Next Article in Journal
Non-Destructive Classification of Diversely Stained Capsicum annuum Seed Specimens of Different Cultivars Using Near-Infrared Imaging Based Optical Intensity Detection
Previous Article in Journal
Analysis of Key Issues on GNSS-R Soil Moisture Retrieval Based on Different Antenna Patterns
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analytical Model for the Duty Cycle in Solar-Based EH-WSN for Environmental Monitoring

by
Sebastià Galmés
1 and
Soledad Escolar
2,*
1
Department of Mathematics and Computer Science, University of Balearic Islands, 07122 Palma de Mallorca, Spain
2
School of Computing Engineering, University of Castilla-La Mancha, 13071 Ciudad Real, Spain
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(8), 2499; https://doi.org/10.3390/s18082499
Submission received: 11 June 2018 / Revised: 19 July 2018 / Accepted: 26 July 2018 / Published: 1 August 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
A technology drift is currently taking place from traditional battery-powered sensor networks, which exhibit limited lifetime, to the new Energy-Harvesting Wireless Sensor Networks (EH-WSN), which open the way towards self-sustained operation. However, this emergent modality also brings up new challenges, especially due to the time-varying nature and unpredictability of ambient energy sources. Most proposals for implementing EH-WSN rely on heuristic approaches to redesign the duty-cycling mechanism at the MAC layer, with the ultimate goal of optimizing network performance while preserving self-sustained and continuous operation. In contrast to the common system-wide reduced duty cycle of battery-powered sensor networks, the duty cycle in EH-WSN is much larger and adapted to the energy harvesting rate and traffic load of each node in the network. In this paper, we focus on solar-based EH-WSN devoted to environmental monitoring. In contrast to current works, we follow an analytical approach, which results into closed-form expressions for the duty cycle and initial energy storage that guarantee self-sustained operation to any node in a solar-based EH-WSN. To center the analysis, we consider TinyOS sensor nodes, though we postulate that the essential components of the obtained formulation will contribute to further develop duty cycle adaptation schemes for TinyOS and other software platforms.

1. Introduction

A wireless sensor network is a wireless network of low-cost, low-power and small-in-size multifunctional nodes, which have limited sensing, processing and communicating capabilities and cooperate with each other to relay sensed data from a region of interest to one or multiple sinks. From its emergence in the early nineties, the main design goal faced by researchers in this area has been network lifetime. This is due to the fact that, for many years, it has been assumed that sensor nodes are battery-powered, and so it has become essential to develop solutions aimed at optimizing energy consumption. These solutions span all components of a sensor node and, in the case of the communication component, all layers of the protocol stack. However, the main research efforts have been devoted to the design of energy-aware MAC (Medium Access Control) protocols, since major sources of energy consumption take place at this layer; channel-sensing, packet transmission and reception, packet overhearing, collisions and idle listening. However, in contrast to channel-sensing, packet transmission and reception, packet overhearing and collisions, which represent energy expenses on the scale of the relatively short packet duration, idle listening is especially harmful, because a node might spend a great amount of time listening to the channel without receiving any packet. This is particularly true in the case of event-driven sensor networks designed for rare event detection, and also in the case of time-driven sensor networks supporting environmental monitoring applications, where reporting times are typically much larger than the duration of packets. Hence, in order to reduce the impact of idle listening, the majority of MAC protocols for battery-powered sensor networks are based on duty-cycling the communication activity (these protocols are described in more detail in the next section). Nevertheless, even the best of such protocols cannot avoid node batteries to become exhausted after a finite (and relatively short) period of time. On the other hand, the new vision of Internet of Things (IoT), from which WSN (Wireless Sensor Networks) will become an integral part, claims enhanced energy management mechanisms that lead to much longer network lifetimes while providing QoS (Quality Of Service) guarantees. To achieve this goal, the scientific and industrial communities have recently intensified their efforts towards the introduction of energy-harvesting technologies in wireless sensor networks, with the ultimate goal of taking self-sustained WSN from vision to reality. The size compatibility between harvesting devices and the small sensor nodes has been and continues being one of the main obstacles, since the efficiency of the former is directly proportional to their surface or volume. Fortunately, research efforts have made it possible nowadays to develop various cost-effective energy scavenging mechanisms tailored to the intrinsic characteristics of sensor nodes. Among them, photovoltaic cells constitute the most widely deployed alternative in spite of the unavailability of solar power during night times or under bad weather conditions. This is due to their higher energy conversion efficiency compared to other mechanisms, such as vibrational, electromagnetic, thermoelectric, wind, etc. References [1,2,3,4,5] provide good surveys on energy scavenging mechanisms for EH-WSN.
However, size compatibility between harvesting devices and sensor nodes is not the only challenge faced by researchers in EH-WSN. In fact, this new paradigm poses additional and even more difficult challenges due to the time-varying nature and unpredictability of most energy sources. As stated in [1], the main research focus is again on the MAC layer, but according to a fundamental difference in the design principle of EH-WSN compared to their battery-powered counterpart: whereas the latter were developed with the objective of maximizing network lifetime, the energy-harvesting paradigm allows for paying more attention to other design objectives, namely performance metrics such as throughput and delay, in line with the high expectations from IoT. Note that QoS was already taken into account in the last generation of MAC protocols for battery-powered sensor networks (see, for instance, [6,7]), but subject to rigid energy budget constraints. Contrarily, in EH-WSN the emphasis is put on network performance while ensuring a sustainable energy state (more formally, this is known as energy neutral operation, which means that, in a period of time, the energy drained from the environment is equal to or larger than the energy consumed by the node). Thus, it is of crucial importance to consider the energy-harvesting mechanism in the design of MAC protocols for EH-WSN; otherwise, it is not possible to provide performance guarantees under self-sustained operation [1]. Currently, such redesign process has already produced various MAC protocols for EH-WSN. These protocols again rely on duty-cycling the communication activity, but allowing for much larger duty cycles which, in turn, can be individually adapted to the energy harvesting and consumption rates of each node. The work presented in [1] proposes a taxonomy of duty-cycled MAC protocols for EH-WSN based on the element that triggers the communication process (sender, receiver or sink). This taxonomy and the most relevant protocols in each category are also examined in the next section.
As it will be noticed, a common feature of current MAC protocols for EH-WSN is that they are based on heuristic approaches. Since the main design objective is network performance under self-sustained operation, these approaches focus on dynamically adjusting the duty cycle of nodes according to their energy level. So, nodes with more available energy increase their duty cycle in order to enhance throughput and/or delay, whereas those experiencing energy scarcity switch to sleep mode (to recharge batteries), thus diminishing their traffic activity and causing some performance degradation. However, the mathematical relationship between node duty cycle and other parameters such as energy harvesting rate and traffic load remains unknown. This is more or less successfully overcome by current protocols by imposing a tight control of the energy available at nodes via frequent measurements. Alternatively, in this paper, we follow an analytical approach, which allows for obtaining closed-form expressions for the duty cycle and initial energy storage that guarantee self-sustained operation at each node. This does not only contributes to a better understanding the dependence of node duty cycle on energy-related and traffic-related parameters, but we expect that it will result in helping the development of simpler and more effective adaptive schemes for adjusting the duty cycle of nodes. To fix ideas, we consider a widely deployed duty-cycled MAC protocol, which is the LPL (Low Power Listening) mechanism implemented in TinyOS sensor nodes, though the essential results can be extrapolated to other software (and corresponding hardware) platforms. We assume a typical environmental monitoring application, where nodes periodically sense and transmit towards a base station via multi-hop communication (time-driven paradigm). Based on these assumptions, we first derive an accurate model for the energy consumed by sensor nodes during each period of the communication process (communication round). Then, by using an experimentally tested theoretical model for the energy harvested by solar cells, we formulate the condition for energy neutral operation, from which we obtain the above mentioned closed-form expressions in terms of known and/or measurable parameters.
More specifically, the contributions of this paper can be listed as follows:
  • We develop an analytical model for the energy consumed (per round) by sensor nodes supporting the LPL mechanism implemented in TinyOS. With no loss of generality, we consider the MicaZ [8] hardware platform integrating the CC2420 radio in the evaluation, as it has been one of the most widespread commercial solutions. In addition, this selection allows for validating the resulting model via simulation with Avrora [9]. Avrora is a very accurate and highly scalable sensor node simulator that offers a complete framework for evaluating applications written in TinyOS 1.x/2.x for the Mica family nodes, which include an AVR microcontroller.
  • We develop an analytical model for the duty cycle of nodes in terms of relevant parameters describing their traffic load and energy harvesting capability. This model results from the formulation of the condition for energy neutral operation and the assumption that solar irradiance follows a periodical pattern.
  • We show that, in general, duty cycle adjustment is not enough to support non-disrupted operation, but an initial level of energy is also necessary. So, in addition, the proposed model includes a closed-form expression for the energy that is initially required for self-sustained operation.
To the best of our knowledge, the work presented in this paper represents the first attempt to tackle the characterization of the node duty cycle for energy neutral operation in an analytical way. The rest of the paper is organized as follows. In Section 2, we revise the state of the art on MAC protocols for battery-powered and energy-harvesting WSN. Then, in Section 3, we describe the LPL mechanism implemented in TinyOS for duty cycling the communication activity of sensor nodes. In Section 4, we construct an analytical model for the energy consumed by any node in a TinyOS WSN supporting an active-monitoring (time-driven) application. In Section 5, we validate the proposed model via simulation. Section 6 describes an accurate model for energy harvesting based on solar cells. Then, by using both the energy consumption and energy harvesting models, in Section 7 we develop closed-form expressions for the duty cycle and initial energy storage that guarantee energy neutral operation. Finally, in Section 8, we draw the main conclusions and suggestions for further research.

2. Related Work

Current MAC protocols for battery-powered sensor networks can be classified according to the type of duty cycle implementation. Accordingly, the following categories are devised:
  • Contention-free, schedule-based or synchronous MAC protocols. The idea of these protocols is to couple the duty cycles of sender and receiver, in such a way that both wake up at the same time in order to exchange one or several packets. To achieve this behavior, a predetermined or negotiated schedule is used, which requires tight synchronization among nodes. This represents a disadvantage from the implementation point of view, but even more severe is the fact that such a rigid schedule leads to limitations in terms of network scalability, protocol adaptability to spatial and temporal variations, robustness, etc. Altogether, these deficiencies make scheduled protocols less attractive in spite of their benefits: very low duty cycles and absence of collisions and packet overhearing. These protocols rely on the principles of TDMA (Time Division Multiple Access). Some examples are Self-Organizing MAC (SMACS) [10], Sensor-MAC (SMAC) [11], ReSync [12], TRaffic-Adaptive Medium Access protocol (TRAMA) [13] and Timeout-MAC (TMAC) [14].
  • Contention-based, random access or asynchronous MAC protocols. In this case, clock synchronization is avoided and consequently the duty cycles of nodes are completely decoupled. Thus, in order to link a transmitter that has data to send to a receiver that is duty-cycling, many asynchronous protocols make use of LPL techniques. Essentially, as stated in [15], these techniques shift the burden of synchronization to the sender. In the most primitive form of LPL, a transmitter sends a sufficiently long preamble before the data packet, in such a way that, upon waking up, the receiver detects the preamble and stays awake for the time required to capture the packet. This implementation, known as preamble sampling (PS), represents a solution purely focused on the physical layer. Examples of protocols using preamble sampling are Aloha with preamble sampling [16] and B-MAC [17]. Later, more efficient implementations were developed, which basically substituted the long preamble by a repetitive sequence of a wake-up packet, which could be the data packet itself or an advertisement packet. The resulting protocols could then be categorized according to the way the receive check is performed: either at the MAC layer (packet header recognition), as in X-MAC [15], or at the physical layer (energy detection), as in BoX-MAC-1 and BoX-MAC-2 [18]. Finally, an alternative to LPL is a technique called Low Power Probing (LPP) [19]. In this case, it is the receiving node that periodically sends small packets called beacons or probes, to announce that it is awake and ready to receive data. A node willing to send a packet turns its radio on and waits for a probe. Upon receiving a probe from the intended destination, it sends an acknowledgement (ACK) and, subsequently, the data packet. The most representative LPP-based protocols are Receiver-Initiated MAC (RI-MAC) [20] and A-MAC [21]. An extensive survey on asynchronous MAC protocols for wireless sensor networks is provided in [22].
  • Hybrid protocols. In general, asynchronous protocols offer better balance among multiple design criteria than their synchronous counterparts. Certainly, despite asynchronous protocols are less energy-efficient due to their contention nature, they exhibit higher levels of scalability, flexibility and robustness. In order to keep the benefits of the two categories, some hybrid solutions have also been proposed over the years, like WiseMAC [23] or Zebra MAC (Z-MAC) [24]. As stated in [18], these approaches attempt to combine TDMA with certain types of asynchronous support. However, these protocols have not led to standard implementations.
  • Adaptive protocols. Other protocols focus on dynamically setting the duty cycle of nodes so as to make it adaptive to changing traffic conditions. This can be done over synchronous or asynchronous/hybrid solutions, though the latter have attracted most proposals. The duty cycle can be adjusted either by modifying the duty period or the sleep period (or both), under a variety of criteria that span several QoS metrics as well as energy efficiency. For instance, some protocols dynamically adjust the duty cycle based on the traffic load and/or topology information in order to achieve acceptable balances between QoS parameters (throughput, latency, reliability) and energy consumption. This is the case of BoostMAC [25], MaxMAC [26], Scheduled Channel Polling MAC (SCP-MAC) [27], Energy-Aware Adaptive LPL (EA-ALPL) [28], ASLEEP [29], Demand Wakeup MAC (DW-MAC) [30] and, more recently, DISSense [31] and Cross Layer Adaptation of Check Intervals (CLAC) [32]. Some of these protocols are in fact mechanisms built on top of other known protocols. For instance, EA-ALPL is built on top of B-MAC, and CLAC is implemented on top of BoX-MAC-2 and the Collection Tree Protocol (CTP) [33]. These two protocols are, respectively, the MAC and network layer solutions adopted in TinyOS/MicaZ nodes. Other contributions proposing adaptive duty cycles are [34,35,36].
More information on MAC protocols for battery-powered wireless sensor networks can be found in [6,7,37,38,39,40,41]. However, it is commonly accepted that these protocols are inappropriate under the energy-harvesting paradigm. As stated in the previous section, the primary objective in the design of EH-WSN is to optimize performance while preserving self-sustained operation. EH-WSN are subject to the time-varying nature of energy sources, fact that may result into periods of insufficient energy along the network lifecycle. For this reason, MAC protocols for EH-WSN try to couple traffic activity in transmission-reception pairs with peaks of energy in the participating nodes, while at the same time minimizing the impact on delay or throughput. Whereas these new requirements make MAC protocol design even more complex, the benefits in terms of longer network lifetimes or perpetual operation are invaluable. As stated in [1], synchronous MAC protocols are not deemed appropriate for EH-WSN because tight schedules are not compatible with the temporal and spatial variability of energy sources. Thus, the focus is on asynchronous protocols. The authors in [1] classify asynchronous MAC protocols for EH-WSN into three categories depending on the element that initiates the communication process: sink-initiated, receiver-initiated and sender-initiated asynchronous protocols. Next, these categories are described in more detail.
In sink-initiated asynchronous MAC protocols, it is the sink that triggers the communication process by polling sensor nodes. Particularly, in [42] a probabilistic polling approach is adopted, which takes into account the unpredictability of energy sources. More specifically, the sink sets a contention probability in every polling packet to indicate the probability that any sensor node in receiving state should send its data packet. Upon receiving the polling packet, a sensor node generates an internal random number and decides to transmit the data packet if the generated number is below the contention probability; otherwise, the node remains in receiving state or switches to charging state if its residual energy falls below a predetermined value. Ideally, only one out of the set of sensor nodes in receiving state should transmit after having received the polling packet; precisely, the core algorithm executed by the sink consists of adapting the contention probability from poll to poll in order to achieve this goal. This approach is formulated in [42] for single-hop WSN; then, its multi-hop extension is proposed in [43]. In [44], an adaptive MAC protocol that maintains energy efficiency and quality of service for an IEEE 802.15.4 standard-based IoT network is proposed. The core contribution is an algorithm that dynamically adjusts the sleeping period of nodes in order to allow them for harvesting sufficient RF energy from a surrounding LTE eNodeB. Finally, another sink-initiated MAC protocol is AH-MAC (Adaptive Hierarchical MAC) [45], which is suitable for low-rate large-scale wireless sensor networks supporting active monitoring applications or event-driven alarm systems. AH-MAC combines the benefits of LEACH [46] and IEEE 802.15.4 to implement a scalable, self-configurable and self-healing wireless sensor network that incorporates energy-harvesting at a reasonable cost: only predetermined cluster heads are equipped with energy-harvesting circuits in AH-MAC. Accordingly, the activity of regular battery-powered nodes is limited to uploading their data to the cluster heads, which support most network tasks.
In receiver-initiated asynchronous MAC protocols, it is every receiver that requests data transmission from its senders. For instance, in the EH-MAC protocol proposed in [47], a receiver uses a probabilistic polling mechanism to request data packets. Compared to deterministic polling, this mechanism is more consistent with the unpredictable state of potential senders, given the temporal and spatial variability of the energy that can be harvested from the environment. Moreover, the contention probability value contained in the polling packet is dynamically adjusted by the receiver in order to reduce data packet collisions and maximize network throughput. Note that EH-MAC is very similar to the protocol proposed in [43], with the main difference that the polling activity in EH-MAC is transferred to the receivers. Another receiver-initiated MAC protocol is ODMAC (On-Demand MAC) [48], which exploits the fact that typically sensor networks are low traffic networks. In ODMAC the communication is on demand, meaning that a sensor node transmits a packet only upon being requested by a receiver. To do this, receivers periodically broadcast a beacon frame to indicate senders that they are ready to receive. Senders only wake up when they have queued packets to be transmitted to the sink; after waking up, they listen to the channel waiting for a beacon and may enter a contention period if other senders react to the same beacon. So, the burden of communication (idle listening) is transferred from receivers to transmitters, fact that benefits the overall energy balance because most of time transmission queues are empty (low traffic condition). Additionally, each receiver dynamically adjusts the beacon period according to the energy profiles of its sending nodes. As a result, the per-node duty cycle is kept as large as possible to maximize performance while, at the same time, energy neutral operation is preserved. LEB-MAC (Load and Energy Balancing MAC) [49] follows a similar approach, but in this case a receiving node stamps the next time it will wake up with a certain probability in the beacon message. This probability is locally computed based on recent energy-harvesting history, and thus it takes into account the variability of environmental factors. Upon receiving a beacon message, sending nodes can synchronize their duty cycles with the receiver duty cycle as long as they have sufficient energy. So, the resulting duty cycles and node throughputs are consistent with current energy states. ODMAC and LEB-MAC do not avoid contention between multiple senders trying to transmit data to the same receiver. In contrast, the authors of QAEE-MAC (QoS-Aware Energy Efficient) [50] propose an exchange of beacon messages between senders and receivers in order to reduce contention. Specifically, if a sender node wants to transmit a data packet, it first sends a Tx-beacon and waits for a beacon from the intended receiver (Rx-beacon). For its part, the receiver periodically wakes up and listens to the channel to receive all sender beacon frames. Next, this node determines which sender can transmit first (decision process that may include priorities to distinguish between normal and urgent data), and broadcasts a receiver beacon containing the identity of the selected sender as well as a network allocation vector (NAV) indicating the next wakeup time of the receiver. Moreover, the NAV value can be adjusted by the receiver according to its own energy profile. After capturing a beacon message, all senders except the one selected by the receiver switch to sleep mode, thus guaranteeing contention avoidance. It is shown that this protocol improves throughput, especially in the case of critical data.
The last subset of MAC layer solutions for EH-WSN falls into the category of transmitter-initiated asynchronous protocols. One example is DeepSleep [51], which consists of a MAC enhancement scheme on the baseline IEEE 802.11 power saving mode (PS). DeepSleep was developed in the light of the forthcoming M2M (Machine To Machine) networks, which are expected to consist of large amounts of energy-harvesting devices. Large number of devices means high level of contention in the original IEEE 802.11, and hence high energy expenditure in idle listening, packet overhearing and collisions. Whereas this can be supported by personal devices such as mobile telephones and portable computers, as they can be recharged frequently, it is not deemed appropriate for autonomous wireless networks featuring long operation periods. Basically, DeepSleep introduces two enhancements: it grants higher channel access priority to devices with lower energy levels (this is done by reducing their contention window during backoff intervals), and it randomly defers the wakeup times of high-priority devices in order to reduce contention among them. In summary, DeepSleep improves performance (outage probability, packet loss rate and transmission delay) under self-sustained operation. Another solution is the EL-MAC (Energy Level MAC) protocol proposed in [52], which assumes that energy-harvesting devices are secondary users in a cognitive radio network. In essence, EL-MAC benefits low-energy nodes by allowing all nodes to compute an access probability and a contention window size on the basis of their residual energy. The access probability defines the probability that a node wishing to transmit decides to sense the channel; if not, channel-sensing is postponed and the node switches to sleep mode. The contention window size is the maximum number of CSMA/CA contention slots selected by the node once it has decided to sense the channel and transmit. Obviously, secondary users with lower energy levels will compute higher access probabilities and smaller contention windows. Finally, another relevant contribution in this category is the RF-MAC protocol [53], which also retains the essential concepts of CSMA/CA. RF-MAC adapts CSMA/CA to the specificities of sensor nodes that harvest radio frequency (RF) energy. The design is based on a experimental study that demonstrates how the location and number of RF transmitters, as well as the chosen frequency, impact node charging time. As in previous protocols, some parameters of the CSMA/CA mechanism are dynamically varied in order to balance energy delivery to sensor nodes with overall communication performance. Examples of these parameters are the slot time, the inter-frame spacing and the contention window size.
As stated in the previous section, the protocols just described are based on heuristic approaches to the problem of optimizing network performance under self-sustained operation. In contrast, in this paper we follow an analytical approach. In the next section, we start by developing an accurate energy consumption model for the LPL mechanism implemented in TinyOS sensor nodes.

3. Background

The default MAC protocol delivered with the TinyOS 2.x release [54,55] for the MicaZ platform, which holds a CC2420 radio [56], consists of an implementation of a protocol known as BoX-MAC [18]. This implementation, called BoX-MAC-2, was jointly proposed with implementation BoX-MAC-1 by David Moss and Philip Levis in [18]. Thus, this section aims to describe the operation of BoX-MAC-2, as it becomes a major issue in order to understand the energy model proposed in the next section.
The CC2420 radio exhibits five operational states with different energy consumptions: (1) Power Off, where the voltage regulator is switched off; (2) Power Down, where the voltage regulator is on but the on-chip oscillator is still turned off; (3) Idle, where the oscillator is running; (4) Receive (RX), for reception mode; and (5) Transmit (TX), for transmission mode. Transitions between these states are triggered as consequence of some action on the radio. In essence, the LPL TinyOS mechanism alternately switches the CC2420 radio between the states ON and OFF, though through several intermediate states. For example, when a sensor node wakes up and puts its radio on to listen the channel, three transitions take place: (1) from Power Off to Power Down, (2) from Power Down to Idle, and (3) from Idle to RX. Analogously, when the sensor node turns off the radio from RX state, transitions from RX to Power Down and from Power Down to Power Off occur. Specifically, the state transition diagram for a CC2420 radio activation in which no ongoing packets are heard by the node is shown in Figure 1 on the left: the radio transits from Power Off to RX (passing through the intermediate states) and remains in the latter state for a period of time T l ; after that, the radio transits from RX to Power Off and stays in this state for T s l p in order to perform a complete sleep period. Alternately, it could be the case that the node listens to an in-progress packet over the channel. This could occur during any radio activation of the node, at some instant between the start and end of a predetermined listening period. If this occurs, the listener keeps its radio at RX state until the packet is completely received and, after that, it transits to TX state in order to send the corresponding acknowledgement to the sender. Note that, in general, the time for checking the channel will be smaller than the duration of the RX period ( T l ). Note also that the transmitter could need several retries until the receiver catches the full packet. Additionally, as the receiver of the packet will be generally a forwarding node (except in the case of the base station), this will perform subsequent TX-RX transitions until receiving an acknowledgement from its next hop. Then, before switching to the Power Off state, the node listens to the channel again for an additional time called DELAY_AFTER_RECEIVE, whose purpose is to keep the radio in RX state when activity, either transmission or reception, is detected on the channel. Note that, although the term suggests that this time is only spent after a reception occurs, it is also spent after a transmission occurs (DELAY_AFTER_RECEIVE in CC2420 Low Power Listening: http://mail.millennium.berkeley.edu/pipermail/tinyos-help/2008-May/033858.html). Figure 1 on the right shows the state transition diagram for this scenario. Finally, it could also happen that the reception (and subsequent forwarding) of a packet and the transmission of a packet generated by the node itself coincide at the same radio activation. In this case, the node behaves as explained previously and, additionally, it must accomplish the transmission of the own packet, for which the node goes into a new loop of TX-RX transitions until receiving a new ACK from its next hop.
In summary, T l can be interpreted as the nominal duration of the RX state when there is no channel activity, or, in other words, as the minimum amount of time that the radio is kept on (active) after each activation (the so-called DUTY_ON_TIME in TinyOS context). Note that the maximum time of activity depends on the traffic load and thus it is a priori unknown (the LPL TinyOS mechanism maintains the radio on beyond the value T l when it detects channel activity). Regarding T s l p , this is the nominal duration of the sleep period (Power Off state), that is, the time elapsed between a radio deactivation and the next radio activation. On the other hand, for the setup of the LPL mechanism, the developer has to fix a duty cycle ( D C ) to be used by all sensor nodes. This is a well-known MAC-layer parameter that represents the level of activity of a sensor node in communication. It is established statically according to the frequency with which the application performs environmental sensing and packet transmission. Based on D C , the MAC layer configures the sleep period, whose duration can be calculated as T s l p = T l ( 100 D C ) D C . Note that, according to this expression, D C is the percentage that the minimum radio activation period represents with regard to the total period; hence, it refers to activation periods with no channel activity. Both parameters, T l and T s l p , and their relationship through D C , represent a simplified view of the communication module as alternating between only two states, active (ON) and inactive (OFF), with no transitory states. This is precisely the perspective adopted in the construction of the energy consumption model in the next section. This is not only a totally acceptable approximation, but it also helps to make the analytical model less dependent on the particular radio module.

4. Analytical Energy Consumption Model

In this section we derive an analytical model for the energy consumed by a sensor node that is part of a data-gathering tree for environmental monitoring. We assume that this node supports the LPL implementation embedded in TinyOS. Its task consists of receiving and forwarding packets from other nodes as well as generating and transmitting own packets containing local readings. Given the lack of synchronization between any transmitting node and its corresponding receiver, the time lag between the start of their duty periods is completely random. Hence, energy consumption will also be subject to randomness, what means that we can expect a model of stochastic nature. In fact, the analysis that follows involves the derivation of complete statistical distributions for the two basic sources of energy consumption in a sensor network, namely transmission and reception. Next, the problem is addressed in detail.

4.1. Assumptions

In order to preserve the analytical tractability, the energy model developed in this section relies on some simplifying assumptions, which will be further validated via the simulation tests described in the next section. These assumptions are as follows:
  • The sensor network supports a monitoring application, which means that nodes periodically sense the environment and send the corresponding data towards a sink or base station. So, the network behaves as a data-gathering tree where the overall data flow from nodes to base station is organized into communication rounds whose duration is known as reporting period. With no loss of generality, we assume that every node generates a single packet per communication round (which may result from aggregating multiple samples of the environment).
  • Power control is enabled and hence every node can tune its transmission power according to the receiver distance (in fact, this is why we define forward and backward transmission distances).
  • For simplicity purposes, the proposed model does not reflect the transitory states described in Figure 1 (Power Down and Idle), which means that it only captures the alternation between RX-TX (ON) and Power Off (OFF) states. However, given the small durations and current draws that correspond to transitory states, this assumption can be adopted without penalizing the realistic nature of the model. In fact, simulation results shown in Section 5 reveal the validity of this assumption.
  • There are no packet collisions. Collisions are quite unpredictable, as they depend on the spatial and temporal distribution of the traffic load; however, given the fact that nodes are not synchronized and typically reporting periods in data-gathering applications are very large (on the order of minutes or more), we can reasonably assume that, after an initial period, transmissions become sufficiently randomized so as to neglect collisions. Again, the experiments performed with Avrora (reported in the next section) allowed us to definitely validate this assumption.
  • Since transmissions are randomized, we can also assume that all packets processed by any intermediate node during a communication round (either generated or received and forwarded from any other node) occupy different duty cycles. This assumption is based again on the fact that reporting periods in monitoring applications are very large compared to the length of duty cycles. The experiments performed with Avrora showed that, even if this is not the case for some nodes, it only affects the way energy consumption is distributed over time, but it has very little impact on the overall balance of energy consumption per node and per communication round.

4.2. Analytical Model

Under the above assumptions, our modelling process relies on two fundamental calculations: the energy wasted by a node to transmit a single packet, and the energy wasted by a node to receive and forward a single packet too. For this purpose, we start by considering the scenario shown in Figure 2, where node A is a leaf node that generates and transmits a packet and node B is a relay or intermediate node that receives and forwards the packet from A. As it can also be noticed, we distinguish between forward and backward transmission distances in order to account for the general case where power control is enabled. In general, for an arbitrary node X, d f ( X ) is the distance between node X and the node to which it transmits packets (forward transmission distance), whereas d b ( X ) is the distance between node X and a node from which it receives packets (backward transmission distance). For the detailed analysis, we can use the time diagram shown in Figure 3, which also helps to understand the operation of the LPL TinyOS mechanism in a transmitter-receiver pair. Based on this diagram, the next two subsections are devoted to the analysis of the energy wasted by nodes A and B in their respective roles. Then, we develop a general expression for the energy wasted by an arbitrary node that receives and forwards multiple packets from other nodes, in addition to generating and transmitting an own packet. Since the results take form of statistical distributions, in the last subsection we obtain the corresponding expectations.

4.2.1. Packet Generation and Transmission

As it can be noticed from Figure 3, there are some relevant time intervals in addition to the already defined T l (DUTY_ON_TIME), T s l p and DELAY_AFTER_RECEIVE:
  • T c : This is the transmission cycle, which is the time spent by a node in the transmission of a single non-successful packet. During this period, three standard operations are performed in sequence: (1) clear channel assessment (CCA) and random back-offing ( T C C A ); (2) packet transmission ( T p k t ); and (3) waiting for acknowledgement ( W a c k ). In general, the first time component is an unpredictable variable that depends on the amount of workload and its spatio-temporal distribution over the network. Thus, it is usually characterized by its average. However, if transmissions from all nodes are sufficiently randomized, as we have postulated in our assumptions, the channel is likely to be found idle every time a node senses the channel. Hence, the incurred time is just for clear channel assessment and thus deterministic and of small value ( T C C A constant and small).
  • T c : This is a modified transmission cycle that corresponds to the transmission of a successful packet. It is very similar to the previous one, but instead of including a waiting time for acknowledgement, it contains the actual time to receive such acknowledgement.
  • T a c k : This is the duration of acknowledgements packets.
In order to ensure that a receiving node, upon its radio activation, detects the start of a packet transmission regardless of the asynchrony with the sender, it must be accomplished that T l > T c .
From Figure 3 we can notice that in general the transmitter needs to send its packet repeatedly until the receiver catches it entirely after waking up from its sleep period. Depending on the number of tries, the transmitter wastes more or less energy. Thus, we first characterize the number of tries (k) required by the transmitter to receive an acknowledgement from the receiver. Table 1 shows the characterization of this random variable by taking the backend of the receiver duty period as reference (see Figure 3). Note that the actual position of such backend is measured with regard to the time origin set up in the figure, which is the start of the transmitter duty period. Accordingly, for every outcome of the number of tries, the table shows the time interval to which the backend belongs, as well as its probability. As noticed, the case of single try corresponds to the union of two time intervals: in the first one, the level of asynchrony between transmitter and receiver is very small, whereas in the second one such asynchrony is sufficiently large so as to make the next receiver duty period come into scene. Also, it is worth observing that the overall distribution is not uniform because not all time intervals are equally long; in particular, the probability of a single try is precisely the duty cycle of the LPL mechanism. Finally, α is an auxiliary parameter defined as follows:
α = T s l p T c
Then, if node A requires k tries to successfully send a packet to B, the energy wasted to exclusively complete the transmission of such packet obeys the following equation:
E T ( A ) = ( k 1 ) E C ( A ) + E C ( A ) + E l D A R
In this expression, E C ( A ) is the energy wasted by node A in any non-successful transmission cycle, E C ( A ) is the energy wasted in the last (successful) transmission cycle, in which node A actually receives an acknowledgement, and E l D A R is the energy wasted in idle listening during the final DELAY_AFTER_RECEIVE period. More specifically, we have:
E C ( A ) = E l C C A + E t x p k t ( d f ( A ) ) + E l a c k
E C ( A ) = E l C C A + E t x p k t ( d f ( A ) ) + E r x a c k
Here E l C C A , E t x p k t ( d f ( A ) ) , E l a c k and E r x a c k are respectively the energy losses experienced by node A to sense the channel, transmit a single packet to B, wait for the corresponding acknowledgement and actually receive such acknowledgement.

