Next Article in Journal
Convergence Analysis on a Second Order Algorithm for Orthogonal Projection onto Curves
Next Article in Special Issue
The Development of Key Technologies in Applications of Vessels Connected to the Internet
Previous Article in Journal
Scale Effect and Anisotropy Analyzed for Neutrosophic Numbers of Rock Joint Roughness Coefficient Based on Neutrosophic Statistics
Previous Article in Special Issue
An Internet of Things Approach for Extracting Featured Data Using AIS Database: An Application Based on the Viewpoint of Connected Ships
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reliability Improved Cooperative Communication over Wireless Sensor Networks

1
School of Information Science and Engineering, Central South University, Changsha 410083, China
2
Department of Computer Science, Stony Brook University, New York, NY 11794, USA
3
School of Software, Central South University, Changsha 410075, China
*
Author to whom correspondence should be addressed.
Symmetry 2017, 9(10), 209; https://doi.org/10.3390/sym9100209
Submission received: 15 August 2017 / Revised: 18 September 2017 / Accepted: 22 September 2017 / Published: 1 October 2017
(This article belongs to the Special Issue Applications of Internet of Things)

Abstract

:
With the development of smart devices and connection technologies, Wireless Sensor Networks (WSNs) are becoming increasingly intelligent. New or special functions can be obtained by receiving new versions of program codes to upgrade their software systems, forming the so-called smart Internet of Things (IoT). Due to the lossy property of wireless channels, data collection in WSNs still suffers from a long delay, high energy consumption, and many retransmissions. Thanks to wireless software-defined networks (WSDNs), software in sensors can now be updated to help them transmit data cooperatively, thereby achieving more reliable communication. In this paper, a Reliability Improved Cooperative Communication (RICC) data collection scheme is proposed to improve the reliability of random-network-coding-based cooperative communications in multi-hop relay WSNs without reducing the network lifetime. In WSNs, sensors in different positions can have different numbers of packets to handle, resulting in the unbalanced energy consumption of the network. In particular, nodes in non-hotspot areas have up to 90% of their original energy remaining when the network dies. To efficiently use the residual energy, in RICC, high data transmission power is adopted in non-hotspot areas to achieve a higher reliability at the cost of large energy consumption, and relatively low transmission power is adopted in hotspot areas to maintain the long network lifetime. Therefore, high reliability and a long network lifetime can be obtained simultaneously. The simulation results show that compared with other scheme, RICC can reduce the end-to-end Message Fail delivering Ratio (MFR) by 59.4%–62.8% under the same lifetime with a more balanced energy utilization.

1. Introduction

The Internet of Things (IoT) [1,2,3,4] uses smart equipment such as sensor-based devices [5,6,7,8,9,10,11], smartphones [12] and vehicle sensor devices [13] to gathering information and give a different method for carrying out complex data-sensing-based tasks to satisfy the significant demands of critical infrastructures [14,15,16,17,18], such as environmental and weather monitoring systems [19,20,21,22,23]. Wireless Sensor Networks (WSNs) has large numbers of sensor nodes, it has huge potential to solve military and civilian domains [24,25,26,27,28,29]. Portable devices usually operate on their own to solve a single or multiple signal processing tasks (such as communications) in a non-cooperative fashion. Having the ability to achieve superior performance without a dedicated and power-hungry central device, distributed and cooperative processing techniques over WSNs have received much attention [28,30,31]. Recently, multi-input-multi-output (MIMO) systems has higher promising to improve transmission reliability [25,28,32]; in WSNs, this feature can be obtained by receiving new versions of program codes that are disseminated from a sink node.
For data collection, some sensing applications have the strict requirement. The arrival ratio of data packet should be high [32]. Studies revealed that only the number of hop from source to the sink is 5, the end-to-end reliability is less than 73.51%, its reliability is less [32]. Due to the inherent characteristic of constrained resources, data packet is transmitted to the sink, the energy consumption in the area near to the sink is higher than other areas, the energy left of other nodes can be used to improve network performance [3,4,6,30,31,32].
In WSNs, the packet can be lost by malicious nodes. Liu et al. proposed a communication scheme named the Network Coding-based Cooperative Communications scheme (NCCC) as shown in Figure 1 [31], which achieves high reliability through the cooperation of multi-nodes, where the data transmission reliability can be evaluated by Message Fail delivering Ratio (MFR). Generally, increasing the data transmission power of a node is an effective method to improve the data reliability. However, this method will increase the energy consumption of the node, thereby shortening its lifetime [10]. Numerous studies have shown that there is a trade-off between energy efficiency and data reliability [25,28,30,32]. Determining how to guarantee the data transmission reliability while maintaining the lifetime of the node is a challenging issue. In this paper, based on a WSDN in which software inside the sensors can help them construct clusters to perform the data collection task, a data collection scheme named Reliability Improved Cooperative Communications (RICC) is proposed to increase the network reliability and energy utilization ratio without harming the network lifetime. The invitations are as follows:
(1)
A Reliability Improved Cooperative Communications (RICC) with adjustable data transmission power [31] is proposed, in which the residual energy in non-hotspots is fully utilized to increase the transmission power of nodes to improve the data transmission reliability, whereas in hotspot areas, the transmission power is unchanged to maintain the previous network lifetime. For cooperative communications, the higher the transmission power of the nodes is, the shorter the lifetime of the nodes is. Thus, if the data transmission reliability is kept the same as before, the network lifetime is damaged. Due to different nodes load different amount of data, the energy consumption of different nodes is different, the non-hotspots area has much energy left. Therefore, in this paper, RICC adopts higher transmission power in non-hotspot regions, while using the same transmission power in hotspots areas as in previous schemes. Because most nodes are in non-hotspot areas, RICC can effectively improve the data transmission reliability.
To the best of our knowledge, for coding-based cooperative communication WSNs, RICC is the first data collection strategy that enhances the reliability without harming the lifetime.
(2)
The effectiveness of RICC is evaluated in this paper, and compared with Network Coding-based Cooperative Communications (NCCC), RICC has following features: (a) the network energy utilization ratio is enhanced by as much as 50% on average; and (b) it significantly improves the reliability of data collection, and specifically, under the same lifetime, RICC can reduce the weighted end-to-end MFR by approximately 59.4% to 62.8%.

2. Related Work

Many research works focus on improving the reliability of WSNs. In recent years, several methods and schemes with great data delivery rates have been proposed.
(1)
Retransmission-based mechanism. Automatic Repeat-Request can improve reliability of data transmission compared with traditions scheme [32]. The main strategy of an ARQ protocol is as follows: once node transmits a data packet, it waits for an acknowledgement (ACK, a message sent by the receiver) indicating that its data packet was correctly received. The sender does not send any additional packets until it receives an ACK signal or a timeout. In contrast, with GBN and SR, the nodes transmit packets continuously without the need to wait for individual ACKs from the receiver; only the ACK for the last packet is required [32]. In WSNs, an ACK could possibly be lost, which results in the transmitter resending a packet that was already successfully transmitted but an ACK was not received correctly or in time. Thus, in [33], we proposed a scheme to reduce the retransmission of packets by increasing the transmissions times of ACK when the receiver manages to receive a packet. Additional ACK transmissions will not cause significant increases in energy consumption but can further improve the lifetime of the WSN [33].
The advantage of the retransmission-based mechanism is that it improves the network reliability at a low energy cost, so it is quite suitable for WSNs whose energy is extremely limited [4,32]. However, the unfavorable is that the network delay is usually long due to the repeat transmissions of data packets, especially in a link with high packet error rate [32] because the retransmission-based mechanism sends several data packets to the sink until the nodes receive ACK signals in response. If the ACK is dropped, nodes cannot receive the ACK and will send data packets to the sink, thereby increasing the transmission delay.
(2)
Forward error correction (FEC) [34,35]. In the FEC scheme, when source node sends one data packet to the sink, the data packet is encoded through errors-correcting code. If the error ratio of data packet is in a certain value, the sink will correct the error of data packet using errors-correcting code. But the transmission bandwidth is higher, and the cost is higher [34,35]. The reliability of data packet in the FEC is improved, however, in this scheme, the cost for encoding the message in a redundant way is larger; thus, the network lifetime is shorter.
(3)
Cooperative Communication (CC). Yu et al. [36], after an in-depth analysis on cooperative ARQ (automatic re-request), found that the cooperative ARQ protocols ensure the reliability of data packet better [33,36]. Zhang et al. [33], for the first time, determined the most appropriate value of the bit error ratio (BER) along with the number of cooperative nodes that reduce energy consumption for transmitting one bit of data through theoretical analysis. Then, they adjusted the transmission BER according to the energy left of nodes. As a result, not only could the energy of nodes in the clusters far from the sink node be fully used, but the energy cost of nodes in the nearer cluster could also be reduced, so the network lifetime was prolonged.
(4)
Network coding techniques. In the network coding techniques, the source node encodes the packets at the application layer with some level of redundancy. Because the data transmitted by the source node have some redundancy, this approach will not affect the reception of the correct packets by the destination node. Network coding techniques have many advantages, such as small data transmission delay, while their main disadvantage is the relatively large energy consumption due to the complex algorithm. Other studies can be found in [37].
(5)
Network-coding-based cooperative communications (NCCC). Reference [31] proposed a communication scheme whose main idea is the combination of coding techniques and cooperative communications. The scheme has two main operations: (a) the original data packets should be encoded before being sent from the source cluster and they should be re-encoded before being sent from the transitional cluster, where both encoding and re-encoding are performed using random network coding; and (b) in each hop, several sensor nodes with a certain probability of temporarily failing constitute a cluster to cooperatively send data packets. At the cost of acceptable delay, NCCC can achieve reliable performance. Although this scheme can achieve better reliability, the transmission delay is longer.
The major challenge of the schemes described above is balancing the transmission delay and network transmission reliability. When adopting a complex scheme, the network lifetime will be damaged due to the larger energy consumption. However, if the algorithm is simple, the network reliability cannot be guaranteed. Due to the disadvantage of these schemes, this paper uses the remaining energy of the nodes to increase the transmission power. In this way, the network reliability can be improved while preserving the network lifetime.

3. System Model and Problem Statement

3.1. Network Model

The network model is the same with Refs. [28,31,33], the network includes n homogenous sensor nodes. The studies area is a circular areas, its network radius is R (in meters), per-hop transfer distance r (in meters), and one sink node (base station) is in the center. Its density of nodes in the network is ρ . The network data collection strategy is the same as that of the NCCC algorithm proposed in [31]. The NCCC algorithm is a cluster-based data collection approach, and each cluster is assumed to be composed of N sensor nodes.
Node generates one data packet at probability λ . Considering sensor nodes is static, the energy of a common node is limited, and the energy of the sink is infinite [3,20,29]. In this paper, because the energy consumption for data transmission occupies a large part of the total energy consumption, only the energy consumption of data transmission is considered in this paper; the related studies are shown in References [29,30]. Although the total energy consumption of nodes includes the energy consumptions of small computations, sensing, and data encryption, the energy consumptions of these processes do not affect the effectiveness of the RICC scheme. The reasons are as follows: First, those energy consumptions are small compared to the energy consumption for data transmission; thus, most studies compute only the energy consumption for data transmission, such as References [3,6,24,28,31]. Second, the main innovation of the RICC scheme is to use the remaining energy of nodes in non-hotspot areas to increase the transmission power and thereby improve the communication reliability. Thus, the effectiveness of the RICC scheme is not affected by the remaining energy in the non-hotspot areas. Energy is left in non-hotspot areas because the amount of data relayed in these areas is smaller, so the energy consumption is smaller. The energy consumptions for computations and sensing of the nodes are equal; thus, the energy left in non-hotspot areas is not reduced. However, the energy consumption for data encryption is larger in hotspots areas, which causes more energy to be left in non-hotspot areas. Thus, the performance of the RICC scheme can be improved effectively.

3.2. Problem Statement

The problem studied in this paper is as follows [28,31]:
(1)
Effective energy utilization (denoted as ϖ ). ϖ is the ratio of the used energy to the total energy in the network. Considering e i is the used energy of node v i , and E i n i denotes the initial energy:
max ( ϖ ) = max ( ( 1 i n e i ) / ( 1 i n E i n i ) )
(2)
Network lifetime (denoted as L ). In our network model, the energy consumption of node v i includes (a) the energy consumed for delivering data packets, e d i ; (b) the energy used for transmitting and receiving original packets, e o i ; and (c) the energy spent for broadcasting and receiving status messages from other nodes in the same cluster, e s i . As in [19], so maximizing L is as follows.
max ( L ) = max   min 0 < i n ( E i n i / ( e d i + e o i + e s i ) )
(3)
End-to-end data collection reliability (denoted as ϕ e 2 e ). This should be guaranteed, which means it should be higher than the minimum reliability, ϕ min , required by the application. Let ϕ e 2 e j stand for the end-to-end reliability of a data packet generated by node v j , and let ϕ i is the reliability of the packet at the i-th hop. Then, ϕ e 2 e is as follows:
ϕ e 2 e j j { 1 ,   ,   n } = ( i p a t h   j ) ϕ i ϕ min
Obviously, the goal of RICC can be summarized as Equation (4):
{ Minimize   ϖ ,   Minimize   L ,   Minimize   ϕ e 2 e max ( ϖ ) = max ( ( 1 i n e i ) / ( 1 i n E i n i ) ) max ( L ) = max   min 0 < i n ( E i n i / ( e d i + e o i + e s i ) ) s .   t .   ϕ e 2 e j j { 1 ,   ,   n } = ( i p a t h   j ) ϕ i ϕ min
To facilitate the readers’ understanding of this paper, the main parameters in this paper are listed in Table 1.

4. Main Design of RICC

4.1. Motivations of RICC

The research motivations of this paper originate from the two reasons:
Observation 1.
Generally, a large data transmission power can improve the link quality between nodes, which we validated in a network using a communication scheme named NCCC and found that a higher data transmission power could achieve a lower MFR; however, the energy consumption was increased [28]. Thus, there must be a tradeoff between the energy usage and reliability [26,27]. According Equation (18), this situation is discussed by Figure 2. As the data transmission power increases from 0.015 to 0.1 (J/Hop/Message), the MFR reduces from 0.024 to 1.577×10-4, which means that an increase in the data transmission power by a factor of 6.66 can reduce the MFR by a factor of 155. Therefore, increasing the data transmission power can effectively reduce the MFR, but it consumes more energy.
Observation 2.
In NCCC, which employs equal transmission power throughout the whole network [31], there is much remaining energy in the region far from the sink node (see Figure 3, which shows the experimental result in Section 6) due to the impact of the energy hole. We are inspired to adopt unequal transmission powers in different places in the network; more specifically, a higher transmission power is used in the area where much energy remains. Hence, the network can increase data collection reliability without reducing the network lifetime. Meanwhile, the energy utilization ratio is also improved.
For those two reasons, the Reliability Improved Cooperative Communications (RICC) data collection scheme is proposed. The main idea are that: the reliability is guaranteed by each node in the routing path; however, since the nodes have unbalanced energy consumption, RICC uses the remaining energy to increase the data transmission power, and adopts the same data transmission power in the area near to the sink as in previous studies. Thus, the goal of enhancing the network reliability without decreasing the lifetime can be achieved.

4.2. Preliminary Knowledge

Some relevant technologies and models for the proposed scheme should be introduced.

4.2.1. Data Transmission Model

According to NCCC model, the process of data collection is mainly composed of the following three stages: Source Cluster routing stage, Transitional Cluster routing stage and Destination Cluster routing stage, as shown in Figure 1.
(1)
Source Cluster routing stage. First, the source node senses origin data D and distributes them to the neighboring nodes in the same source cluster through broadcasting. After the functioning nodes receive D , they split it into M blocks:
D = ( D 1 ,   D 2 ,   ,   D M ) T
and generate a coding vector of size 1     ×     M (denoted as v ) over finite field GF(q) randomly. Then, the encode method for data packet is:
C = v × ( D 1 ,   D 2 ,   ,   D M ) T
(2)
Transitional Cluster routing stage. When source node in the source cluster transmit data packet to the next cluster, which is called the transitional cluster. Then the data packet is transmitted by the transitional cluster using the same way until this packet is transmitted to the destination cluster [31], which contains the sink node.
D r = ( D r 1 ,   D r 2 ,   ,   D r n )
Assume n data packets are received by a node in a certain transitional cluster. v r i and C r i are the coding vector and coded data, respectively. The n coding coefficients ( v 1 ,   v 2 ,   ,   v n ) are produced by GF(q), the encoding method of data packet is as follow:
v n e w = i = 1 n v i × v r i
C n e w = i = 1 n v i × C r i
where v n e w and C n e w are the coding vector and coded data of the new coded packet, respectively [31].
(3)
Destination Cluster routing stage. All data packets are transmitted to the destination cluster, then some nodes will transmit data packet to destination cluster. Those redundancy data will be removed, and the other packets are decoded to retrieve the original packets.
In the packet transmission stage, N coded packets are transmitted from one cluster to another. Suppose there are τ functioning nodes in a cluster. If τ = N , N packets will be equally delivered. If τ < N , then T d = k , for k = 1 ,   2 ,   ,   τ , the k-th node will transmit the corresponding k-th coded packet, and after the τ coded packets have been transmitted by the τ functioning nodes, the system will perform the operation T d % τ to make the 1-th node send the ( τ + 1 ) -th packet, and the 2-th node send the ( τ + 2 ) -th packet, and until other (N-τ) packets are transmitted to the next hop.
In the first two stages, some status messages containing the IDs of nodes are generated. The functioning nodes in both source clusters and transitional clusters declare their status at their broadcast slot, while in other time slots, they receive the status messages of other functioning nodes in the same cluster. All the status messages are stored in a TransQueue queue. After this process, all the functioning nodes’ IDs are restored in the TransQueue queue [31].

4.2.2. Reliability Model

Considering the bit errors can be corrected through an FEC if the received Signal-to-Noise Ratio (SNR) is higher than a threshold, denoted as S N R 0 [9]; hence, in this case, the delivered packets can be obtained correctly by the sink node. The method for calculating received signal-to-noise ratio ( S N R r ) is [9]:
S N R r = h 2     ×     G t G r w 2 d 0 k 2 ( 1 + α ) ( 4 π ) 2 M l N f d k     ×     E A m p N 0
Since the diameter of the cluster, r b , is quite short, a high data transmission power is not necessary for extremely reliable intra-cluster communications; thus, the MFR within clusters will be set to a small constant value, e.g., p b = 10 6 . The Probability Density Function (PDF) of wireless channel is:
f ( x ) = 2 x σ 2 exp ( x 2 σ 2 )
where σ 2 is the scale parameter of the distribution. Then, the packet loss probability is as follow
p l = Pr ( S N R r < S N R 0 ) = Pr ( h Q N 0 d k E A m p ) = 1 exp ( Q N 0 d k E A m p σ 2 )
where
Q = ( 1 + α ) ( 4 π ) 2 M l N f S N R 0 G t G r w 2 d 0 k 2
Define the communication constant U as follows:
U = ( 4 π ) 2 M l N f G t G r w 2
Then,
Q = ( 1 + α ) S N R 0 d 0 k 2     ×     U
Assume that in a certain data collection round, there are u functioning nodes in a certain transitional cluster. Then, each packet delivered from the previous cluster will not be received successfully by the cluster unless it can be received by at least one of these u nodes. Therefore, the probability for a packet to be successfully received is ( 1 p l ) u . Hence, the probability of v among the N packets being obtained.
p ( u , v ) = ( N v ) ( 1 ( p l ) u ) v p l u ( N v )
The payload of each coded packet is the linear combination of the M original data blocks. However, this decoding constraint cannot always be satisfied because the encoding and re-coding vectors of the v received packets are generated over a Galois Field randomly. Let p n , m denote the probability that the rank of an n × m matrix generated randomly over a Galois Field is less than m [31]. thus, its value is as follows:
p n , m = { 1 , if   n < m 1 x = 0 m 1 ( 1 1 q n x ) . if   n m
As in [9], the Message Fail Delivering Ratio (MFR) is a performance index. From the above discussions, the MFR in one hop of transmission with the packet loss probability p l and node failure probability p r can be calculated as:
M F R o = u = 0 N v = 0 N ( N u ) ( 1 p r ) u p r N u × ( N v ) ( 1 ( p l ) u ) v ( p l ) u ( N v ) × p v , M
In particular, when data packet is transmitted from destination cluster to the sink, the MFR is recalculated as:
M F R s = u = 0 N 1 v = 0 N ( N 1 u ) ( 1 p r ) u p r N 1 u × ( N v ) ( 1 ( p l ) u + 1 ) v ( p l ) ( u + 1 ) ( N v ) × p v , M

4.3. Data Load of Node

Based on the above data transmission model, there are three kinds of packets for the communications of nodes: data packet, original packet and status message, which is analyzed in detail in this subsection.
Suppose the data transmission is failure-free between any two nodes. Then, according to [12], the amount of data received a node of distance l meters from the sink is:
ζ r l = h p + h p ( h p + 1 ) r 2 l
To determine the amount of transmitted data, one packet generated by each node should be considered:
ζ t l = ( h p + 1 ) + h p ( h p + 1 ) r 2 l
where h p = ( R l ) / r .
Theorem 1.
In the RICC model, for a node that is l meters far from the sink node, the numbers of data packets it transmits to and receives from other clusters (denoted as ζ l , t D and ζ l , r D , respectively), the numbers of original packets it broadcasts to and receives from other nodes within its cluster (denoted as ζ l , b O and ζ l , r O , respectively), and the numbers of status messages it broadcasts to and receives from other nodes within its cluster (denoted as ζ l , b S and ζ l , r S , receptively) can be calculated as:
{ ζ l , t D = ( h p + 1 + h p ( h p + 1 ) r 2 l ) p r ¯ λ ζ l , r D = ( h p + h p ( h p + 1 ) r 2 l ) N ( p r ¯ ) 2 p l ¯ λ ζ l , b O = p r ¯ λ ,   ζ l , r O = ( N 1 ) ( p r ¯ ) 2 p b ¯ λ ζ l , b S = ( h p + h p ( h p + 1 ) r 2 l ) N ( p r ¯ ) 2 p l ¯ λ + p r ¯ λ ζ l , r S = ( h p + h p ( h p + 1 ) r 2 l ) ( N 1 ) ( p r ¯ ) 2 p b ¯ λ
where h p = ( R l ) / r , p r ¯ = 1 p r , p l ¯ = 1 p l , and p b ¯ = 1 p b .
Proof. 
For a data packet, a node will transmit a data packet if it has not failed, and it successfully generates one packet with probability p r ¯ λ . The precondition for a node to successfully receive a packet of any kind is that both the receiver and sender do not fail; the probability that this precondition is satisfied is ( 1 p r ) 2 , and the probability of losing a packet is p l , so the final probability for a node to receive a packet is ( p r ¯ ) 2 p l ¯ λ . As there are N nodes in each cluster and each node sends its data packet to the next cluster, each node will receive a data packet N times from the last cluster.
For an original data packet, in a single round of data collection, each functioning node will broadcast its original data packet only once if it generates an event with probability λ and will receive original data packets from its N 1 neighboring nodes (if it has any) in the same source cluster. As assumed before, the within-cluster packet loss probability is a constant value p b , so the original data packet loads are p r ¯ λ and ( N 1 ) ( 1 p r ) 2 p b ¯ λ .
For a status message, once a node receives a data packet or has original data to transmit, it will broadcast a status message containing its ID information, so the number of broadcasted status messages should be ζ l , b S = ζ l , r D + ζ l , b O . Similarly, a node will receive status messages from its N 1 neighbors, under the event generation probability of λ .
According to Theorem 1, the data packet load of nodes is shown in Figure 4, from which we can see that nodes in different places in the network can have a very different data loads, bringing about the so-called “energy hole” phenomenon. Moreover, with more nodes in a cluster, each node receives more data packets, but the transmission data load remains the same. Note that the curves have some abruptions; this is because the nodes on the left side of the abrupt points must handle one more ring of packets than those on the right side.
According to Theorem 1, Figure 5 shows the original data packet loads of nodes, which are very small compared with the later data packet loads. Similarly, with more nodes in a cluster, each node will receive more original data packets, and the broadcasting data load also stays the same. A node will receive more original packets if its failure probability is lower.
According to Theorem 1, Figure 6 and Figure 7 are introduced to show the status message loads of nodes. Compared with the data packet loads, the status message loads are also small, which indicates that the main source of energy consumption for a node is delivering data packets.

4.4. Energy Consumption of a Node

The power consumption of transmitting circuits P C t and the power consumption of receiving circuits P C r , P C t and P C r are given by:
P C t = P D A C + P m i x + P f i l t + P s y n
P C r = P L N A + P m i x + P I F A + P f i l r + P A D C + P s y n
where P D A C , P A D C , P f i l t , P f i l r , P L N A , P I F A , P m i x and P s y n is the power consumption values for the Digital-to-Analog Converter (DAC), the Analog-to-Digital Converter (ADC), the active filters at transmitter side and receiver side, the Low Noise Amplifier (LNA), the Intermediate Frequency Amplifier (IFA), the mixer and the frequency synthesizer, respectively [9].
According to Equation (12), the power consumption of the amplifier is:
E A m p = Q N 0 d k σ 2 lg ( 1 p l )
Therefore, the total energy consumption per bit and the required packet loss probability can be calculated as:
e T ( d , p l ) = E A m p + P C t R b = Q N 0 d k σ 2 lg ( 1 p l ) + P C t R b
where R b denotes the transmission data rate. Finally, the power needed for receiving data packet per bit is:
E R = P C r R b
Theorem 2.
With the routing strategy of the NCCC system model, for a node that is x meters away from the sink node, its energy consumption in one round, denoted as ω p l x , can be calculated as follows:
{ ω p l x = e T ( d , p l ) ζ x , t D l d + e T ( r b , p b ) × ( ζ x , b S l s + ζ x , b O l o ) + E R × ( ζ x , r D l d + ζ x , r S l s + ζ x , r O l o ) d = { x ,   f o r   x < r r ,   f o r   x r
where l d , l o and l s stand for the sizes of the data packet, original packet and status message, respectively. A packet consists of a payload and a packet header containing a sequence number; therefore, the size of each data packet is l d = ( l o / M + l h ) , where l h is the size of the packet header.
Proof. 
As sending and receiving data are the critical sources of energy consumption of nodes, the latter is not considered here. The total number of bits that a node, e.g., v i , receives in one round depends on the data packets received from the last hop, ζ l , r D l d ; the original packets received from the source node in the same cluster, ζ l , r O l o ; and the status messages received from other nodes in the same cluster, ζ l , r S l s . The power needed for the reception of one bit is E R = P C r / R b . Therefore, the energy consumption of node v i to receive all those data bits can be computed as E R × ( ζ l , r D l d + ζ l , r S l s + ζ l , r O l o ) . Meanwhile, in one round, the total number of bits that node v i needs to transmit depends on the data packets to be transmitted to the next hop, ζ l , t D l d ; the original data packets, ζ l , b O l o ; and the status messages to be broadcasted to other nodes in the same cluster, ζ l , b S l s . According to Equation (26), for a fixed data rate R b and a required packet loss probability p l , the energy consumption per bit is as e T ( d , p l )     =     Q N 0 d k σ 2 lg ( 1 p l )     +     P C t R b . Therefore, the energy consumption for node v i to transmit all those data bits is e T ( d , p l ) × ζ x , t D l d + e T ( r b , p b ) × ( ζ x , b S l s + ζ x , b O l o ) .

4.5. The Design of RICC

From the above analyses, we know that the linchpin of RICC is determining the transmission power of nodes in different places in the network to increase the cooperative communication performance. In this section, this problem is studied.
In NCCC, if the packet loss probability that the network adopts is determined, then according to Theorem 2, the energy consumption of each node in the network is calculated. First, considering the data transmission power is the minimum value that meets the reliability requirements of the application. Then, the residual energy of a node in the far-sink region is used to increase its data transmission power and thereby decrease the MFR of the transmission hop originating from it and further improve the reliability of the whole network.
Theorem 3.
In NCCC, suppose the required packet loss probability is p l . Then, in RICC, for a certain node, say v x , which is x m away from the sink node, the largest transmission power E A m p x that it can adopt without harming the network lifetime can be calculated as:
{ E A m p x = w p l x 0 E R ε r P C t R b ε t ζ x , t D d + ( ζ x , b S s + ζ x , b O o ) r k d k log ( 1 p b ) ( 1 p l ) ε r = ( ζ x , r D d + ζ x , r S s + ζ x , r O o )   ε t = ( ζ x , t D d + ζ x , b S s + ζ x , b O o )
where x 0 is the distance of the last hop that is from the last node to the sink.
Proof. 
According to Equations (26) and (28), for the required node failure probability and a fixed data rate, the energy consumption of node v x is w p l x . In addition, from Theorem 1, we know that w p l x 0 is the largest energy consumption. By subtracting w p l x from w p l x 0 , node v x ’s energy left is:
w Δ x = w p l x 0 w p l x
Here, w Δ x = 0 means that node v x makes full use of its residual energy, and we can directly solve for E A m p x :
e T ( x 0 , p l ) ζ x 0 , t D l d + e T ( r b , p l ) ( ζ x 0 , b S l s + ζ x 0 , b O l o ) + E R × ( ζ x 0 , r D l d + ζ x 0 , r S l s + ζ x 0 , r O l o ) = e T ( x , p l ) ζ x , t D l d + e T ( r b , p l ) ( ζ x , b S l s + ζ x , b O l o ) + E R × ( ζ x , r D l d + ζ x , r S l s + ζ x , r O l o ) E A m p x ζ x , t D l d + E A m p 0 ( ζ x , b S l s + ζ x , b O l o ) + E R ε r + P C t R b ε t = w p l x 0 E A m p x [ ζ x , t D l d + r k d k log ( 1 p b ) ( 1 p l ) ( ζ x , b S l s + ζ x , b O l o ) ] = w p l x 0 E R ε r P C t R b ε t E A m p x = w p l x 0 E R ε r P C t R b ε t ζ x , t D l d + ( ζ x , b S l s + ζ x , b O l o ) r k d k log ( 1 p b ) ( 1 p l )
where E A m p c stands for the power consumption of the amplifier within clusters and is calculated as:
E A m p c = Q N 0 r k σ 2 lg ( 1 p b )
thus,
E A m p c E A m p x = r k d k log ( 1 p b ) ( 1 p l )

5. Performance Analysis of RICC

5.1. Energy Consumption of RICC

Figure 8 is introduced to show the comparisons of energy consumptions between RICC and NCCC. As the previous analyses show, RICC and NCCC have the same largest energy consumption, so the network lifetime is maintained at the same level. However, in non-hotspot areas, RICC has a larger energy consumption than NCCC does, which is the consequence of increasing the data transmission power of the nodes. According to observation 1 in Section 4.1, when the transmission power of a node exceeds 0.1 J/Hop/Packet, the MFR does not significantly improve, which means that MFRs with different cluster sizes all reach their lower bounds, so we set an upper threshold for the power as 0.1 (J/Hop/Packet). But the energy utilization still cannot be perfectly balanced. The use of a more even energy utilization to achieve a better network performance is left for our future work. The corresponding energy used by nodes for delivering a packet per hop is given in Figure 9.
The average enhanced energy utilization ratio of the network is shown in Figure 10; specifically, the ratio is improved by 59.4%–62.8%, which indicates a higher energy usage efficiency of RICC compared with NCCC.

5.2. Network Reliability of RICC

5.2.1. End-to-end MFR

Theorem 4.
End-to-end MFR is refer to the final MFR of a packet from the source cluster to the destination cluster. In RICC, for a node that is x m away from the sink, the end-to-end MFR of a packet produced by this node is as follows.
M F R e 2 e x = 1 ( 1 M F R s )     ×     i = 1 h p 1 ( 1 M F R o i )
where M F R o i is the MFR of a packet at the i-th hop of a routing path, M F R s is the last hop of the transmission, and h p represents the total number of hops from this node to the sink, that is, h p = ( R x ) / r . As shown in Equation (12), when E A m p is large enough, p l 0 and M F R e 2 e x can be rewritten as:
M F R e 2 e x 1     ( 1 p N , M )     ×     { 1         [ p N , M +     ( p r ) N ] } h p 1
Proof. 
Considering the probability that the packet is obtained by sink node is the product of the probabilities that the packet can be successfully transmitted at each hop. In particular, the MFR of the last hop is different from others; see the reliability model in Section 4.
Figure 11 shows a comparison of the end-to-end MFR versus hops counts between RICC and NCCC. The results indicate that RICC can always achieve reliable cooperative communication. Having more nodes in a cluster weakens the improvement in reliability since increasing the size of the cluster can also enhance the reliability [9].

5.2.2. Weighted End-to-end MFR

Theorem 5.
In RICC, the weighted end-to-end MFR of the network is calculated, which reflects the universality of the data collection reliability with the RICC approach:
M F R e 2 e w = 0 R 0 2 π M F R e 2 e x × x × d θ × d x
Proof. 
Considering network node that is x m far from the sink, where | x { 0 , , R } , we take a sector of fan-shaped ring θ with an angle d θ and a width of d x . The area of the sector is x d x d θ . The probability of losing a packet from the generating node to the sink node, i.e., the end-to-end MFR, is M F R e 2 e w ; see Equation (34). Integral to the end-to-end MFR in the entire network, the network weighted end-to-end MFR is as follows:
M F R e 2 e w = 0 R 0 2 π M F R e 2 e x × x × d θ × d x
Figure 12 is introduced to show a comparison of the weighted end-to-end MFR between two schemes. In RICC, only nodes that are very close to the sink have the same MFR as in NCCC, and these nodes are only a small proportion of the whole network. Therefore, the weighted end-to-end MFR in RICC is much lower than that in NCCC; specifically, the percentage reduction is at least 50%.

6. Experimental Results and Analyses

6.1. Energy Consumption

Omnet++ simulator [38] is used to evaluate the effectiveness of RICC. Figure 13 presents the simulation results of the energy consumptions of different nodes. With more nodes in a cluster, much energy is consumed because it must handle more amount of data packets, which can be seen from Equation (22). Since the power for transmitting a packet is increased with RICC, nodes always have a larger energy consumption compared with NCCC, except for those in the area very close to the sink. It shows that RICC scheme can improve the energy utilization rate.
Figure 14 shows that in NCCC, the energy consumption of nodes in hotspots is unbalanced in the network. In Figure 15, RICC causes the far-sink nodes to consume more energy; that is, the nodes in the network tend to have the same energy consumption. Hence, the energy usage of the network is more balanced, which improves the energy utilization rate and network reliability.
The corresponding energy used for delivering a data packet per hop is shown in Figure 16. The node that is closest to the sink uses the same energy power for transmitting a packet, but unlike in NCCC, in RICC, the power increases with the distance from the sink node, resulting in lower one-hop MFR of packets. The energy consumption for each hop in the area far from the sink in the RICC scheme is higher than that of each hop in the NCCC scheme due to the larger N in this area in the RICC scheme.

6.2. Network Reliability

Based on Figure 17 and Figure 18, which show the one-hop MFRs of nodes for RICC and NCCC, the theoretical analyses match the simulation results well. In the near-sink area, the one-hop MFR is positively correlated with the distance to the sink node; however, when the distance exceeds the transmission radius r , the one-hop MFR becomes horizontal because the transmission distance stays at r . The one-hop MFR for RICC is significantly lower than that for NCCC, which fully illustrates the effectiveness of RICC in improving the reliability. The one-hop MFR in RICC is lower than the one-hop MFR in NCCC. This indicates that the network reliability in the RICC scheme is better.
The simulation results of weighted E2E MFR are presented in Figure 19, and they are consistent with the theoretical analysis shown in Figure 12. We also present the average reduced weighted end-to-end MFR in Figure 20, which shows that the weighted E2E MFR is improved by at least 50%; moreover, the larger the network is, the less of the reduced percentage.

7. Conclusions and Future Work

In wireless sensor networks which the bit error rate (BER) is higher than wired network, the energy of sensor nodes is very limited, making it a problem to ensure a low end-to-end Message Fail Delivering Ratio (MFR) without leading a decline in the network lifetime. An efficient way to obtain a reliable data communication is that several sensors transmit sensed data cooperatively, which can be implemented through a technology named Wireless Software Define Networks (WSDNs). In this paper, based on a WSDN where software inside sensors can help them construct clusters to do the data collection task, we focus on the cooperation details, namely, a data collection scheme called Reliability Improved Cooperative Communications (RICC) with adjustable data transmitting power is proposed to achieve high reliability for random network coding based cooperative communications in multi-hop relay WSNs with long lifetime guaranteed. In RICC, high data transmitting power is adopted by nodes in far-sink areas to fully use their residual energy to further reduce the MFR, while the nodes in hotspots area adopt relatively low power to maintain network lifetime, so both of MFR and lifetime of network can be improved. Omnet++ simulator is used to evaluate the effectiveness of RICC. The evaluation results indicate that: with RICC, the utilization ratio of energy is approximately increased by as much as 59.4% to 62.8% compared with NCCC, and the weighted end-to-end MFR is reduced by as least 50%.
Although building a reliability cooperative communications network is the key issue for wireless sensor networks, there are many work to do for creating an efficient communication network. With the development of sensing devices for harvest energy from surrounding circumstance, its devices are getting smaller and smaller, and the function is getting stronger and stronger. So for the future work, we plan to seeking new techniques to improve communication reliability as well as lifetime for harvesting energy sensor networks especially in practice applications.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (Grant No. 61772554, 61379110, 61572526, 61572528), the National Basic Research Program of China (973 Program) (Grant No. 2014CB046305).

Author Contributions

Zhuangbin Chen designed the algorithms and wrote the manuscript. Ming Ma wrote part of the manuscript. Xiao Liu analyzed the experiment results. Anfeng Liu conceived of the work, designed the algorithms. Ming Zhao commented the work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Naranjo, P.G.V.; Shojafar, M.; Mostafaei, H.; Pooranian, Z.; Baccarelli, E. P-SEP: A prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks. J. Supercomput. 2017, 73, 733–755. [Google Scholar] [CrossRef]
  2. Qin, G.; Wang, L.; Li, Q. Resource symmetric dispatch model for internet of things on advanced logistics. Symmetry 2016, 8, 20. [Google Scholar] [CrossRef]
  3. Zhao, S.; Liu, A. High performance target tracking scheme with low prediction precision requirement in WSNs. Int. J. Ad Hoc Ubiquitous Comput. 2017, in press. [Google Scholar]
  4. Liu, X.; Zhao, S.; Liu, A.; Xiong, N.; Vasilakos, A.V. Knowledge-aware proactive nodes selection approach for energy management in Internet of Things. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
  5. Byun, S.S.; Gil, J.M. Fair Dynamic spectrum allocation using modified game theory for resource-constrained cognitive wireless sensor networks. Symmetry 2017, 9, 73. [Google Scholar] [CrossRef]
  6. Liu, A.; Zhang, Q.; Li, Z.; Choi, Y.J.; Li, J.; Komuro, N. A green and reliable communication modeling for industrial internet of things. Comput. Electr. Eng. 2017, 58, 364–381. [Google Scholar] [CrossRef]
  7. Baccarelli, E.; Naranjo, P.G.V.; Scarpiniti, M.; Shojafar, M.; Abawajy, J.H. Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study. IEEE Access 2017, 5, 9882–9910. [Google Scholar] [CrossRef]
  8. Huang, C.; Ma, M.; Liu, Y.; Liu, A. Preserving source location privacy for energy harvesting WSNs. Sensors 2017, 17, 724. [Google Scholar] [CrossRef] [PubMed]
  9. Li, T.; Liu, Y.; Gao, L.; Liu, A. A Cooperative-based model for smart-sensing tasks in fog computing. IEEE Access. 2017. [Google Scholar] [CrossRef]
  10. Chen, Z.; Liu, A.; Li, Z.; Choi, Y.J.; Sekiya, H.; Li, J. Energy-efficient broadcasting scheme for smart industrial wireless sensor networks. Mob. Inform. Syst. 2017. [Google Scholar] [CrossRef]
  11. Liu, X.; Dong, M.; Ota, K.; Yang, L.T.; Liu, A. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure. J. Comput. Syst. Sci. 2016. [Google Scholar] [CrossRef]
  12. Li, T.; Liu, A.; Huang, C. A similarity scenario-based recommendation model with small disturbances for unknown items in social networks. IEEE Access 2016, 4, 9251–9272. [Google Scholar] [CrossRef]
  13. Liu, A.; Chen, Z.; Xiong, N. An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs. Inform. Sci. 2017. [Google Scholar] [CrossRef]
  14. Liu, A.; Liu, X.; Wei, T.; Yang, L.T.; Rho, S.C.; Paul, A. Distributed multi-representative re-fusion approach for heterogeneous sensing data collection. ACM Trans. Embed. Comput. Syst. 2017, 16, 73. [Google Scholar] [CrossRef]
  15. Liu, Y.; Liu, A.; Guo, S.; Li, Z.; Choi, Y.J.; Sekiya, H. Context-aware collect data with energy efficient in Cyber-physical cloud systems. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
  16. Liu, X.; Li, G.; Zhang, S.; Liu, A. Big program code dissemination scheme for emergency software-define wireless sensor networks. Peer-to-Peer Netw. Appl. 2017. [Google Scholar] [CrossRef]
  17. Liu, A.; Liu, X.; Tang, Z.; Yang, L.T.; Shao, Z. preserving smart sink location privacy with delay guaranteed routing scheme for WSNs. ACM Trans. Embed. Comput. Syst. 2017, 16, 68. [Google Scholar] [CrossRef]
  18. Liu, Q.; Liu, A. On the hybrid using of unicast-broadcast in wireless sensor networks. Comput. Electr. Eng. 2017. [Google Scholar] [CrossRef]
  19. Chen, X.; Ma, M.; Liu, A. Dynamic power management and adaptive packet size selection for IoT in e-Healthcare. Comput. Electr. Eng. 2017. [Google Scholar] [CrossRef]
  20. Chen, X.; Xu, Y.; Liu, A. Cross layer design for optimal delay, energy efficiency and lifetime in body sensor networks. Sensors 2017, 17, 900. [Google Scholar] [CrossRef] [PubMed]
  21. Xu, Y.; Chen, X.; Liu, A.; Hu, C. A latency and coverage optimized data collection scheme for smart cities based on vehicular ad-hoc networks. Sensors 2017, 17, 888. [Google Scholar] [CrossRef] [PubMed]
  22. Wang, J.; Liu, A.; Zhang, S. Key parameters decision for cloud computing: Insights from a multiple game model. Concurr. Comput. Pract. Exp. 2017. [Google Scholar] [CrossRef]
  23. Wang, J.; Liu, A.; Yan, T.; Zeng, Z. A resource allocation model based on double-sided combinational auctions for transparent computing. Peer-to-Peer Netw. Appl. 2017. [Google Scholar] [CrossRef]
  24. Liu, X.; Liu, Y.; Song, H.; Liu, A. Big data orchestration as a service networking. IEEE Commun. Mag. 2017, 55, 94–101. [Google Scholar]
  25. Liu, Y.; Liu, A.; Li, Y.; Li, Z.; Choi, Y.J.; Sekiya, H.; Li, J. APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication. Pervasive Mob. Comput. 2017. [Google Scholar] [CrossRef]
  26. Zhang, Q.; Liu, A. An unequal redundancy level based mechanism for reliable data collection in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2016. [Google Scholar] [CrossRef]
  27. Xu, Y.; Liu, A.; Huang, C. Delay-aware program codes dissemination scheme in Internet of everything. Mob. Inform. Syst. 2016. [Google Scholar] [CrossRef]
  28. Liu, X.; Liu, A.; Li, Z.; Tian, S.; Choi, Y.J.; Sekiya, H.; Li, J. Distributed cooperative communication nodes control and optimization reliability for resource-constrained WSNs. Neurocomputing 2017. [Google Scholar] [CrossRef]
  29. Chen, Z.; Liu, A.; Li, Z.; Choi, Y.J.; Li, J. Distributed duty cycle control for delay improvement in wireless sensor networks. Peer-to-Peer Netw. Appl. 2017, 10, 559–578. [Google Scholar] [CrossRef]
  30. Cui, S.; Goldsmith, A.J.; Bahai, A. Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks. IEEE J. Sel. Areas Commun. 2004, 22, 1089–1098. [Google Scholar] [CrossRef]
  31. Liu, X.; Gong, X.; Zheng, Y. Reliable cooperative communications based on random network coding in multi-hop relay WSNs. IEEE Sens. J. 2014, 14, 2514–2523. [Google Scholar] [CrossRef]
  32. Rosberg, Z.; Liu, R.P.; Le Dinh, T.; Dong, Y.F.; Jha, S. Statistical reliability for energy efficient data transport in wireless sensor networks. Wirel. Netw. 2010, 16, 1913–1927. [Google Scholar] [CrossRef]
  33. Zhang, D.; Chen, Z. Energy-efficiency of cooperative communication with guaranteed E2E reliability in WSNs. Int. J. Distrib. Sens. Netw. 2013, 9. [Google Scholar] [CrossRef]
  34. Noda, C.; Prabh, S.; Alves, M.; Voigt, T. On packet size and error correction optimisations in low-power wireless networks. In Proceedings of the 2013 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), New Orleans, LA, USA, 24–27 June 2013. [Google Scholar]
  35. Zhou, M.; Jin, C. QoS-aware forward error correction cooperating with opportunistic routing in wireless multi-hop networks. Wirel. Pers. Commun. 2017, 92, 1407–1422. [Google Scholar] [CrossRef]
  36. Yu, G.; Zhang, Z.; Qiu, P. Efficient ARQ protocols for exploiting cooperative relaying in wireless sensor networks. Comput. Commun. 2007, 30, 2765–2773. [Google Scholar] [CrossRef]
  37. Keller, L.; Atsan, E.; Argyraki, K.; Fragouli, C. SenseCode: Network coding for reliable sensor networks. ACM Trans. Sens. Netw. (TOSN) 2013, 9. [Google Scholar] [CrossRef]
  38. The OMNET++ Simulator. Available online: http://www.omnetpp.org/ (accessed on 23 March 2016).
Figure 1. Network model.
Figure 1. Network model.
Symmetry 09 00209 g001
Figure 2. Message Fail Delivering Ratio (MFR) versus energy used for delivering a packet per hop (J/Hop/Packet).
Figure 2. Message Fail Delivering Ratio (MFR) versus energy used for delivering a packet per hop (J/Hop/Packet).
Symmetry 09 00209 g002
Figure 3. Energy consumption of Network Coding-based Cooperative Communications (NCCC).
Figure 3. Energy consumption of Network Coding-based Cooperative Communications (NCCC).
Symmetry 09 00209 g003
Figure 4. Data packet loads of nodes.
Figure 4. Data packet loads of nodes.
Symmetry 09 00209 g004
Figure 5. Original data packet loads of nodes.
Figure 5. Original data packet loads of nodes.
Symmetry 09 00209 g005
Figure 6. Status message (broadcasted) loads of nodes.
Figure 6. Status message (broadcasted) loads of nodes.
Symmetry 09 00209 g006
Figure 7. Status message (received) loads of nodes.
Figure 7. Status message (received) loads of nodes.
Symmetry 09 00209 g007
Figure 8. Total energy consumption of nodes.
Figure 8. Total energy consumption of nodes.
Symmetry 09 00209 g008
Figure 9. Energy used for delivering a packet per hop.
Figure 9. Energy used for delivering a packet per hop.
Symmetry 09 00209 g009
Figure 10. Average enhanced energy utilization ratios for different network sizes.
Figure 10. Average enhanced energy utilization ratios for different network sizes.
Symmetry 09 00209 g010
Figure 11. Comparison of end-to-end MFR.
Figure 11. Comparison of end-to-end MFR.
Symmetry 09 00209 g011
Figure 12. Comparison of weighted end-to-end MFR.
Figure 12. Comparison of weighted end-to-end MFR.
Symmetry 09 00209 g012
Figure 13. Comparison of energy consumptions.
Figure 13. Comparison of energy consumptions.
Symmetry 09 00209 g013
Figure 14. Energy consumption of NCCC (3D).
Figure 14. Energy consumption of NCCC (3D).
Symmetry 09 00209 g014
Figure 15. Energy consumption of Reliability Improved Cooperative Communications (RICC) (3D).
Figure 15. Energy consumption of Reliability Improved Cooperative Communications (RICC) (3D).
Symmetry 09 00209 g015
Figure 16. Energy used for delivering a packet per hop.
Figure 16. Energy used for delivering a packet per hop.
Symmetry 09 00209 g016
Figure 17. One-hop MFR of nodes with NCCC.
Figure 17. One-hop MFR of nodes with NCCC.
Symmetry 09 00209 g017
Figure 18. One-hop MFR of nodes with RICC.
Figure 18. One-hop MFR of nodes with RICC.
Symmetry 09 00209 g018
Figure 19. Simulated weighted end-to-end MFR.
Figure 19. Simulated weighted end-to-end MFR.
Symmetry 09 00209 g019
Figure 20. Average reduced weighted end-to-end MFR.
Figure 20. Average reduced weighted end-to-end MFR.
Symmetry 09 00209 g020
Table 1. Network Parameters.
Table 1. Network Parameters.
SymbolMeaningValueSymbolMeaningValue
P C t the power consumption of receiving circuits98.2 mW k the data time slot3.0
P C t the power consumption of transmitting circuits112.5 mW p r the probability that a node does not transmit a data packet successfully0.05
R b a fixed data rate10 kbps p b the packet loss probability within the same cluster10−6
N 0 the single-sided thermal noise Power Spectral Density (PSD) at room temperature−171 dBm/Hz σ 2 the scale parameter of the distribution1.0
N f the receiver noise figure10 dB w the carrier wavelength0.12 m
M l the link margin compensating the hardware process variations40 dB d 0 the close-range reference distance between the receiver and transmitter1 m
U communication constants3.47 × 108 M The number of splits of the network2
G t G r the transmitter and receiver antenna gains, respectively7 dBi l h the size of the packet header44 bits
S N R 0 a threshold of Signal-to-Noise Ratio (SNR)0 dB l d the size of the data packet1200 bits
λ the probability of generating data in a period0.1 l s the size of the status message100 bits
d the transmission distance- N r the PSD of the total effective noise at the receiver input-
E A m p the energy consumption of the power amplifier for transmitting one bit of data- η the drain efficiency of the RF power amplifier-
h the channel gain- ξ the Peak-to-Average Ratio (PAR)-

Share and Cite

MDPI and ACS Style

Chen, Z.; Ma, M.; Liu, X.; Liu, A.; Zhao, M. Reliability Improved Cooperative Communication over Wireless Sensor Networks. Symmetry 2017, 9, 209. https://doi.org/10.3390/sym9100209

AMA Style

Chen Z, Ma M, Liu X, Liu A, Zhao M. Reliability Improved Cooperative Communication over Wireless Sensor Networks. Symmetry. 2017; 9(10):209. https://doi.org/10.3390/sym9100209

Chicago/Turabian Style

Chen, Zhuangbin, Ming Ma, Xiao Liu, Anfeng Liu, and Ming Zhao. 2017. "Reliability Improved Cooperative Communication over Wireless Sensor Networks" Symmetry 9, no. 10: 209. https://doi.org/10.3390/sym9100209

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop