A Data Transmission Protocol for Wireless Sensor Networks: A Priority Approach
Keywords:Buffer Management, Priority, Transport, Packet Scheduling, Wireless Sensor Networks, Reporting Rate,
AbstractRecent development in the field of a wireless sensor network has shown the significant improvement and has emerged as a new energy efficient wireless technology for low data rate applications. Handling different types of event data altogether is a crucial task in the sensor networks. This paper presents the solution to the problem of heterogeneous data transmission of long distance prioritised nodes in low data rate wireless sensor networks (LR-WSNs). The solution comprises three main algorithms, namely data reporting, traffic scheduling, and centralised reporting rate mechanism. The data reporting algorithm reports the demanded data in each specified decision window size with variable reporting rate. The traffic aware packet scheduling algorithm performs the packet reprioritisation and scheduling. The priority assignment is designed based on the data priority and hop count. It serves transient traffic against newly sensed packets, or less hop distance travelled packets. As a result, it minimises the chances of dying earlier than its deadline. The third algorithm presents the flexible data gathering approach based on the level of the buffer either sensed by its own or recently received information from hop node. It uses a decision interval window for managing the frequency of data delivery. This centralised decision approach makes the sink node more adaptive for data gathering and controlling the active source nodes. This multi-tier framework functions over CSMA/CA due to its unique feature of energy saving, especially for LR-WSNs. The reported work is simulated and examined over various scenarios in the multi-hop wireless sensor networks. Moreover, the performance of the scheduler proves better data transmission rate for prioritybased traffic over regular traffic flows; approximately 7% over First-Come-First-Served (FCFS) and 5% against Precedence Control Scheme (PCS) mechanism using theoretical analysis and computer simulations.
C. Lin, B. Xue, Z. Wang, D. Han, J. Deng, and G. Wu, “DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks”, 2015 IEEE 17th International Conference on High-Performance Computing and Communications (HPCC). 2015, pp.503-508.
S. R. Vijay, R.V.Prasad, G. Ignas, and M. Niemegeers, 2015 IEEE Wireless Communications and Networking Conference (WCNC 2015) - Track 2: MAC and Cross-Layer Design, pp.1030-1035.
K. Meejoung, and K. Chul-Hee, “Priority-Based ServiceDifferentiation Scheme for IEEE 802.15.4 Sensor Networks in Nonsaturation Environments,” IEEE Transactions On Vehicular Technology. vol. 59. no. 7. September 2010. pp.3524-3535.
S. Wei, Z. Tingting, B. Filip, and G. Mikael, “PriorityMAC: A Priority-Enhanced MAC Protocol for Critical Traffic in Industrial Wireless Sensor and Actuator Networks,” IEEE Transactions On Industrial Informatics, vol. 10, no. 1, 2014. pp.824-835.
IEEE Standard 802.15.4. IEEE Standard 802.15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area networks (WPANs).Available:http://standards.ieee.org/getieee802/download/8 02.15.4-2006.pdf.
S. C. Ergen, P. Varaiya, “Quality-of-service in ad hoc carrier sense multiple access wireless networks,” IEEE J. Sel. Areas Commun., vol. 17, no. 8, 199, pp.1353-1368.
Ettus Research LLC, Universal Software Radio Peripheral. Available:http://www.ettus.com.
L. Q.Tao, F.Q.Yu, “ECODA: Enhanced Congestion Detection and Avoidance for Multiple Class of Traffic in Sensor Networks,” IEEE Transactions on Consumer Electronics-2010, vol. 56, no.3, pp.1387- 1394.
A. Ahmad, R. Arshad, S. A. Mahamud, G. M. khan, and H. S. AlRaweshidy, “Earliest-Deadline-Based Scheduling to Reduce Urban Traffic Congestion,” IEEE Transactions on Intelligent Transportation Systems. vol. 15, no.4, 2014, pp.1510-1526.
A. Subramanian, I. Paramasivam, “PRIN: A Priority-Based Energy Efficient MAC Protocol for Wireless Sensor Networks Varying the Sample Inter-Arrival Time,” Wireless Personal Communication, 2017. vol. 92. no.3, pp.863–881.
H. M. Yaghmaee, N. F. Bahalgardi, and D. Adjeroh, “A Prioritization Based Congestion Control Protocol for Healthcare Monitoring Application in Wireless Sensor Networks,” Wireless Personal Communications, vol.72, no.4, pp.2605–2631.
C. M. Liang, N. B. Priyantha, J. Lie, and F. Zhao, “RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks,” SenSys '14 Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014, pp.105-118.
W. Guanhua, W. Kaishun, and M. Lionel, “CSMA/SF: Carrier Sense Multiple Access with Shortest First,” IEEE Transactions on Wireless Communications, vol. 13, no.3, 2014, pp.1692-1702.
J. Li, and P. Mohapatra, “An analytical model for the energy hole problem in many-to-one sensor networks”, in Proc. 2005 Veh. Technol. Conf., 2005, pp.2721-2725.
Y. Yun, and Y. Xia, “Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications,” IEEE Trans. Mobile Comput, vol. 9, no. 9, 2010, pp.1308-1318.
J. Lie, and P. Mohapatra, “Analytical modeling and mitigation techniques for the energy hole problem in sensor networks” Pervasive Mobile Comput. Vol. 3, no.3, pp.233-254.
X. Wu, G.Chen, and S. K. Das, “Avoiding energy holes in wireless sensor networks with non uniform node distribution,” IEEE Trans. Parallel Distributed System, vol. 19, no.5, 2008, pp.710-720.
C. Buratti, and R. Verdone, “L-CSMA: A MAC Protocol for Multihop Linear Wireless (Sensor) Networks”, IEEE Transactions On Vehicular Technology, vol.65, no.1, 2016, pp.251-265.
A. Jindal, and K. Psounis, “Making the case for random access scheduling in wireless multi-hop networks,” In Proc. IEEE INFOCOM, 2010, pp.1-5.
T. Suzuki, and S. Tasaka, “Performance evaluation of priority-based multimedia transmission with the PCF in an IEEE 802.11 standard wireless LAN,” 12th IEEE Int. Symp. PIMRC, 2001, vol.2, pp.70-77.
R. Moraes, F. Vasques, P. Portugal, and J. Fonseca, “VTP-CSMA: A virtual token passing approach for real-time communication in IEEE 802.11 wireless networks,” IEEE Trans. Ind. Inf., vol.3, no.3, 2007, pp.215-224.
Y. Xiao, “Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs,” IEEE Transaction Wireless Communication, vol. 4, no.4, 2005, pp.1506-1515.
M. Kaynia, P. Nardelli, and M. Latva-aho, “Evaluating the information efficiency of multi-hop networks with carrier sensing capability,” IEEE ICC, 2011, pp.1-5.
P. Muhlethaler, and A. Najid, “Throughput optimization of a multihop CSMA mobile ad-hoc network,” In Proc. IEEE EW., 2004, pp.1– 5.
A. Busson, and G. Chelius, “Point processes for interference modelling in CSMA/CA ad-hoc networks,” In Proc. ACM Int. Symp. PE-WASUN,2009, pp.1-5.
N. Tadayon, H. Wang, and H. H. Chen, “Performance analysis of distributed access multihop Poisson networks,” IEEE Trans. Veh. Technol. vol. 63, no.2, 2014, pp.849-858.
Y. Sankarasubramaniam, O.B. Akam, I.F. Akyildiz, “ESRT: Event to Sink Reliable Transport in Wireless Sensor Networks,” MobiHoc’03. ACM. 2003, pp.177-188.
S. Sarode, and J. Jagdish, “Precedence Control Scheme for WSNs”, 2015 IEEE conference on Pervasive Computing (ICPC), 2015, pp.1- 5.
H. Kim, J. Song, and S. Lee, “Energy-Efficient Traffic Scheduling in IEEE 802.15.4 for Home Automation Networks,” IEEE Transaction on Consumer Electronics. vol.53. no.2, 2007, pp.369-374.
S. Sarode, and J. Jagdish, “PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks,” International Journal of Communication Networks and Information Security (IJCNIS) vol.9, no. 2, 2017, pp.253-262.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.