4.2.2. Packet Forwarding

Figure 3 also describes the temporal breakdown of the process of receiving and forwarding a packet (by node B). In general, upon waking up, node B detects a fragment of the transmitted packet before its complete reception. Of course, this fragment may not exist if the wake up takes place during the gap between two consecutive tries. As stated in Section 3, once the packet is completely received, the node issues an acknowledgement, forwards the packet, and enters a DELAY_AFTER_RECEIVE period before switching to sleep mode. Let us start by calculating the energy wasted by node B to complete the reception of the packet from A (that is, until it transmits the acknowledgement packet):
E R ( B ) = E f d + E r x p k t + E t x a c k ( d b ( B ) )
Here, E f d denotes the energy cost of the fraction of duty period that precedes the full packet reception; in other words, it is the energy wasted during the time elapsed between the wakeup of the receiver and the start of the successful packet reception. Additionally, E r x p k t and E t x a c k ( d b ( B ) ) are, respectively, the energy costs experienced by node B to receive and confirm the packet from A. Among all such energy components, the only one that is subject to randomness is E f d , as it depends on the asynchrony between the two nodes. For the characterization of this component, we set up another time origin at the beginning of the last non-successful packet transmitted by node A. Accordingly, t represents the shift of the backend of the duty period of node B with regard to the new reference; this shift may vary from 0 + to T c (see again Figure 3). More specifically, t and t are related through the following equation:
t = T C C A + ( k 2 ) T c + t , k = 2 α + 1
Based on this equation, Table 2 provides a characterization of E f d in terms of the transmitter-receiver asynchrony. A new magnitude appears, namely E l , which is the total energy wasted in idle listening during a radio activation with no ongoing packets, the duration of which is precisely DUTY_ON_TIME. For illustration purposes, Figure 4 and Figure 5 plot the information contained in Table 2. In particular, Figure 4 corresponds to T s l p α T c + T p k t , whereas Figure 5 describes the opposite case (note that these two cases are distinguished in Table 2). Note also that the two graphs exhibit a similar sawtooth-like profile, only differing in the interval [ T C C A + α T c , T C C A + T s l p ) . The change of slope that takes place in most subdomains of the two representations reflects the general case where power consumption in idle listening differs from that in packet reception. Otherwise, a single straight line would have been drawn. For the evaluation of the distribution of E f d , some reference values have been indicated in Figure 4 and Figure 5:
E 1 = E l W a c k + T C C A T l
E 2 = E r x p k t T p k t ( T s l p α T c ) T p k t + E l W a c k + T C C A T l
E 2 = E l T c ( T s l p α T c ) T l
E 3 = E r x p k t + E l W a c k + T C C A T l
E 4 = E l
Note that it has been assumed that E 4 > E 3 in Figure 4 and Figure 5. This is true if power consumption in idle listening is equal to the power consumption in packet reception. However, if this is not the case, it could happen that E 4 < E 3 for sufficiently larger values of the power consumption in packet reception with regard to that in idle listening.
Next, based on the knowledge of E f d as a function of the transmitter-receiver asynchrony, and the fact that this asynchrony is uniformly distributed between 0 and T l + T s l p , we can derive the cumulative distribution function of E f d viewed as a compound random variable. Let this distribution be F ( y ) , that is, F ( y ) = p r o b ( E f d y ) . The result is as follows:
  • Case 1: T s l p α T c + T p k t
    F ( y ) = ( α + 1 ) y E l T l T l + T s l p if 0 < y E 1 F ( E 1 ) + y E 1 T l + T s l p ( α T p k t E r x p k t + T l E l ) if E 1 < y E 2 F ( E 2 ) + y E 2 T l + T s l p ( ( α + 1 ) T p k t E r x p k t + T l E l ) if E 2 < y E 3 F ( E 3 ) + y E 3 E l T l T l + T s l p if E 3 < y E 4
  • Case 2: T s l p > α T c + T p k t
    F ( y ) = ( α + 1 ) y E l T l T l + T s l p if 0 < y E 2 F ( E 2 ) + ( α + 2 ) y E 2 E l T l T l + T s l p if E 2 < y E 1 F ( E 1 ) + y E 1 T l + T s l p ( ( α + 1 ) T p k t E r x p k t + T l E l ) if E 1 < y E 3 F ( E 3 ) + y E 3 E l T l T l + T s l p if E 3 < y E 4
Recalling again Figure 3, we can now set up the following equation for the total energy wasted by node B to forward a single packet from A ( E F ( B ) ):
E F ( B ) = E R ( B ) + E T ( B )
Here, E T ( B ) obeys Equation (2), but particularized for node B.

4.3. Energy Consumption per Round

The previous analysis has focused on the generation and transmission as well as the reception and forwarding of single packets. However, during a communication round, a node in a data-gathering tree is generally entailed to forward packets from multiple nodes in addition to transmitting its own packet. The scenario is described in Figure 6, where an arbitrary node X receives and forwards packets from all of its children. Every child is denoted by c i ( X ) , with i varying between 1 and the total number of children, namely C H ( X ) . Let also σ ( X ) denote the total number of descendants of node X (what includes its children and, recursively, the descendants of its children). Then, according to the assumption that transmissions become sufficiently randomized, in such a way that every packet managed by a node occupies a distinct duty period (recall Section 4.1), we can set up the following equation for E r o u n d ( X ) , the total energy consumed by node X during a communication round:
E r o u n d ( X ) = i = 1 C H ( X ) ( σ ( c i ( X ) ) + 1 ) E R , i ( X ) + ( σ ( X ) + 1 ) E T ( X ) + T r n d T l + T s l p ( σ ( X ) + 1 ) ( E l + E s l e e p )
In this equation, E R , i ( X ) denotes the energy wasted by node X to receive a packet from its child node c i ( X ) , whereas the last term accounts for the total energy wasted in duty cycles that are not dedicated to transmit or receive (unused duty cycles). Note that the energy wasted in sleep periods has been included: despite power consumption is very low during such periods, the overall energy consumption may be non-negligible if T s l p T l (for low duty cycles). Also note that Equation (15) includes two types of random components: the number of tries k required by node X to upload its packets (contained in the component of energy wasted in transmission) and the fraction of duty period previous to successful reception from every child node (contained in every component of energy wasted in reception). Altogether, E r o u n d ( X ) contains C H ( X ) + 1 random variables, which are mutually independent according to the randomization assumption. In the next subsection we compute the expected value of E r o u n d ( X ) .

Expected Energy Consumption per Round

The stochastic nature of E r o u n d ( X ) has ultimately its origin in the random asynchrony between the duty periods of the two endpoints of any communication pair. In particular, the randomness of the number of tries (k) results from the randomness of the asynchrony between a node and its parent node (the node to which it transmits packets), whereas the randomness of E f d is due to the smaller-scale randomness (characterized by t in Figure 3) between a node and any node from which it receives packets (child node). Accordingly, the evaluation of the expected energy consumption per round relies on averaging k and E f d . In particular, from Table 1 we can easily derive the following expression for the average number of tries:
ε [ k ] = α 2 ( α + 3 ) T c + ( α + 2 ) ( T s l p α T c ) + T l T l + T s l p
For the calculation of the expectation of E f d , we can use either its description in terms of the transmitter-receiver asynchrony provided in Table 2, jointly with the fact that this asynchrony is uniformly distributed, or its characterization in terms of the distribution function given in Equations (12) or (13). Having adopted the first alternative, we introduce the following auxiliary functions in order to simplify the analysis:
(17) E f d ( 1 ) ( t ) = E r x p k t T p k t t T p k t + E l W a c k + T C C A T l , t [ 0 , T p k t ) (18) I 1 ( x ) = 0 x E f d ( 1 ) ( t ) d t , x [ 0 , T p k t ) (19) E f d ( 2 ) ( t ) = E l T c t T l , t [ T p k t , T c ] (20) I 2 ( x ) = T p k t x E f d ( 2 ) ( t ) d t , x [ T p k t , T c ]
Accordingly, we have:
ε [ E f d ] = 0 T l + T s l p E f d ( t ) 1 T l + T s l p d t = 1 T l + T s l p T C C A T C C A + T c E f d ( t ) d t + + T C C A + ( α 1 ) T c T C C A + α T c E f d ( t ) d t + T C C A + α T c T C C A + T s l p E f d ( t ) d t + 0 T C C A E f d ( t ) + T C C A + T s l p T l + T s l p E f d ( t ) d t = 1 T l + T s l p α ( I 1 ( T p k t ) + I 2 ( T c ) ) + T C C A + α T c T C C A + T s l p E f d ( t ) d t + 0 T C C A E f d ( t ) + T C C A + T s l p T l + T s l p E f d ( t ) d t
Note that the integral has been initially decomposed into the periodic component, which covers the region [ T C C A , T C C A + T c ) [ T C C A + ( α 1 ) T c , T C C A + α T c ) , and the rest of subdomains, namely [ 0 , T C C A ) , [ T C C A + α T c , T C C A + T s l p ) and [ T C C A + T s l p , T l + T s l p ] . Further development of ε [ E f d ] requires considering the two cases distinguished in Table 2 (for k = α + 2 ):
  • Case 1: T s l p α T c + T p k t
    T C C A + α T c T C C A + T s l p E f d ( t ) d t = 0 T s l p α T c E f d ( 1 ) ( t ) d t = I 1 ( T s l p α T c )
  • Case 2: T s l p > α T c + T p k t
    T C C A + α T c T C C A + T s l p E f d ( t ) d t = 0 T p k t E f d ( 1 ) ( t ) d t + T p k t T s l p α T c E f d ( 2 ) ( t ) d t = I 1 ( T p k t ) + I 2 ( T s l p α T c )
On the other hand, the two last integrals in Equation (21) can be combined into a single integral from T C C A + T s l p to T C C A + T l + T s l p and developed as follows:
T C C A + T s l p T C C A + T l + T s l p E f d ( t ) d t = T C C A + T s l p T C C A + T l + T s l p E l T l + T s l p + T C C A t T l d t = E l T l 2
Next, we can introduce expressions Equations (22) or (23) and (24) into the intermediate result given by Equation (21). In summary, we have:
  • Case 1: T s l p α T c + T p k t
    ε [ E f d ] = 1 T l + T s l p α ( I 1 ( T p k t ) + I 2 ( T c ) ) + I 1 ( T s l p α T c ) + E l T l 2
  • Case 2: T s l p > α T c + T p k t
    ε [ E f d ] = 1 T l + T s l p ( α + 1 ) I 1 ( T p k t ) + α I 2 ( T c ) + I 2 ( T s l p α T c ) + E l T l 2
Finally, the analysis can be completed by evaluating the auxiliary integrals:
I 1 ( T p k t ) = E r x p k t T p k t 2 + E l ( W a c k + T C C A ) T p k t T l
I 2 ( T c ) = E l ( T c T p k t ) 2 2 T l
I 1 ( T s l p α T c ) = E l ( T s l p α T c ) 1 T s l p α T c 2 T p k t + W a c k + T C C A T l
I 2 ( T s l p α T c ) = E l 2 T l ( ( T s l p α T c ) ( ( α + 2 ) T c T s l p ) 2 T c T p k t + T p k t 2 )
Note that ε [ E f d ] does not depend on the specific child node from which node X receives a packet. Now we can formulate the expectations of the energy costs in transmission and reception by recalling expressions Equations (2) and (5):
ε [ E T ( X ) ] = ( ε [ k ] 1 ) E C ( X ) + E C ( X ) + E l D A R
ε [ E R , i ( X ) ] = ε [ E f d ] + E r x p k t + E t x a c k ( d b , i ( X ) )
In the last equation, d b , i ( X ) stands for the backward distance between node X and its child node c i ( X ) .
Now, ε [ E r o u n d ( X ) ] can be simply obtained by introducing expressions Equations (31) and (32) into (15). In particular, if power control is not enabled, all energy costs in transmission become independent of distance and ε [ E r o u n d ( X ) ] can be formulated in a more straightforward way:
ε [ E r o u n d ( X ) ] = σ ( X ) ε [ E R ( X ) ] + ( σ ( X ) + 1 ) ε [ E T ( X ) ] + T r n d T l + T s l p ( σ ( X ) + 1 ) ( E l + E s l e e p )

5. Simulations

In this section we validate the proposed energy model by using the Avrora simulator [9]. For this purpose, we simulate a real sensor network application and compare the energy results provided by Avrora against the results provided by our model. Avrora simulates sensor applications developed in TinyOS 1.x/2.x for platforms that include an AVR microcontroller, as for instance Mica2 and MicaZ sensor nodes. However, we want to highlight the fact that the model proposed in this paper can be applied to any other hardware platform supporting a LPL implementation.
Avrora enables a complete framework of simulation of a sensor network platform running a particular TinyOS 1.x/2.x application. This simulator manages with high accuracy the time in which the actions on the physical components of the node platform take place, providing evaluators with a better understanding of their behavior. One of the strengths of Avrora is its module for the evaluation of energy consumption, which is based on the AEON energy prediction model [57]. AEON estimates the energy consumed by a node running a particular application on the basis of usage of components, times spent at each state, and their current draws. The Avrora simulator reports the overall energy consumption of each node, breaks it down into the consumptions of individual components and, in turn, into different states, by capturing all low-level events generated by the application. In our evaluations, we will focus on the energy wasted by the radio component, which accounts for the five states shown in Figure 1 (in contrast to our model which ignores transitory states).
For the simulation purpose, we have first developed a data-gathering application for TinyOS 2.x/MicaZ where every node periodically samples several sensors, composes a message from the measurements, and transmits such message towards the base station. As stated previously, MicaZ integrates a CC2420 radio [56], which is compliant with the 802.15.4 standard. Unless the developer explicitly modifies the network implementation, any application is built on top of the default network protocols, i.e., Collection Tree Protocol (CTP) and BoX-MAC-2 as routing and MAC protocols, respectively.

5.1. Basic Validation

We start the validation of the analytical energy model by considering the simple scenario depicted in Figure 2. Our goal is to proof that the models developed for packet transmission and packet forwarding are consistent with the results provided by Avrora, as a prior step to deal with more complex configurations.
We assume that node A executes the application that was previously described with a duty cycle D C = 3 % . We also set the duty cycles of node B and its parent node to 3 % . The rest of parameters used in the evaluation are listed in Table 3. With these settings ( D C = 3 % and T l = 5 ms), the nodes activate their radios approximately every T l + T s l p = 166.7 ms. This is the duration of a cycle with no communication activity, also called LPL interval in TinyOS context. These values are consistent with the two-state description used in the analytical model. In contrast, Table 4 shows the duration of each state in Figure 1 as measured by Avrora. As it can be noticed, there are differences between the theoretical model and the real system, but they are sufficiently small so as to accept the former with the advantage of simplification. In general, we also observed that state durations were approximately fixed, with the exception of the Power Off state. The radio remained in this state for the time until completing the nominal LPL interval, that is, T L P L ( 166.7 ms in our case). For example, upon a single radio activation with no packets to transmit or receive, the duration of the Power Off state is T o f f = T L P L ( T d o w n 1 + T i d l e + T r x + T d o w n 2 ) , with T r x = T l . Otherwise, the remaining time depends on the number of tries that are required to successfully send/forward a packet. In this case, the term T r x in the previous formula would be replaced by the total duration of the duty period dedicated to receive and forward the packet, including the DELAY_AFTER_RECEIVE interval. Accordingly, the resulting value for T o f f would be lower for the same nominal T L P L .
Since the reporting period is typically much larger than the LPL interval ( T r n d T L P L ), most of the times a radio activation does not entail any packet transmission or reception (see Figure 1 on the left). For the scenario under consideration, node A generates a packet only once every T r n d , and generally it uses several tries to send this packet to node B. In turn, node B forwards the packet to its parent node, for which it also requires a certain number of tries, completely independent of those required by node A. Specifically, we performed two experiments as part of this basic validation. In the first experiment, we varied the level of asynchrony between nodes A and B, in such a way that the number of tries required by node A also varied. According to the model described in Section 4, the number of transmissions k ranges between 1 and α + 2 . For the parameter setting considered here, α = 59 and hence the number of tries could vary between 1 and 61. However, in order to simplify the evaluation, we consider k [ 1 , 20 ] and, for each k, we compare the energy consumption provided by Avrora with the energy consumption calculated by our model. During the experiment, we realized that Avrora was not able to meet the exact duration of the DELAY_AFTER_RECEIVE ( D A R ) parameter, fixed in the source code to the value 100 ms and that, in general, its real duration tended to be slightly larger than 100 ms. For this reason, we evaluate the scenario using two different values of D A R , namely 100 ms and 125 ms. The results are shown in Figure 7 on the left, where the energy consumed by node A to transmit a packet is represented in terms of the number of tries (k). As it could be expected, energy consumption grows linearly when k increases. We also noticed that the deviation between the results provided by Avrora and by the model was approximately 6% in the worst case (for D A R = 125 ms), which is an acceptable value.
In the second experiment, we evaluated the energy consumed by node B to receive and forward the packet from A. In this case, we varied the level of asynchrony between node B and its parent node while keeping the time difference between nodes A and B fixed. The results are shown in Figure 7 on the right, where again a linear trend is observed. Note that the results in Figure 7 on the right are slightly larger than the figure on the left, a fact that is explained by the small extra energy required by node B to receive the packet from node A. Again, the maximum deviation between Avrora and the analytical model is below 6%.

5.2. Tree-Based Topologies Validation

In this subsection we proceed with the assessment of our analytical energy model by using realistic network topologies. Figure 8 shows the two networks under evaluation: (1) a 10-node tree-based topology deployed into a square of side L = 100 m (on the left); and (2) a 20-node tree-based topology on a square of side L = 200 m (on the right). Both networks use an outdoor radio range of R = 75 m. We consider two values for the duty-cycle, namely D C = { 3 , 10 } % . Each simulation with Avrora assumes that the application described before is run by all nodes; moreover, all of them use the same DC with the exception of the base station (node 0), as it generally lacks energy restrictions. The results provided by Avrora, namely the energy consumed by each node for a given number of communication rounds, are then compared with those obtained from the proposed energy model in order to determine the accuracy of the latter.
A key parameter in our analysis is σ , which is determined for each node by network topology (recall that, in fact, σ = σ ( X ) , with X representing an arbitrary node). In TinyOS-based sensor networks, the default routing protocol is CTP. CTP progressively builds a connected network by means of frequent exchanges of beacon messages between nodes, until a tree-based topology is achieved. Subsequently, the exchange of beacon messages is modulated by the temporal and spatial variation of the traffic load, as this determines the frequency of topology updates. Remind that CTP, which is responsible for collecting data from the network and sending them to a small number of sinks, was designed to achieve the objectives of agility and efficiency [33]. This means that network topology can dynamically change in response to changing traffic conditions, though this was not the case in our simulation experiments once an initial transient regime was completed. This is due to the regularity of the traffic pattern generated by the monitoring application being executed. Therefore, despite beacon messages were very frequent during an initial transient period, their impact on energy consumption became marginal as long as the simulation was evolving. As an example, Figure 9 depicts the final topologies obtained after simulating the 10-node network; one of these topologies corresponds to D C = 3 % (left) and the other one to D C = 10 % (right). In both experiments the simulation time was set large enough to allow CTP to complete the initial period of topology construction, after which we observed that the data-gathering tree remained practically constant.
At the end of each simulation experiment, Avrora reports several parameters on a per-node basis: total number of packets transmitted and received, and energy consumption. Accordingly, the results for the 10-node network are shown in Figure 10, which plots the energy consumed by every node with the exception of node 0 (base station). Only the consumption of the radio component is taken into account, both for D C = 3 % (on the left) and D C = 10 % (on the right). The X-axis corresponds to the number of rounds executed (1, 2, 3, 10, 20 and 30), while the Y-axis provides the corresponding energy consumption in Joules. As observed, the energy consumed by each node grows approximately linearly with the number of rounds, fact that is consistent with the observation that topology was almost static. We also noticed that the differences between nodes were mainly due to the combination of the parameters k and σ . The value of σ was very stable for each node, as the topology hardly experienced any change. Moreover, even if a topological change had taken place, this does not necessarily mean that the total number of descendants of a given node had changed as well. The other parameter that causes differences between nodes is k, which is unpredictable and uncontrollable as it depends on the asynchrony between the nodes in every transmitter-receiver pair. However, again with no loss of generality, we forced the stabilization of the parameter k of each node within the interval [ 1 , 20 ] ; for this purpose, we used the simulator options -random-seed and -random-start, which ensure reproducible simulation results and avoid artificial cycle-level synchronization, respectively. As expected, the energy consumption grows with D C , since a larger D C means more radio activity. On the other hand, we can also observe that leaf nodes exhibit less energy consumption compared to forwarder (intermediate) nodes, fact that is due to the lesser value of σ of the former.
Figure 11 shows the energy consumed per round by every node in the 10-node network, as provided by Avora and the analytical model. For the computation of the energy consumption from the analytical model, we took the specific value of k required by each node from the Avrora simulation (recall that k is an input parameter in our model). The obtained results show an average deviation of our model with regard to the Avrora simulator below 4.8% for D C = 3 % and 0.5% for D C = 10 %. The reason why the lower duty-cycle gives rise to a larger deviation is the presence of beacon messages, which are included in the energetic balance provided by Avrora but not in the analytical model: a lower duty-cycle means less communication activity and thus more impact of beacon messages in the overall evaluation of energy consumption.
The experiments done with the 20-node network produced a data-gathering tree after a longer transient period. This is because CTP requires more time to create a topology when the network size is increased. Accordingly, we set up a larger simulation time. Figure 12 shows the resulting topologies, again for D C = 3 % (on the left) and D C = 10 % (on the right). For these topologies, Figure 13 shows the energy consumption reported by Avrora for 2, 3, 4, 10, 20 and 30 communication rounds. Similarly to the results obtained for the 10-node network, we observe a linear increase of energy consumption in terms of number of rounds; however, some nodes, like node 5 in the case of D C = 3 % and node 11 in the case of D C = 10 %, exhibit a large deviation above the linear trend for some number of rounds; this is due to the fact that k and/or σ experienced sporadic and unpredictable changes at some time instants. While this is possible with both CTP and BoX-MAC, it does not represent the normal behavior and thus we believe that such deviations do not compromise the validity of the proposed model. As in the 10-node network, leaf nodes consume less energy than forwarding nodes.
In order to better illustrate the variation of energy consumption among nodes, Figure 14 compares, for each node, the results obtained with our model against the results of Avrora. They correspond to 2 rounds of communication and both D C = 3 % (on the left) and D C = 10 % (on the right). In this case, the average deviation obtained for the two duty-cycles was approximately the same, on the order of 3%. This is because with 20 nodes there is more communication activity in the network ( σ is generally larger), fact that, in turn, diminishes the impact of beacons.

6. Solar Energy Harvesting Model

Another fundamental component in the analysis of an energy-harvesting system is the energy production model. Thus, for a solar-based EH-WSN, the energy that can be harvested by a solar module embedded into a sensor node needs to be characterized. Specifically, we use the energy production model proposed and validated in [58], which takes into account the relevant parameters of the solar cell, namely efficiency and surface, as well as the solar irradiance or solar intensity, defined as the amount of solar power incident per unit of surface. For the solar irradiance, the model proposed in [58] is based on data obtained from the RetScreen NASA program [59], which consists of two parameter sets for any given location in terms of its longitude and latitude coordinates: S T D H O U R S m o n t h , the standard number of hours of solar light in a month, and D m o n t h , the standard value of maximum irradiance in a month. Note that t s u n r i s e = h S T D H O U R S 2 and t s u n s e t = h + S T D H O U R S 2 are the time instants corresponding, respectively, to the sunrise and sunset. Based on these parameters, the proposed model for the irradiance at a given time, D ( t ) , obeys a quadratic trend:
D ( t ) = ( t h ) 2 p + D m o n t h if t s u n r i s e t t s u n s e t 0 otherwise
In this expression, p = S T D H O U R S 2 4 D m o n t h , t is any hour between 0:00 and 24:00 and h denotes the hour of maximum solar light (12:00). Though this model was further refined in [60], it predicts very accurately the solar irradiance that can be expected at given spatio-temporal coordinates. For illustration, Figure 15 shows the hourly irradiance curves for the cities of Madrid and Hamburg during the months of January and July. These curves have been obtained by using the data shown in Table 5 (extracted from the RetScreen database).
Then, the power output delivered by a solar cell of efficiency η and surface S can be expressed in the following way:
P o u t ( t ) = D ( t ) η S
Unfortunately, the efficiency of solar cells is still rather small. For instance, the efficiency of the widely used solar module KL-SUN3W is η = 12.8 % under standard conditions, which means that only 12.8 % of the solar power absorbed is converted into electrical power.

7. Duty Cycle for Energy Neutral Operation

In this paper we consider the harvest-store-consume supply alternative described in [1], which consists of combining the energy harvesting subsystem (solar module) with a buffer for energy storage (rechargeable battery or supercapacitor). This latter can absorb any excess (up to a limit) of energy scavenged, which can then be available during periods of decreasing sunlight (night hours or adverse weather conditions). To start with the analysis, let us denote by P c ( t ) the power consumed by the sensor node at time t. Assuming that the buffer does not have any inefficiency in charging and does not leak any energy over time, the condition for energy neutral operation can be formulated as stated in [61] (the terminology has been adapted):
E ( t ) = E ( 0 ) + 0 t P o u t ( u ) d u 0 t P c ( u ) d u 0 t 0
In this expression, E ( t ) denotes the energy balance at time t and hence E ( 0 ) represents the initial energy stored in the buffer. Given the fact that in our case both the energy harvested and the energy consumed follow periodic patterns, the former on a daily basis (for a given month in our modelling approach), the latter on a round basis, the condition for energy neutral operation can be formulated for a one-day interval, since this is the largest period: note that typically the 24-h period is a very large multiple integer of the round duration, which is on the order of one or several minutes at most. For the same reason, we can undoubtedly assume that the energy consumed by the sensor node during a communication round is uniformly distributed over its duration, and thus the power consumption component becomes independent of time. Based on theses assumptions, we can rewrite the condition for energy neutral operation in the following way, where T D represents the duration of a day ( T D = 24 if it is expressed in hours) and the reference to the individual node X has been made explicit:
E ( t , X ) = E ( 0 , X ) + 0 t P o u t ( u ) d u 0 t E r o u n d ( X ) T r n d d u 0 t [ 0 , T D ]
E ( T D , X ) = E ( 0 , X )
So, E ( t , X ) represents the energy available in node X at time t. Note that, for sustained operation, it would be enough that E ( T D , X ) E ( 0 , X ) , meaning that the energy available at the node would increase from day to day. However, such a positive balance would only reflect an inefficient use of the available energy. Hence, in order to benefit the node duty cycle from any excess of harvested energy, the optimal condition is Equation (37b). This contributes to increased performance under self-sustained operation.
Let us start by evaluating the first integral in Equation (37a), which is nothing else but the energy produced by the solar cell up to time t, namely E o u t ( t ) = 0 t P o u t ( u ) d u . Recalling Equations (34) and (35), we can easily derive the following result:
E o u t ( t ) = 0 if t < t s u n r i s e η S 3 p ( t h ) 3 + η S D m o n t h t + η S ( t s u n r i s e h ) 3 3 p D m o n t h t s u n r i s e if t s u n r i s e t < t s u n s e t η S 3 p ( t s u n s e t h ) 3 + η S D m o n t h t s u n s e t + η S ( t s u n r i s e h ) 3 3 p D m o n t h t s u n r i s e if t s u n s e t t T D
On the other hand, 0 t E r o u n d ( X ) T r n d d u = E r o u n d ( X ) T r n d t . Figure 16 plots the evolution of E ( t , X ) during a one-day period. Regarding the energy consumption model, we have used the data shown in Table 3, but with T r n d = 60 s and D C = 40 % . The load σ ( X ) has been set to 30. Regarding the energy harvesting model, we have considered D m o n t h = 4.87 kWh/m 2 /day and S T D H O U R S = 12.5 h (data corresponding to Madrid in September), E ( 0 , X ) = 1000 Joules (initial energy level), a capacity of 3000 Joules and a solar cell with S = 36 cm 2 and η = 11.38 % . As it can be noticed, E ( t , X ) exhibits an oscillating behavior while condition Equation (37a) is satisfied.
Next, returning to condition Equation (37b), we can reformulate it as follows after very simple manipulations:
E o u t ( T D ) = E r o u n d ( X ) T D T r n d
Note that the quotient T D T r n d is nothing else but the number of rounds per day. From Equation (39) we can derive the condition for the duty cycle of node X, which is a parameter contained in E r o u n d ( X ) through Equation (15). In effect, this equation can be rewritten in the following way, by simply recalling that T s l p = T l ( 100 D C ) D C :
E r o u n d ( X ) = i = 1 C H ( X ) ( σ ( c i ( X ) ) + 1 ) E R , i ( X ) + ( σ ( X ) + 1 ) E T ( X ) + T r n d T l + T l ( 100 D C ) D C ( σ ( X ) + 1 ) ( E l + E s l e e p )
In order to simplify the process of obtaining a closed-form expression for D C , it is convenient first to analyze the dependence of E r o u n d ( X ) on this parameter. Figure 17 shows E r o u n d ( X ) in terms of D C for different values of σ ( X ) , T r n d = 60 s and the rest of parameters as given in Table 3. As it can be noticed, all curves exhibit a linear trend from relatively small values of D C . Additionally, recall from Section 1 that, whereas in battery-operated sensor networks the primary goal was to keep energy consumption as low as possible, in the case of EH-WSN the focus is on enhancing performance as long as energy neutral operation is preserved. Enhancing performance means enlarging the duty cycle of nodes as much as possible, as demonstrated in Figure 18, which shows the decrease of ε [ k ] as D C increases (note that smaller values of ε [ k ] imply higher throughput and lower delays). On the other hand, large values for D C (on the order of 40–50%) clearly correspond to the linear region of all curves in Figure 17. Thus, we can definitely make use of the linear approximation of E r o u n d ( X ) in terms of D C for sufficiently large values of the latter. After performing several manipulations, the resulting expression is as follows:
E r o u n d ( X ) I r x V T r n d D C 100 + ( σ ( X ) + 1 ) E l D A R
We have validated this approximation for several parameter combination. Figure 19 shows the results of one of the tests, which corresponds to most of data contained in Table 3 and σ ( X ) = 20 . In all cases, we could observe the same behavior: the straight line approaches very accurately the real function from moderately low values of D C onwards.
We can now introduce the linear approximation into Equation (39) and isolate D C to obtain the following result:
D C 100 = E o u t ( T D ) I r x V T D ( σ ( X ) + 1 ) E l D A R I r x V T r n d
Note that, in fact, this equation defines a threshold value for D C : if the real D C is larger, then the energy available at the node, E ( t , X ) , exhibits a decreasing trend until the node eventually reaches a blocking status; in contrast, if it is smaller, the trend is increasing but evolving towards a flat as the node energy approaches the capacity of the energy buffer. Though this latter situation is feasible from an operational point of view, it reflects a downward dimensioning of the duty cycle that entails some unnecessary performance degradation. The three situations are described in Figure 20, for which we have reused the data of Figure 16 (except the duty cycle). Specifically, for such dataset the duty cycle obtained by applying Equation (42) is D C 46 % . Accordingly, Figure 20 shows the evolution of E ( t , X ) corresponding to D C = 46 % , D C = 40 % and D C = 50 % . Note that the evolution of E ( t , X ) has been extended to 10 days in the three curves, in order to clearly show their trends and the effects of the energy capacity in the case of Figure 20 located on the center.
The last part of the analysis consists of determining a minimum value for the initial energy level, namely E ( 0 , X ) , such that condition Equation (37a) is satisfied for the one-day period. Note that, in our modelling approach, if this condition holds and the duty cycle is less than or equal to the value obtained from Equation (42), then sustained operation is guaranteed. Note also that condition Equation (37a) is fulfilled as long as the minimum of E ( t , X ) along the one-day period is greater than or equal to zero. Thus, the next step is to determine such minimum by setting d E ( t , X ) t = 0 . In fact, this process leads to the calculation of both the maximum and minimum of E ( t , X ) with the help of the second derivative. Let T m i n and T m a x denote, respectively, the time instants within a one-day period for which the minimum and maximum of E ( t , X ) take place—recall Figure 16. The results are as follows:
T m i n = h S T D H O U R S 2 1 E r o u n d ( X ) η S T r n d D m o n t h
T m a x = h + S T D H O U R S 2 1 E r o u n d ( X ) η S T r n d D m o n t h
For the calculation of E r o u n d ( X ) , either Equation (40) or its linear approximation Equation (41) can be used. Next, by imposing E ( T m i n , X ) 0 and performing some manipulations, we can end up with the following result for the initial energy:
E ( 0 , X ) E r o u n d ( X ) T r n d T m i n E o u t ( T m i n )
Equations (42) and (45) represent the final results of this paper for the modelling approach and assumptions that have been adopted. Certainly, real weather conditions often deviate from the periodic behavior exhibited by the prediction model proposed in Section 6, and in addition other unexpected changes may also take place (for instance, topological updates). However, we believe that those equations can be used as starting points to develop adaptive schemes that also rely on the capabilities of nodes of measuring their own energy level. We emphasize this task as an issue for further research in the next section.

8. Conclusions and Future Work

In this paper, we have obtained closed-form expressions for the duty cycle and initial energy storage that guarantee self-sustained operation in TinyOS solar-based EH-WSN devoted to periodic monitoring. To achieve these results, first we have developed an energy consumption model, whose deviation from simulation estimates is 4.8% in the worst case. Then, we have formulated the condition for energy neutral operation by combining an approximate version of the energy consumption model with a well-known solar irradiance model. This model assumes a periodic pattern for the irradiance level that is based on the average prediction at given spatial and temporal coordinates. The approximate energy consumption model omits the details of the LPL mechanism implemented in TinyOS sensor nodes, while at the same time it retains the essential components. For this reason, we postulate that the obtained formulation can be extended to other software (with corresponding hardware) platforms, and thus it can be used as a starting point to develop adaptive schemes that dynamically adjust the duty cycle of nodes according to changing traffic and weather conditions. We leave these issues for further research. We also suggest that the energy-harvesting model considered in this paper be refined according to the geographic latitude and meteorological conditions of the deployment scenario.

Author Contributions

Conceptualization, S.G. and S.E.; Validation, S.G. and S.E.; Formal Analysis, S.G.; Investigation, S.G. and S.E.; Writing and Original Draft Preparation, S.G. and S.E.; Writing, Review & Editing, S.G. and S.E.

Funding

This research received no external funding.

Acknowledgments

The authors wish to thank David Moss, from People Power Company, for his valuable comments on much of the subject matter of this paper, particularly with regard to the implementation of LPL in TinyOS, to which development he contributed mostly.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Sherazi, H.H.R.; Grieco, L.A.; Boggia, G. A comprehensive review on energy harvesting MAC protocols in WSNs: Challenges and tradeoffs. Ad Hoc Netw. 2018, 71, 117–134. [Google Scholar] [CrossRef]
  2. Ramezani, P.; Pakravan, M.R. Overview of MAC protocols for energy harvesting wireless sensor networks. In Proceedings of the IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, China, 30 August–2 September 2015; pp. 2032–2037. [Google Scholar] [CrossRef]
  3. Selahattin, K. MAC Protocols for Energy Harvesting Wireless Sensor Networks: Survey. ETRI J. 2015, 37, 804–812. [Google Scholar] [CrossRef]
  4. Seah, W.K.G.; Eu, Z.A.; Tan, H.P. Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP)—Survey and challenges. In Proceedings of the 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, Aalborg, Denmark, 17–20 May 2009; pp. 1–5. [Google Scholar] [CrossRef]
  5. Eu, Z.; Seah, W.; Tan, H. A study of mac schemes for wireless sensor networks powered by ambient energy harvesting. In Proceedings of the 4th Annual International Conference on Wireless Internet, Maui, HI, USA, 17–19 November 2008; pp. 17–19. [Google Scholar]
  6. Yigitel, M.A.; Incel, O.D.; Ersoy, C. QoS-aware MAC protocols for wireless sensor networks: A survey. Comput. Netw. 2011, 55, 1982–2004. [Google Scholar] [CrossRef]
  7. Huang, P.; Xiao, L.; Soltani, S.; Mutka, M.W.; Xi, N. The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2013, 15, 101–120. [Google Scholar] [CrossRef]
  8. Memsic. MicaZ Platform. 2004. Available online: http://www.memsic.com/userfiles/files/Datasheets/WSN/micaz_datasheet-t.pdf (accessed on 28 July 2018).
  9. Titzer, B.; Lee, D.; Palsberg, J. Avrora: Scalable sensor network simulation with precise timing. In Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, Boise, ID, USA, 15 April 2005; pp. 477–482. [Google Scholar]
  10. Sohrabi, K.; Gao, J.; Ailawadhi, V.; Pottie, G. Protocols for self-organization of a wireless sensor network. Pers. Commun. IEEE 2000, 7, 16–27. [Google Scholar] [CrossRef]
  11. Ye, W.; Heidemann, J.; Estrin, D. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 23–27 June 2002; Volume 3, pp. 1567–1576. [Google Scholar]
  12. Conner, W.S.; Chhabra, J.; Yarvis, M.; Krishnamurthy, L. Experimental Evaluation of Synchronization and Topology Control for In-building Sensor Network Applications. In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA ’03), San Diego, CA, USA, 19 September 2003; pp. 38–49. [Google Scholar] [CrossRef]
  13. Rajendran, V.; Obraczka, K.; Garcia-Luna-Aceves, J.J. Energy-efficient Collision-free Medium Access Control for Wireless Sensor Networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys ’03), Los Angeles, CA, USA, 5–7 November 2003; pp. 181–192. [Google Scholar]
  14. Van Dam, T.; Langendoen, K. An Adaptive Energy-efficient MAC Protocol for Wireless Sensor Networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys ’03), Los Angeles, CA, USA, 5–7 November 2003; pp. 171–180. [Google Scholar] [CrossRef]
  15. Buettner, M.; Yee, G.V.; Anderson, E.; Han, R. X-MAC: A Short Preamble MAC Protocol for Duty-cycled Wireless Sensor Networks. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SenSys ’06), Boulder, CO, USA, 31 October–3 November 2006; pp. 307–320. [Google Scholar]
  16. El-Hoiydi, A. Aloha with preamble sampling for sporadic traffic in ad hoc wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC 2002), New York, NY, USA, 28 April–2 May 2002; Volume 5, pp. 3418–3423. [Google Scholar]
  17. Polastre, J.; Hill, J.; Culler, D. Versatile Low Power Media Access for Wireless Sensor Networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys ’04), Baltimore, MD, USA, 3–5 November 2004; pp. 95–107. [Google Scholar] [CrossRef]
  18. Moss, D.; Levis, P. BoX-MACs: Exploiting Physical and Link Layer Boundaries in Low-Power Networking; Technical Report; Computer Systems Laboratory Stanford University: Stanford, CA, USA, 2008. [Google Scholar]
  19. Liang, C.J.M.; Terzis, A. Koala: Ultra-Low Power Data Retrieval in Wireless Sensor Networks. In Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN ’08), St. Louis, MO, USA, 22–24 April 2008; pp. 421–432. [Google Scholar]
  20. Sun, Y.; Gurewitz, O.; Johnson, D.B. RI-MAC: A Receiver-initiated Asynchronous Duty Cycle MAC Protocol for Dynamic Traffic Loads in Wireless Sensor Networks. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ’08), Raleigh, NC, USA, 4–7 November 2008; pp. 1–14. [Google Scholar] [CrossRef]
  21. Dutta, P.; Dawson-Haggerty, S.; Chen, Y.; Liang, C.J.M.; Terzis, A. Design and Evaluation of a Versatile and Efficient Receiver-initiated Link Layer for Low-power Wireless. In Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems (SenSys ’10), Zurich, Switzerland, 3–5 November 2010; pp. 1–14. [Google Scholar] [CrossRef]
  22. Kakria, A.; Aseri, T.C. A Survey on Asynchronous MAC protocols in Wireless Sensor Networks. Int. J. Comput. Appl. 2014, 109, 19–22. [Google Scholar] [CrossRef]
  23. El-Hoiydi, A.; Decotignie, J.D. WiseMAC: An ultra low power MAC protocol for the downlink of infrastructure wireless sensor networks. In Proceedings of the Ninth International Symposium on Computers and Communications (ISCC 2004), Alexandria, Egypt, 28 July 2004; Volume 1, pp. 244–251. [Google Scholar]
  24. Rhee, I.; Warrier, A.; Aia, M.; Min, J.; Sichitiu, M. Z-MAC: A Hybrid MAC for Wireless Sensor Networks. IEEE/ACM Trans. Netw. 2008, 16, 511–524. [Google Scholar] [CrossRef] [Green Version]
  25. Stone, K.; Colagrosso, M. Efficient duty cycling through prediction and sampling in wireless sensor networks. Wirel. Commun. Mob. Comput. 2007, 7, 1087–1102. [Google Scholar] [CrossRef]
  26. Hurni, P.; Braun, T. MaxMAC: A Maximally Traffic-Adaptive MAC Protocol for Wireless Sensor Networks. In Wireless Sensor Networks; Silva, J., Krishnamachari, B., Boavida, F., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 5970, pp. 289–305. [Google Scholar]
  27. Ye, W.; Silva, F.; Heidemann, J. Ultra-low Duty Cycle MAC with Scheduled Channel Polling. In Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SenSys ’06), Boulder, CO, USA, 1–3 November 2006; pp. 321–334. [Google Scholar] [CrossRef]
  28. Jurdak, R.; Baldi, P.; Lopes, C.V. Adaptive Low Power Listening for Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2007, 6, 988–1004. [Google Scholar] [CrossRef]
  29. Anastasi, G.; Conti, M.; Di Francesco, M. Extending the Lifetime of Wireless Sensor Networks Through Adaptive Sleep. IEEE Trans. Ind. Inf. 2009, 5, 351–365. [Google Scholar] [CrossRef] [Green Version]
  30. Sun, Y.; Du, S.; Gurewitz, O.; Johnson, D.B. DW-MAC: A Low Latency, Energy Efficient Demand-wakeup MAC Protocol for Wireless Sensor Networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’08), Hong Kong, China, 26–30 May 2008; pp. 53–62. [Google Scholar] [CrossRef]
  31. Colesanti, U.; Santini, S.; Vitaletti, A. DISSense: An adaptive ultralow-power communication protocol for wireless sensor networks. In Proceedings of the International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), Barcelona, Spain, 27–29 June 2011; pp. 1–10. [Google Scholar] [CrossRef]
  32. Escolar, S.; Chessa, S.; Carretero, J.; Marinescu, M.C. Cross Layer Adaptation of Check Intervals in Low Power Listening MAC Protocols for Lifetime Improvement in Wireless Sensor Networks. Sensors 2012, 12, 10511–10535. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  33. Gnawali, O.; Fonseca, R.; Jamieson, K.; Moss, D.; Levis, P. Collection Tree Protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys ’09), Berkeley, CA, USA, 4–6 November 2009; pp. 1–14. [Google Scholar] [CrossRef]
  34. Merlin, C.; Heinzelman, W. Node synchronization for minimizing delay and energy consumption in low-power-listening MAC protocols. In Proceedings of the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 September–2 October 2008; pp. 265–274. [Google Scholar] [CrossRef]
  35. Merlin, C.J.; Heinzelman, W.B. Schedule Adaptation of Low-Power-Listening Protocols for Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2010, 9, 672–685. [Google Scholar] [CrossRef] [Green Version]
  36. Merlin, C.; Heinzelman, W. Duty Cycle Control for Low-Power-Listening MAC Protocols. IEEE Trans. Mob. Comput. 2010, 9, 1508–1521. [Google Scholar] [CrossRef] [Green Version]
  37. Alfayez, F.; Hammoudeh, M.; Abuarqoub, A. A Survey on MAC Protocols for Duty-cycled Wireless Sensor Networks. Procedia Comput. Sci. 2015, 73, 482–489. [Google Scholar] [CrossRef]
  38. Demirkol, I.; Ersoy, C.; Alagoz, F. MAC protocols for wireless sensor networks: A survey. IEEE Commun. Mag. 2006, 44, 115–121. [Google Scholar] [CrossRef]
  39. Bachir, A.; Dohler, M.; Watteyne, T.; Leung, K.K. MAC Essentials for Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2010, 12, 222–248. [Google Scholar] [CrossRef] [Green Version]
  40. Trivedi, N.; Kuamr, G.; Raikwar, T. Survey on MAC protocol for wireless sensor network. Int. J. Emerg. Technol. Adv. Eng. 2013, 3, 558–562. [Google Scholar]
  41. Verma, A.; Singh, M.P.; Singh, J.P.; Kumar, P. Survey of MAC Protocol for Wireless Sensor Networks. In Proceedings of the Second International Conference on Advances in Computing and Communication Engineering, Dehradun, India, 1–2 May 2015; pp. 92–97. [Google Scholar] [CrossRef]
  42. Eu, Z.A.; Tan, H.P.; Seah, W.K. Design and performance analysis of MAC schemes for Wireless Sensor Networks Powered by Ambient Energy Harvesting. Ad Hoc Netw. 2011, 9, 300–323. [Google Scholar] [CrossRef]
  43. Fujii, C.; Seah, W.K.G. Multi-tier probabilistic polling in Wireless Sensor Networks powered by energy harvesting. In Proceedings of the Seventh International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Adelaide, Australia, 6–9 December 2011; pp. 383–388. [Google Scholar] [CrossRef]
  44. Nguyen, T.D.; Khan, J.Y.; Ngo, D.T. An Adaptive MAC Protocol for RF Energy Harvesting Wireless Sensor Networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  45. Al-Sulaifanie, A.I.; Biswas, S.; Al-Sulaifanie, B.K. AH-MAC: Adaptive Hierarchical MAC Protocol for Low-Rate Wireless Sensor Network Applications. J. Sens. 2017, 2017. [Google Scholar] [CrossRef]
  46. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; Volume 2, p. 10. [Google Scholar] [CrossRef]
  47. Eu, Z.A.; Tan, H.P. Probabilistic polling for multi-hop energy harvesting wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 271–275. [Google Scholar] [CrossRef]
  48. Fafoutis, X.; Dragoni, N. ODMAC: An On-demand MAC Protocol for Energy Harvesting—Wireless Sensor Networks. In Proceedings of the 8th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN ’11), Miami, FL, USA, 3–4 November 2011; pp. 49–56. [Google Scholar] [CrossRef]
  49. Liu, H.I.; He, W.J.; Seah, W.K. LEB-MAC: Load and energy balancing MAC protocol for energy harvesting powered wireless sensor networks. In Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Hsinchu, Taiwan, 16–19 December 2014; pp. 584–591. [Google Scholar] [CrossRef]
  50. Kim, S.C.; Jeon, J.H.; Park, H.J. QoS Aware Energy-Efficient (QAEE) MAC Protocol for Energy Harvesting Wireless Sensor Networks. In Proceedings of the 6th International Conference, ICHIT 2012, Daejeon, Korea, 23–25 August 2012. [Google Scholar]
  51. Lin, H.H.; Shih, M.J.; Wei, H.Y.; Vannithamby, R. DeepSleep: IEEE 802.11 enhancement for energy-harvesting machine-to-machine communications. Wirel. Netw. 2014, 21, 357–370. [Google Scholar] [CrossRef]
  52. Kim, Y.; Park, C.W.; Lee, T.J. MAC Protocol for Energy-harvesting Users in Cognitive Radio Networks. In Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication (ICUIMC ’14), Siem Reap, Cambodia, 9–11 January 2014. [Google Scholar] [CrossRef]
  53. Naderi, M.Y.; Nintanavongsa, P.; Chowdhury, K.R. RF-MAC: A Medium Access Control Protocol for Re-Chargeable Sensor Networks Powered by Wireless Energy Harvesting. IEEE Trans. Wirel. Commun. 2014, 13, 3926–3937. [Google Scholar] [CrossRef] [Green Version]
  54. Hill, J.; Szewczyk, R.; Woo, A.; Hollar, S.; Culler, D.; Pister, K. System Architecture Directions for Networked Sensors. SIGPLAN Not. 2000, 35, 93–104. [Google Scholar] [CrossRef]
  55. Amjad, M.; Sharif, M.; Afzal, M.K.; Kim, S.W. TinyOS-New Trends, Comparative Views, and Supported Sensing Applications: A Review. IEEE Sens. J. 2016, 16, 2865–2889. [Google Scholar] [CrossRef]
  56. CC2420 Datasheet. 2014. Available online: http://www.ti.com/lit/ds/symlink/cc2420.pdf (accessed on 28 July 2018).
  57. Landsiedel, O.; Wehrle, K.; Gotz, S. Accurate Prediction of Power Consumption in Sensor Networks. In Proceedings of the Second IEEE Workshop on Embedded Networked Sensors (EmNetS-II), Sydney, Queensland, Australia, 31 May 2005; pp. 37–44. [Google Scholar] [Green Version]
  58. Escolar, S.; Chessa, S.; Carretero, J. Energy Management in Solar Cells Powered Wireless Sensor Networks for Quality of Service Optimization. Pers. Ubiquitous Comput. 2014, 18, 449–464. [Google Scholar] [CrossRef]
  59. NASA. Surface meteorology and Solar Energy (RETScreen). 2013. Available online: https://eosweb.larc.nasa.gov/cgi-bin/sse/retscreen.cgi?&[email protected] (accessed on 28 July 2018).
  60. Escolar, S.; Chessa, S.; Carretero, J. Quality of service optimization in solar cells-based energy harvesting wireless sensor networks. Energy Effic. 2017, 10, 331–357. [Google Scholar] [CrossRef]
  61. Kansal, A.; Hsu, J.; Zahedi, S.; Srivastava, M.B. Power Management in Energy Harvesting Sensor Networks. ACM Trans. Embed. Comput. Syst. 2007, 6. [Google Scholar] [CrossRef]
Figure 1. State transition diagrams of one CC2420 radio activation with no channel activity (left) and with channel activity (right). RX and Power Off states include also their durations, T l and T s l p , respectively, on the figure on the left.
Figure 1. State transition diagrams of one CC2420 radio activation with no channel activity (left) and with channel activity (right). RX and Power Off states include also their durations, T l and T s l p , respectively, on the figure on the left.
Sensors 18 02499 g001
Figure 2. Scenario under analysis: node A generates and transmits a packet and node B receives and forwards this packet to its next-hop node.
Figure 2. Scenario under analysis: node A generates and transmits a packet and node B receives and forwards this packet to its next-hop node.
Sensors 18 02499 g002
Figure 3. Time diagram for packet generation and transmission (node A) and packet forwarding (node B). The transmission process starts at the beginning of a duty period in the sending node A. This period is extended to the total time required to complete the transmission, i.e., until an ACK is received from node B. Packet reception by node B generally involves detection of a packet fragment before the complete packet is received and acknowledged. Then, the node forwads the packet through its next-hop link. Note also that the two nodes spend an extra time in reception mode before switching again to sleep mode.
Figure 3. Time diagram for packet generation and transmission (node A) and packet forwarding (node B). The transmission process starts at the beginning of a duty period in the sending node A. This period is extended to the total time required to complete the transmission, i.e., until an ACK is received from node B. Packet reception by node B generally involves detection of a packet fragment before the complete packet is received and acknowledged. Then, the node forwads the packet through its next-hop link. Note also that the two nodes spend an extra time in reception mode before switching again to sleep mode.
Sensors 18 02499 g003
Figure 4. Evolution of E f d in terms of the transmitter-receiver asynchrony, for T s l p α T c + T p k t .
Figure 4. Evolution of E f d in terms of the transmitter-receiver asynchrony, for T s l p α T c + T p k t .
Sensors 18 02499 g004
Figure 5. Evolution of E f d in terms of the transmitter-receiver asynchrony, for T s l p α T c + T p k t .
Figure 5. Evolution of E f d in terms of the transmitter-receiver asynchrony, for T s l p α T c + T p k t .
Sensors 18 02499 g005
Figure 6. General scenario for the evaluation of the energy consumption per round.
Figure 6. General scenario for the evaluation of the energy consumption per round.
Sensors 18 02499 g006
Figure 7. Energy consumption in μ Joules for k tries of a transmitter node (left) and a receiver and forwarding node (right).
Figure 7. Energy consumption in μ Joules for k tries of a transmitter node (left) and a receiver and forwarding node (right).
Sensors 18 02499 g007
Figure 8. Network deployments used in the simulation tests.
Figure 8. Network deployments used in the simulation tests.
Sensors 18 02499 g008
Figure 9. 10-node topologies after simulation with D C = 3 % (left) and D C = 10 % (right).
Figure 9. 10-node topologies after simulation with D C = 3 % (left) and D C = 10 % (right).
Sensors 18 02499 g009
Figure 10. Energy consumption after the simulation of the 10-node topology, with D C = 3 % (left) and D C = 10 % (right), for 1, 2, 3, 10, 20 and 30 rounds.
Figure 10. Energy consumption after the simulation of the 10-node topology, with D C = 3 % (left) and D C = 10 % (right), for 1, 2, 3, 10, 20 and 30 rounds.
Sensors 18 02499 g010
Figure 11. Avrora vs. energy model comparison for the 10-nodes network with D C = 3 % (on the left) and D C = 10 % (on the right).
Figure 11. Avrora vs. energy model comparison for the 10-nodes network with D C = 3 % (on the left) and D C = 10 % (on the right).
Sensors 18 02499 g011
Figure 12. 20-node topologies after simulation with D C = 3 % (left) and D C = 10 % (right).
Figure 12. 20-node topologies after simulation with D C = 3 % (left) and D C = 10 % (right).
Sensors 18 02499 g012
Figure 13. Energy consumption after the simulation of the 20-node topology, with D C = 3 % (left) and D C = 10 % (right), for 2, 3, 4, 10, 20 and 30 rounds.
Figure 13. Energy consumption after the simulation of the 20-node topology, with D C = 3 % (left) and D C = 10 % (right), for 2, 3, 4, 10, 20 and 30 rounds.
Sensors 18 02499 g013
Figure 14. Avrora vs. energy model comparison for the 20-nodes network with D C = 3 % (left) and D C = 10 % (right).
Figure 14. Avrora vs. energy model comparison for the 20-nodes network with D C = 3 % (left) and D C = 10 % (right).
Sensors 18 02499 g014
Figure 15. Irradiance curves for the cities of Madrid and Hamburg in January and July.
Figure 15. Irradiance curves for the cities of Madrid and Hamburg in January and July.
Sensors 18 02499 g015
Figure 16. Evolution of E ( t , X ) during a one-day period, for D C = 40 % .
Figure 16. Evolution of E ( t , X ) during a one-day period, for D C = 40 % .
Sensors 18 02499 g016
Figure 17. Energy consumption per round in terms of the duty cycle.
Figure 17. Energy consumption per round in terms of the duty cycle.
Sensors 18 02499 g017
Figure 18. Expected number of tries in terms of the duty cycle.
Figure 18. Expected number of tries in terms of the duty cycle.
Sensors 18 02499 g018
Figure 19. Linear approximation to E r o u n d ( X ) from moderately low values of D C , for σ ( X ) = 20 .
Figure 19. Linear approximation to E r o u n d ( X ) from moderately low values of D C , for σ ( X ) = 20 .
Sensors 18 02499 g019
Figure 20. Evolution of E ( t , X ) for D C = 46 % (left), for D C = 40 % (center) and for D C = 50 % (right).
Figure 20. Evolution of E ( t , X ) for D C = 46 % (left), for D C = 40 % (center) and for D C = 50 % (right).
Sensors 18 02499 g020
Table 1. Characterization of the number of tries (k) in the process of sending a packet.
Table 1. Characterization of the number of tries (k) in the process of sending a packet.
Time Intervals (for the Backend)kProbability
[0, T C C A ) U [ T C C A + T s l p , T l + T s l p ]1 T l T l + T s l p
[ T C C A , T C C A + T c )2 T c T l + T s l p
[ T C C A + T c , T C C A + 2 T c )3 T c T l + T s l p
[ T C C A + 2 T c , T C C A + 3 T c )4 T c T l + T s l p
[ T C C A + 3 T c , T C C A + 4 T c )5 T c T l + T s l p
[ T C C A + ( α 1 ) T c , T C C A + α T c ) α + 1 T c T l + T s l p
[ T C C A + α T c , T C C A + T s l p ) α + 2 T s l p α T c T l + T s l p
Table 2. Characterization of ( E f d ) in terms of the transmitter-receiver asynchrony.
Table 2. Characterization of ( E f d ) in terms of the transmitter-receiver asynchrony.
Time Intervals (var. t)Subintervals (var. t’) E f d
[ 0 , T C C A ) E l T C C A t T l
[ T C C A , T C C A + T c ) [ 0 + , T p k t ) E r x p k t T p k t t T p k t + E l W a c k + T C C A T l
[ T p k t , T c ) E l T c t T l
[ T C C A + T c , T C C A + 2 T c ) [ 0 + , T p k t ) E r x p k t T p k t t T p k t + E l W a c k + T C C A T l
[ T p k t , T c ) E l T c t T l
[ T C C A + 2 T c , T C C A + 3 T c ) [ 0 + , T p k t ) E r x p k t T p k t t T p k t + E l W a c k + T C C A T l
[ T p k t , T c ) E l T c t T l
[ T C C A + ( α 1 ) T c , T C C A + α T c ) [ 0 + , T p k t ) E r x p k t T p k t t T p k t + E l W a c k + T C C A T l
[ T p k t , T c ) E l T c t T l
[ T C C A + α T c , T C C A + T s l p ) if ( T s l p α T c + T p k t ) [ 0 + , T s l p α T c ) E r x p k t T p k t t T p k t + E l W a c k + T C C A T l
else [ 0 + , T p k t ) E r x p k t T p k t t T p k t + E l W a c k + T C C A T l
[ T p k t , T s l p α T c ) E l T c t T l
[ T C C A + T s l p , T l + T s l p ] E l T l + T s l p + T C C A t T l
Table 3. Parameters used in the validation of the analytical model.
Table 3. Parameters used in the validation of the analytical model.
SymbolDescriptionValue
B W 802.15.4 Bandwidth250 Kbps
L p k t Length of data packets41 Bytes
T p k t Duration of data packets L p k t B W
L a c k Length of acknowledgement packets17 Bytes
T a c k Duration of acknowledgement packets L a c k B W
T C C A CCA interval0.4 ms
W a c k Waiting time for ACK1 ms
T c Transmission cycle2.712 ms
T r n d Round time (reporting period)30 s
D C Duty cycle3%, 10%
T l DUTY_ON_TIME5 ms
D A R DELAY_AFTER_RECEIVE100 ms
BBattery2500 mAh
VVoltage3 V
I o f f Current draw in Power Off 0.2 · 10 6 A
I d o w n Current draw in Power Down 20 · 10 6 A
I i d l e Current draw in Idle 0.426 · 10 3 A
I t x Current draw in TX (at 0 dbM)0.0174 A
I r x Current draw in RX0.0188 A
Table 4. Duration of each CC2420 radio state on a radio activation with no incoming packets.
Table 4. Duration of each CC2420 radio state on a radio activation with no incoming packets.
StateNotationDuration (ms)
Power Down 1 T d o w n 1 1.680750
Idle T i d l e 0.146625
RX T r x 4.742875
Power Down 2 T d o w n 2 0.000250
Power Off T o f f To be adjusted
Table 5. Daylight hours and solar irradiance parameters for Madrid (latitude: 40.437944; longitude: −3.679536) and Hamburg (latitude: 53.558869; longitude: 9.927821) during the months of January and July.
Table 5. Daylight hours and solar irradiance parameters for Madrid (latitude: 40.437944; longitude: −3.679536) and Hamburg (latitude: 53.558869; longitude: 9.927821) during the months of January and July.
City/MonthSTDHOURS (Hours) D month (kWh/m 2 /day)
Madrid/January9.652.03
Madrid/July14.707.20
Hamburg/January8.100.68
Hamburg/July16.404.83

Share and Cite

MDPI and ACS Style

Galmés, S.; Escolar, S. Analytical Model for the Duty Cycle in Solar-Based EH-WSN for Environmental Monitoring. Sensors 2018, 18, 2499. https://doi.org/10.3390/s18082499

AMA Style

Galmés S, Escolar S. Analytical Model for the Duty Cycle in Solar-Based EH-WSN for Environmental Monitoring. Sensors. 2018; 18(8):2499. https://doi.org/10.3390/s18082499

Chicago/Turabian Style

Galmés, Sebastià, and Soledad Escolar. 2018. "Analytical Model for the Duty Cycle in Solar-Based EH-WSN for Environmental Monitoring" Sensors 18, no. 8: 2499. https://doi.org/10.3390/s18082499

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop