Next Article in Journal
Determination of the Optimum Harvest Window for Apples Using the Non-Destructive Biospeckle Method
Next Article in Special Issue
A Task-Centric Cooperative Sensing Scheme for Mobile Crowdsourcing Systems
Previous Article in Journal
An Efficient Seam Elimination Method for UAV Images Based on Wallis Dodging and Gaussian Distance Weight Enhancement
Previous Article in Special Issue
Search Techniques for the Web of Things: A Taxonomy and Survey
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimizing Retransmission Threshold in Wireless Sensor Networks

1
Department of Computer Science, Dalian University of Technology, Dalian 116000, China
2
Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA
*
Author to whom correspondence should be addressed.
Current address: No. 2 Linggong Road, Hi-Tech Zone, Dalian 116000, China
Sensors 2016, 16(5), 665; https://doi.org/10.3390/s16050665
Submission received: 22 March 2016 / Revised: 23 April 2016 / Accepted: 29 April 2016 / Published: 10 May 2016
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)

Abstract

:
The retransmission threshold in wireless sensor networks is critical to the latency of data delivery in the networks. However, existing works on data transmission in sensor networks did not consider the optimization of the retransmission threshold, and they simply set the same retransmission threshold for all sensor nodes in advance. The method did not take link quality and delay requirement into account, which decreases the probability of a packet passing its delivery path within a given deadline. This paper investigates the problem of finding optimal retransmission thresholds for relay nodes along a delivery path in a sensor network. The object of optimizing retransmission thresholds is to maximize the summation of the probability of the packet being successfully delivered to the next relay node or destination node in time. A dynamic programming-based distributed algorithm for finding optimal retransmission thresholds for relay nodes along a delivery path in the sensor network is proposed. The time complexity is O n Δ · max 1 i n { u i } , where u i is the given upper bound of the retransmission threshold of sensor node i in a given delivery path, n is the length of the delivery path and Δ is the given upper bound of the transmission delay of the delivery path. If Δ is greater than the polynomial, to reduce the time complexity, a linear programming-based ( 1 + p m i n ) -approximation algorithm is proposed. Furthermore, when the ranges of the upper and lower bounds of retransmission thresholds are big enough, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is proposed. Experimental results show that the proposed algorithms have better performance.

1. Introduction

Wireless Sensor Networks (WSNs) have been increasingly deployed for a wide variety of real-time applications, such as industrial Internet-of-Things, emergency response, critical infrastructure monitoring and process measurement and control. In real-time applications, deadline misses in data transmission may bring about irreparable damage [1,2,3,4]. For mission-critical tasks, not only the packet delivery deadline should be met, but also the transmission reliability is supposed to be guaranteed. Therefore, providing reliable and timely data delivery in WSNs is crucial to the success of the mission.
In supporting mission critical-tasks, data delivery is required to be timely and reliable, but it is challenging for desirable Quality of Service (QoS). Due to the transmission uncertainties, wireless link dynamics and the queueing dynamics, wireless link qualities in sensor networks can vary at a wide range of timescales [5,6], which also results in node failures and connectivity varying over time [7]. In practical sensor networks, the sensor node may need multiple retransmissions for successfully forwarding a packet at each hop. A maximum number of retransmissions, i.e., retransmission threshold, is usually set for each node to prevent transmitting a packet over a bad link unlimitedly, and the packet will be eventually dropped by the sender after the maximum number of transmission retries. The success of a packet delivery is probabilistic, and thus, the WSNs are rendered unreliable.
QoS supported by the underlying networks aims to meet end users’ satisfaction with the services that the system provides [8]. The QoS provisioning in data delivery can be measured in the form of performance metrics, such as delay, packet loss rate and throughput. There exists a tradeoff among the QoS requirements, such as transmission reliability and deliver delay. Thus, the soft QoS supported can be accomplished, in which the soft QoS refers to achieving the QoS requirements with probability. Many efforts have been made to improve transmission reliability and deliver delay in WSNs, including quality measurement of forwarding data [5,9,10] and real-time routing protocol designing [11,12,13].
The main methodology applied in the existing works is to exploit a delivery path based on the QoS-aware forwarding quality metrics to improve the performance of packet transmission. However, there exist limited studies on the optimization of the retransmission threshold for each node in a delivery path, which imposes a significant effect on the probability of a packet being successfully transmitted within specified deadline. Most protocols set the same retransmission threshold for all sensor nodes in advance without considering the delay requirement and link quality, so that the delivery performance in terms of latency and reliability is decreased. We use an example inspired by the one in [14] to show the impact of retransmission threshold on the performance, illustrated in Figure 1.
The number associated with each link is the probability for a packet being successfully delivered to the next node through the link, denoted by p s u c , which means that on average, 1 / p s u c transmission trials are needed to successfully deliver a packet through the link. The integer variable A denotes the number of packets in the buffer waiting to be served. The delivery path for the first packet is S B C D 1 , and the path for the second packet is S E D 2 . We assume that one transmission takes 10 ms, and the deadline of delivering the first packet from node S to node D 1 is 90 ms. For delivering the packet to node D 1 before the deadline, the summation of transmission trials along the path must be no more than nine, that is the result of 90 ms divided by one transmission time of 10 ms. Traditional protocols set the same retransmission threshold for each relay node in advance. If the protocol is set by a high retransmission threshold, such as 29, in the CTPprotocol [15], without the consideration of delay requirement, thus the probability for successfully transmitting the first packet through the link S B can be significantly improved. However, this strategy may make the deadlines of both packets expire and consumes more system resource. If the maximum number of transmission trials is three for each node, in view of the summation of transmission trials, there are no more than nine. Then, the probability of the first packet passing the link S B is 1 0.9 3 = 0.271 . However, if the retransmission thresholds of the three nodes are set to 6, 0 and 0, that is the maximum numbers of transmission trials are 7, 1 and 1, then the probability is 1 0.9 6 = 0.927 . In terms of latency and reliability, there is a tradeoff in determining the retransmission threshold. Therefore, the retransmission threshold should be carefully chosen to achieve desirable QoS provisioning [9].
From the example above, it is obvious that the retransmission threshold has significant impact on the delivery performance in terms of delay and reliability. Few studies focus on the optimization of the retransmission threshold [5,14], and they have the following two major disadvantages. In the feedback control-based framework [5], a heuristic method for adjusting the transmission numbers is proposed, which does not provide the reliability guarantee. In our previous work [14], a greedy-based algorithm for finding optimal retransmission thresholds is proposed, which overlooks the impact of queue length on the forwarding quality. The aforementioned observation motivates us to investigate the problem of finding optimal retransmission thresholds in this paper. The problem is formalized as an integer optimization problem first. Then, a dynamic programming-based distributed algorithm for solving the problem is proposed. It can be run on a sensor node and enables the node to adaptively set the optimal retransmission threshold based on the link quality and the remaining time to deadline. Its time complexity is O n Δ · max 1 i n { u i } , where u i is the given upper bound of the retransmission threshold of sensor node i in a given delivery path and n is the length of the delivery path. The complexity depends on delivery delay Δ. If Δ is less than or equal to the polynomial, the complexity of the algorithm is polynomial. Otherwise, the algorithm is not efficient. In this case, a ( 1 + p m i n ) -approximation algorithm is provided based on the linear programming. Furthermore, when the ranges of the upper and lower bounds of the retransmission thresholds are big enough, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is developed. The main contributions of the paper are as follows.
  • The problem of finding optimal retransmission thresholds for each node along a delivery path is defined and is formalized as an integer optimization problem.
  • A Dynamic Programming-based Distributed Algorithm (DPDA) for solving the problem above is proposed; the correctness of the algorithm is proven; and its time and space complexity are analyzed, i.e., O n Δ · max 1 i n { u i } , and O n Δ · max 1 i n { u i } .
  • In case of the delivery delay Δ being greater than the polynomial, a Linear Programming-based ( 1 + p m i n ) -Approximation Algorithm (LPAA) is proposed.
  • Furthermore, in the case of the ranges of the upper and lower bounds of the retransmission thresholds being big enough, a Lagrange Multiplier-based Distributed Approximation Algorithm (LMDAA) with time complexity O ( 1 ) is proposed.
  • Simulation experiments are conducted to evaluate the proposed algorithms. Simulation results show that the proposed algorithms in the paper have better performance for real-time data delivery.
The rest of this paper is organized as follows. The related works on real-time data delivery are surveyed in Section 2. In Section 3, the problem is described. In Section 4, a dynamic programming-based distributed algorithm for finding optimal retransmission thresholds is provided. Section 5 gives a linear programming-based approximation algorithm, and the ratio bound is analyzed. In Section 6, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is proposed. Experimental results are illustrated in Section 7, and Section 8 concludes this paper.

2. Related Works

The real-time performance of packet delivery is a fundamental factor in sensor networks, and many efforts have been made to design efficient real-time routing protocols in WSNs. Most of the existing works addressed the following two challenges. First, it is essential to design the metric, which measures the forwarding quality, such as node forwarding quality [9], link quality [10], data aggregation [2] and energy efficiency [12]. Approximate aggregation for tracking quantiles and range countings is presented in [2], where a dynamic binary tree based deterministic tracking algorithm is proposed. Based on the actual number of data transmissions, link-Quality of Forwarding (QoF) and node-QoF metrics are proposed in [9]. A data-driven-based link quality prediction approach is provided in [10], which combines the packet reception ratio and the physical-layer information. Considering queuing delay, the Weighted End-to-End Delay (WEED) metric is introduced in [11]; the work focuses on selecting the path with the minimum expected end-to-end delay. In multi-hop wireless networks, the routing decision takes spatial reusability into account to improve the end-to-end throughput [16]. The authors in [17] utilize the expected available bandwidth to capture the logical intra-flow and inter-flow interference, and an isotonic metric of expected delay is proposed. Dependence among links was revealed recently. By exploiting the low correlated forwarding links, link-correlation Opportunistic Routing (OR) is given in [18]. Facing the uncertainties in wireless communication, the multi-timescale adaptation routing protocol is provided in [6], which can adapt to in situ delay conditions in routing delay.
To provide real-time packet delivery, QoS provisioning protocols and transmission scheduling protocols have also been extensively studied. The literature [13] studies geographic opportunistic routing protocol for multi-constrained QoS provisioning in WSNs, and the problem is formulated as a multi-objective multi-constraint optimization problem. By differentiating the priorities of user-level applications, the author in [19] develops an optimization tool for balancing the system resources and presents a cluster-based routing protocol. Under the constraints of delay and load balancing requirements, a centralized heuristic algorithm for selecting the path with minimal cost is provided in [20]. To separate the packet of different QoS requirements, a virtual hybrid potential field is introduced in [21]. Considering capacitated multicast routing problem, the work [22] provides the approximation algorithms for multicast k-path routing and multicast k-tree routing. By supporting slot rescheduling, the segmented slot assignment-based method for improving retransmission efficiency is proposed in [23]. Pan et al. [24] formulate joint routing and scheduling into an optimization problem and solve the problem with a column generation method. To route around the dead end relay node, the authors in [25] propose the cross-layer protocol, which integrates geographic routing with the contention-based MAC protocol. The author in [26] map the scheduling of data flow to multiprocessor scheduling and prove an upper bound of the end-to-end communication delay.
There exist limited studies on optimizing the retransmission threshold [5,14]. A distributed route maintenance framework is proposed in [5], which enables the link to adjust the retransmission number. However, the proposed heuristic method cannot provide the reliability guarantee theoretically. In our previous work [14], a greedy-based algorithm for finding optimal retransmission thresholds is proposed, which overlooks the impact of queue length on the forwarding quality. To overcome the shortage of the method, we investigate the problem of finding optimal retransmission thresholds in this paper.

3. Problem Description

In this section, the problem of finding optimal retransmission thresholds for each node along a delivery path is defined and is formalized as a general integer optimization problem. We prove that the problem is NP-hard.

3.1. Problem Definition

Suppose that the end-to-end path is P = j 1 , j 2 , , j n + 1 , where j 1 and j n + 1 are source and destination nodes and other j i ’s are relay nodes. There exist the following four attributes for each link j i j i + 1 .
  • transmission time t: This means that once transmission costs time, including encoding and wireless communication. Usually each sensor node takes the same time for once transmission.
  • transmission failure probability p i : p i denotes the transmission failure probability over the link j i j i + 1 . It means that p i is the probability of a transmission failure due to either collisions or bad channel quality when node j i forwards a packet to node j i + 1 .
  • retransmission threshold K i : This means that the maximum number of retransmission trials is K i . It is obvious that the maximum number of transmission retries is K i + 1 , and thus, the packet will be eventually dropped by the sender after the K i + 1 transmission retries. It can be known that 1 p i K i + 1 is the probability of a packet being successfully delivered to node j i + 1 .
  • retransmission threshold A i : Each hop delay consists of the transmission delay over the wireless link and the queuing delay in the buffer [9]. A i denotes the number of the packets queued at node j i , which means that there exist A i + 1 packets to be forwarded [6].
We define the metric of a given retransmission threshold as the probability of a packet being successfully delivered through the link. Existing works exploit multipath routing to guarantee both reliability and deliver delay in WSNs [13,27,28]. Similarly to [5,9], we aggregate the measure over a path based on the metric and aim at maximizing the summation of the probability of the packet delivered to the next relay node along the given path within the deadline. The path-metric estimates the given path forwarding quality, and it considers both transmission reliability and delay constraint.
The end-to-end delay over a path is the summation of the delays of all of the hops along the path. Let δ denote the delay constraint. Then, the problem of finding the optimal retransmission thresholds for each node can be formulated as the following integer optimization problem, where L i and U i are the given lower and upper bounds of the retransmission threshold of node i.
max i = 1 n 1 p i K i + 1 s . t . i = 1 n ( A i + 1 ) ( K i + 1 ) t δ L i K i U i , K i Z , i { 1 , 2 , , n }
Each hop delay consists of the transmission delay and the queuing delay in the buffer; thus, the maximum delay latency for each hop is ( A i + 1 ) ( K i + 1 ) t . The first inequality constraint means that the deliver delay of the last packet served at source node j 1 is no more than the deadline constraint δ. The second inequalities mean that the retransmission thresholds should be bounded in a given interval.
For the convenience of formalization and analysis, let Δ denote δ / t . For any i { 1 , 2 , , n } , let a i = A i + 1 , k i = K i + 1 , l i = L i + 1 and u i = U i + 1 ; then, the problem above is equivalent to the following integer optimization problem.
min i = 1 n p i k i s . t . i = 1 n a i k i Δ l i k i u i , k i Z , i { 1 , 2 , , n }

3.2. Computational Complexity Analysis

In this subsection, we construct a 0-1 Knapsack problem [29], and we prove that integer optimization Equation (2) is equivalent to the proposed 0-1 Knapsack problem. The computational complexity of the 0-1 Knapsack problem is NP-hard [29]; thus the hardness of the problem for calculating optimal retransmission thresholds is NP-hard.
Let S i , j denote p i l i + j p i l i + j 1 , where j { 1 , 2 , , u i l i } . It can be known that p i l i + j = k = 1 j S i , k + p i l i . Thus, we can formulate a 0-1 Knapsack problem as follows.
min i = 1 n j = 1 u i l i C i , j S i , j + p i l i s . t . i = 1 n j = 1 u i l i a i C i , j + i = 1 n a i l i Δ C i , j { 0 , 1 } , i { 1 , 2 , , n } , j { 1 , , u i l i }
Lemma 1. 
For i { 1 , , n } , the following inequalities hold if 0 < p i < 1 and l i < u i ,
p i l i + j p i l i + j 1 < p i l i + j + 1 p i l i + j < 0
where j { 1 , , u i l i } .
Proof. 
Let g i ( x ) = p i x . For any i { 1 , , n } , it is obvious that g i ( x ) is a monotone decreasing function; thus, p i l i + j + 1 p i l i + j < 0 . Obviously, p i ( p i l i + j p i l i + j 1 ) = ( p i l i + j + 1 p i l i + j ) . Since 0 < p i < 1 and p i l i + j + 1 p i l i + j < 0 , we have p i l i + j p i l i + j 1 < p i l i + j + 1 p i l i + j . In conclusion, p i l i + j p i l i + j 1 < p i l i + j + 1 p i l i + j < 0 . ☐
Lemma 2. 
If C 1 , 1 * , C 1 , 2 * , , C 1 , u 1 l 1 * , C 2 , 1 * , , C n , u n l n * are the optimal solutions to Equation (3), then there exist j 1 , , j n , such that:
C i , k * = 1 k j i 0 k > j i
where i { 1 , 2 , , n } , k { 1 , , u i l i } , j i { 0 , 1 , , u i l i } .
Proof. 
The proof is by contradiction. Suppose that C 1 , 1 * , C 1 , 2 * , , C 1 , u 1 l 1 * , C 2 , 1 * , , C n , u n l n * are the optimal solutions to Equation (3) and that they enable the objective function value to achieve the minimum. For given m, if there is no integer in { 0 , 1 , , u m l m } such that Equation (5) are true, then there must exist integers r , t , q { 1 , , u m l m } such that C m , r * = 1 , C m , t * = 0 , C m , q * = 1 and r < t < q . We can construct a solution, whose objective function values are less than that of C 1 , 1 * , , C n , u n l n * , by exchanging C m , t * and C m , q * . Suppose that C 1 , 1 , C 1 , 2 , , C n , u n l n are derived by merely exchanging C m , t * and C m , q * .
Firstly, we prove that C 1 , 1 , C 1 , 2 , , C n , u n l n are feasible solutions of Equation (3). For any i { 1 , 2 , , n } and j { 1 , , u i l i } , C i , j * and C i , j are 0 , 1 variables. It is obvious that j = 1 u m l m a m C m , j * = j = 1 u m l m a m C m , j . According to the construction of the solution, C i , j * and C i , j are identical correspondingly, except for C m , t * and C m , q * . Since i = 1 n j = 1 u i l i a i C i , j * + i = 1 n a i l i Δ , we have i = 1 n j = 1 u i l i a i C i , j + i = 1 n a i l i Δ . Thus, C 1 , 1 , C 1 , 2 , , C n , u n l n are feasible solutions.
Let ε = i = 1 n j = 1 u i l i C i , j * S i , j + p i l i i = 1 n j = 1 u i l i C i , j S i , j + p i l i be the difference between the values of the two objective functions. It is easily derived that ε = j = 1 u m l m C m , j * S m , j j = 1 u m l m C m , j S m , j = S m , q S m , t . From Lemma 1, we know ε > 0 . Then, C 1 , 1 , , C n , u n l n are more optimal solutions, and it contradicts the fact that C 1 , 1 * , , C n , u n l n * are the optimal solutions. ☐
Theorem 3. 
Suppose that C 1 , 1 * , , C n , u n l n * are the optimal solutions to Equation (3). For any i { 1 , 2 , , n } , let k i * = j = 1 u i l i C i , j * + l i . Then, k 1 * , , k n * are the optimal solutions to Equation (2), and the values of the two objective functions are identical.
Proof. 
Suppose that k 1 , , k n are the optimal solutions of Equation (2), then we can construct feasible solutions C 1 , 1 , , C n , u n l n to Equation (3) as following, where i { 1 , 2 , , n } , j { 1 , , u i l i } .
C i , j = 1 j k i l i 0 j > k i l
It can be known that i = 1 n j = 1 u i l i a i C i , j + i = 1 n a i l i = i = 1 n j = 1 k i l i a i C i , j + i = 1 n a i l i = i = 1 n a i ( k i l i ) + i = 1 n a i l i = i = 1 n a i k i . Since i = 1 n a i k i Δ , C 1 , 1 , , C n , u n l n are the feasible solutions to Equation (3). Based on the definition of S i , j , it can be derived that i = 1 n p i l i + k i l i = i = 1 n j = 1 k i l i S i , j + p i l i = i = 1 n j = 1 k i l i C i , j S i , j + p i l i = i = 1 n j = 1 u i l i C i , j S i , j + p i l i . Thus, the following inequality can be derived.
min i = 1 n p i k i = i = 1 n p i k i = i = 1 n j = 1 u i l i C i , j S i , j + p i l i min i = 1 n j = 1 u i l i C i , j S i , j + p i l i
Therefore, the objective function value of Equation (3) is a lower bound of that of Equation (2).
Since C 1 , 1 * , , C n , u n l n * are the optimal solutions of Equation (3), there exist j 1 , , j n , such that Equation (5) hold according to Lemma 2. For any i, j = 1 u i l i C i , j * = j = 1 j i C i , j * = j i from Equation (5), then j = 1 u i l i C i , j * S i , j + p i l i = j = 1 j i S i , j + p i l i = p i l i + j i . Since k i * = j = 1 u i l i C i , j * + l i = j i + l i , we have i = 1 n j = 1 u i l i a i C i , j * + i = 1 n a i l i = i = 1 n j = 1 j i a i C i , j * + i = 1 n a i l i = i = 1 n a i j i + i = 1 n a i l i = i = 1 n a i ( l i + j i ) = i = 1 n a i k i * . Since C 1 , 1 * , , C n , u n l n * satisfy all of the constraints of Equation (3), i = 1 n a i k i * Δ . For any i, it is obvious that 0 j i u i l i . Thus, k 1 * , , k n * are the feasible solutions of Equation (2), and hence:
min i = 1 n j = 1 u i l i C i , j S i , j + p i l i = i = 1 n j = 1 u i l i C i , j * S i , j + p i l i = i = 1 n p i k i * min i = 1 n p i k i
Thus, the objective function value of Equation (2) is a lower bound of that of Equation (3). Based on the analysis above, we can conclude that k 1 * , , k n * are the optimal solutions of Equation (2); the values of the two objective functions are identical. ☐
Corollary 4. 
The hardness of integer optimization Equation (2) is NP-hard. That is, finding optimal retransmission thresholds for each node in a delivery path is NP-hard.
Proof. 
Based on Theorem 3, the hardness of Equation (2) is identical to 0-1 programming Equation (3), which is equivalent to the Knapsack problem. Since the Knapsack problem is NP-hard [29], the hardness of integer optimization Equation (2) is NP-hard. ☐

4. Dynamic Programming-Based Distributed Algorithm for Optimal Retransmission Thresholds

As analyzed in Section 3.2, the problem of finding optimal retransmission thresholds is equivalent to the 0-1 Knapsack Problem. Thus, it can be solved by a dynamic programming-based pseudo-polynomial time algorithm [29]. In this section, we first prove the correctness of the dynamic programming-based algorithm, which can output the optimal resolutions to Equation (3). We design a dynamic programming-based algorithm to solve the proposed 0-1 Knapsack Problem, and then, according to Theorem 3, the optimal retransmission thresholds can be derived based on the resolutions to Equation (3).
Theorem 5. 
If C 1 , 1 , C 1 , 2 , , C n , u n l n are the optimal solutions to Equation (3), then C 1 , 2 , , C n , u n l n are the optimal solutions to the following problem.
min i = 2 n j = 1 u i l i C i , j S i , j + p i l i + j = 2 u 1 l 1 C 1 , j S 1 , j + p 1 l 1 s . t . i = 2 n j = 1 u i l i a i C i , j + j = 2 u 1 l 1 a 1 C 1 , j + i = 1 n a i l i Δ a 1 C 1 , 1 C i , j { 0 , 1 } , j { 1 , , u i l i } , i { 1 , 2 , , n }
Proof. 
The proof is by contradiction. If C 1 , 2 , , C n , u n l n are not optimal solutions to Equation (8), suppose that Z 1 , 2 , , Z n , u n l n are the optimal solutions of Equation (8). Then, C 1 , 1 , Z 1 , 2 , , Z n , u n l n are batter solutions of Equation (3), which leads to a contradiction. The proof demonstrates the correctness of the dynamic programming-based algorithm. ☐
To briefly describe the recursive procedure, based on Lemma 2, the following mappings are introduced,
f : N × N N , f ( i , j ) = m = 0 i 1 ( u m l m ) + j g : N N , g ( h ) = min i | h m = 0 i ( u m l m ) 0 , i 1
where u 0 = l 0 = 0 . Let C i , j = C f ( i , j ) , S i , j = S f ( i , j ) and s u m = m = 1 n ( u m l m ) , then Equation (3) is equivalent to the following knapsack problem.
min h = 1 s u m C h S h + i = 1 n p i l i s . t . h = 1 s u m a g ( h ) C h + i = 1 n a i l i Δ C h { 0 , 1 } , h { 1 , 2 , , s u m }
When the object set is { S h , S h + 1 , , S s u m } and the capacity is bounded by j, we use m ( h , j ) to express the minimum cost. Then, we derive the recursive equation of m ( h , j ) .
m ( h , j ) = m ( h + 1 , j ) , 0 j h = 1 n a h l h < a g ( h ) min m ( h + 1 , j ) , m ( h + 1 , j a g ( h ) ) + S h , j h = 1 n a h l h a g ( h )
Additionally, the initial conditions are as follows.
m ( s u m , j ) = 0 0 j h = 1 n a h l h < a n S s u m j h = 1 n a h l h a n
Suppose that node j i needs to forward a packet with delivery delay Δ and that the end-to-end path is j i , j i + 1 , , j n . Since the packet is the first one queued at node j i , a i = 1 . Therefore, finding the optimal retransmission threshold k i for the packet over link from j i to j i + 1 is equivalent to solving the following integer optimization problem.
min v = i n p v k v s . t . v = i + 1 n a v k v + k i Δ l v k v u v , k v Z , v { i , i + 1 , , n }
According to Theorem 3, the above Equation (10) is equivalent to the following knapsack Equation (11).
min h = u i 1 l i 1 + 1 s u m C h S h + v = i n p v l v s . t . h = u i 1 l i 1 + 1 s u m a g ( h ) C h + v = i n a v l v Δ C h { 0 , 1 } , h { u i 1 l i 1 + 1 , , s u m }
Based on the above analysis, knapsack Equation (11) is a special instance of Equation (9), where the `object’ set is { S u i 1 l i 1 + 1 , , S s u m } and the `capacity’ is bounded by Δ . Suppose C u i 1 l i 1 + 1 , . , C s u m are the optimal solutions of Equation (11), then h = u i 1 l i 1 + 1 u i l i C h is the optimal retransmission threshold of node j i . The message exchanges among network nodes are enhanced to carry necessary information of link quality and queue length [6,11], so that each node can independently calculate the optimal retransmission threshold based on the path forwarding quality and the remaining time to deadline. Such a property enables the node to adaptively set the optimal retransmission threshold in a scalable manner. The proposed dynamic-based distributed algorithm for the optimal retransmission threshold is described in Algorithm 1.
We present the analysis for the computational complexity of Algorithm 1. The recurrence process of the algorithm yields the time computation of Δ h = i n a i l i · h = i n u i l i . Thus, the time complexity of the proposed distributed algorithm is O n Δ · max 1 i n { u i } . Space complexity can be similarly analyzed, that is O n Δ · max 1 i n { u i } .

5. Linear Programming-Based Approximation Algorithm

The dynamic programming-based algorithm proposed in Section 4 is not efficient, if Δ is greater than the polynomial function with respect to n. In this section, we construct a linear programming problem and prove that the solution of the proposed problem can be used to construct the approximate solution of integer optimization Equation (2). Additionally, then, a linear programming-based ( 1 + p m i n ) -approximation algorithm is provided.

5.1. Mathematical Foundations

According to p i , l i and u i , piecewise linear function f i ( z ) is defined as follows, where h { 0 , 1 , , u i l i 1 } . We use an example to illustrate the defined function, as depicted in Figure 2.
f i ( z ) = ( z l i h ) ( p i l i + h + 1 p i l i + h ) + p i l i + h , z ( l i + h , l i + h + 1 ) p i z , z { l i , l i + 1 , , u i }
Lemma 6. 
For any i { 1 , 2 , , n } , f i ( z ) is a convex function.
Algorithm 1: Dynamic Programming-based Distributed Algorithm for the optimal retransmission threshold (DPDA).
Sensors 16 00665 i001
Proof. 
For any i, since f i ( z ) is a piecewise linear function, f i ( z ) = 0 , where z ( l i + h , l i + h + 1 ) and h { 0 , 1 , , u i l i 1 } . Thus, f i ( z ) satisfies the sufficient condition of convexity function if z ( l i + h , l i + h + 1 ) . Now, we prove that f i ( z ) is a convex function if z { l i , l i + 1 , , u i } .
Suppose that z = h = 1 n λ h z h , where z { l i , l i + 1 , , u i } , λ 1 , , λ n [ 0 , 1 ] , z 1 , , z n [ l i , u i ] and h = 1 n λ h = 1 . Since ( p i x ) > 0 , p i x is a convex function. Thus, p i z h = 1 n λ h p i z h . For any z h , there must exist j h { 0 , 1 , , u i l i 1 } , such that z h [ l i + j h , l i + j h + 1 ] .
From the definition of f i ( z ) , f i ( z h ) = ( z h l i j h ) ( p i l i + j h + 1 p i l i + j h ) + p i l i + j h . Let b i , z h = 1 + l i + j h z h , b i , z h = z h l i j h , we have f i ( z h ) = b i , z h p i l i + j h + b i , z h p i l i + j h + 1 , b i , z h , b i , z h [ 0 , 1 ] and b i , z h + b i , z h = 1 . Since z h = b i , z h ( l i + j h ) + b i , z h ( l i + j h + 1 ) , then p i z h f i ( z h ) according to the convexity of p i x . Based on the above analysis, it can be derived that p i z h = 1 n λ h p i z h h = 1 n λ h f i ( z h ) . In conclusion, for any i { 1 , 2 , , n } , f i ( z ) is a convex function. ☐
According to the constraints of Equation (2), a general optimization problem can be formulated as follows.
min i = 1 n f i ( z i ) s . t . i = 1 n a i z i Δ l i z i u i , , i { 1 , 2 , , n }
Theorem 7. 
The objective function value of Equation (12) is a lower bound of that of Equation (2), which implies that a feasible solution can be derived based on the optimal resolutions of Equation (12).
Proof. 
Suppose that k 1 , k 2 , , k n are the optimal solutions to Equation (2). For any i { 1 , 2 , , n } , let x i = k i . Thus, x 1 , x 2 , , x n are feasible solutions to Equation (12), and hence:
min i = 1 n p i k i = i = 1 n p i k i = i = 1 n f i ( x i ) min i = 1 n f i ( z i )
Therefore, the objective function value of Equation (12) is a lower bound of that of Equation (2). ☐
Theorem 8. 
The proposed optimization Equation (12) is equivalent to the following linear programming problem, and then, the general optimization Equation (12) can be solved by the linear programming technique.
min i = 1 n j = 0 u i l i λ i , j p i l i + j s . t . i = 1 n a i j = 0 u i l i λ i , j ( l i + j ) Δ j = 0 u i l i λ i , j = 1 , 0 λ i , j 1 , j { 0 , , u i l i } , i { 1 , 2 , , n }
Proof. 
For any i { 1 , 2 , , n } , we have l i j = 0 u i l i λ i , j ( l i + j ) u i . It is easily known that for any z i [ l i , u i ] , there exist λ i , 0 , , λ i , u i l i [ 0 , 1 ] , such that z i = j = 0 u i l i λ i , j ( l i + j ) and j = 0 u i l i λ i , j = 1 . Additionally, similarly for any λ i , 0 , , λ i , u i l i [ 0 , 1 ] , if j = 0 u i l i λ i , j = 1 , there must exist z i [ l i , u i ] , such that z i = j = 0 u i l i λ i , j ( l i + j ) .
Suppose that λ 1 , 0 , λ 1 , 1 , , λ 2 , 0 , , λ n , u n l n are feasible solutions of Equation (13). For any i { 1 , 2 , , n } , let z i = j = 0 u i l i λ i , j ( l i + j ) . Thus, z 1 , , z n are feasible solutions of Equation (12). According to the convexity of f i ( z ) , we have f i ( z i ) j = 0 u i l i λ i , j f i ( l i + j ) = j = 0 u i l i λ i , j p i l i + j , and hence:
min i = 1 n f i ( z i ) min i = 1 n j = 0 u i l i λ i , j p i l i + j
Suppose that z 1 , . , z n are the optimal solutions to Equation (12); there must exist n integers j 1 , . , j n , such that z i [ l i + j i , l i + j i + 1 ] . For any i { 1 , 2 , , n } , let λ i , j i = 1 + l i + j i z i , λ i , j i + 1 = z i l i j i , and the others λ i , j s are zero. Obviously, λ 1 , 0 , λ 1 , 1 , , λ n , u n l n are feasible solutions of Equation (13). Based on the definition of f i ( x ) , f i ( z i ) = ( z i l i j i ) ( p i l i + j i + 1 p i l i + j i ) + p i l i + j i = λ i , j i p i l i + j i + λ i , j i + 1 p i l i + j i + 1 = j = 0 u i l i λ i , j p i l i + j . Thus, we can have the following formula.
min i = 1 n j = 0 u i l i λ i , j p i l i + j i = 1 n j = 0 u i l i λ i , j p i l i + j = i = 1 n f i ( z i ) = min i = 1 n f i ( z i )
In conclusion, optimization Equation (12) is equivalent to linear programming Equation (13). ☐

5.2. Linear Programming-Based Approximation Algorithm

Suppose that λ 1 , 0 , λ 1 , 1 , , λ n , u n l n are the optimal solutions to Equation (13). For any i { 1 , 2 , , n } , let z i = j = 0 u i l i λ i , j ( l i + j ) . Thus, z 1 , z 2 , , z n are the optimal solutions to Equation (12) according to the proof of Theorem 8. To obtain the feasible solutions of integer optimization Equation (2), rounding optimal fractional solutions is a natural idea [29]. The following theorem guarantees that the ratio bound of the rounding approach is 1 + p m i n , where p m i n is the minimum of the probabilities of one transmission failure along the given end-to-end path.
Theorem 9. 
For any i { 1 , 2 , , n } , the ratio bound of the rounding approach is 1 + p min , if z i ln p min ln p i , where p min = min { p 1 , p 2 , , p n } .
Proof. 
Suppose that z 1 , z 2 , , z n are the optimal solutions to Equation (12), which are derived from the optimal solutions of linear programming Equation (13). Denote k 1 , k 2 , , k n as the optimal solutions to Equation (1). From Theorem 7, the approximation ratio r satisfies the following formula.
r = i = 1 n 1 p i k i i = 1 n 1 p i z i = n i = 1 n p i k i n i = 1 n p i z i n i = 1 n f i ( z i ) n i = 1 n p i z i
According to the proof of Theorem 8, for any i { 1 , 2 , , n } , there must exist integer j i in { 0 , 1 , , u i l i 1 } , such that z i [ l i + j i , l i + j i + 1 ] . Based on the convexity of p i x , we know that:
f i ( z i ) = ( 1 + l i + h z i ) p i l i + h + ( z i l i h ) p i l i + h + 1 p i z i
Let p min = min { p 1 , p 2 , . . , p n } ; we have:
n i = 1 n f i ( z i ) n i = 1 n p i z i < n i = 1 n p i z i + 1 n p min i = 1 n p i z i
Additionally, then, the approximation ratio r satisfies the following formula:
r < n p min i = 1 n p i z i n i = 1 n p i z i = n n p min + n p min p min i = 1 n p i z i n i = 1 n p i z i = n n p min + p min n i = 1 n p i z i n i = 1 n p i z i = n i = 1 n p min n i = 1 n p i z i + p min
For any i { 1 , 2 , , n } , since z i ln p min ln p i , p i z i p min and n i = 1 n p min n i = 1 n p i z i < 1 . In conclusion, the ratio bound is 1 + p min . ☐
The link properties vary as a result of environmental conditions changing at a longer timescale [6,15], then the difference of failure transmission probability among links is little. Thus, the premises of Theorem 9 are always satisfied in practical sensor networks. Since the objective function value of Equation (12) is decreasing with respect to z i , its optimum value can be achieved if and only if i = 1 n a i z i = Δ . For a general linear programming problem, finding optimal solutions incurs high computational overhead. However, it can be efficiently solved if the problem is to optimize a linear function subject to linear equality constraints [30].
The linear programming-based distributed approximation algorithm running at each sensor node is described in Algorithm 2, which is derived from the convex programming algorithm in [30]. f h L ( x ) and f h R ( x ) are the left and right derivative of f h ( x ) , respectively. The proposed algorithm in [30] can yield optimal solutions for the piecewise linear convex function. For any i { 1 , 2 , , n } , the derivative of f i ( x ) is discontinuous and constant. According to the proposed algorithm [30], the termination condition can be satisfied when the optimal retransmission threshold is not L i or U i . The maximum number for iteration rounds can be assigned in advance. The algorithm can also be stopped if the convergence condition is not achieved. Therefore, figuring out the retransmission threshold of node j i can be achieved.

6. Lagrange Multiplier-Based Distributed O(1)-Approximation Algorithm

In practical sensor networks, the optimal retransmission thresholds hardly hit the given upper or lower bounds. Therefore, we aim at finding the optimal retransmission thresholds when the ranges of the upper and lower bounds of the retransmission thresholds are big enough. In Section 6.1, we formalize the problem as an integer optimization problem and provide a mathematical method for finding the approximate solution of the problem. Then, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is provided.

6.1. Mathematical Foundations

Compared to integer optimization Equation (1), the problem of optimal retransmission thresholds in the case that the ranges of the upper and lower bounds of retransmission thresholds are big enough can be formulated as follows, which implies that the optimization problem has no interval constraints of retransmission thresholds.
Algorithm 2: Linear Programming-Based distributed Approximation Algorithm for the retransmission threshold (LPAA).
Sensors 16 00665 i002
 According to the convex programming algorithm [30], adjust xi1 and xt;
max i = 1 n 1 p i k i s . t . i = 1 n a i k i Δ k i Z + , i { 1 , 2 , , n }
The following lemma provides a mathematical method to figure out the optimal solutions of Equation (18) in the real number field; that is for any i, k i is a real number. Lemma 10 is the foundation for the rounding technique.
Lemma 10. 
Let Λ = i = 1 n 1 p i x i + ω i = 1 n a i x i Δ . If there exist x 1 , x 2 , , x n , such that for any i { 1 , 2 , , n } , the following equations hold:
Λ x i = 0
then x 1 , , x n are the optimal solutions to the following problem.
max i = 1 n 1 p i x i s . t . i = 1 n a i x i Δ x i R , i { 1 , 2 , , n }
Proof. 
For any i { 1 , 2 , , n } , p i x is a decreasing function. By contradiction, it is easily proven that the objective function achieves the maximum if and only if i = 1 n a i x i = Δ . Since x 1 , x 2 , , x n are real numbers and the only constraint is equality, then we can derive the optimal solutions by the Lagrange multiplier method. We integrate the objective function and the constraint multiplied by ω to the following Lagrange function:
Λ ( x 1 , x 2 , , x n , ω ) = i = 1 n 1 p i x i + ω i = 1 n a i x i Δ
Since i = 1 n a i x i Δ = 0 , Λ ( x 1 , , x n , ω ) is a function with respect to x 1 , , x n . The gradients on x 1 , , x n and ω are as follows:
Λ x 1 = p 1 x 1 ln ( p 1 ) + ω a 1 Λ x i = p i x i ln ( p i ) + ω a i Λ x n = p n x n ln ( p n ) + ω a n Λ ω = i = 1 n a i x i Δ
For any i { 1 , 2 , , n } and j { 1 , 2 , , n } , we have 2 Λ x i x j = 0 if i j . For any i { 1 , 2 , , n } , it is easily derived that 2 Λ 2 x i = p i x i ln 2 ( p i ) . The Hessian matrix of Λ ( x 1 , x 2 , , x n ) is as follows.
2 Λ x i x j = p 1 x 1 ln 2 ( p 1 ) 0 0 0 0 0 p i x i ln 2 ( p i ) 0 0 0 0 p n x n ln 2 ( p n )
Then, the following equalities can be easily derived.
λ E 2 Λ ( x 1 , x 2 , , x n ) x i x j = λ + p 1 x 1 ln 2 ( p 1 ) 0 0 0 0 0 λ + p i x i ln 2 ( p i ) 0 0 0 0 λ + p n x n ln 2 ( p n ) λ E 2 Λ ( x 1 , x 2 , , x n ) x i x j = i = 1 n λ + p i x i ln 2 ( p i )
Since all of the eigenvalues of 2 Λ ( x 1 , , x n ) x i x j are negative, the Hessian matrix of Λ ( x 1 , , x n ) is negative definite. In conclusion, if there exist x 1 , , x n , such that for any i { 1 , 2 , , n } , Λ x i = 0 , then x 1 , , x n are the optimal solutions to Equation (19). ☐
Theorem 11. 
x 1 , , x n are the optimal solutions to Equation (19), if for any i { 1 , 2 , , n } , x i satisfies Equation (21).
x i = Δ i = 1 n a i log p i a i ( ln p i ) 1 ln p i i = 1 n a i ( ln p i ) 1 + log p i a i ( ln p i ) 1
Proof. 
According to the proof of Lemma 10, if x 1 , , x n are the solutions of Equation (20), then they are the optimal solutions to Equation (19). If Λ x i = 0 , we have p i x i ln ( p i ) = ω a i . For any i { 1 , 2 , , n } , since a i > 0 , 0 < p i < 1 and ω < 0 , we have that:
x i = log p i ω a i ( ln p i ) 1 = log p i ω + log p i a i ( ln p i ) 1
Since Λ ω = i = 1 n a i x i Δ = 0 , it is easily derived that:
i = 1 n a i log p i ω + log p i a i ( ln p i ) 1 = Δ
By simple calculation, we can get the following equations:
i = 1 n a i ln ω ln p i + i = 1 n a i log p i a i ( ln p i ) 1 = Δ
ln ω = Δ i = 1 n a i log p i a i ( ln p i ) 1 i = 1 n a i ( ln p i ) 1
In conclusion, x 1 , , x n are the optimal solutions to Equation (19), if for any i { 1 , 2 , , n } , x i satisfies Equation (21). ☐
It is obvious that log p i a i ( ln p i ) 1 = ln a i + ln ( ln p i ) 1 ln p i ; the following equation can be derived.
x i = Δ i = 1 n a i ln a i + ln ( ln p i ) 1 ln p i ln p i i = 1 n a i ( ln p i ) 1 + ln a i + ln ( ln p i ) 1 ln p i

6.2. Lagrange Multiplier-Based Distributed O(1)-Approximation Algorithm

The computation of the logarithm is undesired to execute on the sensor node; the log values needed can be stored on the sensor node in advance. For example, three arrays a [ 99 ] , b [ 99 ] and c [ 99 ] are forwarded to the sensor node at first, where a [ h ] = ln h , b [ h ] = ln ( 0 . 01 h ) , c [ h ] = ln ( ln 0 . 01 h ) 1 and h { 1 , 2 , , 99 } . Then, the log values needed by Equation (22) are stored in the sensor node. The proposed Lagrange multiplier-based distributed approximation algorithm is described in Algorithm 3. It is easily known that the computation cost is O ( n ) , where n is the number of hops from the source node to the destination node. Since the number of sensor nodes along the given end-to-end delivery path is no more than a few dozen, hence the computation complexity of the algorithm is O ( 1 ) .
Algorithm 3: Lagrange Multiplier-based Distributed Approximation Algorithm for the retransmission threshold (LMDAA).
Sensors 16 00665 i003
Similarly to the linear programming-based approximation algorithm, approximate solutions to integer optimization Equation (18) can be derived by rounding the optimal fractional solutions. The following theorem guarantees that the ratio bound of the rounding approach is 1 + p m i n . Due to 0 < p m i n < 1 , the ratio bound of the Lagrange multiplier-based approximation algorithm is two.
Theorem 12. 
Suppose that x 1 , x 2 , , x n are the optimal solutions to Equation (19), then x 1 , , x n are the feasible solutions to Equation (18). The ratio bound is 1 + p m i n , if for any i { 1 , 2 , , n } , x i ln p min ln p i , where p min = min { p 1 , p 2 , , p n } .
Proof. 
Since x 1 , x 2 , , x n are the optimal solutions to Equation (19), i = 1 n a i x i = Δ , and hence, i = 1 n a i x i Δ . Thus, x 1 , , x n are the feasible solutions to Equation (18). Suppose that k 1 , k 2 , , k n are the optimal solutions to Equation (18). Obviously, the objective function value of Equation (19) is an upper bound of that of Equation (18). Thus, the following inequalities can be derived.
i = 1 n 1 p i k i i = 1 n 1 p i x i < i = 1 n 1 p i x i + 1
Let p min = min { p 1 , p 2 , , p n } . Thus, i = 1 n 1 p i k i < i = 1 n 1 p min p i x i , and hence, the approximation ratio r satisfies the following equation:
r = i = 1 n 1 p i k i i = 1 n 1 p i x i < i = 1 n 1 p min p i x i i = 1 n 1 p i x i = n n p min n i = 1 n p i x i + p min
In conclusion, the ratio bound is 1 + p m i n , if for any i { 1 , 2 , , n } , x i ln p min ln p i . Similarly, we know that the premises of Theorem 12 are easily satisfied in practical sensor networks. ☐

7. Experiment Evaluation

The effectiveness and efficiency of the proposed algorithms are evaluated through simulations in this section. Several experiments are conducted to demonstrate the relationships between the performance of real-time data delivery and the input parameter, such as deadline, the number of hops of the given delivery path and the number of packets queued at the relay node. The first two group of simulations are carried out by MATLAB, and the third group is implemented with NS2.
One hundred sensor nodes and the sink are randomly deployed into a region of size 200 m × 200 m (m for meters), and we assume that the sensors have the same transmission radius. In each simulation, source and destination nodes are randomly selected. Each simulation is repeated 100 times and the simulation result corresponds to the average value over 100 times. To understand the benefits of the proposed algorithms, the comparison with the general method is conducted. The main idea of the general method is that we set the same retransmission threshold for all of the sensor nodes.
The first group of experiments is to investigate the Deadline Success Ratio (DSR) of the proposed algorithms, where DSR is the ratio of the packets delivered to the destination before their deadlines. Figure 3a shows the relationship between the deadlines and DSRs. The proposed algorithms have better performance. For example, when the deadline is 0.22 s, the DSRs of LMDAA and general method are 74% and 61%, respectively. Furthermore, we investigate the impact of the number of hops of a delivery path on the DSR. The remaining time to the deadline and link quality have been considered; thus, our algorithms can achieve higher deadline success ratios as shown in Figure 3b. Figure 3c depicts the relationship between the average number of packets queued at relay nodes and DSRs. From Figure 3c, the DSR becomes worse with the increase of the packets queued on the condition that the deadline is a constant. LMDAA is a distributed algorithm and enables the node to adaptively set the optimal retransmission threshold based on the link quality and the remaining time to the deadline. Therefore, LMDAA has better performance in terms of DSR than that of LPAA.
The second group of experiments is to investigate the Real-Time Ratio (RTR) of the proposed algorithms, where RTR is the ratio of the packets delivered to the destination before their deadlines among the packets successfully delivered to the destination node. Figure 4a shows the relationship between the deadlines and RTRs. As expected, the proposed algorithms can reach higher RTR than that of the general method. Figure 4b depicts the relationship between the number of hops of a delivery path and RTRs. The figure shows that our algorithms have better performance. For example, the real-time ratio of LPAA is more than 60%. Similarly, we investigate the impact of the average number of packets queued at relay nodes on RTR, with results illustrated in Figure 4c. Experimental results show that the proposed algorithms can reduce the deliveries of the packets, which cannot meet their deadlines. Therefore, our algorithms can improve the real-time ratio and energy efficiency.
The third group of simulations is implemented with NS2, which is a widely-used simulation tool in wireless sensor networks. From the experimental results of the first two groups of simulations, LMDAA can reveal the effectiveness of the proposed algorithms more neutrally, then we compare the results of LMDAA and the general method. The reasons why DSRs in the simulations implemented by NS2 are lower than those in case of MATLAB are as follows. For identical transmission failure probability, the link quality in NS2 simulation is much worse, which leads to a lower packet delivery ratio. Secondly, we have to set stationary retransmission thresholds in advance in NS2 simulations, and the retransmission thresholds cannot be adaptively set based on the link quality and remaining time during the packet delivery. As shown in Figure 5a–c, the proposed algorithm has better performance in real-time data delivery, in the case of worse wireless links or a severe delivery delay requirement.
The forth group of experiments is to investigate the computing performance of LPAA and LMDAA, and the correctness of the approximation ratio is verified. We prove that the objective function value of Equation (12) is a lower bound of that of Equation (2), then i = 1 n 1 f i ( z i ) generated by the optimal solution of Equation (12) is an upper bound of Equation (1). In the experiments, the Approximation Ratio (AR) is the ratio of i = 1 n 1 f i ( z i ) generated by the optimal solutions of linear programming Equation (13) to that of the approximated solutions output by LPAA and LMDAA. Figure 6a–c demonstrates the relationships between the approximation ratio and the input parameter. Experimental results show that the objective function value of the approximation results returned by LPAA and LMDAA is very close to that of the optimal ones. Additionally, the proposed approximation algorithms can achieve high accuracy in terms of optimal retransmission thresholds.

8. Conclusions

The retransmission threshold in wireless sensor networks is critical to the latency of data transmitting in the networks. The problem of finding optimal retransmission thresholds for each node along a delivery path is defined and is formalized as an integer optimization problem. A dynamic programming-based distributed algorithm for finding the optimal retransmission threshold is proposed. The correctness of the algorithm is proven, and its time and space complexity are analyzed. When the delivery delay Δ is greater than polynomial, a linear programming-based ( 1 + p m i n ) -approximation algorithm is proposed. Furthermore, in the case of the ranges of the upper and lower bounds of the retransmission thresholds being big enough, a Lagrange multiplier-based distributed O ( 1 ) -approximation algorithm with time complexity O ( 1 ) is proposed. Simulation results show that the proposed algorithms have better performance for real-time data delivery.

Acknowledgments

This work is supported in part by the National Natural Science Foundation of China (61572104, 61402076), the Startup Fund for the Doctoral Program of Liaoning Province (20141023), the Fundamental Research Funds for the Central Universities (DUT15RC(3)088, DUT15QY26) and the open project of the key laboratory of symbolic computation and knowledge engineering in Jilin University (93K172016K11).

Author Contributions

Ran Bi provided the proof of the theorems and designed the algorithms. Yingshu Li supported the theory background and revised the paper. Liang Sun designed the simulations and analyzed the data. Guozhen Tan supported and supervised the research. All of the authors participated in the project, and they read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cheng, S.; Cai, Z.; Li, J. Curve Query Processing in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2015, 64, 5198–5209. [Google Scholar] [CrossRef]
  2. He, Z.; Cai, Z.; Cheng, S.; Wang, X. Approximate aggregation for tracking quantiles and range countings in wireless sensor networks. Theor. Comput. Sci. 2015, 607, 381–390. [Google Scholar] [CrossRef]
  3. Cai, Z.; Chen, Z.; Lin, G. A 3.4713-approximation algorithm for the capacitated multicast tree routing problem. Theor. Comput. Sci. 2009, 410, 5415–5424. [Google Scholar] [CrossRef]
  4. Cai, Z.; Goebel, R.; Lin, G. Size-constrained tree partitioning: A story on approximation algorithm design for the multicast k-tree routing problem. In Proceedings of the Third International Conference on Combinatorial Optimization and Applications, Huangshan, China, 10–12 June 2009; pp. 363–374.
  5. Lin, S.; Zhou, G.; Al-Hami, M.; Whitehouse, K.; Wu, Y.; Stankovic, J.; He, T.; Wu, X.; Liu, H. Toward stable network performance in wireless sensor networks: A multilevel perspective. ACM Trans. Sens. Netw. 2015, 11, 42:1–42:26. [Google Scholar] [CrossRef]
  6. Liu, X.; Zhang, H.; Xiang, Q.; Che, X.; Ju, X. Taming uncertainties in real-time routing for wireless networked sensing and control. IEEE Trans. Smart Grid 2013, 4, 288–301. [Google Scholar] [CrossRef]
  7. Niu, J.; Cheng, L.; Gu, Y.; Shu, L.; Das, S.K. R3E: Reliable reactive routing enhancement for wireless sensor networks. IEEE Trans. Ind. Inform. 2014, 10, 784–794. [Google Scholar] [CrossRef]
  8. Feng, X. QoS challenges and opportunities in wireless sensor/actuator networks. Sensors 2008, 8, 1099–1110. [Google Scholar]
  9. Wang, J.; Liu, Y.; He, Y.; Dong, W.; Li, M. QoF: Towards comprehensive path quality measurement in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1003–1013. [Google Scholar] [CrossRef]
  10. Liu, T.; Cerpa, A. Data-driven link quality prediction using link features. ACM Trans. Sens. Netw. 2014, 10. [Google Scholar] [CrossRef]
  11. Li, H.; Cheng, Y.; Zhou, C.; Zhuang, W. Routing metrics for minimizing end-to-end delay in multiradio multichannel wireless networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 2293–2303. [Google Scholar] [CrossRef]
  12. Shi, T.; Cheng, C.; Cai, Z. Adaptive Connected Dominating Set Discovering Algorithm in Energy-Harvest Sensor Networks. In Proceedings of the IEEE International Conference on Computer Communications INFOCOM 2016, San Francisco, CA, USA, 10–15 April 2016.
  13. Cheng, L.; Niu, J.; Cao, J.; Das, S.K.; Gu, Y. QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1864–1875. [Google Scholar] [CrossRef]
  14. Bi, R.; Li, J.; Gao, H.; Chen, Q. Deadline aware retransmission threshold setting protocol in cyber-physical systems. Int. J. Distrib. Sens. Netw. 2015, 2015. [Google Scholar] [CrossRef]
  15. Dong, W.; Liu, Y.; He, Y.; Zhu, T. Measurement and analysis on the packet delivery performance in a large scale sensor network. In Proceedings of the IEEE International Conference on Computer Communications INFOCOM 2013, Turin, Italy, 14–19 April 2013; pp. 2679–2687.
  16. Meng, T.; Wu, F.; Yang, Z.; Chen, G.; Vasilakos, A.V. Spatial reusability-aware routing in multi-hop wireless networks. IEEE Trans. Comput. 2016, 65, 244–255. [Google Scholar] [CrossRef]
  17. Shi, W.; Shang, S.; Zheng, Y.; Xu, Y. Routing metric of expected delay in multi-radio multi-channel wireless mesh networks. J. Commun. 2014, 9, 851–858. [Google Scholar] [CrossRef]
  18. Wang, S.; Basalamah, A.; Song, M.; Guo, S.; Tobe, Y.; He, T. Link-correlation-aware opportunistic routing in wireless networks. IEEE Trans. Wirel. Commun. 2015, 14, 47–56. [Google Scholar] [CrossRef]
  19. Hammoudeh, M.; Newman, R. Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance. Inf. Fusion 2015, 22, 3–15. [Google Scholar] [CrossRef]
  20. Yao, Y.; Cao, Q.; Vasilakos, A. EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE ACM Trans. Netw. 2015, 23, 810–823. [Google Scholar] [CrossRef]
  21. Zhang, J.; Ren, F.; Gao, S.; Yang, H.; Lin, C. Dynamic routing for data integrity and delay differentiated services in wireless sensor networks. IEEE Trans. Mob. Comput. 2015, 14, 328–343. [Google Scholar] [CrossRef]
  22. Cai, Z.; Lin, G.; Xue, G. Improved Approximation Algorithms for the Capacitated Multicast Routing Problem. In Proceedings of 11th Annual International Conference on Computing and Combinatorics COCOON 2005, Kunming, China, 16–29 August 2005; pp. 136–145.
  23. Yang, D.; Xu, Y.; Wang, H.; Zheng, T.; Zhang, H.; Zhang, H.; Gidlund, M. Assignment of segmented slots enabling reliable real-time transmission in industrial wireless sensor networks. IEEE Trans. Ind. Electron. 2015, 62, 3966–3977. [Google Scholar] [CrossRef]
  24. Pan, M.; Zhang, C.; Li, P.; Fang, Y. Joint routing and link scheduling for cognitive radio networks under uncertain spectrum supply. In Proceedings of the IEEE International Conference on Computer Communications INFOCOM 2011, Shanghai, China, 10–15 April 2011; pp. 2237–2245.
  25. Petrioli, C.; Nati, M.; Casari, P.; Zorzi, M.; Basagni, S. ALBA-R: Load-balancing geographic routing around connectivity holes in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 529–539. [Google Scholar] [CrossRef]
  26. Saifullah, A.; Xu, Y.; Lu, C.; Chen, Y. End-to-end communication delay analysis in industrial wireless networks. IEEE Trans. Comput. 2015, 64, 1361–1374. [Google Scholar] [CrossRef]
  27. Huang, X.; Fang, Y. Multiconstrained QoS multipath routing in wireless sensor networks. Wirel. Netw. 2008, 14, 465–478. [Google Scholar] [CrossRef]
  28. Wang, Z.; Bulut, E.; Szymanski, B.K. Energy efficient collision aware multipath routing for wireless sensor networks. In Proceedings of the IEEE International Conference on Communications, Dresden, Germany, 14–18 June 2009; pp. 1–5.
  29. Vazirani, V.V. Approximation Algorithms; Springer Science & Business Media: Berlin, Germany, 2013. [Google Scholar]
  30. Dantzig, G.B. Linear Programming and Extensions; Princeton University Press: Princeton, NJ, USA, 1998. [Google Scholar]
Figure 1. Impact of the retransmission threshold on the probability of packet delivery.
Figure 1. Impact of the retransmission threshold on the probability of packet delivery.
Sensors 16 00665 g001
Figure 2. Example of a piecewise linear function.
Figure 2. Example of a piecewise linear function.
Sensors 16 00665 g002
Figure 3. Deadline Success Ratio (DSR) of the proposed algorithms. (a) DSR vs. deadlines; (b) DSR vs. the number of hops; (c) DSR vs. the average number of packets queued.
Figure 3. Deadline Success Ratio (DSR) of the proposed algorithms. (a) DSR vs. deadlines; (b) DSR vs. the number of hops; (c) DSR vs. the average number of packets queued.
Sensors 16 00665 g003
Figure 4. Real-Time Ratio (RTR) of the proposed algorithms. (a) RTR vs. deadlines; (b) RTR vs. number of hops; (c) RTR vs. the average number of packets Queued.
Figure 4. Real-Time Ratio (RTR) of the proposed algorithms. (a) RTR vs. deadlines; (b) RTR vs. number of hops; (c) RTR vs. the average number of packets Queued.
Sensors 16 00665 g004
Figure 5. Deadline success ratio by NS2 simulation. (a) DSR vs. deadlines; (b) DSR vs. the number of hops; (c) DSR vs. the average number of packets queued.
Figure 5. Deadline success ratio by NS2 simulation. (a) DSR vs. deadlines; (b) DSR vs. the number of hops; (c) DSR vs. the average number of packets queued.
Sensors 16 00665 g005
Figure 6. Computing performance of Linear Programming-based (1 + pmin)-Approximation Algorithm (LPAA) and Lagrange Multiplier-based Distributed Approximation Algorithm (LMDAA). (a) Approximation Ratio (AR) vs. deadlines; (b) AR vs. the number of hops; (c) AR vs. the average number of packets queued.
Figure 6. Computing performance of Linear Programming-based (1 + pmin)-Approximation Algorithm (LPAA) and Lagrange Multiplier-based Distributed Approximation Algorithm (LMDAA). (a) Approximation Ratio (AR) vs. deadlines; (b) AR vs. the number of hops; (c) AR vs. the average number of packets queued.
Sensors 16 00665 g006

Share and Cite

MDPI and ACS Style

Bi, R.; Li, Y.; Tan, G.; Sun, L. Optimizing Retransmission Threshold in Wireless Sensor Networks. Sensors 2016, 16, 665. https://doi.org/10.3390/s16050665

AMA Style

Bi R, Li Y, Tan G, Sun L. Optimizing Retransmission Threshold in Wireless Sensor Networks. Sensors. 2016; 16(5):665. https://doi.org/10.3390/s16050665

Chicago/Turabian Style

Bi, Ran, Yingshu Li, Guozhen Tan, and Liang Sun. 2016. "Optimizing Retransmission Threshold in Wireless Sensor Networks" Sensors 16, no. 5: 665. https://doi.org/10.3390/s16050665

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop