• 沒有找到結果。

Under our chain construction framework, a chain construction algorithm consists of two parts (Figure 2). The first is to compute and store the costs of every possible pair of nodes. Provided the cost information, the second part constructs a logical chain among all sensor nodes. The issue of leader scheduling is discussed in Section 3.4.

a c b

e d

Figure 1. A chain under construction. Node e cannot be included in the chain.

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

3.1. Costs of node pairs

Conventionally, the cost of every pair of nodes is simply the energy expense of a direct transmission between them [5, 6]. Let Md be a matrix whose element indexed by i; j; Mdði; jÞ; is the energy expense of a direct transmission between nodes i and j: To allow a virtual chain, the costs should be associated with data propagation paths rather than direct links. Let Mp be the minimum cost matrix such that Mpði; jÞ ¼ cðPi;jÞ for some Pi;j2 mcpði; jÞ: Such a Pi;j for every i and j can be found by running an all-pair shortest-path algorithm (e.g. Floyd-Warshall algorithm [9, pp. 558–562]) on the input Md: As an example, Figure 3(a) represents Md graphically for a four-sensor network, where each edge is labelled with the direct transmission cost between two terminal nodes. Figure 3(b) shows Mp that corresponds to all-pair shortest paths for Md:

All-pair shortest-path algorithms are time expensive (Oðn3Þ in case of Floyd-Warshall algorithm). Alternatively, we may find first a minimum-cost spanning tree (MST) on the weighted complete graph corresponding to Md: Then Pi;j is designated to be the shortest path (actually the only path) traversing the tree from i to j: We denote the matrix that keeps such costs by Mt: With this approach, the data propagation paths found may not be optimal. However, the time complexity of constructing an MST and traversing it from every node is only Oðn2Þ:

Taking Figure 3(a) as an example, Figure 4(a) shows an MST of Figure 3(a). Mt

corresponding to the MST is illustrated in Figure 4(b). Here Mtðc; dÞ ¼ 13 because the data propagation path from c to d is confined to be that along the tree (i.e. c; a; b; d). Observe that this is not a minimum-cost path.

It is interesting and also important to note the property of the triangle inequality in these cost matrices. The triangle inequality refers to that the cost between any two nodes A and B must be at most the cost between A and any other node C plus the cost between C and B: The triangle inequality does not hold if Md is used as the cost matrix in our problem setting (due to the non-linear attenuation property of radio signals). That is, Mdði; jÞ can be larger than Mdði; kÞ þ Mdðk; jÞ for some i; j; and k: Nevertheless, the triangle inequality does hold in case

Calculate cost of every node pair

Construct a chain Node-pair

cost matrix Virtual

chain

Figure 2. Framework for chain constructions.

a

(a) (b)

b

c d

2

3 8 12 9

16

a b

c d

2

8

3 5 9

12

Figure 3. (a) Md; and (b) the corresponding Mp:

ENERGY OPTIMIZATION FOR CHAIN-BASED DATA GATHERING

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

of Mp; as it is a property of shortest paths [9, p. 520]. For Mt computed based on an MST, the triangle inequality still hold by the following theorem.

Theorem 1

Let Td be an MST built on the graph corresponding to Md: If Mt is computed based on Td; we have Mtði; jÞ4Mtði; kÞ þ Mtðk; jÞ for any i; j; and k:

Proof

For any two nodes i and j in a tree, there exists exactly a unique simple path} from i to j: The path from i to k and then to j is either the same path from i to j; for which the equality of cost holds, or a non-simple path. In the latter case, an edge incident with k must be included in the path twice, one immediately followed by the other (one joining at k and the other leaving k). If the occurrences of this edge are removed from the path, the path becomes either the exact simple path from i to j or a non-simple path with lower cost which can be further shrank by above

arguments. The conclusion thus follows. &

3.2. Chain construction

Once Mp (or Mt) and every Pi;j have been obtained, a virtual chain can be formed using any conventional chain construction algorithm such as those proposed in References [5, 6]. The only difference is that the algorithm may run on Mpor Mt instead of Md: Figure 5 shows different chains obtained by running the appending-based chain construction algorithm of PEGASIS [5]

on different cost matrices.

Although the insertion-based chain construction algorithm [6] generally performs well, here we consider an MST-based chain construction heuristic which is more time efficient. The basic idea is to find an MST first (on the weighted complete graph representing Md; Mt; or Mp) and then convert it to a chain. A tree can be converted to a chain by traversing the tree from the root in prefix order. The visiting sequence then corresponds to a chain. Figure 6 shows an example.

Time complexity of this approach is Oðn2Þ:

This heuristic has been devised for the TSP, and is often accompanied with the assumption of the triangle inequality. It can be shown that, thanks to the triangle inequality, the heuristic creates a TSP tour whose cost is at most twice the cost of the MST [9, pp. 969–972]. The cost can

a

(a) (b)

b

c d

2

3 8

a b

c d

2

8

3 5 10

13

Figure 4. (a) MST of Figure 3(a); and (b) the corresponding Mt:

}A path is simple if it does not include the same edge twice [10].

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

be further reduced to at most 1.5 times as the minimum cost [11]. However, a constant performance ratio is impossible without the triangle inequality.

In summary, we have one design choice among three cost metrics and another design choice among three chain construction algorithms. Table I lists all possible combinations. Among them, the operations of MST-based chain constructions are detailed in Figure 7. The procedure MST-MST can be further simplified by the following theorem.

Theorem 2

Let Td be an MST built on the graph corresponding to Md: Assume that Mt is the cost matrix computed on Td: Let Ttbe an MST on the graph corresponding to Mt: The cost of Ttis equal to that of Td:

Proof

For every edge ði; jÞ 2 Tt; let Pi;jdenote the data propagation path from i to j that traverses Td: If jPi;jj ¼ 1; edge ði; jÞ must be an edge of Tdas well. So if we can prove that jPi;jj ¼ 1 for every edge ði; jÞ 2 Tt; the cost of Tt will be equal to that of Td: Suppose, by contradiction, that there exists

(a) (b)

a b

c d

2

8

16

a b

c d

2 5

12

(c)

a b

c d

2

5

13

Figure 5. Different chains found by running PEGASIS on: (a) Md of Figure 3(a); (b) Mpof Figure 3(b);

and (c) Mtof Figure 4(b).

a

b c d

e f g h

a

b c d

e f g h

(a) (b)

Figure 6. (a) A tree rooted at a; and (b) the chain corresponds to the prefix traversal of (a).

Table I. All possible cost-metric/chain construction combinations.

Chain construction

Cost matrix Greedy appending Greedy insertion MST traverse

Md(direct transmission) PEGASIS [5] Direct-insertion [6] Direct-MST Mp(all-pair shortest paths) Shortest-appending Shortest-insertion Shortest-MST

Mt(paths confined to MST) MST-appending MST-insertion MST-MST

ENERGY OPTIMIZATION FOR CHAIN-BASED DATA GATHERING

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

an edge ði; jÞ 2 Tt with jPi;jj > 1: It follows that there is at least one intermediate node k on Pi;j: Since Pi;j corresponds to the shortest path traversing Td from i to j; it must be a simple path.

Therefore, for any k we have Mtði; kÞ þ Mtðk; jÞ ¼ Mtði; jÞ:} There are four possible cases depending on the relation among i; j; and k:

* Both edges ði; kÞ and ðk; jÞ are included in Tt: This is impossible since the inclusion of these edges plus ði; jÞ creates a cycle in Tt:

* Edge ði; kÞ but not ðk; jÞ is included in Tt: We can form Tt0 by first removing ði; jÞ from Tt

and then adding ðk; jÞ into Tt: Note that Tt0 does not contain cycle and the cost of Tt0 is lower than that of Tt since we swap ði; jÞ for a lower-cost edge ðk; jÞ: It follows that Tt0is a tree with cost lower than that of Tt:

* Edge ðk; jÞ but not ði; kÞ is included in Tt: Similarly, this leads to another tree whose cost is lower than that of Tt:

* Neither ði; kÞ nor ðk; jÞ is included in Tt: Tt must contain a path from i to k and another from k to j as Tt is connected. The lengths of these paths must be greater than one. Now consider replacing ði; jÞ with the combination of ði; kÞ and ðk; jÞ in Tt: Let the result be Tt0: Note that Tt0has the same cost as Ttbut contains two cycles, one involving the path from i to k and the other j to k: We can remove any edge from the first path and any other from the second, resulting in a tree with cost lower than that of Tt:

All these cases lead to impossibility or contradiction, so we conclude that there exists no edge

ði; jÞ 2 Tt with jPi;jj > 1: &

Theorem 2 indicates that, in case of MST-MST, we may directly convert Td instead of Ttto a chain. Procedure MST-reduced in Figure 8 thus replaces MST-MST.

Table II lists the time complexities of all mentioned methods. Among them, PEGASIS, Direct-MST, MST-appending, and MST-reduced are more time efficient than others.

Figure 7. Operations of MST-based chain constructions.

}Recall that the equality in Theorem 1 holds when k lies on the path from i to j:

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

3.3. Energy-latency trade-off

As mentioned, one drawback of using chains instead of trees or clusters is the increase of data latency. The situation may be aggravated when using virtual chains, as a virtual chain increases the number of hops to collect sensed data. Therefore, one may want to constrain data latency and meanwhile still make some gains in energy saving.

Given a conventional chain fNigni¼1; if we replace LNi;Niþ1; the link between Ni and Niþ1

ð14i4n  1Þ; with the best data propagation path from Nito Niþ1; PNi;Niþ1; the number of hops will be increased by jPNi;Niþ1j  1 while the energy gain is cðLNi;Niþ1Þ  cðPNi;Niþ1Þ: Therefore, the maximal energy gain with latency constraint (MEGLC) problem can be defined as to find E  f1; 2;. . . ; n  1g that maximizes

X

i2E

½cðLNi;Niþ1Þ  cðPNi;Niþ1Þ

subject to

X

i2E

ðjPNi;Niþ1j  1Þ4T

where T is the maximal number of additional hops allowed to be added. This problem is also NP-hard as it can be shown that the 0/1 Knapsack problem reduces to MEGLC. The 0/1 Knapsack problem is to choose a set of items to put into a limited-capacity Knapsack, where the ith item has a profit pi and weighs wi: The Knapsack capacity is essentially T; wi can be transformed to jPNi;Niþ1j  1; and pi is cðLNi;Niþ1Þ  cðPNi;Niþ1Þ:

It also can be shown that MEGLC reduces to the 0/1 Knapsack problem. As the 0/1 Knapsack problem can be solved by a dynamic programming algorithm, so can MEGLC.

Nevertheless, we found through experiments that a greedy method performs well. Given Figure 8. Operations of MST-reduced.

Table II. Time complexities of all methods.

Cost matrix Chain

Method computation construction Overall

PEGASIS [5] Oðn2Þ Oðn2Þ Oðn2Þ

Direct-insertion [6] Oðn2Þ Oðn3Þ Oðn3Þ

Direct-MST Oðn2Þ Oðn2Þ Oðn2Þ

Shortest-appending Oðn3Þ Oðn2Þ Oðn3Þ

Shortest-insertion Oðn3Þ Oðn3Þ Oðn3Þ

Shortest-MST Oðn3Þ Oðn2Þ Oðn3Þ

MST-appending Oðn2Þ Oðn2Þ Oðn2Þ

MST-insertion Oðn2Þ Oðn3Þ Oðn3Þ

MST-reduced Oðn2Þ Oðn2Þ Oðn2Þ

ENERGY OPTIMIZATION FOR CHAIN-BASED DATA GATHERING

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

a conventional chain, the greedy method ‘virtualizes’ the edge that maximizes the ratio of energy gain to the latency raised.

Figure 9 shows how the greedy method trades latency for energy. The energy consumed by a conventional chain (without any edge being virtualized) is 0:44 J: In contrast, the energy expense with a virtual chain can be as low as 0:18 J (with over 20 virtualized edges), a 60% reduction. On the other hand, the conventional chain incurs no additional latency while a virtual chain increases the number of hops to a maximum of 40, a 50% increase (a conventional chain consisting of 80 sensors has a fixed length of 79 hops.) As a remark, the energy gain is trivial after 20 edges have been virtualized. Further edge virtualization does not improve energy efficiency significantly.

3.4. Leader scheduling

Given a chain structure, leader scheduling determines which node acts as a leader in each round of the data-collection processes. The goal is to prolong network lifetime, i.e. to maximize the number of data-collection rounds. In the following, we analyse the maximum number of data collection rounds that can be achieved before any node exhausts its power. To simplify the analysis, we focus on leader scheduling in a conventional chain. Without loss of generality, we assume that nodes in the chain are numbered sequentially as 1; 2;. . . ; n: We also use the following notations.

* ei: the energy consumed by node i in transmitting a data message to the BS.

* ri;j: the energy consumed by i in transmitting a k-bit message to node j; where ri; j¼ kEelecþ keampdði; jÞa:

* er¼ kEelec: energy consumed in receiving a k-bit message.

* Ei: the amount of energy that node i initially has.

When some node i is selected to be the leader, every node numbered j5i (if any) expends energy rj; jþ1 in sending data to node j þ 1; at which energy er is consumed to receive the data. Likewise, every node numbered k > i (if any) expends rk;k1to send data to node k  1;

where energy eris expended in receiving the data. The leader transmits the collected data to the BS, consuming energy ei: Supposing that every node i is scheduled to be the leader xi times,

0 10 20 30 40

0.1 0.2 0.3 0.4 0.5

Number of edges being virtualized

Energy consumption (J) Increased latency (hops)

Energy

0 10 20 30 40

Latency

Figure 9. Trade-off between energy and latency with the greedy method. The results were obtained with 80 sensors under a 200  200 network.

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

Table III shows the energy expense of every sensor node. Optimal leader scheduling problem is to find positive integer values of xi’s as to maximizeP

ixisubject to the following constraints:

E15 ðe1þ erÞx1þ r1;2x2þ r1;2x3þ    þ r1;2xn ...

Ei5 ðri;i1þ erÞx1þ    þ ðri;i1þ erÞxi1

þ ðeiþ 2erÞxiþ ðri;iþ1þ erÞxiþ1þ    þ ðri;iþ1þ erÞxn ...

En5 rn;n1x1þ rn;n1x2þ    þ ðenþ erÞxn These constraints can be reformulated as

A x1 x2

x3

... xn

0 BB BB BB BB B@

1 CC CC CC CC CA

4 E1 E2

E3

... En

0 BB BB BB BB B@

1 CC CC CC CC CA

ð1Þ

where

A ¼

e1þ er r1;2 r1;2    r1;2 r2;1þ er e2þ 2er r2;3þ er    r2;3þ er r3;2þ er r3;2þ er e3þ 2er    r3;4þ er

...

...

...

   ... rn;n1 rn;n1 rn;n1    enþ er 0

BB BB BB BB BB

@

1 CC CC CC CC CC A

The problem turns out to be a linear programming problem. Some sensors may be ruled out by the BS in the leader scheduling process. If sensor i cannot be selected as a leader for some reason

Table III. Energy expense of every sensor.

Node id. In sending messages to the BS

In sending messages to neighbours

In receiving neighbour’s messages

1 e1x1 r1;2Pn

j¼2xj erx1

i; 24i4n  1 eixi ri;i1Pi1

j¼1xjþ ri;iþ1 Pn

j¼iþ1xj

erðPi1 j¼1xjþPn

j¼iþ1xjþ 2xiÞ

n enxn rn;n1Pn1

j¼1xj erxn

xi: the number of times node i is selected to be the leader; ei: the amount of energy consumed in transmitting a message from node i to the BS; ri;j: the energy consumed by i in transmitting a message to j; er: the energy consumed by any node in receiving a message.

ENERGY OPTIMIZATION FOR CHAIN-BASED DATA GATHERING

Copyright # 2006 John Wiley & Sons, Ltd. Int. J. Commun. Syst. (in press) DOI: 10.1002/dac

(for example, it has no direct link with the BS), variable xiin (1) is bound to zero. Therefore, the existence of leader-ineligible sensors eases the scheduling work by reducing the population of leader candidates.

Round-robin leader scheduling (RR) equalizes the values of xi’s, which is generally far from optimal. In Reference [5], an improvement on RR is proposed. This approach sets up a threshold of distance, and nodes are not allowed to be leaders if their distances to their neighbours along the chain are beyond the threshold.

Instead of finding an optimal solution, we propose a simple rule called maximum residual power first (MRPF) for leader scheduling. As the name suggests, MRPF selects the node that has the maximum residual power to be the leader in each round of data collection. Residual power information can be piggybacked with data messages as part of the aggregated data. If every node attaches its own power level to data message and let the BS find the maximum value, it will incur an additional OðnÞ overhead on every message. A better approach is to let every node compare its power level with the one attached with the incoming data message (if any) and send only the larger. This is similar to existing distributed maximum-finding algorithms on rings [12–15] and the message overhead is only Oð1Þ:

Recall that the BS broadcasts the result of leader scheduling to all sensors before each data-collection round. The energy consumed in receiving broadcasts is not taken into account in the above model. If it is to be considered, a slight modification on the modelling is required.

Suppose that receiving one broadcast consumes b unit of energy. As there are P

ixi data-collection rounds in total, all sensors uniformly spend bP

ixi unit of energy on receiving broadcasts. Taking account of this quantity, (1) becomes

A x1 x2 x3

... xn

0 BB BB BB BB B@

1 CC CC CC CC CA

4 E1=b E2=b E3=b

... En=b 0 BB BB BB BB B@

1 CC CC CC CC CA

ð2Þ

This formula is essentially the same as (1) with the only exception that the initial energy of each sensor Ei is uniformly divided by b: Therefore, if hw1; w2; . . . ; wni is the optimal value for hx1; x2; . . . ; xni that maximizes P

xi subject to (1), hw1=b; w2=b; . . . ; wn=bi will be the solution that maximizes P

xi subject to (2). In other words, the consideration of energy expense on broadcasting only scales down the optimal value by a constant. It does not make the problem harder or easier to deal with.

The same conclusion also applies to other energy dissipation sources that have an equal effect on all sensor nodes. An example is the energy expense in idle mode.

相關文件