Next Article in Journal
A Likelihood-Based SLIC Superpixel Algorithm for SAR Images Using Generalized Gamma Distribution
Previous Article in Journal
Real-Time Detection and Measurement of Eye Features from Color Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks

1
School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
School of Computing and Communications, University of Technology Sydney, Sydney 2109, Australia
3
Faculty of Engineering and Computing, Coventry University, Coventry CV1 5FB, UK
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(7), 1108; https://doi.org/10.3390/s16071108
Submission received: 15 June 2016 / Revised: 7 July 2016 / Accepted: 11 July 2016 / Published: 18 July 2016
(This article belongs to the Section Sensor Networks)

Abstract

:
Super dense wireless sensor networks (WSNs) have become popular with the development of Internet of Things (IoT), Machine-to-Machine (M2M) communications and Vehicular-to-Vehicular (V2V) networks. While highly-dense wireless networks provide efficient and sustainable solutions to collect precise environmental information, a new channel access scheme is needed to solve the channel collision problem caused by the large number of competing nodes accessing the channel simultaneously. In this paper, we propose a space-time random access method based on a directional data transmission strategy, by which collisions in the wireless channel are significantly decreased and channel utility efficiency is greatly enhanced. Simulation results show that our proposed method can decrease the packet loss rate to less than 2 % in large scale WSNs and in comparison with other channel access schemes for WSNs, the average network throughput can be doubled.

1. Introduction

Wireless sensor networks (WSNs) play an important role in sensing and collecting a wide range of environmental and geological parameters in the current and future surveillance systems. In such networks, widely covered and densely deployed sensors may simultaneously detect the sensing data and they need to send the data to a sink node. As a result, the effective network throughput will be severely decreased because of the collisions among the contending sensors accessing the wireless channel simultaneously. With the increasing demand for high network converge and sensor density with new applications such as Internet of Things (IoT) and Vehicular-to-Vehicular (V2V) networks, the possibility of collisions among WSN nodes has become too high for WSNs to work well. Therefore, how to achieve effective data collection through an efficient channel access and scheduling mechanism so as to decrease the collisions becomes a new challenge in the new IoT and V2V types of super dense WSNs.
In Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based networks, the transmission by hidden nodes causes severe interference, i.e., collision, to an on-going transmission in WSNs. In this paper, we focus on seeking a new method to avoid such interference.
So far, channel estimation based backoff algorithms [1,2] have been proposed to avoid collisions among the neighbor nodes. In such algorithms, nodes adaptively schedule their time to access the channel by continuously estimating the contention levels among their neighbor nodes. It has been shown in [3] that channel estimation based backoff algorithms can efficiently decrease collisions among neighbor nodes to the theoretical low bound in cases with a wide range of contention levels. However, such algorithms are invalid for the case of collisions from hidden nodes because collisions from hidden nodes are too complex and hard to monitor on-the-fly.
Decreasing the possibility of collisions from hidden nodes with as small throughput loss as possible is challenging. In recent years, the studies in [4,5,6] re-evaluated the Channel Clear Assessment (CCA) function and tried to solve the hidden terminal problem by proposing new solutions based on the new concept of efficient Carrier Sense Ranges (CSR). By enabling the non-hidden nodes to detect and hear the hidden nodes’ activities, the hidden nodes will no longer be hidden for others. Thus, a lot of interference analysis models have been proposed since then for better CSRs for different applications. The authors in [7,8,9,10] proposed Protocol Interference Models (PrIMs) to improve performance of CSRs in networks with diverse topologies. In their models, the interference introduced by a hidden node to an on-going communication is comprehensively analyzed, and a “safe” CSR is calculated to prevent the on-going communication from being corrupted by this hidden node. However, the work in [4] indicated that PrIMs is idealistic because the interference in reality is not from a single hidden node but from multiple hidden nodes. As a consequence, the CSRs calculated from PrIMs are not large enough to effectively avoid collisions caused by hidden nodes. A new interference analysis model, Physical Interference Model (PhIM), was proposed in [11,12]. In these papers, interferences from all possible hidden terminals are included so that the CSRs calculated from PhIMs can totally avoid the collisions from hidden nodes even in the worst case. However, in practice, interference from hidden nodes is not always that serious. This suggests that the estimated CSRs in PhIMs sometimes become larger than the correct value of CSR. An over-estimated CSR will cause the explosion problem and some contending nodes will miss the transmission opportunities. As a result, the effective channel utilization rate, which has a positive correlation with the system throughput, will be decreased.
In this paper, we propose an effective method to improve the network throughput performance by controlling the interference from neighbor nodes including hidden nodes. Our main contributions in this paper are summarized as bellow:
Firstly, we analyze the characteristics of the pre-configuring operations in WSNs. Based on such operations, we propose a data collection scheme with distinct directivity. We validate of this directional transmission scheme on the premise of complete data collection.
Secondly, we analyze collisions in WSNs and propose a space-time based medium access mechanism, which explores user diversity both in space and time domains. By fully taking advantage of the directional transmission strategy, we propose a new method of calculating C S R s for the proposed channel access mechanism to significantly reduce or even totally eliminate in some cases collisions from both neighbor nodes and hidden nodes.
Thirdly, we conduct simulations to evaluate the performance of our proposed solution, which was compared to the classic IEEE 802.11 series protocols and ones with enhanced CSRs. We analyze the throughput and the packet loss rate, the key parameters that determine the data collection efficiency. In order to cover scenarios with different settings, we evaluate the performance of our proposed solution in networks with different topologies, including the regular latticed case and random deployed ones.
This paper is organized as follows. In Section 2 we analyze the channel access characteristics in WSNs and propose a new directional data transmission strategy. A space-time based random access method is proposed in Section 3. In Section 4, we evaluate the performance of the proposed method through simulations. In Section 5 we conclude this paper.

2. Data Collection Strategy with Directional Transmission

Communications in WSNs are quite different from general wireless networks in that the data flow is quite directional, i.e., either from the sink node to end nodes or vice versa. In this section, we analyze these properties ofa WSNs and propose our new data collection strategy with directional transmission characteristics.

2.1. Pre-Configuring Operation in WSNs

In WSNs, a sink node is the controller of the whole network by sending commands to other sensors, including monitoring the sensors’ status, broadcasting commands to sensors, etc. This task is called the run-up phase. The second task for WSNs is to collect data from all the sensors where data will be sent to the sink node using intermediate relay sensor nodes. This task is called the data-collection phase. Controlled by the sink node, the WSN can either be in the run-up phase or data-collection phase.
The run-up phase of the WSN happens during the network deployment process when some simple interactions happen between the sensors and the sink node. For example, the sink node will unicast, multicast or broadcast commands to sensors and then the sensors will report their state information back to the sink node, i.e., their position, battery, routing information, etc. to the sink node. By checking the information above, the sink node can ensure the network connectivity while sensors can update their information to the sink node.
The data-collection phase happens when an event is detected by sensors so that the sensors need to send data back to the sink node. During this period of time, a large number of nearby sensors will simultaneously attempt to get access to the channel in order to transmit the data to the sink node. Since CSMA/CA is not good at supporting large users contending for channel access, the above case will result in serious collisions among the sensors which significantly decreases network throughput and introduce more delay.
Considering those characteristics of communications in WSNs, it is necessary to introduce centralized control, i.e., making some pre-configurations to sensors and introducing some rules to define specific behaviours of sensors especially during the run-up phase. With the pre-configuration in the run-up phase, data transmissions in the data-collection phase can be well controlled by avoiding extreme congestions, so that collisions are able to be suppressed.

2.2. Directional Transmission Model

Directional data forwarding is a typical feature of communications in WSNs because the data flow in WSNs is always directional, i.e., it is either from sensors to the sink node or vice versa. Considering the pre-configuring operations during the run-up phase, the property of directional data transmissions in WSNs can be further utilized and the interference among nodes can be better mitigated. Next, we focus on the analysis of the directional transmission model.
We start with the physical model of a sensor network. As shown in Figure 1, we consider a sensor network which includes n wireless sensor node V = { v 1 , v 2 , · · · , v n } and a sink node s. We use a random extended network model [13] by assuming that sensor nodes are uniformly deployed in a rectangular region with the size of a × b .
We denote the location of the sensor node v t in the network by
v t d e f ( x t , y t )
where x t and y t represent the location coordinates. We denote the distance between v t and v r as the euclidean space | | v t - v r | | and the communication range as R, which is associated with the Signal to Interference plus Noise Ratio (SINR). If | | v t - v r | | R , data transmission from v t to v r will be successful. We denote the link as l ( v t , v r ) and express the links in the network as Equation (2).
L = { l ( v t , v r ) | | | v t - v r | | R , v t , v r V }
The sink node is placed at the upper-left corner with the coordinate ( 0 , 0 ) . Thus, the data collection process is divided into two parts: horizontal forwarding and vertical forwarding. During the horizontal forwarding process, data goes from the right to the left which is shown as the data forwarding in the white area of the Figure 1, and for the vertical forwarding, data goes from bottom to top which is shown as the data forwarding in the gray area of the Figure 1. The horizontal forwarding and vertical forwarding processes are separated by different methods and resources including channels and time slots, etc. Next we construct the directional data forwarding in the horizontal forwarding process as an example since the vertical forwarding process can be done in the same way.
The property of directional data transmission in the horizontal forwarding process is analyzed by introducing the link constraint between sensor nodes. The link constraint is that a link from v t to v r is available, if and only if the projected length of l ( v t , v r ) in the vertical axis is smaller than a · b log n 2 · n . Denoting | | v t - v r | | y as the projected length of l ( v t , v r ) in the vertical axis, the links which satisfy the above link constraint can be expressed as Equation (3).
L * = { l ( v t , v r ) | v t , v r V , | | v t - v r | | y a · b · log n 2 · n }

