destination can send a probe to the source node to inform it about the per-bit energy required to transfer a packet (b) between the source and the destination on a path, ei . The per-bit energy consumption on a path can be determined by adding up the energy required to transfer a bit at every node Pni −1 (k) (b) on the path ei = k=0 ei , where ni is the number of nodes on path i. The vector of per bit energy consumption in (b) (b) (b) the network is given by Eb = [e1 , e2 , .., en ]T . So, the total amount of energy spent to transmit the M + K fragments is given by: ETotal (m, Eb ) = bmT Eb . (3) The source node obtains the vector Eb periodically from the network measurements. So, the source node should also perform the minimization periodically, when it receives the updates. With network probing, we also have access to the maximum (e) number of fragments, Mi , that can be transmitted on each 1 We

give mathematical details of this discussion in [8].

(4)

IV. M INIMUM E NERGY R ELIABLE A D H OC N ETWORKS We minimize the the total consumed energy (i.e. the sum of energy use across each path in the network) with a given bound on reliability and efficiency in the network. The minimization finds the optimum number of parity fragments K needed to satisfy the reliability bounds, as well as the allocation of fragments on each path m = [M1 , M2 , . . . , Mn ]: Minimize: ETotal (m, Eb ) = bmT Eb

(5a)

Subject to: Psucc ≥  η(m, K) ≥ δ

(5b) (5c)

m,K

mT 1 − K = M 0  m  Me

(5d) (5e)

The reliability constraint (5b) is the guarantee that the packet can be reconstructed at the receiver node with some minimum probability . The efficiency constraint (5c) puts a bound on the maximum number of fragments K that can be used to achieve the reliability, i.e. η(m, K) = M/(M + K). We solve the minimization in two ways. First, we assume that the source has full knowledge of fragment loss on each path. In this case, we use the Poisson cumulative distribution function (c.d.f) to give the lower bound for the network reliability Psucc . This allows us to convert the minimization into a linear program: Minimize: ETotal (m, Eb ) = bmT Eb

(6a)

Subject to: − mT ln(q) − s()K ≤ c()

(6b)

mT 1 − K = M 0  m  Mth .

(6d) (6e)

m,K

0 ≤ K ≤ Kmax

(6c)

where ln(q) = [ln(q1 ), . . . , ln(qn )] and s() and c() are constants relating the Poisson c.d.f and the parameter 2 . Second, we enhance the optimization by adding a robust bound for the reliability in the network. We modify (6) to include the uncertainty of fragment loss information. The resulting optimization becomes a robust linear program [9] which can be solved with convex programming. We add robustness for the reliability constraint by noting that the probability that reliability is lower than what is given by (6b) is equal to the probability that λ(m) > s()K + c() = α(K), 2 We derive bound in (6b) from (1). We give mathematical details of the linearization in [8]. We also show there that even though the solution with the approximation is sub-optimal, the difference is almost negligible.

i.e.: Pr[Psucc < ] = Pr[λ(m) > α(K)].

(7)

adding more parity fragments. This is because there is a higher

So, we can replace the reliability bound (6b) with a confidence bound on the reliability. We note by (2) that λ(m) is a sum of continuous random variables, so by the Central Limit Theorem (C.L.T.) we can approximate λ(m) as a Normal PSfragthe replacements random variable with mean µλ and variance σλ2 . With confidence bound, the optimization is given as the following mathematical program: (8a)

Subject to: mT µ + Φ−1 (γ)kσ ◦ mk ≤ −α(K) Kmin ≤ K ≤ Kmax

(8b) (8c)

m,K

mT 1 − K = M



0  m  Me

q¯ = 0.7 q¯ = 0.8 q¯ = 0.9

200

% Energy Increase

Minimize: ETotal (m, Eb ) = bmT Eb

Energy Overhead vs. Minimum Reliability

250

150

100

50

0 −2

(8d)

−1

Fig. 2.

0

1

2

Log-odd Minimum Reliability 

3

4

Energy Overhead vs. Minimum Reliability 

(8e)

Log-odd Efficiency η

where kxk = xT x is the vector norm, and ◦ is the pointwise (Hadamard) matrix multiplication. This is a Second-Order Conic Program (SOCP) that can be solved with convex programming [9]. In fact, we could also relax the bound on the reliability of the energy information required for the program and use the C.L.T. approximation to add a confidence bound on the minimum of thePSfrag energyreplacements consumption. The robust bound allows us to validate our claim on the guaranteed reliability in the network, by taking into account that the information about the paths may be inaccurate. The robust bound transforms the minimization into a Second-Order Conic Program that can be solved with Convex programming. V. R ESULTS We use numerical simulations to give results for minimization of energy consumption. We show the effect of improving network reliability on the energy consumption in Fig. 2. We use packet loss ratio on the paths  as a measure of reliability. We plot the percent increase from the minimum energy when  changes. The minimum energy is achieved when the problem is optimized with no reliability constraints. We give the plot in log-odd format where we plot α as log(α/(1 − α)). The log-odd scale allows us map the set [0, 1] uniformly to the set [−∞, ∞], so that we can observe the asymptotic effect when  → 0 or  → 1. We can see from Fig. 2 that with less than twice the increase in total energy consumption, we can make the minimum reliability  > 0.999 even for channels where the probability of fragment loss is 20% on average. We show the effect of variance of energy consumption on the efficiency in Fig. 3. Efficiency is plotted for the packet allocation that has the minimum energy consumption. We can see that the efficiency does not depend on the minimum reliability alone. In fact, the variance of energy consumption has a great impact on the traffic efficiency we can expect in the network. Fig. 3 also shows that when the variance in energy consumption is large, we can decrease energy by

0.8 0.7 0.6 0.5 0.4 0.3 0.2 0

0.1

0.2

0 −0.1 1

0.4 0.9

0.6 0.8

0.7

0.6

0.5

0.4

0.8 0.3

0.2

0.1

1

Log 

Energy Range

Fig. 3.

Efficiency at Minimum Energy

likelihood that a path with low energy consumption also has higher reliability. R EFERENCES [1] S. Shakkottai, T. S. Rappaport, and P. C. Karlsson, “Cross-layer design for wireless networks,” IEEE Commun. Mag., vol. 41, no. 10, pp. 74–80, October 2003. [2] C.-Y. Wan, A. T. Campbell, and L. Krishnamurthy, “PSFQ: a reliable transport protocol for wireless sensor networks,” in Proceedings of the first ACM international workshop on Wireless sensor networks and applications. ACM Press, 2002, pp. 1–11. [3] P. Papadimitratos, Z. J. Haas, and E. G. Sirer, “Path selection in mobile ad hoc networks,” in Proceedings of Mobihoc 2002. ACM, 2002. [4] G.-S. Ahn, A. T. Campbell, A. Veres, and L.-H. Sun, “SWAN: Service differentiation in stateless wireless ad hoc networks,” in INFOCOM 2002, 2002. [5] M. K. Marina and S. R. Das, “On-demand multipath distance vector routing in ad hoc networks,” in Proceedings of the International Conference for Network Procotols (ICNP), Riverside, November 2001. [6] M. O. Rabin, “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance,” Journal of the Association for Computing Machinery, vol. 36, no. 2, pp. 335–348, April 1989. [7] R. J. Serfling, “The role of the Poisson distribution in approximating system reliability of k-out-of-n structures,” in Proceedings on the The Theory and Applications of Reliability with Emphasis on Bayesian and Non-parametric Methods, C. P. Tsokos and I. Shimi, Eds., vol. 1. University of South Florida: Academic Press, Inc, December 1975, pp. 243–259. [8] P. Djukic, “Optimum resource allocation in multipath ad hoc networks,” Master’s thesis, University of Toronto, 2003. [9] S. Boyd and L. Vandenberghe, Convex Optimization. University of Stanford: http://www.stanford.edu/ boyd/cvxbook.html, December 2002.

Minimum Energy Reliable Multipath Ad Hoc ... - Semantic Scholar

relax the bound on the reliability of the energy information required for the program and use the C.L.T. approximation to add a confidence bound on the minimum ...

184KB Sizes 1 Downloads 227 Views

Recommend Documents

End to end secure communication in ad-hoc ... - Semantic Scholar
Jul 13, 2009 - copies bear this notice and the full citation on the first page. To copy otherwise, or ..... A regular desktop PC was used as the hospital's database with ... Station, due to cost limitations, we were unable to build a prototype with .

End to end secure communication in ad-hoc ... - Semantic Scholar
Jul 13, 2009 - Different wireless technologies and different types of communication interfaces .... WiFi and a 3G interface, and can be a laptop, a PDA or a 3G.

Ad Hoc Routing with Early Unidirectionality ... - Semantic Scholar
utilizes geographical distance and path loss between the nodes for fast detection .... goal of DEAR is energy-awareness and it only addresses power source .... Cross Layer Solution As an alternative, we can utilize a wireless channel ...

On Promoting Ad-Hoc Collaboration Among ... - Semantic Scholar
our vision of the future role that handheld devices will play in a mobile .... which is outside the coverage area of a mobile support sta- ... phone) of a user constituting both a messenger when they move. ... a conventional local-area network.

Wireless Mobile Ad-hoc Sensor Networks for Very ... - Semantic Scholar
proactive caching we significantly improve availability of sensor data in these extreme conditions ... farmers over the web interface, e-mail, or post and stored in a.

DCDD: Reliable and Energy Efficient Transport ... - Semantic Scholar
Sensors would be placed throughout a building and occasionally take pictures ... PSFQ the cost of energy is not taken into account. In contrast, ... App. 2. 3. Filter. 4. 5. Routing. 6. 7. 8. MAC. Fig. 1. Directed Diffusion Network Stack and the sink

On-Demand Multipath Routing for Mobile Ad Hoc Networks Asis ...
Division of Computer Science ... A mobile, ad hoc network is an autonomous system of ... route set up and maintenance in a packet radio network with moderate ...

DCDD: Reliable and Energy Efficient Transport ... - Semantic Scholar
MAC layer (entry point 1) and is then passed to applications and filters that ..... “Network routing application programmer's interface (API) and walk through 8.0 ...

On-demand Multipath Distance Vector Routing in Ad Hoc Networks
On-demand routing protocols for ad hoc networks discover and maintain only the ... An ad hoc network is a mobile, multihop wireless network with no stationary infrastructure. ...... Conf. on Computer Communications and Networks ... Workshop on Mobile

Achieving Minimum-Cost Multicast: A ... - Semantic Scholar
network knowledge. The recent proposal of network coding [4], [5] has suggested ... net Service Provider (ISP) networks as a result of using our network-coding ...

Achieving Minimum-Cost Multicast: A ... - Semantic Scholar
problem of minimum-energy multicast in wireless networks. II. ...... [9] T. Ho, R. Koetter, M. Médard, D. R. Karger, and M. Effros, “The benefits of coding over ...

Renewable Energy and Energy Efficiency ... - Semantic Scholar
Oct 18, 2013 - Energy Efficient Appliance Tax Credit for Manufacturers . ..... FY2011; $0 for FY2012; $0 for FY2013; data for FY2014 is currently unavailable.

Renewable Energy and Energy Efficiency ... - Semantic Scholar
Oct 18, 2013 - Bioenergy Technologies Office – Financial Opportunities online ... contract for cost-shared research, development, and demonstration projects. ... production, delivery, and storage technologies; overcome technical barriers to.

On-Demand Energy Efficient Clustering in Ad Hoc ...
6 Cluster maintenance algorithm. 6 Effective utilization of duplicate gateway problem. 6 Battery power recovery algorithm. 6 Increases the network lifetime.

Evaluation of the Masked Node Problem in Ad-Hoc ... - Semantic Scholar
tion (PCF) and Distributed Coordination Function (DCF). The DCF .... probability in a real system (although it does capture the right order). ..... ~30 dB shield.

Energy Efficiency in the Mobile Ad Hoc Networking ...
monitoring bovine animals potentially offers high increase in the profitability ... The recent progress in the energy efficient wireless network ... detecting pregnancy, much cheaper than currently used rectal .... over Internet, from mobile phones,

Split Multipath Routing with Maximally Disjoint ... - Semantic Scholar
Computer Science Department. University of ..... We generated various mobility degree by using .... difference becomes evident as the mobility degree increases.

Evaluation of the Masked Node Problem in Ad-Hoc ... - Semantic Scholar
The DATA packet size is fixed and the transmission time of each packet is T. The transmission time of ACK packets is negligible. We define the load on each ...

A MAC protocol for reliable communication in low ... - Semantic Scholar
Apr 8, 2016 - sonalized medication [9]. ..... We use the reserved bits 7–9 of the frame control field for spec- ..... notebook are connected by a USB cable. Fig.

A MAC protocol for reliable communication in low ... - Semantic Scholar
Apr 8, 2016 - BANs share the spectrum, managing channel access dynamically to .... run together on an android platform or on a mote with sufficient.

Toward reliable estimates of seed removal by ... - Semantic Scholar
access to small rodents do not work properly in the Neotropics. We used an .... mum distance of 100 m from the nearest edge of the frag- ment. Thus, seed ...

Minimum output power anti-jam with fully ... - Semantic Scholar
†School of Electrical Engineering and Telecommunication, ... The Minimum Output Power (MOP) ... is difference co-array equivalent to the physical array. The.

Elixir Ad Hoc Designer
Current export formats include exporting as HTML webpage, an Adobe Acrobat PDF document ... and Remote designer for more details and available classes.

Do Energy Prices Influence Investment in Energy ... - Semantic Scholar
They find little evidence that the price premium for a green home .... used for electronics, new homes, commercial buildings, and industrial plants. It should ... were Energy Star products for each of four major appliances: air-conditioners, clothes.