2.3. Model Validity Analysis

L * in our directional transmission strategy is a subset of L. In order to make sure all the data from the sensor nodes can be sent to the gateway nodes by L * out of L, we need to ensure the network is completely connected based on the above model.
As shown in Figure 1, by setting the coordinate of a sender v t as the midpoint of the right side, a square area is created with the side length of c. In a uniformly distributed network with the size of a × b , the probability of a random deployed sensor node within the above square area is equal to c 2 a · b . Thus, in a n-node system, the probability of having an empty square area can be calculated by
p n = ( 1 - c 2 a · b ) n
where
c = 2 · a · b · ln n n
Because 1 - x exp ( - x ) , we have
p n exp ( - n · c 2 a · b ) = 1 n 2
and
n = 1 p n <
According to the Borel-Cantelli lemma, there is at least one sensor node located in the square area for sufficiently large n.
As shown in Figure 1, if the communication range R is larger than 5 2 · c , at least one sensor node can be selected as a receiver by the sender v t to establish a link. Because v t is in the middle of the right side of the square, the projected length of the link in the vertical axis is smaller than c 2 . Forwarding data from all the sensor nodes to the gateway nodes through the links in set L * is feasible. As the number of sensor nodes located in the square area is a binomial random variable with parameters ( c 2 a · b , n ) , the availability of links in the square area is guaranteed. As shown in Figure 1, if the communication range R is large enough, which is very common in practice, the sender v t can select receivers from other nearby square areas. In this situation, more links to do the data forwarding are available.
Now, we define ρ = n a × b , where ρ represents the sensor density of a WSN. According to Equation (5), a smaller square area can be constructed by larger ρ. In a dense WSN, our proposed directional data forwarding scheme for both the horizontal and vertical cases can be modelled as a problem of bunch of parallel-arranged lines with certain offsets which decrease significantly as a function of the sensor nodes density. For the scenarios that a WSN has a regular latticed topology, the data forwarding links are in parallel to each other with no offsets and can be expressed as c = 0 .

3. A Space-Time Based Random Access Mechanism

3.1. Collisions Analysis

The set of nodes that have collisions with the data transmission from v t to v r can be defined as concurrent nodes. Because there are multiple concurrent nodes, the concurrent nodes can be further grouped as concurrent senders, which are the nodes that are sending data to their corresponding receivers and concurrent receivers that are passively responding to the corresponding senders for handshaking purpose.
Base on the literature review on the Carrier Sense Range (CSR), the proposed CSR based schemes to protect the on-going transmission from being collided by concurrent nodes, can be expressed as follows:
C S R = ( K + β ) · d m a x
where d m a x is the maximum link length in the network. K is a coefficient calculated from the signal propagation loss model [4,11]. All the concurrent nodes including both concurrent senders and receivers are considered in the model above. The power levels of those concurrent nodes are accumulated at the receiver as interference and K is determined to make sure that the lower bound of the signal to interference plus noise ratio (SINR) at the receiver is larger than a given threshold.
K · d m a x defines the range which eliminates collisions from concurrent nodes. However, it does not differentiate the roles of the concurrent nodes involved, if they are the concurrent senders or receivers, or their position information. In order to make a receiving node maintain an ideal SINR according to K · d m a x , an extra range is needed to better separate the transmissions between concurrent nodes as sources of interference and the receiver of interest. The above problem through the two pairs of communications ( T 1 , R 2 ) and ( T 2 , R 2 ) is illustrated in Figure 2. The carrier sense range is initially defined by K · d m a x . As shown in Figure 2a, T 1 and T 2 are out of each other’s carrier sensing range. As a result, the sending activity of T 2 can not be stopped by the sending node T 1 . However, the noise from T 2 may collide with R 1 ’s received signal. This problem can be solved through extending C S R by d m a x as shown in Figure 2b. R 1 ’s signal may also collide with the signal between T 2 and R 2 in Figure 2c because of the directional communication introduced. In this case, C S R needs to be extended by another d m a x to eliminate the collisions as shown in Figure 2d. An extra extension of C S R is defined as β. According to the existing literature, the value of β is often larger than 2.
According to the above analysis, the network topology, the positions of the concurrent senders and receivers, and the data transmission direction can jointly determine the value of the carrier sense range. With the directional transmission strategy, the positions of the concurrent nodes and the data transmission directions can be well controlled to minimize collisions. A new random medium access scheme is further proposed to allow multiple users to access the channel from both space and time domains.

3.2. Space-Time Based Random Access Mechanism

We define the coordinate system as follows. The data forwarding direction is denoted as the x-axis, and then the sensor nodes are grouped as B-group along the x-axis according to Equation (9).
B i = { v t | x t [ i · D , i · D + D ) } , i = 0 , 1 , 2 , · · ·
where D is the width of B-group. Based on the grouping rules in Equation (9), the sensor nodes are divided into Δ groups, which are named as the G-group according to Equation (10):
G k = i = 0 B i · Δ + k , k = 0 , 1 , · · · , Δ - 1
The data collection time is divided into T s and sensor nodes in G k can only access the channel during the time interval of T k .
T k = i = 1 [ i · Δ - k - 1 , i · Δ - k ) · T

3.3. CSR for Space-Time Based Random Access Mechanism

According to the system model above, concurrent senders can only exist in the same G-group based on the fact that only the nodes belonging to the same G-group can access the channel at the same time interval of T. The concurrent senders are divided into two categories based on whether they belong to the same B-group or not. Next, the CSRs are designed for our proposed random access mechanism to eliminate collisions and its performance is evaluated.

3.3.1. Eliminating Interference from the Same B-Group

The interference from concurrent senders in the same B-group is analyzed through Figure 3. In the figure, node v t with coordinate ( x t , y t ) is sending data to node v r with coordinate ( x r , y r ) . The carrier sense range is firstly initialized into K · d m a x , and the carrier sense areas of v t and v r are expressed as two circles shaped by Equations (12) and (13).
( x - x t ) 2 + ( y - y t ) 2 = K 2 · d m a x 2
( x - x r ) 2 + ( y - y r ) 2 = K 2 · d m a x 2
The concurrent nodes are in a susceptible area, which contains the carrier sense area of v r expected for the carrier sense area of v t . As shown in Figure 3, such a susceptible area is divided into three parts labeled as U, V and W by the s e n d i n g a r e a with the width of D. We denote the left and right boundaries of the s e n d i n g a r e a as L 0 : x = x 0 and L 1 : x = x 1 . According to the definition of B-group in Equation (9) and the time assignment in Equation (11), if nodes are located in a band region with the width of D ( D = x 1 - x 0 ) access channel, the nodes in the adjacent regions are not allowed to access the channel. Thus, the distribution of the concurrent nodes is significantly affected by the configuration of the s e n d i n g a r e a .

Concurrent Senders Elimination

According to Figure 3, concurrent senders will only stay in the area of U V . In order to eliminate the interference from these concurrent senders, the carrier sense area is extended to cover the area of U V . By substituting x = x 1 to Equation (13) and then working on the equation, we get the coordinates of the two intersections A ( x 1 , y A ) and B ( x 1 , y B ) as shown in Figure 3. From the above figure, we can get y A = y B when we have y t = y r . It can be easily proved that by setting:
C S R c s ( x 1 - x t ) 2 + max { y A 2 , y B 2 }
the concurrent senders of the transmission from v t to v r can be totally eliminated. Because v t s e n d i n g a r e a , it has x t [ x 0 , x 1 ] . Thus, we get x 1 - x t D . According to the equation of | y t - y r | c 2 from the previous section, we have | y A | , | y B | K · d m a x + c 2 . Based on the above, by setting:
C S R c s D 2 + ( K · d m a x + c 2 ) 2
the collisions to an on-going transmission generated by any sender in the s e n d i n g a r e a can be eliminated.
Here, d m a x is used to evaluate D and c by defining ω = D d m a x and θ = c d m a x . Thus, Equation (15) can be rewritten as
C S R c s ω 2 + ( K + θ 2 ) 2 · d m a x

Concurrent Receivers Elimination

A sender which is out of the carrier sense range of v t is denoted as v t t ( x t t , y t t ) . By defining C S R according to Equation (16), it can have
y t t ( K + θ 2 ) · d m a x
Then, v t t ’s receiver is denoted as v r r ( x r r , y r r ) . According to the directional data forwarding property, y r r has
y r r [ x r r - θ 2 · d m a x , x r r + θ 2 · d m a x ]
By substituting Equation (17) to Equation (18), we get
y r r K · d m a x
Because y r r is smaller than the upper bound of the carrier sense range of v r , v r r may become the concurrent receiver of the transmission from v t to v r . Thus as shown in Figure 3, we extend the C S R to get rid of these potential concurrent receivers according to
C S R c r ω 2 + ( K + θ ) 2 · d m a x
y t t can be controlled as Equation (21) below
y t t ( K + θ ) · d m a x
Then it has
y r r ( K + θ 2 ) · d m a x
which is out of the carrier sense range of v r .

CSR Configuration

By comparing Equations (16) and (20) to the basic carrier sense range K · d m a x , concurrent nodes can be totally eliminated if CSR is set up according to
C S R = ω 2 + ( K + θ ) 2 · d m a x
As shown in Equation (23), the safe carrier sense range is determined by three parameters K, θ and ω. According to our analysis of the above, K is the lower bound of C S R while θ indicates the maximum data forwarding offset which is affected by the network density according to our analysis in Section 2. Thus, the only variable is ω which indicates the width of B-group D. Next, we focus on the configuration of D.
According to Equation (23), C S R increases as a function of D, suggesting that a larger B-group leads to a lower channel utilization rate, which corresponds to a lower network throughput. From this point of view, a smaller B-group is preferred. However, the smaller B-group means that fewer nodes can be included in a single group. If B-group becomes small, some areas may become empty with no sensors, indicating that the channel utilization rate will also be decreased. This becomes worse if only a few nodes need to transmit data and the effective channel utilization rate will decreased significantly.
In order to get a balanced size of B-group, D is set as the minimum link length in the network d m i n with the following benefits.
  • Firstly, d m i n is a crucial factor constrained by the network layer configuration in multi-hop data collection networks and it can be calculated during the run-up phase.
  • Secondly, a large number of short links on the data transmission path leads to a longer time of data forwarding. It will not only lead to channel contention but also increase the data forwarding delay, thus d m i n is always set as large as possible while considering the reliability of data reception. Thus, by setting D = d m i n , B-group can contain a sufficient number of nodes sharing the channel.
  • Thirdly, we set D = d m i n to ensure that data will be forwarded to other B-groups during the following T time slots. This structure can effectively increase the channel utility rate during a low traffic period.

3.3.2. Eliminating Interferences Between B-Groups

The distance between two concurrent senders belonging two different B-groups is larger than ( Δ - 1 ) · D . According to the analysis above, there is one and only one receiver associated with the two senders. By denoting the maximum communication range in x-axis as d x _ m a x , the minimum distance between the receiver and the interfering sender is larger than ( Δ - 1 ) · D - d x _ m a x . According to the conclusion in Equation (8), the safe range between a receiver and a interfering sender is larger than K · d m a x . We get
( Δ - 1 ) · D - d x _ m a x K · d m a x
We have d m a x d x _ m a x . By substituting it to Equation (24) and then doing some transpositions, we can get
Δ ( K + 1 ) · d m a x + D D
During the groups of sensor nodes taking turns accessing the wireless channel as Equations (10) and (11) indicated, the channel utility rate will be decreased by the oversized Δ. Thus, in our proposed method, we can set it according to the following for any determined B-group width D.
Δ = ( K + 1 ) · d m a x + D D
The idea of the above is to totally eliminate collisions from concurrent senders belonging to different B-groups.

4. Performance Evaluation

The performance of the proposed schemes is evaluated through simulations using OMNET++ [14]. The classic protocols (IEEE 802.11x [15], IEEE 802.15.4 [16]), and other channel access mechanisms with enhanced CSRs [4] are compared in this section. Simulations are conducted with different network scales. Along with the increasing of the network scales, the number of neighbor nodes and hidden nodes increase. In our simulations, the performance of different data collection strategies is evaluated by analyzing the effects of interference from neighbor nodes and hidden nodes on the network performance of throughput, collision rate and frame loss rate, which are all key factors determining the data collection efficiency in WSNs. In addition, in order to cover the diversity of WSN applications, we consider two typical topologies, i.e., the random topology and the latticed topology.

4.1. Simulation Configurations

4.1.1. PHY and MAC Layer Configurations

The related PHY and MAC layer parameters are listed in Table 1 based on the IEEE 802.11b standard [15] which supports a longer distance than that of IEEE 802.15.4. Since the backoff process is universal in all the IEEE 802.11x and IEEE 802.15.4 standards, the proposed algorithm and its performance apply to all the backoff based medium access schemes in IEEE 802.11x and 802.15.4 networks.

4.1.2. Path Loss Model Configuration

In the simulations, the signal attenuates during the propagation in the form of the well known simple path loss model [17] which is expressed in Equation (27).
P L = ( λ 4 π ) 2 d - α
In Equation (27), P L is the pass loss, and λ is the wavelength, d is the transmitter-receiver distance and α is the path loss exponent. For WiFi applications, α is often set from 2 to 4. Because the value of α does not affect the final simulation results, we set α = 4 in our simulations.

4.1.3. Topology Configuration

The WSN topology is an important factor in the simulations to make sure it comprehensively represents the real settings in WSNs. Since the corresponding communication range is around 80 m for α = 4 , we set up an area of 400 m × 400 m with 100 sensors using different deployment schemes. In our simulations, we evaluate the proposed algorithms in networks with different settings.

4.1.4. Contrast Simulations

In order to comprehensively evaluate our proposed data collection method, we make five types of simulations with different kinds of data collection methods listed as below.
  • I E E E 802 . 11 —This is the traditional data collection method in WSNs, where all sensors are implemented with the IEEE 802.11 protocol.
  • P h I M —This is a data collection method proposed in [4] based on IEEE 802.11 with a larger CSR to totally eliminate collisions from hidden nodes and with a low signal receiving sensitivity.
  • P h I M _ E s t —Because collisions from hidden nodes are totally eliminated in “ P h I M ”, the estimation-based backoff algorithm is used in this algorithm to further decrease collisions from neighbor nodes. Thus, this is a data collection method with the classical estimation-based backoff and idle sense algorithm [2].
  • S T - R A M —This is our proposed data collection method with updated CSRs by utilizing the directional data forwarding characteristics in WSNs.
  • S T - R A M _ E s t —This is our proposed data collection method working together with the estimation-based backoff algorithm.
Next, the performance of the above five data collection methods is compared in terms of throughput and frame loss rate with the above two kinds of topologies.

4.2. Throughput Performance

Throughput is one of the most important performance indexes in WSNs. Figure 4 and Figure 5 show the results of the throughput when using different data collection methods in the networks with different scales. The network scales ranging from 400 m × 400 m to 400 m × 3200 m are presented in the figure which is indicated by the x-axis. The y-axis is the average throughput of 400 m × 400 m area on average.
Figure 4 shows the throughput as a function of the network scale with random topologies. From the figure we can see that when the network scale is small, the throughput of different data collection methods is similar but when the network scale is increased, the throughput become very different.
Compared to the five different data collection methods, the throughput of “ I E E E 802 . 11 ” decreases much faster than of the other schemes. This is because the number of hidden nodes of an on-going communication increases exponentially along with the increase of the network scale. As a result, interference from hidden nodes severely decreases the throughput of “ I E E E 802 . 11 ”. The farther a hidden node is, the weaker interference it can cause. Thus, with the increase of the network scale, the accumulated interference from hidden nodes tends to be stable which makes the throughput of “ I E E E 802 . 11 ” stable at around 5 Mbps when k is larger than 4.
The throughput of “ P h I M ” is much higher than that of “ I E E E 802 . 11 ”, because the interference from hidden nodes is significantly suppressed by setting large CSR. However, with the increase of the network scale, the throughput of “ P h I M ” can only reach a certain level. It is because a larger CSR not only suppresses the number of the hidden nodes but it also increases the number of the neighbor nodes. The number of the neighbors will increase as a function of the extension of the network coverage. A larger number of neighbor nodes with more serious channel contention will also decrease the throughput.
The throughput decrease resulting from the neighbor nodes can be relieved by “ P h I M _ E s t ” which can be easily verified by the two curves labeled with “ P h I M ” and “ P h I M _ E s t ” in the figure. It is because the estimation-based backoff algorithm which is applied in “ P h I M _ E s t ” can effectively reduce collisions from the extremely large number of neighbor nodes.
In all the simulations, our proposed data collection method “ S T - R A M ” performs the best with the most stable throughput even for the cases of increasing the network scale. This is because our proposed solution has the following three advantages: Firstly, collisions from the hidden nodes are totally eliminated by our new proposed CSR. Secondly, the value of CSR is cut down by sufficiently utilizing the communication rules in WSNs which significantly improves the effective channel utilization. Thirdly, sensors are allowed to access the channel in different time intervals in our proposed method which further decreases collisions from neighbor nodes.
Figure 4 shows that the throughput of “ S T - R A M ” and that of “ S T - R A M _ E s t ” is about the same. This is reasonable because the number of concurrent neighbor nodes in our proposed method is significantly decreased by the time division multiple access mechanism so that the number of contending neighbors is only around a dozen for our settings. In this case, collisions from neighbor nodes are so low that the possibility of collisions that can be avoided by the estimation-based backoff algorithms is very small. This conclusion can be verified according to the results in [3].
The throughput of different data collection methods in latticed topology is shown in Figure 5. By comparing the results in Figure 4 and Figure 5 we can find that the throughputs of “ I E E E 802 . 11 ”, “ P h I M ” and “ P h I M _ E s t ” in the random topology are almost the same as that of the latticed topology case. This is because the topological structure is not taken into consideration in designing the value of CSR by the above methods. However, in our proposed method, the position relationship among the sensors plays an important role in obtaining better CSRs. According to Equation (23), we can find that the CSR in the latticed topology can be further optimized by substituting θ = 0 which is proved in Section 2. This conclusion is verified in Figure 5 where the throughput of “ S T - R A M ” and “ S T - R A M _ E s t ” in the latticed topology are obviously higher than that in the random topology.

4.3. Collision Rate and Frame Loss Rate

Collision rate is another important performance parameter in WSNs. The MAC layer protocol of WSNs requires that if collision happens the frame will be retransmitted until it is successfully received or reaches the maximum number of retransmissions tries. This retransmission mechanism is applied to avoid endless retransmissions over very bad quality links. Once the maximum number of retransmissions is reached, the node will drop the frame. This may trigger an upper layer retransmission during which a new transmission route will be generated. However, the frame loss may be because of the interference from other sensors. In this case, the upper layer retransmission will be also triggered; however, this does not make any sense, because congestions in WSNs are always within a region. However, during this process, the new transmission route establishment process will cost a lot of time that is tens or hundred times of an ordinary frame transmission in the MAC layer. This will cause a severe throughput decrease on the basis of the results we presented in the previous section.
Figure 6 and Figure 7 show the results of the collision rate in using of different data collection methods in the networks with different scales. Results shown in Figure 6 are for the case in the random topology. It can be seen that, being affected by the serious collisions from hidden nodes, “ I E E E 802 . 11 ” has the highest collision rate which is larger than 0 . 95 in large-scale networks. While eliminating the collisions from hidden nodes and bringing a larger number of neighbor nodes, the collision rates of “ P h I M ” and “ P h I M _ E s t ” are close and both approach 0 . 6 in large-scale networks. Our proposed methods “ S T - R A M ” and “ S T - R A M _ E s t ” have the lowest collision rate by simultaneously decreasing the collisions from hidden nodes and contending neighbor nodes.
According to the IEEE 802.11 protocol, we set the maximum number of retransmissions as 4 and simulate the corresponding frame loss rate in networks with different scales. The approximate frame loss rates in large scale networks, where the frame loss rate becomes stable, are labeled on the right side of Figure 6. An extremely large amount of time will be wasted on establishing a new route in “ I E E E 802 . 11 ” because of its 86 . 5 % frame loss rate. The frame loss rate in “ P h I M ” is acceptable which is around 12 . 5 % and our proposed “ S T - R A M ” can achieve extremely low packet loss rate which is less than 2 % .
The collision rate and frame loss rate of different data collection methods in the latticed topology is shown in Figure 7. Our proposed method “ S T - R A M ”, the frame loss rate can even be less than 1 % .

4.4. Performance in Networks with Different Densities

In above simulations, the network topologies are all constructed in the unit area where 100 sensors locate in 400 m × 400 m. In order to study the performance of different data collection methods in networks with other densities, the network with the scale of 400 m × 800 m are constructed and new simulations where the network densities are 1 to 5 times as much as 100/(400 m × 400 m) are configured. Figure 8 shows the simulation results where four subgraph respectively represents the throughput and collision rate of different data collection methods for lattice deployed networks and random deployed networks.
In the figure, the density index equals the simulated network density divided by 100/(400 m × 400 m). Figure 8a,b show that the throughput performances of different data collection methods all decrease along with the increase of the network density, and tend to be stable when the network densities are extremely large. It works both in lattice deployed networks and the random deployed networks. This is mainly because the interferences from hidden nodes in IEEE 802.11 become more and more serious, until the energies from additional hidden nodes are negligible compared to the accumulated interferences. Besides, the significant increasing number of neighbor nodes is another main cause of the throughput decrease. Similar results can be obtained from the collision rate performance in Figure 8c,d. By comparing the performance of different data collection methods in Figure 8, it can be found that our proposed method “ S T - R A M ” achieves the best and the most stable throughput and collision rate.

5. Conclusions

In IEEE 802.11 based wireless networks, throughput is significantly affected by collisions and interference particularly in widely spread and densely deployed WSNs. Mitigating interference and reducing these collisions is recognised as a research challenge. In this paper, the characteristics of communications in WSNs were analyzed and a directional data transmission strategy by sufficiently utilizing these communication features was proposed. Based on this directional strategy, a space-time based random access method for WSNs was further provided.
To evaluate the performance of our proposed method, comprehensive simulations were performed to compare with other methods for WSNs reported in the literature. Simulation results show that our proposed method can achieve the frame loss rate of less than 2 % in large scale WSNs and the average network throughput can be effectively improved to 2 times that of the other channel access schemes in WSNs.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (No. 41-174-158) and SinoProbe-09-04 (No. 2010-1108-1-4).

Author Contributions

All the authors have contributed to ensure the quality of this work. Chunyang Lei designed the experiments, conceived the new proposed algorithms and wrote the paper. Xuekun Zhang performed the experiments. Gengfa Fang, Elena Gaura, James Brusey and Eryk Dutkiewicz analyzed the data and contributed to write the paper. Finally, Hongxia Bie coordinated and supervised the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lei, C.; Bie, H.; Fang, G.; Mueck, M.; Zhang, X. An Efficient Backoff Algorithm Based on the Theory of Confidence Interval Estimation. IEICE Trans. Commun. 2016, E99-B. [Google Scholar] [CrossRef]
  2. Heusse, M.; Rousseau, F.; Guillier, R.; Duda, A. Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs. ACM SIGCOMM Comput. Commun. Rev. 2005, 35, 121–132. [Google Scholar] [CrossRef]
  3. Lei, C.; Bie, H.; Fang, G.; Zhang, X. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks. Sensors 2015, 15, 30221–30239. [Google Scholar] [CrossRef] [PubMed]
  4. Fu, L.; Liew, S.C.; Huang, J. Effective Carrier Sensing in CSMA Networks under Cumulative Interference. IEEE Trans. Mob. Comput. 2013, 12, 748–760. [Google Scholar] [CrossRef]
  5. Andrews, M.; Dinitz, M. Maximizing Capacity in Arbitrary Wireless Networks in the SINR Model: Complexity and Game Theory. In Proceedings of the INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 1332–1340.
  6. Chau, C.K.; Chen, M.; Liew, S.C. Capacity of Large-Scale CSMA Wireless Networks. IEEE/ACM Trans. Netw. 2011, 19, 893–906. [Google Scholar] [CrossRef]
  7. Wang, Y.; Yan, N.; Li, T. Throughput Analysis of IEEE 802.11 in Multi-Hop Ad Hoc Networks. In Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2006), Wuhan, China, 22–24 September 2006; pp. 1–4.
  8. Jiang, L.B.; Liew, S.C. Improving Throughput and Fairness by Reducing Exposed and Hidden Nodes in 802.11 Networks. IEEE Trans. Mob. Comput. 2008, 7, 34–49. [Google Scholar] [CrossRef]
  9. Chen, S.; Wang, Y.; Li, X.Y.; Shi, X. Order-optimal data collection in wireless sensor networks: Delay and capacity. In Proceedings of the 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’09), Rome, Italy, 22–26 June 2009; pp. 1–9.
  10. Chen, S.; Wang, Y.; Li, X.Y.; Shi, X. Data collection capacity of random-deployed wireless sensor networks. In Proceedings of the Global Telecommunications Conference (GLOBECOM 2009), Honolulu, HI, USA, 30 November–4 December 2009; pp. 1–6.
  11. Ji, S.; Beyah, R.; Li, Y. Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model. In Proceedings of the 2011 IEEE 8th International Conference on Mobile AdHoc and Sensor Systems (MASS), Valencia, Spain, 17–22 October 2011; pp. 222–231.
  12. Chen, S.; Huang, M.; Tang, S.; Wang, Y. Capacity of Data Collection in Arbitrary Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 52–60. [Google Scholar] [CrossRef]
  13. Wang, C.; Jiang, C.; Li, X.Y.; Tang, S.; Yang, P. General capacity scaling of wireless networks. In Proceedings of the INFOCOM, Shanghai, China, 10–15 April 2011; pp. 712–720.
  14. OMNET++. OMNeT++ Discrete Event Simulator. Available online: https://omnetpp.org/ (accessed on 16 July 2016).
  15. Committee, I.L.S. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Higher-Speed Physical Layer Extension in the 2.4 GHz Band; IEEE: New York, NY, USA, 1999. [Google Scholar]
  16. Committee, I.L.S. IEEE Standard for Local and Metropolitan Area Networks—Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs); IEEE: New York, NY, USA, 2003. [Google Scholar]
  17. Phillips, C.; Sicker, D.; Grunwald, D. A survey of wireless path loss prediction and coverage mapping methods. IEEE Commun. Surv. Tutor. 2013, 15, 255–270. [Google Scholar] [CrossRef]
Figure 1. Directional data forwarding topology for a high density distributed wireless sensor network.
Figure 1. Directional data forwarding topology for a high density distributed wireless sensor network.
Sensors 16 01108 g001
Figure 2. Diagram of interference from concurrent senders on the basis of coefficient K.
Figure 2. Diagram of interference from concurrent senders on the basis of coefficient K.
Sensors 16 01108 g002
Figure 3. Diagram of interference from concurrent senders in the same B-group.
Figure 3. Diagram of interference from concurrent senders in the same B-group.
Sensors 16 01108 g003
Figure 4. Throughput performance of different data collection methods for random deployed networks with different scales.
Figure 4. Throughput performance of different data collection methods for random deployed networks with different scales.
Sensors 16 01108 g004
Figure 5. Throughput performance of different data collection methods for lattice deployed networks with different scales.
Figure 5. Throughput performance of different data collection methods for lattice deployed networks with different scales.
Sensors 16 01108 g005
Figure 6. The collision rate and frame loss rate of different data collection methods for random deployed networks with different scales.
Figure 6. The collision rate and frame loss rate of different data collection methods for random deployed networks with different scales.
Sensors 16 01108 g006
Figure 7. The collision rate and frame loss rate of different data collection methods for lattice deployed networks with different scales.
Figure 7. The collision rate and frame loss rate of different data collection methods for lattice deployed networks with different scales.
Sensors 16 01108 g007
Figure 8. Throughput performance of different data collection methods for lattice deployed networks (a) and the random deployed networks (b); Collision rate of different data collection methods for lattice deployed networks (c) and random deployed networks (d).
Figure 8. Throughput performance of different data collection methods for lattice deployed networks (a) and the random deployed networks (b); Collision rate of different data collection methods for lattice deployed networks (c) and random deployed networks (d).
Sensors 16 01108 g008
Table 1. PHY layer and MAC layer parameters used in simulations.
Table 1. PHY layer and MAC layer parameters used in simulations.
ParametersValueParametersValue
Channel Bit Rate11 MbpsPayload Length2304 Byte
Slot Time (ST)20 μsMAC Header224 bit
SIFS10 μsRTS160 bit
DIFS50 μsCTS112 bit
PHY Header192 bitACK112 bit

Share and Cite

MDPI and ACS Style

Lei, C.; Bie, H.; Fang, G.; Gaura, E.; Brusey, J.; Zhang, X.; Dutkiewicz, E. A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks. Sensors 2016, 16, 1108. https://doi.org/10.3390/s16071108

AMA Style

Lei C, Bie H, Fang G, Gaura E, Brusey J, Zhang X, Dutkiewicz E. A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks. Sensors. 2016; 16(7):1108. https://doi.org/10.3390/s16071108

Chicago/Turabian Style

Lei, Chunyang, Hongxia Bie, Gengfa Fang, Elena Gaura, James Brusey, Xuekun Zhang, and Eryk Dutkiewicz. 2016. "A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks" Sensors 16, no. 7: 1108. https://doi.org/10.3390/s16071108

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop