Next Article in Journal
Information-Aware Secure Routing in Wireless Sensor Networks
Next Article in Special Issue
Discovering Human Activities from Binary Data in Smart Homes
Previous Article in Journal
A Sparse Perspective for Direction-of-Arrival Estimation Under Strong Near-Field Interference Environment
Previous Article in Special Issue
Auto-Configuration in Wireless Sensor Networks: A Review
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Route Selections in ZigBee Wireless Sensor Networks

by
Srikar Meka
1,† and
Benedito Fonseca, Jr.
2,*,†
1
Underwriters Laboratories (UL) Inc., 333 Pfingsten Rd., Northbrook, IL 60062, USA
2
Department of Electrical Engineering, Northern Illinois University, 590 Garden Rd., DeKalb, IL 60115, USA
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2020, 20(1), 164; https://doi.org/10.3390/s20010164
Submission received: 30 November 2019 / Revised: 20 December 2019 / Accepted: 22 December 2019 / Published: 26 December 2019
(This article belongs to the Special Issue Wireless Sensor Networks in Smart Homes)

Abstract

:
The ZigBee wireless communication specifications forecast the use of multihop routes between nodes and define that nodes select their routes based on their costs. The specifications define how to compute a route cost from the probability of successfully transmitting on each of the routes’ links; and it is recommended that such probabilities be obtained by counting received link status messages or averaging link quality indicators from received packets. In this paper, we study the performance of these two recommended procedures, show that they can lead to degraded route selections, and propose a procedure that can improve route selections without modifications to the ZigBee protocol or frame formats. Our procedure estimates the probability of successful transmission on each link, based on information from the medium access layer during unicast packet transmissions, and includes a modification into how ZigBee nodes treat routing messages internally in order to reduce variations in the link cost estimates. Focusing on a home environment with one or two hops, our simulation results show that, in several scenarios, our procedure performs better than either of the two procedures recommended in the ZigBee specifications.

1. Introduction

ZigBee is a wireless communication protocol that has been successfully used in applications ranging from home automation to industrial control and consumer electronics [1,2]. It is particularly suitable for wireless sensor networks because of the low cost of devices and their low power consumption. ZigBee operates above the IEEE 802.15.4 wireless communication standard [3], which contains medium access and physical layer procedures to enable operation in the unlicensed frequency spectrum. An additional benefit of the ZigBee protocol is its ability to extend the communication range with multihop communications [1]. Consider, for instance, the network of Figure 1. Although nodes 3, 4, and 5 are not within radio reach of node 0, they can transmit their data packets to node 1 or 2, which then relays the packets to node 0. The ZigBee protocol has detailed procedures to establish multihop routes between nodes. In fact, ZigBee contains procedures specifically tailored for many-to-one communications [4], in which several nodes transmit data to a single concentrator node, which is a typical scenario in wireless sensor networks. Although there are many products already using the ZigBee protocol, the ZigBee Alliance is still actively developing future versions [5,6], and there is still interest on ZigBee from a research perspective [7,8,9,10,11,12].
In this paper, we focus on one particular aspect that the ZigBee specifications do not fully specify: the estimation of the probability of successful transmission on a link. Such an estimation is important because it is used by nodes to select multihop routes. Often, a node has multiple candidate routes to reach another node; for example, node 3 in Figure 1 can reach node 0 through the nodes 1 or 2; and nodes are supposed to choose the route with the lowest cost. As discussed in Section 2.3, there are several ways to define the cost of a route; and ZigBee specifies the cost of a route as the sum of the cost of each link that compose a route; and the cost of each link is an inverse function of the probability of successfully transmitting on the link [13].
Although the ZigBee specifications do not specify how nodes should estimate the probability of successful transmission on a link, two possibilities are suggested (see page 338 of [13]): estimating the probability of successful transmission at the network layer by counting link status (LS) and data frames; or estimating the probability of successful transmission indirectly through the use of a physical level indicator that reflects the quality (or SINR) of a received packet. In ZigBee, such an indicator is the link quality indicator (LQI) that the IEEE 802.15.4 medium access layer (MAC) includes in every packet received and forwarded to the network layer; and the ZigBee’s network layer averages the received LQIs and maps the result into a probability of successful transmission to determine the cost of a link.
As discussed in Section 3.1, previous authors have shown that estimating link costs from beacons, such as ZigBee’s LS packets, is less accurate than estimating them from unicast data packets and have proposed alternative procedures to improve route selection [14,15,16,17,18,19,20,21,22,23,24,25,26,27,28]. Although these procedures are valuable and would improve link cost estimation and route selection, their implementation in ZigBee devices would require significant changes in the ZigBee specifications, protocol, and frame formats.
The question that motivated this paper was: can we improve link cost estimation and select better routes without changing the ZigBee protocol or frame formats? With this question in mind, our paper has two contributions:
  • We studied and compared the performances of the LS-based and LQI-based link cost estimation procedures suggested by the ZigBee specifications. We confirmed the findings of previous studies—that selecting routes based on solely the exchange of link status messages or LQI measurements can lead to poor route selections in ZigBee.
  • We proposed and evaluated the performance of a link cost estimation procedure that can be implemented without changes to the ZigBee protocol. As described in Section 6, the method that we propose is founded on estimating the probability of successful transmission by using information from the medium access control (MAC) layer regarding unicast retransmissions. Although the use of MAC layer information to estimate link costs has been considered before in other wireless networks [16,17,18,21,23,24,25,26,27,28], our method has procedures tailored to ZigBee. Furthermore, our procedure defines how to select among routes with the same cumulative costs, which is common in ZigBee links because ZigBee frame formats require the quantization of link costs into three bits. Although our procedure requires changes in the service access point between the network and MAC layers so that the MAC layer supplies more information than anticipated by the ZigBee specifications, the procedure can be implemented without changes to the ZigBee protocol or to the format of its frames. Focusing on a home environment with one or two hops, our simulations indicate that our procedure can offer better performance than either the LS-based or LQI-based procedures in several scenarios.
This paper is organized as follows: In Section 2, we provide an overview of ZigBee, the IEEE 802.15.4, the many-to-one routing protocol, and the way ZigBee specifies the computation of link and route costs. In Section 3.1, we provide more details about the previous works on estimating link costs and the LS-based and LQI-based estimation procedures suggested by the ZigBee specifications. In Section 4, we describe the simulation tool how we used it to evaluate link cost estimation procedures. Using this tool, Section 5 describes in detail, two examples that highlight the problems of the LS-based and LQI-based estimation procedures and motivated our procedure. Section 6 describes the link cost estimation method and the modified route selection procedure that we propose. In Section 7, we compare the performance of the LS-based, the LQI-based, and our proposed procedure in various topologies. Section 8 contains our conclusions and avenues for future research.

2. Overview of ZigBee

ZigBee is different from protocols such as IEEE 802.11, in that it specifies the use of a complete set of protocols specifically designed for device-to-device communication [1,2].
In its application layer, ZigBee defines application profiles that facilitate the communication between applications in the various devices and defines procedures for network discovery and connection establishment. ZigBee also defines the application support sub-layer (APS), which manages ongoing connections and has transport layer functionalities for end-to-end reliable data transfer with acknowledgments, retransmissions, and rejection of duplicate packets.
In its network layer, ZigBee defines procedures to establish multihop communication routes between devices, defining procedures for route discovery and routing algorithms. Four routing algorithms are defined [4]: table-based routing (similar to AODV), hierarchical tree routing, multicast routing, and many-to-one source routing. In this paper, we focus on the many-to-one (M2O) source routing algorithm because many applications of sensor networks involve many sensors transmitting information to one concentrator node. Details of the M2O algorithm are present in Section 2.2.
To support networking functions, ZigBee also defines that nodes periodically broadcast link status (LS) messages. In each LS message, a node broadcasts its current view of each neighboring link. More precisely, the LS message transmitted by a node contains a list of all neighbors of the node and contains the cost of the link from each of its neighbors to the node.
It is important to highlight that
  • The link costs present in the LS message are quantized into three bits (see Section 3.4.8 of [13]).
  • ZigBee differentiates between outgoing and incoming link costs; however, for M2O routing, the ZigBee specifications define that path costs be based on the maximum between them (see second paragraph of page 347 of [13]). To simplify our discussion, link costs in this paper refer to the maximum between the incoming and outgoing costs of a link.
For the medium access control (MAC) and physical layers, ZigBee specifies the use of the IEEE 802.15.4 MAC and physical layers, which are described next.

2.1. IEEE 802.15.4 MAC and Physical Layers

The IEEE 802.15.4 MAC layer has two operation modes: beacon and beaconless modes [3,29,30]. In this paper, we focus on the beaconless mode, which is more suitable for multihop communications. In the beaconless mode, devices associate with a coordinator device and new devices join the network by requesting beacons from devices already associated, extending the range of the network.
The IEEE 802.15.4 MAC layer controls the access of the channel through a carrier sense multiple access with collision avoidance (CSMA-CA) process. As detailed in Section 6.2.5 of [3], such a CSMA-CA procedure contains mechanisms for channel monitoring, random backoff, and retransmission.
As in other wireless protocols using CSMA-CA, ZigBee networks are prone to the hidden node problem [31,32], in which devices fail to sense each other transmissions (being hidden from each other) and may transmit at the same time, causing interference in the receiving node. For instance, in Figure 1, nodes 4 and 5 are far from nodes 0 and 3. When nodes 4 or 5 transmit, the energy received at nodes 0 and 3 is too low to trigger their carrier sense mechanism. If nodes 0 or 3 have a packet to transmit, they would then transmit at the same time as nodes 4 and 5, causing interference in the reception at nodes 1 and 2.
The IEEE 802.15.4 physical layer specifications enable operation in the unlicensed frequency spectrum at 2.4 GHz, specifying 16 channels of 2 MHz with carriers spaced by 5 MHz. As will be discussed in this paper, because WiFi IEEE 802.11 networks also operate in this band, interference and packet losses may occur in ZigBee communications when both networks operate in overlapping channels [8,33,34].
The IEEE 802.15.4, the physical layer also specifies that, whenever it sends a packet to the MAC layer, it also sends a link quality indicator (LQI). The LQI is a number between 0 and 255 that reflects the quality of the received symbols, being correlated with the SINR of the received packet. The LQI is also forwarded to the network layer, allowing the network layer to estimate the cost of the link, as discussed in Section 3.3.

2.2. Many-To-One Source Routing Algorithm

ZigBee specifies the many-to-one (M2O) Source Routing algorithm to setup routes between multiple devices and a single node, called the concentrator [1,4].
As specified in [13], to establish routes to the concentrator, the M2O routing algorithm uses a flooding of route request (RREQ) messages: the concentrator periodically broadcasts a RREQ message; nodes that receive the RREQ message rebroadcast the RREQ; and, as the RREQ travels through the network, nodes store the previous relay in their routing tables as the next hop to reach the concentrator. For example, in Figure 1, node 0 is the concentrator and periodically broadcasts a RREQ message. When nodes 1 and 2 receive the RREQ, they store in their routing tables that the concentrator can be reached directly; and, after a random delay, nodes 1 and 2 rebroadcast the RREQ message. When node 4 receives the RREQ from node 1, it stores in its routing table that node 1 is the next hop to reach node 0. Likewise, node 5 stores that node 2 is the next hop to reach node 0. The RREQ is rebroadcast by nodes until a specified maximum number of hops.
A node may have multiple routes to the concentrator, and to differentiate among routes, the RREQ message has a route cost field. This field is used by nodes to compute the cumulative route cost toward the concentrator. More precisely, whenever a node receives a RREQ message, it estimates the link cost from the transmitter to itself and adds it to the RREQ’s route cost field, forming the cumulative route cost. If the cumulative route cost is greater than the cumulative cost of a previously discovered route, then the node ignores the RREQ message. Otherwise, the routing table is updated with the next hop information and the cumulative cost; and the RREQ is rebroadcast with the route cost field updated with the cumulative cost.
The M2O algorithm allows nodes to adapt their routes to the environment. To enable routes to adapt, the concentrator broadcasts the RREQ periodically. Each broadcast of the RREQ by the concentrator marks a RREQ period. The RREQ period is defined by the RREQ identifier (RREQ-ID). The RREQ-ID is present in the RREQ message and is incremented whenever the concentrator transmits a new RREQ message. When a node receives a RREQ with a new RREQ-ID, it updates its routing table even if the cumulative route cost is higher than the cost obtained from a previous RREQ period (see first paragraph of page 348 of [13]).
The flooding of RREQ messages enables the establishment of routes from nodes to the concentrator; however, for reverse routes, the M2O algorithm uses route record (RREC) messages and source routing. A RREC message is a control packet sent by nodes to the concentrator. Whenever a node has a message to send to the concentrator, it first checks if a new RREQ period has started or if its next hop to the concentrator has changed. If either of these conditions have happened, the node sends the RREC message destined to the concentrator using the next hop node. As the RREC travels through next hop nodes, nodes append their addresses to the RREC message. When the RREC message arrives in the concentrator, it extracts and stores the whole route towards the node from the RREC message. Later, when the concentrator needs to transmit a message to the node, it uses the stored route to transmit to the target node using source routing; i.e., when transmitting the data packet, the concentrator adds the whole route in the header of the network layer. Relay nodes find out the next relay node from the header and remove their addresses before forwarding the packet.

2.3. Link and Route Costs

In order to enable nodes to differentiate between routes, ZigBee defines the cost of a route as follows: with z 1 , , z K being the nodes that form a route, the cost of the route is defined as the sum of individual link costs:
c z 1 , , z K : = i = 1 K 1 c z i , z i + 1 ,
where c z i , z i + 1 is the cost of the link between nodes z i and z i + 1 .
ZigBee further defines that the cost of a link c z 1 , z 2 be related to the probability of successful transmission in the link as follows: let p z 1 , z 2 be the probability that a packet transmitted by z 1 is successfully received at z 2 . The cost c z 1 , z 2 is defined as (see Section 3.6.3.1 of [13]):
c z 1 , z 2 : = min 7 , round 1 p z 1 , z 2 4 ,
where the reader should note that link costs are quantized into three bits.
It should be highlighted that the probabilities of successful transmission in links, and therefore, the various link costs, vary not only because of the various distances between nodes but because of hidden node problems [31,32] and external interference [8,33,34]. For instance, node 4 in Figure 1 may generate a higher traffic load than node 5, which means that the probability that node 1 successfully receives a packet from node 3 is lower than the probability that node 2 successfully receives node 3’s packet, which means that c 3 , 1 > c 3 , 2 . Likewise, if an IEEE 802.11 WiFi network is closer to node 1 than to node 2, it may cause more interference in node 1’s reception than in node 2’s reception, causing c 3 , 1 > c 3 , 2 as well.
Furthermore, the various link costs may vary over time. Although ZigBee networks usually involve stationary devices with a predictable traffic load, WiFi stations are mobile and their traffic load is difficult to forecast. For instance, a WiFi device may move into the area of a ZigBee network and start streaming a video of short duration, causing interference and variation in the cost of routes only during the video stream.
It is also important to note that ZigBee does not consider how the size of the packet can influence p z 1 , z 2 . Although different packet sizes alters p z 1 , z 2 , this simplification is reasonable when ZigBee is applied in applications where most application packets have approximately the same size. For instance, in a wireless sensor network where sensors behave in a similar manner and acquire the same type of measurements such a simplification is reasonable.
Lastly, we also note that ZigBee’s link cost definition does not include energy consumption. Defining link and route costs to minimize energy consumption is a common approach in the literature of route selection for wireless sensor networks [35,36,37,38,39,40,41,42,43]. Instead of addressing energy considerations in route selection, ZigBee conserves energy in battery-powered nodes by avoiding them to participate in routing procedures and by specifying power saving procedures. In this approach, battery-powered devices do not participate in routing procedures and communicate only with parent nodes, which are either the ZigBee coordinator or nodes with routing capabilities, called ZigBee Routers. Parent nodes are grid-powered and are the only nodes that participate in routing operations. Given the focus of this paper, all nodes are considered to be either the ZigBee coordinator or ZigBee Routers.

3. Estimating Link and Route Costs

The probabilities p z 1 , z 2 needed to define the various link costs are not known a priori and nodes need to estimate them in order to estimate c z 1 , z 2 .
ZigBee does not specify how this estimation is to be done and implementers are supposed to specify their own estimation procedures; however, ZigBee offers two suggestions: (1) estimating p z 1 , z 2 from the reception of link status (LS) or other network layer messages; and (2) estimating the cost c z 1 , z 2 directly by first averaging the LQI values in packets at z 2 and then mapping it into the cost c z 1 , z 2 . Given that these procedures are present in the ZigBee specifications (Section 3.6.3.1 of [13]) and may be guiding implementations, we will use them as baseline for our study and we describe them in more detail after the literature review.

3.1. Literature Review

The first procedure suggested in the ZigBee specifications, estimating link costs from the reception of broadcast LS messages and exchanging such information in LS messages, was proposed in [28]; however, the authors in [28] used such an estimate to derive a different cost metric: the expected transmission count metric (ETX) of a link.
The second procedure suggested in the ZigBee specifications, estimating link costs from the average LQI of received packets, is similar to the MultihopLQI procedure used in the TinyOS platform. A formal reference for the MultihopLQI algorithm is no longer available; however, as reported in [44], the MultihopLQI estimates the overall cost of the route by combining the average LQI of received beacons at each node of the route. The authors in [33] have reported that link cost estimation, through LQI, performs better than procedures based on only radio signal strength, and several authors [44,45,46] have considered LQI to estimate link costs.
In contrast to beacon or LS-based procedures, and related to the method that we propose in Section 6, several authors considered MAC feedback to estimate the link costs:
  • The authors in [22,24,25] relied on unicast transmissions to infer link costs; however, they focused on different link metrics based on the expected transmission time or MAC latency.
  • The authors in [26] suggested the use of MAC feedback from unicast transmissions to infer link cost as opposed to relying on broadcast packets; however, as in [28], the authors in [26] focused on the estimation of the ETX metric.
  • The authors in [27] proposed the EAR (efficient and accurate link-quality monitor) procedure in which nodes constantly switch between passive, cooperative, and active modes of estimation in order to estimate a metric similar to ETX.
  • Focusing on the IPv6 routing protocol for low Power and lossy networks (RPL), the authors in [18] proposed that link qualities be estimated by counting the number of first time transmissions that are unsuccessful and by using an active probing mechanism where nodes send unicast messages to neighbors to estimate the link quality.
Although the procedures above explore unicast transmissions and MAC feedback to estimate links costs and select routes, they were not aimed at estimating p z 1 , z 2 required by the ZigBee specification; the proposed link metrics were not evaluated considering ZigBee’s 3-bit link cost quantization; and, therefore, their route selection procedure does not consider how to select among routes with the same cumulative cost.
More recently, several authors proposed machine learning inspired procedures to estimate link costs and select routes. The authors in [14] proposed a fuzzy C-means clustering algorithm to estimate link qualities based on the packet reception rate. The authors in [15] proposed an algorithm based on reinforcement learning to control monitoring and probing mechanisms to estimate link qualities. The authors in [16] proposed an unsupervised learning technique to select network features to better classify the quality of links. The authors in [17] evaluated various machine learning algorithms that use packet reception rates, LQI, and SINR metrics as input and output the probability of successful delivery in a link. The authors in [19] proposed that nodes monitor RSSI, SINR, and packet reception rates; exchange information with neighbors; and use this information as input to a supervised learning algorithm that uses labeled training samples to estimate the quality of links. The authors in [47] proposed estimating the probability of successful packet transmission in a link by using wavelet and neural network techniques. Their approach would require decomposing measurements of the SINR into a time-varying component and a non-stationary random part. The authors in [48] proposed a hybrid online machine learning algorithm to estimate the quality of candidate links. Their approach combines current samples of link quality with baseline samples previously learned from past samples. The authors in [49] used the packet reception rates between nodes and their neighbors to select routes and propose a distributed learning automaton algorithm to choose routes that satisfy quality-of-service requirements. Although these algorithms are valuable and could improve the estimation of link costs and the selection of routes, such implementations would require nodes to implement machine learning techniques and require significant changes in the ZigBee specifications, protocol, and frame format.

3.2. Link Status (LS)-Based Estimation Procedure

In the LS-based estimation procedure suggested in the ZigBee specifications (Section 3.6.3.1 of [13]), the cost c z 1 , z 2 of a node z 1 transmitting to a node z 2 is estimated by first estimating the probability p z 1 , z 2 that z 1 successfully transmits a packet to z 2 ; and such an estimate is obtained from the transmission of broadcast LS messages.
To obtain the estimate p ^ z 1 , z 2 ( L S ) ( t ) at time t, let T a v g be the duration of the estimation window; let N z 1 ( L S ) , t x ( t ) be the number of LS messages transmitted by node z 1 in the last T a v g seconds; let N z 1 , z 2 ( L S ) , r x ( t ) be the number of these messages that were received by node z 2 . The estimate for p ^ z 1 , z 2 ( L S ) ( t ) is given by
p ^ z 1 , z 2 ( L S ) ( t ) : = N z 1 , z 2 ( L S ) , r x ( t ) N z 1 ( L S ) , t x ( t ) ;
From the estimate p ^ z 1 , z 2 ( L S ) ( t ) , the estimate c ^ z 1 , z 2 ( L S ) ( t ) is obtained with
c ^ z 1 , z 2 ( L S ) ( t ) : = min 7 , round 1 p ^ z 1 , z 2 ( L S ) ( t ) 4 .
It is important to observe that c ^ z 1 , z 2 ( L S ) ( t ) is computed at the node z 2 , which is the node receiving the LS messages; but c ^ z 1 , z 2 ( L S ) ( t ) is used by node z 1 in routing decisions. Recall from the description of the M2O routing algorithm in Section 2.2 that a node z 1 needs to estimate c z 1 , z 2 to determine the cumulative cost toward the concentrator node if it receives a RREQ from node z 2 . Since c z 1 , z 2 is estimated at node z 2 , node z 2 needs to transmit its estimate c ^ z 1 , z 2 ( L S ) ( t ) to node z 1 . In ZigBee, this is accomplished with LS messages as well: whenever node z 2 transmits its own LS message, it attaches to it the latest cost estimates that it computed from any of its neighbors, including c ^ z 1 , z 2 ( L S ) ( t ) . Note further that, to compute c ^ z 1 , z 2 ( L S ) ( t ) , node z 2 is able to determine N z 1 ( L S ) , t x ( t ) because it follows the same procedure for transmitting LS messages, and therefore, N z 1 ( L S ) , t x ( t ) N z 2 ( L S ) , t x ( t ) .
From the individual link costs, the cumulative cost of a route z 1 , , z K is given by
c ^ z 1 , , z K ( L S ) ( t ) = i = 1 K 1 c ^ z i , z i + 1 ( L S ) ( t ) ,
where we observe that c ^ z 1 , , z K ( L S ) ( t ) is computed in a distributed manner. For instance, consider the route 3,1,0 in Figure 1. As described in Section 2.2, node 0 constantly estimates c ^ 1 , 0 ( L S ) ( t ) and sends its latest estimate to node 1 whenever it sends a LS packet. Likewise, node 1 constantly estimates c ^ 3 , 1 ( L S ) ( t ) and sends its latest estimate to node 3 whenever it sends a LS packet. Whenever a RREQ packet is broadcast over the network, node 1 adds the latest received c ^ 1 , 0 ( L S ) ( t ) to the route cost field of the RREQ message. When node 3 receives the RREQ, it adds the latest received c ^ 3 , 1 ( L S ) ( t ) to the cost in the route cost field, obtaining c ^ 3 , 1 , 0 ( L S ) ( t ) .
We further note that both the individual link costs and the route cost are functions of time because of the randomness in the reception of LS messages.

3.3. Link Quality Indicator (LQI)-Based Estimation Procedure

In the LQI-based estimation procedure suggested in the ZigBee specifications (Section 3.6.3.1 of [13]), the cost c z 1 , z 2 of a node z 1 transmitting to a node z 2 is estimated from the average LQI of received messages: Let T a v g be the duration of the estimation window; let N L Q I be the number of transmissions from node z 1 successfully received at node z 2 during the last T a v g seconds; and let L Q I z 1 , z 2 ( j ) be the value of the LQI at the j t h received packet. The average LQI at time t is given by
L Q I ¯ z 1 , z 2 ( t ) : = 1 N L Q I j = 1 N L Q I L Q I z 1 , z 2 ( j ) ,
where we highlight that N L Q I includes both broadcast and unicast received messages.
From the average LQI, the estimated cost c ^ z 1 , z 2 ( L Q I ) ( t ) is obtained from the mapping shown in Table 1; i.e., c ^ z 1 , z 2 ( L Q I ) ( t ) is obtained from one of seven LQI intervals corresponding to each of the seven possible costs. As the ZigBee specifications suggest (see page 338 of [13]), the LQI intervals of Table 1 should be obtained based on tests on the actual hardware. In here, the LQI intervals were obtained from off-line tests as follows: In a network of only 2 nodes without interference, the distance between the 2 nodes were varied, and at each distance, node z 1 transmitted various packets to node z 2 . For each distance, the average LQI value and the ratio of successful transmissions were computed. The ratio of successful transmissions was then used as p z 1 , z 2 in the link cost Equation (2) to obtain the cost for the average LQI value.
It is important to observe that L Q I ¯ z 1 , z 2 ( t ) is obtained only from successfully received packets; i.e., if the SINR of a packet is so low that the IEEE 802.15.4 receiver cannot decode the packet, then the packet is discarded. No packet is sent to upper layers, and no LQI indication is generated.
As in the LS-based procedure, the cost estimate c ^ z 1 , z 2 ( L Q I ) ( t ) is obtained at the receiving node z 2 ; the latest estimate is transmitted to node z 1 when node z 2 transmits its LS messages; the route cost
c ^ z 1 , , z K ( L Q I ) ( t ) = i = 1 K 1 c ^ z i , z i + 1 ( L Q I ) ( t ) ,
is computed in a distributed manner, and c ^ z 1 , , z K ( L Q I ) ( t ) varies over time due to randomness in LQI measurements.

4. Simulation Tool to Evaluate Link Cost Estimation Procedures

In order to evaluate the LS-based, the LQI-based, and our proposed estimation procedures, we used the ns-3 simulator [50]. Ns-3 is an open-source simulator specifically designed to simulate communication protocols. It has been being actively developed for almost 10 years and has been supported by grants from DARPA and NSF.
The current version of ns-3 contains models for the IEEE 802.11 and the IEEE 802.15.4 MAC and physical layers. For this study, we implemented the required portions of the ZigBee APS and network layers, including an implementation of the M2O routing algorithm, generation of LS messages, and protocol overheads.
Ns-3 has detailed channel models to simulate wireless channels. Ns-3 manages the transmission of packets from the transmitter to any receiver, considering both noise and interference. We used ns-3’s channel and propagation model for IEEE 802.11 and IEEE 802.15.4 without changes. Details of these models can be found in [51].

Parameters Common to All Simulations

In the upcoming sections, we describe simulations used to evaluate the performance of the LS-based, the LQI-based, and our proposed procedure in various scenarios. All of such simulations will use the configurations described on this section.
Regarding the application layer, a node z i that connects to a sensor (e.g., nodes 3, 4, and 5 in Figure 1) generates application messages periodically, with an interarrival time uniformly distributed between 0 and a maximum interarrival time, which we vary to generate different averages of packets generated per second. Each application message (sensor data) contains 12 bytes, which are encapsulated by an 8-byte APS header, and subsequently an 8-byte network header, before being sent to the MAC layer (total of 28 bytes). Application messages are sent using the APS reliable data transfer service; i.e., when receiving the application message, node 0’s APS layer generates an 8-byte acknowledgment (APS-ACK) frame towards the sending node. Nodes always wait for the APS-ACK message to arrive before sending a new message. If the APS-ACK message does not arrive after a timeout period of 800 ms, the APS layer retransmits the message up to three times. If the APS-ACK message has not arrived and a new message arrives, the new message is buffered. If the buffer is already full, the message is discarded.
Regarding the network layer, we considered that all ZigBee nodes were full-functioning devices able to participate in routing procedures. All ZigBee nodes generate LS messages every one second with an added random jitter uniformly distributed between 10 and 40 ms, and in all examples, we considered that node 0 was the concentrator node and nodes used the M2O routing algorithm to reach the concentrator. The concentrator was configured to send RREQ messages every 10 s; and the concentrator radius was configured such that the RREQ message was rebroadcast by at most one hop in all but the two-hop scenario of Section 7.1.3, in which the radius was configured for two hops. All the link cost estimation procedures used an averaging window of T a v g = 81 s.
Regarding the IEEE 802.15.4 MAC and physical layers, all simulations used the default parameters of the ns3 model [52]. Among the MAC parameters, we highlight that the CSMA procedure was configured to retransmit packets up to three times before dropping the packet. Among the physical parameters, we highlight that transceivers required 192 microseconds to switch between receive and transmit modes, and vice-versa. All ZigBee devices were configured to transmit with 0 dBm power and operate at channel 11, centered at 2.405 GHz.
Regarding simulations with WiFi IEEE 802.11 stations, the WiFi access point was configured to have a server that transmitted an application packet of 972 bytes to each of two WiFi stations every T W i F i = 972 * 8 / R W i F i s, where R W i F i s the application data throughput that we varied to generate different traffic loads. The WiFi application data was sent over UDP/IPv4. The IEEE 802.11 MAC layer exchanged RTS/CTS messages before sending the data, and we considered WiFi devices using IEEE 802.11n in Greenfield (HT) mode, with a modulation and coding scheme (MCS) level 0 with 800 ns guard spacing and occupying a 20 MHz bandwidth channel, which results in 6.5 Mbps PHY transmission rate. Considering the transmission to the two stations and the time to transmit the RTS/CTS and the MAC ACK, WiFi stations occupy the channel for at least 2.94 ms every T W i F i seconds, which means that the fraction of time in which WiFi transmissions occupy the channel is at least 0 . 00294 / T W i F i . The WiFi devices transmit at 0 dBm and the 20 MHz channel is centered at 2.412 GHz, which overlaps with ZigBee transmissions centered at 2.405 GHz.
Simulations are performed for 400 s and results are collected from the last 300 s of the simulation in ZigBee-only scenarios. In scenarios where a WiFi interferer starts at time t = 100 s, results are collected from the last 220 s of the simulation.

5. Motivating Examples

To motivate the procedure that we propose, we consider first a few examples using single simulation runs to observe the problems of both the LS-based and LQI-based procedures. Analysis considering multiple simulation runs are present in Section 7.

5.1. Example 1: Symmetric Topology

Consider the topology shown in Figure 1, in which sensors at node 3 at (0,−80), node 4 at (−130,0), and node 5 at (130,0) send sensor measurements to the concentrator 0 at (0,80); and node 1 at (−35,0) and node 2 at (35,0) are available for routing packets. Using the propagation model adopted for the IEEE 802.15.4 physical layer in the ns-3 simulator, nodes 4 and 5 are hidden from nodes 0 and 3.
The goal of this example was to illustrate how the LS-based and the LQI-based procedures influence the route selection of node 3, which has two routes available to reach node 0: routes 3,1,0 and 3,2,0.
Consider first a low traffic load scenario where node 3 generates an average of 0 . 5 of a packets and nodes 4 and 5 generate an average of 0 . 02 packets. Given the symmetry of the scenario, both routes have the same cost; i.e., c 3 , 1 , 0 = c 3 , 2 , 0 . We separately simulated the performance of the LS-based and the LQI-based estimation procedures and observed the estimated cumulative costs measured at node 3. In this case, both estimation procedures produced cumulative cost estimates c ^ 3 , 1 , 0 ( L S ) ( t ) = c ^ 3 , 2 , 0 ( L S ) ( t ) = c ^ 3 , 1 , 0 ( L Q I ) ( t ) = c ^ 3 , 2 , 0 ( L Q I ) ( t ) = 2 most of the times and with very little variance. The same results were obtained by simulating the system with nodes 3, 4, and 5 all generating 0.5 packets/s. This shows that, at least for symmetric topologies with low traffic load, either estimation procedure could be used and there would be no need for more elaborate procedures.
Consider now a higher traffic load scenario in which nodes 3, 4, and 5 all generate 20 packets/s. The scenario is still symmetric and both routes still have the same cost; i.e., c 3 , 1 , 0 = c 3 , 2 , 0 .
Figure 2a shows the cost estimates produced over the course of a single simulation run considering the LS-based procedure; and Figure 2c shows the cost estimates produced by the LQI-based procedure. Both graphs show the cumulative cost at node 3 whenever it received a RREQ rebroadcasted from nodes 1 and 2.
From Figure 2a, we can observe that the LS-based estimated costs c ^ 3 , 1 , 0 ( L S ) ( t ) and c ^ 3 , 2 , 0 ( L S ) ( t ) varied significantly over the course of the simulation, even though c 3 , 1 , 0 = c 3 , 2 , 0 .
In contrast, from Figure 2c, we can observe that the LQI-based estimates were c ^ 3 , 1 , 0 ( L S ) ( t ) = c ^ 3 , 2 , 0 ( L S ) ( t ) = 2 most of the times and with very little variance.

5.2. Example 2: Asymmetric Topology

Consider still, the topology shown in Figure 1, but assume for this example an asymmetric traffic load: node 3 generates an average of 20 packets; node 4 generates an average of 10 packets; and node 5 generates an average of 0.5 packets.
Because node 4 generates more packets than node 5, the chance that node 1 is receiving a packet from node 4 when node 3 transmits to node 1 is higher than the chance that node 2 is receiving a packet from node 5 when node 3 transmits to node 2, which means that c 3 , 1 , 0 > c 3 , 2 , 0 and it is desirable that node 3 chooses route 3,2,0.
Considering all other parameters as before, we simulated this topology with both the LS-based and LQI-based procedures.
For the LS-based procedure, Figure 2b shows the cumulative cost at node 3 at every RREQ received. It is possible to observe that, in some instances, the LS-based procedure was able to obtain c ^ 3 , 1 , 0 ( L S ) ( t ) > c ^ 3 , 2 , 0 ( L S ) ( t ) and recognize that route 3,2,0 is preferred over 3,1,0; however, c ^ 3 , 1 , 0 ( L S ) ( t ) = c ^ 3 , 2 , 0 ( L S ) ( t ) most of the time. At those instances, node 3 would randomly choose between the two routes and could choose the suboptimal route 3,1,0 until the next RREQ arrives. For this particular simulation run, node 3 chose route 3,1,0 35% of the time.
For the LQI-based procedure, the cumulative costs at node 3 were similar to the costs shown in Figure 2c; i.e., both routes 3,1,0 and 3,2,0 were estimated to have the same cumulative cost 2, meaning that the LQI-based procedure was not able to recognize that route 3,1,0 had more instances of hidden node problems. Seeing both routes with the same cumulative cost, node 3 chose between routes 3,1,0 and 3,2,0 randomly. For this particular simulation run, node 3 chose route 3,1,0 64% of the time.
Sending over the suboptimal route 3,1,0 is undesirable because it increases the probability of packet losses, causing unnecessary MAC retransmissions and traffic load in the channel. For these particular simulation runs, there was an average of 108 unnecessary MAC transmissions per 1000 messages transmitted by node 3 when the LS-based procedure was used; and this number increased to 128 when the LQI-estimator was used.

5.3. Analyzing the LS-Based and LQI-Based Estimation Procedures

There are two main conclusions from Examples 1 and 2:
  • The LS-based procedure produces estimates with higher variance than the LQI-based procedure.
  • The LQI-based procedure is blind to hidden node instances.
The main reason why the LS-based cost estimates c ^ 3 , 1 , 0 ( L S ) ( t ) and c ^ 3 , 2 , 0 ( L S ) ( t ) had a high variance in Example 1 is because of hidden node instances. Recall that LS-based cost estimates are obtained from the ratio of received LS messages, which are sent in MAC broadcast mode, without acknowledgments or retransmissions. In Example 1, nodes 4 and 5 are hidden from node 3, which means that if node 4 or 5 transmits to node 1 or 2 while node 3 transmits its LS message, then node 1 or 2 might not be able to receive the LS message, causing a drop in the estimated p ^ 3 , 1 ( L S ) ( t ) or p ^ 3 , 2 ( L S ) ( t ) and an increase in the corresponding cost estimates.
It is also possible to justify the high variance of LS-based cost estimates as follows: recall that N 3 , 1 ( L S ) , r x ( t ) is the number of LS messages sent by node 3 and received by node 1; and, assuming that LS transmissions are independent, N 3 , 1 ( L S ) , r x ( t ) is a binomial random variable with parameters N 3 ( L S ) , t x and p 3 , 1 . For the example that produced Figure 2a, the averaging window is T a v g = 81 s and LS messages are sent at 1-second intervals with a random delay, which means N 3 ( L S ) , t x = 80 . The actual p 3 , 1 for this example was measured as p 3 , 1 0 . 79 . With such a p 3 , 1 , N 3 , 1 ( L S ) , r x ( t ) varies significantly around its mean ( 63 . 2 ), which means that the estimated p ^ 3 , 1 ( L S ) ( t ) varies around 0.79, causing the estimated cost to also vary. More precisely, if node 1 receives N 3 , 1 ( L S ) , r x ( t ) ( 72 , 80 ] LS messages from node 3 during the averaging window, it estimates p ^ 3 , 1 ( L S ) ( t ) ( 0 . 9 , 1 . 0 ] , which maps into a link cost estimate of c ^ 3 , 1 ( L S ) ( t ) = 1 . Likewise, if N 3 , 1 ( L S ) , r x ( t ) ( 64 , 72 ] , then c ^ 3 , 1 ( L S ) ( t ) = 2 ; if N 3 , 1 ( L S ) , r x ( t ) ( 60 , 64 ] , then c ^ 3 , 1 ( L S ) ( t ) = 3 ; and if N 3 , 1 ( L S ) , r x ( t ) ( 54 , 60 ] , then c ^ 3 , 1 ( L S ) ( t ) = 4 . With the actual p 3 , 1 0 . 79 , P [ N 3 , 1 ( L S ) , r x ( t ) ( 72 , 80 ] ] 0 . 003 , P [ N 3 , 1 ( L S ) , r x ( t ) ( 64 , 72 ] ] 0 . 367 , P [ N 3 , 1 ( L S ) , r x ( t ) ( 60 , 64 ] ] 0 . 405 , and P [ N 3 , 1 ( L S ) , r x ( t ) ( 54 , 60 ] ] 0 . 215 , which means that variations of c ^ 3 , 1 ( L S ) ( t ) , and therefore, the variations of c ^ 3 , 1 , 0 ( L S ) ( t ) observed in Figure 2a,b are fairly common.
Variations in LS-based estimates could certainly be reduced if one increases the averaging window T a v g ; however, a designer cannot increase T a v g too much; otherwise, nodes would not able to adapt to changes in the environment. For instance, consider a WiFi device that consumes a data stream for five minutes. Such a WiFi device would cause interference in nearby ZigBee nodes and it is desirable that ZigBee nodes detect the presence of the additional interference and adjust their routes as soon as possible. If T a v g is increased, then ZigBee nodes would take longer times to adjust their routes.
In contrast to LS-based estimates, LQI-based estimates vary much less, even in scenarios with hidden nodes. The main reason for this is the higher number of available samples in the LQI-based procedure. For instance, the LQI-based procedure at node 1 extracts a LQI sample used to estimate the c ^ 3 , 1 ( L S ) ( t ) on every packet received from node 3, not only from LS messages. Consider Example 1: node 3 transmits an average of 20 packets/s; and, considering the averaging window of T a v g = 81 s, node 1 has at least 1600 LQI samples to average, which is much more than the number of LS messages (80) transmitted in the same averaging window.
Although the LQI-based procedure performed well in Example 1, it was not able to differentiate between routes 3-1-0 and 3-2-0 in Example 2 because it is blind to hidden node problems. To understand this, recall that the LQI-based procedure estimates the cost of a link based on the average of the LQI in received packets. If a packet is not received, then it is not considered in the LQI average. For instance, assume node 1 is receiving a packet from node 3. Because node 3 is hidden from node 4, node 4 is unaware of node 3’s transmission and transmits at the same time, causing strong interference and possibly packet loss at node 1. If the packet is indeed lost, which is likely because of the similar distances between nodes 1 and 3 and between nodes 1 and 4, then such an event is not captured in the LQI average because the MAC drops the packet and no information is sent to the network layer. Later, when node 4 is no longer transmitting, node 3 retransmits the packet, which then arrives at node 1 without interference and with a high LQI. As a result, the LQI-based estimates are based on only high LQI packets that are transmitted during times of no hidden node.
It should be mentioned that, if node 4 were farther away from node 1, then the interference power would be lower; the probability of successful reception would increase; and a packet with lower LQI would be received and considered by the LQI-based procedure. However, this example shows that there are reasonable scenarios in which the LQI-based procedure would not be able to detect hidden node problems.

6. Proposed Link Cost Estimation and Modified Route Selection Procedure

Motivated by the problems faced by the LS-based and LQI-based procedures, we propose the use of the following modified link cost estimation and route selection procedures.

6.1. Link Cost Estimation Procedure

We propose that the cost of a link still be computed as in the ZigBee specification; i.e., the cost c z 1 , z 2 between nodes z 1 and z 2 is still computed using the probability of successful packet transmission p z 1 , z 2 in (2); however, we propose that p z 1 , z 2 be estimated not only from LS packets, but also from any unicast packet transmissions from z 1 to z 2 . The rationale is to increase the number of measurements and reduce the estimator variance.
To define the estimator that we propose, we first describe the ideal estimator. At each time t, let N z 1 , z 2 ( u ) , t x ( t ) be the number of unicast packets sent by node z 1 to node z 2 in the last T a v g seconds; let N z 1 , z 2 ( u ) , r x ( t ) be the number of these packets that were received by z 2 ; define
p ^ z 1 , z 2 ( u ) ( t ) : = N z 1 , z 2 ( u ) , r x ( t ) N z 1 , z 2 ( u ) , t x ( t ) ;
recall from (3) that p ^ z 1 , z 2 ( L S ) ( t ) represents the ratio of LS packets transmitted by z 1 ; and use these definitions to obtain the minimum variance unbiased linear estimator [53]:
p ^ z 1 , z 2 ( i d e a l ) ( t ) = σ u 2 ( t ) σ u 2 ( t ) + σ L S 2 ( t ) p ^ z 1 , z 2 ( L S ) ( t ) + σ L S 2 ( t ) σ u 2 ( t ) + σ L S 2 ( t ) p ^ z 1 , z 2 ( u ) ( t ) ,
where σ L S 2 ( t ) and σ u 2 ( t ) are respectively, the variance of the estimators p ^ z 1 , z 2 ( L S ) ( t ) and p ^ z 1 , z 2 ( u ) ( t ) at time t. Considering that the unicast and LS packets have the same size, which is a reasonable approximation when sensors operate in the same manner and the size of data packets is small, the probability of successful transmission of a unicast packet ( p z 1 , z 2 ) is the same as the probability of successful transmission of a LS packet; and since both N z 1 , z 2 ( u ) , r x ( t ) and N z 1 , z 2 ( L S ) , r x ( t ) are binomial random variables, σ u 2 ( t ) = p z 1 , z 2 [ 1 p z 1 , z 2 ] / N z 1 , z 2 ( u ) , t x ( t ) and σ L S 2 ( t ) = p z 1 , z 2 [ 1 p z 1 , z 2 ] / N z 1 ( L S ) , t x ( t ) . Using these expressions in (9) and simplifying, we obtain
p ^ z 1 , z 2 ( i d e a l ) ( t ) = N z 1 , z 2 ( u ) , r x ( t ) + N z 1 , z 2 ( L S ) , r x ( t ) N z 1 , z 2 ( u ) , t x ( t ) + N z 1 ( L S ) , t x ( t ) .
We call the estimator of (10) ideal because the information needed to compute p ^ i d e a l ( z 1 , z 2 ) is spread between z 1 and z 2 : N z 1 , z 2 ( u ) , t x ( t ) is known by z 1 but not z 2 ; and N z 1 , z 2 ( u ) , r x ( t ) and N z 1 , z 2 ( L S ) , r x ( t ) are known by z 2 but not z 1 . Node z 2 provides feedback to z 1 : it sends a MAC ACK to every unicast packet sent by node z 1 ; and z 2 broadcasts c ^ z 1 , z 2 ( L S ) ( t ) whenever it sends its LS packet. This feedback is, however, imperfect. Regarding MAC ACK packets sent by z 2 , z 1 could consider N z 1 , z 2 ( u ) , r x ( t ) as the number of MAC ACK packets received; however, the unicast transmission may have been received by z 2 with the MAC ACK being lost at z 1 ; and z 1 would consider that the unicast transmission was lost, underestimating N z 1 , z 2 ( u ) , r x ( t ) . Regarding z 2 ’s LS packet, it may also be lost at z 1 ; however, more importantly, z 2 ’s LS packet only provides indirect and incomplete information about N z 1 , z 2 ( L S ) , r x ( t ) . As explained in Section 3.2, z 2 computes p ^ z 1 , z 2 ( L S ) ( t ) and uses Equation (2) to compute the 3-bit cost estimate c ^ z 1 , z 2 ( L S ) ( t ) . From the quantized c ^ z 1 , z 2 ( L S ) ( t ) , node z 1 is only able to recover a range for p ^ z 1 , z 2 ( L S ) ( t ) .
Given the difficulty of applying the ideal estimator, we propose the following practical estimator (The reason for referring to our procedure with the superscript U R R will become clear shortly.): let N z 1 , z 2 ( u ) , a c k ( t ) be the number of times that z 1 receives the MAC ACK packet from z 2 in the last T a v g seconds; and z 1 estimates p z 1 , z 2 with
p ^ z 1 , z 2 ( U R R ) ( t ) = N z 1 , z 2 ( u ) , a c k ( t ) + p ¯ z 1 , z 2 ( L S ) ( t ) · N z 1 ( L S ) , t x ( t ) N z 1 , z 2 ( u ) , t x ( t ) + N z 1 ( L S ) , t x ( t ) ,
where p ¯ z 1 , z 2 ( L S ) ( t ) is the highest probability of successful transmissions that maps into the c ^ z 1 , z 2 ( L S ) ( t ) received from z 2 . Table 2 lists p ¯ z 1 , z 2 ( L S ) ( t ) from each of the seven possible costs. The values listed were obtained by using Equation (2).
From p ^ z 1 , z 2 ( U R R ) ( t ) , node z 1 uses Equation (2) to generate the estimate c ^ z 1 , z 2 ( U R R ) ( t ) .
Although imperfect, the estimator p ^ z 1 , z 2 ( U R R ) ( t ) is able to combine the information from both LS and unicast transmissions and adjust the importance of unicast transmissions as they increase. In other words, before z 1 sends any unicast transmission to node z 2 , p ^ z 1 , z 2 ( U R R ) ( t ) = p ¯ z 1 , z 2 ( L S ) ( t ) , which maps in the same link cost as if we were using the LS-based procedure. When N z 1 , z 2 ( u ) , t x ( t ) N z 1 ( L S ) , t x ( t ) , p ^ z 1 , z 2 ( U R R ) ( t ) N z 1 , z 2 ( u ) , a c k ( t ) / N z 1 , z 2 ( u ) , t x ( t ) and the influence of p ¯ z 1 , z 2 ( L S ) ( t ) diminishes. And as N z 1 , z 2 ( u ) , t x ( t ) , the variance of p ^ z 1 , z 2 ( U R R ) ( t ) 0 .
It should be mentioned, however, that p ^ z 1 , z 2 ( U R R ) ( t ) is a biased estimate because it estimates a probability different than p z 1 , z 2 . Because p ^ z 1 , z 2 ( U R R ) ( t ) uses N z 1 , z 2 ( u ) , a c k ( t ) , as N z 1 , z 2 ( u ) , t x ( t ) grows, p ^ z 1 , z 2 ( U R R ) ( t ) converges to p z 1 , z 2 · p z 1 , z 2 ( a c k ) , where p z 1 , z 2 ( a c k ) is the probability of successful transmission of the MAC ACK from node z 2 to node z 1 . This means that route costs and decisions will be taken not based on estimates of p z 1 , z 2 , but instead on estimates of p z 1 , z 2 · p z 1 , z 2 ( a c k ) . This is, however, not a problem, because the MAC ACK is needed to complete a transmission in the IEEE 802.15.4 MAC and if p z 1 , z 2 ( a c k ) p z 1 , z 2 , then sending packets through node z 2 would not be a good choice.
Note further that p ¯ z 1 , z 2 ( L S ) ( t ) · N z 1 ( L S ) , t x ( t ) is a biased estimate for N z 1 , z 2 ( L S ) , r x ( t ) ; in fact, it gives an upper bound for N z 1 , z 2 ( L S ) , r x ( t ) . This follows because of the 3-bit quantization of cost estimates, which means that there is a range of probabilities that map into the same cost c ^ z 1 , z 2 ( L S ) ( t ) received from node z 2 ; therefore, there is a range of possible N z 1 , z 2 ( L S ) , r x ( t ) for a given c ^ z 1 , z 2 ( L S ) ( t ) received at node z 1 . The lower bound for N z 1 , z 2 ( L S ) , r x ( t ) reduces p ^ z 1 , z 2 ( U R R ) ( t ) , and thus, increase c ^ z 1 , z 2 ( U R R ) ( t ) ; likewise, using the upper bound for N z 1 , z 2 ( L S ) , r x ( t ) decreases c ^ z 1 , z 2 ( U R R ) ( t ) . Thus, using any value lower than N z 1 , z 2 ( L S ) , r x ( t ) may cause c ^ z 1 , z 2 ( U R R ) ( t ) to be higher than it would be if N z 1 , z 2 ( L S ) , r x ( t ) are known at node z 1 . As will become clear in the next section, if a route has a chance of being the best route, we would like to select it to send a batch of unicast packets on the route to improve our cost estimate c ^ z 1 , z 2 ( U R R ) ( t ) . Thus, using the upper bound for N z 1 , z 2 ( L S ) , r x ( t ) prevents the exclusion of a route that would otherwise be selected if N z 1 , z 2 ( L S ) , r x ( t ) were to be known at node z 1 . It should be noted that, as mentioned in the previous paragraph, the estimate for N z 1 , z 2 ( L S ) , r x ( t ) becomes less and less relevant as N z 1 , z 2 ( u ) , t x ( t ) grows, which means that this estimate is relevant only while N z 1 , z 2 ( u ) , t x ( t ) is small.
Since our proposed estimator p ^ z 1 , z 2 ( U R R ) ( t ) depends on the number N z 1 , z 2 ( u ) , t x ( t ) of unicast packets sent from z 1 to z 2 , z 1 needs to first select node z 2 as the next hop towards the concentrator in order to start sending unicast packets to it. Furthermore, when node z 1 has to select among multiple routes to the concentrator, it needs good estimates for the probability of successful transmission to each of the next hop candidates in order to build the various route costs. In other words, if node z 1 has nodes z 2 and z 3 as potential candidates to reach the concentrator, z 1 would have to send some packets through z 2 and other packets through z 3 in order to be able to obtain good estimates p ^ z 1 , z 2 ( U R R ) ( t ) and p ^ z 1 , z 3 ( U R R ) ( t ) . For this, we propose the route selection procedure discussed next.

6.2. Modified Route Selection Procedure

Recall from Section 2.2 that ZigBee specifies that nodes compare the costs of candidate routes and select the next hop towards the concentrator whenever they receive a RREQ packet. In order to remain compliant with the ZigBee protocol, our modified route selection procedure still selects routes whenever RREQ packets are received; however, our route selection procedure has an additional treatment to decide among routes with the same cost.
The original ZigBee route selection procedure and our proposed route selection procedure are illustrated in Figure 3a,b respectively. Comparing these figures, it is possible to notice that our procedure starts processing an incoming RREQ in the same way as in the ZigBee specification: whenever a node z 1 receives an incoming RREQ from a node z 2 , it computes the cumulative route cost toward the concentrator. If such a cost is lower than the cumulative route cost of the current next hop node, then node z 1 updates its routing table to reflect node z 2 as the next hop toward the concentrator. If such a cost is greater than the cumulative route cost of the current next hop node, then node z 1 disregards the RREQ.
The novelty of the proposed procedure is in the treatment when two or more next hop candidates have the same cumulative route cost, in the second test of Figure 3b. To understand this step and its effect, consider the scenario of Figure 1; assume that node 3 has node 1 as the current next hop towards the concentrator and assume node 3 receives a RREQ from node 2 with the same cumulative route cost as node 1. Recall that N 3 , 1 ( u ) , t x ( t ) and N 3 , 2 ( u ) , t x ( t ) refer to the number of unicast packets sent by node 3 on the last T a v g seconds to nodes 1 and 2 respectively. If N 3 , 2 ( u ) , t x ( t ) N 3 , 1 ( u ) , t x ( t ) , then node 3 disregards the RREQ and node 1 remains as the next hop toward the concentrator. However, if N 3 , 2 ( u ) , t x ( t ) < N 3 , 1 ( u ) , t x ( t ) , then node 3 selects node 2 as the next hop. The reason for this is to enable node 3 to collect more samples from the link 3 , 2 in order to obtain a low variance estimate for p ^ 3 , 2 ( U R R ) ( t ) in subsequent RREQ cycles.
As subsequent RREQ packets with the same cumulative route cost from other next hop candidates arrive, the procedure performs the same comparison. In effect, among the next hop candidates that have the same cumulative route cost, node 3 selects the next hop candidate with lowest number of unicast packets transmitted during the last T a v g seconds.
A second non-trivial aspect of the second test of Figure 3b is that it causes a node to, in effect, select multiple routes to the concentrator over multiple RREQ intervals. To understand this aspect, assume in the illustration of the previous paragraph that N 3 , 2 ( u ) , t x ( t ) < N 3 , 1 ( u ) , t x ( t ) , causing node 3 to select node 2 as the next hop. This causes node 3 to stop sending the application packets to the concentrator using node 1 as next hop and start sending them using node 2. This causes N 3 , 2 ( u ) , t x ( t ) to increase, and as previous transmissions using node 1 fall out of the averaging window T a v g , causes N 3 , 1 ( u ) , t x ( t ) to decrease. Eventually, in subsequent RREQ intervals, N 3 , 2 ( u ) , t x ( t ) > N 3 , 1 ( u ) , t x ( t ) and node 3 selects node 1 as next hop towards the concentrator. This results in node 3 selecting each next hop candidate with the same cumulative route cost in a round-robin fashion. This aspect is beneficial in that it increases the redundancy of the system, avoids that a certain set of nodes be overused, and to the point of this paper, allows a node to proper measure the link costs of multiple nodes.
Because our procedure uses unicast packets to improve the link cost estimation and selects routes in round-robin fashion, we shall refer to it as the U-RR procedure.
With respect to existing models, the use of unicast transmissions in our U-RR procedure is similar to [22,24,25]; however, our U-RR procedure is tailored to ZigBee and its 3-bit link cost quantization.
It is important to highlight that our U-RR procedure works as the ZigBee specified procedure when the cumulative route cost offered by the RREQ sender is different than the cost offered by the current next hop node. As such, the U-RR procedure is able to maintain the qualities of the existing ZigBee procedure, improving it only when there is a tie between next hop candidates, which is fairly common in ZigBee because of its 3-bit link cost quantization.
An additional important point is that, in the existing ZigBee procedure, the choice between next hop candidates with the same cumulative cost is random: a node would choose as next hop, the node whose RREQ arrived first. In the U-RR procedure, the choice between next hop candidates with the same cumulative cost is no longer random, being guided by the number of past packets sent to each candidate.

6.3. Implementation Considerations

To implement the U-RR procedure, the following must be implemented in ZigBee nodes:
  • Nodes need to track the number of packets transmitted and the number of packets acknowledged with each neighbor node separately. This information should be stored within the network layer to enable access by the route selection function. The network layer already has provisions for a neighbor list [13], which could be expanded to store this additional information. Ideally, the time of each transmission would be stored in order to determine when transmission records become older than the averaging window. Results that follow assume this ability. Alternatively, the tracking of the number of packets successfully transmitted could be implemented with a cyclic buffer, where the result of the latest transmission would overwrite the result of the oldest transmission in the buffer.
  • The IEEE 802.15.4 MAC layer must be augmented so that it provides the network layer with the number of retransmissions needed to transmit a packet. This would probably be done in the service application point and the MAC would provide this information in additional fields of the MCPS-Data.Confirm message. Although provisioning of such information is not forecasted by the IEEE 802.15.4 MAC specification, it is possible for manufacturers to offer additional information in their service access points while still complying with the IEEE 802.15.4 specification.
  • The treatment of the RREQ at the network layer would have to be augmented to follow the procedure of Figure 3b.
It is important to mention that the U-RR procedure does not require any changes to the ZigBee protocol; i.e., there is no need for new protocol messages nor changes to protocol frame formats.

7. Performance Evaluation

7.1. Symmetric Topologies

We first evaluated our procedure in symmetric scenarios in order to evaluate whether it can reduce the variance observed in the LS-based procedure.

7.1.1. Scenario S1: ZigBee-Only, One-Hop Routes

Consider first the topology of Figure 1 in which sensors at node 3 at (0,−80), node 4 at (−130,0), and node 5 at (130,0) send sensor measurements to the concentrator 0 at (0,80); and node 1 at (−35,0) and node 2 at (35,0) are available for routing packets. This is the same scenario as considered in the examples of Section 5.1 and it is reproduced in Figure 1 to facilitate the understanding.
For this scenario, assume that nodes 3, 4, and 5 generate the same average number of packets/s. Because of the symmetry of the scenario, the actual route costs for routes 3,1,0 and 3,2,0 are the same. To see why c 3 , 1 , 0 = c 3 , 2 , 0 , recall that packet losses occur due to low SINR. Using the ns3 channel model, the distances between nodes are such that the probability of a successful transmission is very close to 1 when no interferers transmit, meaning that packet losses are occurring mainly due to interfering transmissions. Interfering transmissions occur randomly due to the various protocol procedures, such as MAC random backoff or random delays in application packet generation. In this symmetric scenario, the rates of interfering transmissions in nodes 1 and 2 are the same, causing p 3 , 1 = p 3 , 2 . Likewise, the rates of interfering transmissions in node 0 are the same if either node 1 or node 2 transmits, causing p 1 , 0 = p 2 , 0 ; and c 3 , 1 , 0 = c 3 , 2 , 0 .
We first evaluate the performance of the U-RR procedure in the single simulation run of the Example 1 of Section 5.1, in which nodes 3, 4, and 5 generate an average of 20 packets/s; Figure 2e in Section 5.1 illustrates the cumulative costs c ^ 3 , 1 ( U R R ) ( t ) and c ^ 3 , 2 ( U R R ) ( t ) measured at node 3 when using the U-RR procedure. Comparing this figure with Figure 2a, which refers to the same scenario but using the LS-based procedure, it is possible to observe that the U-RR procedure was able to generate estimates with less variation and better recognize that routes 3,1,0 and 3,2,0 have the same cost.
To better analyze the performance of the U-RR procedure in reducing the variance of cost estimates, we varied the traffic level generated by nodes 3, 4, and 5, and at each traffic level, we repeated the simulation 30 times, each time with a different random seed.
For each simulation run and each estimation procedure, we simulated the network for 400 s and collected the estimated route costs c ^ 3 , 1 , 0 ( t ) and c ^ 3 , 2 , 0 ( t ) for t 81 s. Let N r r e q r x be the number of RREQ messages received at node 3 in the time interval [ 81 , 400 ] ; and let { t n } n = 1 N r r e q r x be the times in which the RREQ were received. From these estimated route costs, we computed the following performance metrics:
  • The average estimated cost measured at node 3 for the routes 3,1,0 and 3,2,0. For example, for the route 3,2,0:
    c ¯ 3 , 2 , 0 : = 1 N r r e q r x n = 1 N r r e q r x c ^ 3 , 2 , 0 ( t n ) .
  • The standard deviation of the estimated costs measured at node 3 for the routes 3,1,0 and 3,2,0. For example, for the route 3,2,0:
    σ 3 , 2 , 0 : = 1 N r r e q r x 1 n = 1 N r r e q r x ( c ^ 3 , 2 , 0 ( t n ) c ¯ 3 , 2 , 0 ) 2 . .
    The measures σ 3 , 1 , 0 and σ 3 , 2 , 0 tell us how much the cost of each route varied over the course of the simulation run.
Figure 4a,b respectively, show the median of c ¯ 3 , 2 , 0 and σ 3 , 2 , 0 for 30 simulation runs at each traffic level for the LS-based, the LQI-based, and the U-RR procedures. Error bars represent the range between the 15 and 85 percentiles among 30 simulation runs. The figures for the median of c ¯ 3 , 1 , 0 and σ 3 , 1 , 0 showed similar behavior and were therefore omitted.
As discussed in Section 5, the LQI-based procedure produced the lowest variation in all, with the median of σ 3 , 2 , 0 ( L Q I ) 0 ; however, it was insensitive to the traffic load, as shown in Figure 4a: the median of c ¯ 3 , 2 , 0 ( L Q I ) 2 for all traffic loads.
From Figure 4b, it is possible to see that, while all procedures showed σ 3 , 2 , 0 0 at low traffic loads, the U-RR procedure consistently produced cost estimates with less variation than the LS-based procedure as the traffic load increased above 2 packets/s.
The better performance of the U-RR procedure in comparison with the LS-based procedure is justified by the U-RR use of both LS and unicast packets to estimate the probability of successful transmission in links. When the traffic load was low, the U-RR procedure relied mostly on the LS transmissions to estimate the link cost, as can be observed in (11). When the traffic load increased, the number of unicast transmissions became much higher than the number of LS transmissions and the U-RR procedure used these additional transmissions to reduce the variation of cost estimates.
It is interesting to observe in Figure 4b that the median of σ 3 , 2 , 0 ( U R R ) increased after 2 packets/s, reached a peak at 5 packets/s, reduced to 0 at 9 packets/s, and again increased after 9 packets/s. To understand this behavior, recall that estimated costs are rounded to the nearest integer. If the true cost is between two integers, the estimated cost would be alternating between the two integers, increasing the standard deviation of cost estimates. This rounding effect can be seen in Figure 4a,b: at 5 packets/s, the median c ¯ 3 , 2 , 0 ( U R R ) 2 . 5 and the median σ 3 , 2 , 0 ( U R R ) increased; at 9 packets/s, the median c ¯ 3 , 2 , 0 ( U R R ) 3 and the median σ 3 , 2 , 0 ( U R R ) was close to 0.
Figure 4c shows how often route 3,2,0 was chosen by each procedure, illustrating that all procedures chose route 3,2,0 around 50% of the times. This behavior was expected since c 3 , 1 , 0 = c 3 , 2 , 0 .
Since route decisions can impact the probability of retransmissions, we also computed the number of times that node 3 had to retransmit a packet every 1000 messages generated above the network layer. Since c 3 , 1 , 0 = c 3 , 2 , 0 in this scenario, all of the procedures showed similar results, as illustrated in Figure 4d.

7.1.2. Scenario S2: WiFi interference

Consider a symmetric scenario with WiFi interference. As illustrated in Figure 5, ZigBee nodes 0, 1, 2, and 3 are respectively at (0,80), (−35,0), (35,0), and (0,−80) and node 3 sends application data at an average rate of 20 packets/s to node 0 in the same communication channel as a WiFi IEEE 802.11n network. The WiFi network consists of one access point and two stations respectively, at (0,60), (10,60), and (−10,60). We assume that, at the time 100 s of the simulation, the WiFi access point starts two data streams of constant-bit-rate traffic of R W i F i bits/s, one to each WiFi station; and these streams last until the end of the simulation at 400 s.
In this topology, the WiFi devices are far from node 3 and may transmit while node 3 is transmitting, causing interference in the reception at nodes 1 and 2. As explained in Section 7.1.1, the symmetry of the topology means that the rates of interfering transmissions in nodes 1 and 2 are the same and the actual route costs for routes 3,1,0 and 3,2,0 satisfy c 3 , 1 , 0 = c 3 , 2 , 0 .
Figure 6a,b respectively, show the median and the 15th to 85th percentiles of c ¯ 3 , 2 , 0 and σ 3 , 2 , 0 for 30 simulation runs at each WiFi application rate ( R W i F i ) for the LS-based, the LQI-based, and the U-RR procedures. Since the WiFi traffic started only at t = 100 s, the c ¯ 3 , 2 , 0 and σ 3 , 2 , 0 were obtained considering cost estimates after t = 181 s. The figures for the median of c ¯ 3 , 1 , 0 and σ 3 , 1 , 0 showed similar behavior, and were therefore, omitted.
As discussed previously, the LQI-based procedure had the lowest variation in all scenarios; but it was not able to detect the WiFi interference. Even when the WiFi traffic was consuming more than 20% of the channel time, c ¯ 3 , 1 , 0 ( L Q I ) = c ¯ 3 , 2 , 0 ( L Q I ) = 2 most of the time.
Comparing the LS-based and the U-RR procedures, similarly to the analysis in the ZigBee-only network, it is possible to observe in Figure 6b that σ 3 , 2 , 0 ( U R R ) σ 3 , 2 , 0 ( L S ) in most traffic loads. The better performance of the U-RR procedure in comparison to the LS-based procedure was due to its reliance on unicast transmissions, which were more abundant than LS transmissions. It is also possible to observe the cyclic variations in σ 3 , 2 , 0 ( U R R ) caused by the rounding of cost estimates discussed in the previous section. These results show that the U-RR procedure is able to reduce cost estimate variations even under WiFi interference.
It is interesting to note in Figure 6b that σ 3 , 2 , 0 ( L S ) σ 3 , 2 , 0 ( U R R ) when R W i F i = 600 kbps. To understand this, we observed that the interference in the links between nodes 0, 1, and 2 caused by the WiFi transmissions when R W i F i = 600 kbps caused both p ^ 1 , 0 ( L S ) ( t ) and p ^ 2 , 0 ( L S ) ( t ) to be below 0.627, which maps into the maximum link cost 7. This can be seen in Figure 6a, which shows c ^ 3 , 2 , 0 ( L S ) ( t ) 8 . 7 when R W i F i = 600 kbps. This suggests that the high WiFi traffic caused the link cost estimates c ^ 1 , 0 ( L S ) ( t ) and c ^ 2 , 0 ( L S ) ( t ) to saturate at 7, reducing the standard deviation of the cost estimates over the course of the simulation.
Also similar to the Scenario S1, all procedures choose the route 3,2,0 around 50% of the time and showed similar performance regarding retransmissions, as illustrated in Figure 6c,d. This behavior was expected, since c 3 , 1 , 0 = c 3 , 2 , 0 .

7.1.3. Scenario S3: Two-Hop Scenario

Consider now the topology of Figure 7 involving routes with more than 1 hop. In this scenario, sensors at node 3 at (0,−140), node 4 at (−130,0), node 5 at (130,0), node 8 at (−130,−60), and node 9 at (130,60) send sensor measurements to the concentrator 0 at (0,80); and node 1 at (−35,0), node 2 at (35,0), node 6 at (−35,60), and node 7 at (35,−60) are available for routing packets. Because of their distance, nodes 4 and 8 are hidden from nodes 5 and 9 and vice-versa; and nodes 4, 5, 8, and 9 are hidden from nodes 0 and 3 and vice-versa. Node 1 is not close enough to be within node 8’s communication range; however, it can detect transmissions from node 8. Likewise, node 2 can detect transmissions from node 9; node 6 can detect transmissions from node 4; and node 7 can detect transmissions from node 5. Consider also the same parameters as described in Section 5. For this scenario, assume that nodes 3, 4, 5, 8, and 9 generate the same average number of packets/s.
Because of the symmetry of this scenario, the rates of interfering transmissions in nodes 1, 2, 6, and 7 are the same; and, as explained in Section 7.1.1, c 3 , 6 , 1 , 0 = c 3 , 7 , 2 , 0 and c 3 , 6 , 2 , 0 = c 3 , 7 , 1 , 0 ; however, c 3 , 7 , 2 , 0 < c 3 , 7 , 1 , 0 . To see this, note first that node 7 is farther from node 1 than it is from node 2. Furthermore, and perhaps more importantly, node 7 is hidden from node 4’s transmissions, while it is not hidden from node 5’s transmissions, which means a lower probability of successfully transmitting to node 1; i.e., p 7 , 1 < p 7 , 2 . Same argument follows to justify c 3 , 6 , 1 , 0 < c 3 , 6 , 2 , 0 .
Since c 3 , 6 , 1 , 0 = c 3 , 7 , 2 , 0 < c 3 , 6 , 2 , 0 = c 3 , 7 , 1 , 0 , it is desirable to choose either routes 3,6,1,0 or 3,7,2,0. Note that the choice of a route is not done by node 3 alone. As explained in Section 2.2, a node does not select the whole route toward the concentrator; instead, it only selects the next hop node; and the next hop node then chooses its next hop node toward the concentrator. All nodes operate the same next hop selection procedure and we will refer to a procedure as selecting a route as the route that resulted by the distributed operation of the procedure in the various nodes of the network.
Figure 8a,b show the average of cumulative cost estimates c ¯ 3 , 7 , x , 0 and σ 3 , 7 , x , 0 . We use ’x’ in c ¯ 3 , 7 , x , 0 and σ 3 , 7 , x , 0 because node 3 cannot differentiate a RREQ arriving through the route 3,6,1,0 from a RREQ arriving through the route 3,6,2,0; therefore, node 3 cannot estimate c 3 , 7 , 1 , 0 or c 3 , 7 , 2 , 0 separately. The figures showing c ¯ 3 , 6 , x , 0 and σ 3 , 6 , x , 0 followed similar behavior as shown in Figure 8a,b, and were therefore, omitted.
It is possible to see in Figure 8a,b that many of the conclusions reached for the single-hop scenario were also present in this two-hop scenario: the LQI-based procedure had the lowest variation in its cost estimates; however, it was not able to detect traffic increases; all procedures behaved similarly when the traffic load was low; and σ 3 , 7 , x , 0 ( U R R ) σ 3 , 7 , x , 0 ( L S ) as the traffic increased above 2 packets/s.
Letting r 3 , 6 , 1 , 0 and r 3 , 7 , 2 , 0 respectively, denote the ratio of times that the resulting route was 3,6,1,0 and 3,7,2,0; the sum r 3 , 6 , 1 , 0 + r 3 , 7 , 2 , 0 represents the ratio of time that a procedure chose one of the best routes. Figure 8c shows the average of r 3 , 6 , 1 , 0 + r 3 , 7 , 2 , 0 for 30 simulation runs at each traffic level for the LS-based, the LQI-based, and the U-RR procedures.
It is possible to see in Figure 8c that the LS-based procedure resulted in better route decisions than both the U-RR and the LQI-based procedures when the average number of packets/s generated by nodes was between 1 and 5 packets/s. To understand this, recall that the U-RR procedure selects the next hop node with the least number of packets transmitted when two RREQs arrive with the same cumulative cost. When the traffic load is low, packet losses due to the hidden node problem are low, and although c 3 , 6 , 1 , 0 < c 3 , 6 , 2 , 0 , the sum of 3-bit quantized link costs may result in the same value, and the U-RR procedure would result in node 6 selecting node 2 as the next hop towards node 0 more often to better estimate its actual cost.
However, when the average number of packets/s generated by nodes was between 5 and 12.5 packets/s, the U-RR procedure resulted in better route selections than both the LQI-based and the LS-based procedures. In some cases, the U-RR procedure chose one of the preferred routes 3,6,1,0 and 3,7,2,0 more than 90% of the time, while the LQI-based and LS-based procedures selected the preferred routes around 55% and 75% of the time respectively.
When the average number of packets/s generated by nodes was very large (above 12.5 packets/s in this case), both the LS-based and the U-RR procedure reached similar performances. To understand this, note that higher traffic loads increase the frequency of hidden node problems. If the traffic load is high enough, the difference in cost of candidate routes becomes wide enough that, even with the higher variation of the LS-based procedure, the noisy cost estimate of routes 3,6,1,0 or 3,7,2,0 is still above the noisy cost estimate of routes 3,6,2,0 or 3,7,1,0.
Lastly, since c 3 , 6 , 1 , 0 = c 3 , 7 , 2 , 0 < c 3 , 6 , 2 , 0 = c 3 , 7 , 1 , 0 , we also evaluated the impact of choosing the suboptimal routes 3,6,2,0 or 3,7,1,0 in the packet delivery rate of each procedure. Since the routes were not being chosen directly by node 3, we computed the rate of successfully delivering messages. Also, because the procedures also select between route 8,6,1,0, route 8,6,2,0, route 9,7,1,0, and route 9,7,2,0, we computed the rate of successfully delivering packets from nodes 3, 8, and 9 for each procedure. As illustrated in Figure 8d, it is possible to note that the U-RR procedure performed slightly better than the LQI-based procedure when the traffic load was large; however, the difference with respect to the LS-based procedure was small, suggesting that the amount of asymmetry was not large enough to cause an impact in the network delivery performance.

7.2. Asymmetric Topologies

We also evaluated our procedure in asymmetric scenarios in order to evaluate how well it improves the selection of the best route available. Given that the three estimation procedures perform similarly at low traffic loads, we focused on high traffic load conditions.

7.2.1. Scenario A1: ZigBee-Only, One-Hop Routes

Consider again the topology of Figure 1 as in Scenario S1, but now assume that node 4 generates more traffic load than node 5, making the rate of interfering transmissions in node 1 greater than the rate of interfering transmissions in node 2, which results in c 3 , 1 , 0 > c 3 , 2 , 0 . In this case, it is desirable that node 3 chooses the route 3,2,0 as much as possible to avoid the hidden node problem caused by node 4.
We first evaluate the performance of the U-RR procedure in the single simulation run of the Example 2 of Section 5.1, in which nodes 3, 4, and generate an average of 20, 10, and 0.5 packets/s respectively. Figure 2f in Section 5.2 illustrates the cumulative costs measured at node 3 when using the U-RR procedure. Comparing this figure with Figure 2b, which refers to the same scenario but using the LS-based procedure, it is possible to observe that the U-RR procedure was able to generate estimates with less variation and better recognize that route 3,2,0 had lower cost than route 3,1,0 given the higher traffic caused by node 4 upon node 1.
To better analyze the performance of the U-RR procedure at selecting the best route, we varied the traffic level generated by node 5, and at each traffic level, we repeated the simulation 30 times, each time with a different random seed.
Figure 9a–f respectively, show the median and the 15th to 85th percentiles of c ¯ 3 , 1 , 0 , c ¯ 3 , 2 , 0 , σ 3 , 1 , 0 , σ 3 , 2 , 0 , r 3 , 2 , 0 , and node 3’s number of retransmissions per 1000 messages generated for 30 simulation runs at each of node 5’s traffic level for the LS-based, the LQI-based, and the U-RR procedures.
Regarding the LQI-based procedure, as shown in Figure 9a,b, it estimated both routes to have cost 2 regardless of the traffic load generated by node 5. This means that node 3 chose the best route 3,2,0 randomly, around 50% of the times, as shown in Figure 9e.
Regarding the LS-based procedure, it struggled to recognize route 3,2,0 as the best route. Although Figure 9a,b shows that the LS-based procedure resulted in c ¯ 3 , 1 , 0 > c ¯ 3 , 2 , 0 , the difference was within the standard deviation of the cost estimates, as shown in Figure 9c,d. The higher variation of cost estimates caused the LS-based procedure to select route 3,2,0 only 60% of the time when node 5 generated only 0.5 packets/s, as shown in Figure 9e.
In contrast, as illustrated in Figure 9a through Figure 9e, when node 5 generated 0.5 packets/s, the differences in cost estimates of the U-RR procedure were much higher than the standard deviation, and the U-RR procedure chose route 3,2,0 only 89% of the times. The U-RR procedure also resulted in a lower number of retransmissions: as shown in Figure 9f, the median number of node 3 retransmissions per 1000 messages was 115 when using the LQI-based procedure, 110 when using the LS-based procedure, and 83 when using the U-RR procedure.
As the traffic load generated by node 5 increased, the true cost c 3 , 2 , 0 started to increase above the cost 2; however, because of the cost rounding discussed before, the cost estimates by the U-RR procedure started to alternate between cost 2 and cost 3, which is the cost of route 3,1,0, and r 3 , 2 , 0 ( U R R ) decreased little by little, until it reached 50% when node 5’s traffic load reached 4 packets/s.
It is important to observe that, when the node 5 generated 4 packets/s, the actual unrounded cost of the route 3,1,0 was still higher than the actual unrounded cost of the route 3,2,0; however, because costs are rounded to the closest integer, the U-RR procedure was not able to recognize route 3,2,0 as the best route beyond this point.
Note further that the U-RR procedure alternates between routes that have the same rounded cost. More specifically, as the rounded cost estimates for the route 3,2,0 became equal to 3, the U-RR procedure chose the route that had the least number of unicast transmissions in order to improve its cost estimation, resulting in r 3 , 2 , 0 ( U R R ) 0 . 5 . This behavior can be seen in Figure 9e: when node 5 generated between 3.75 and 7.5 packets/s, the U-RR procedure chose the route 3,1,0 more often than the LS-based procedure in order to improve the cost estimate of the route 3,1,0. This results in a slight increase in the number of node 3 retransmissions per 1000 messages of the U-RR procedure over the LS procedure, as can be seen in Figure 9f when node 5 generates around 4 packets/s.
It is also interesting to observe that it is possible for procedures to select non-optimal routes even when the estimation has low variation. For instance, when node 5 generated 0.5 messages/s r 3 , 2 , 0 ( U R R ) > 0 . 9 , σ 3 , 2 , 0 ( U R R ) = 0 , and c ¯ 3 , 2 , 0 < c ¯ 3 , 1 , 0 ; however, the route 3,1,0 was still selected 10% of the time. This was probably due to node 3 missing RREQ messages from node 2 in one or more of the RREQ cycles.

7.2.2. Scenario A2: WiFi Interference

Consider the topology shown in Figure 10, where ZigBee nodes 0, 1, 2, and 3 operate in a communication channel that overlaps with the channel used by a WiFi IEEE 802.11n network. Consider that the ZigBee nodes are in the same locations as in the Scenario A1 of Section 7.1.2 and the WiFi network again consists of one access point and two stations, but now at locations (60,−30), (60,−20), and (60,−40) respectively. Assume that node 3 sends application data at an average rate of 20 packets/s to node 0.
At t = 100 s, the WiFi access point starts two data streams of constant-bit-rate traffic of R W i F i bits/s, one to each WiFi station; and these streams last until the end of the simulation at t = 400 s. Details of these streams are as described in Section 4. As in Scenario S2, the WiFi devices are far from node 3 and may transmit while node 3 is transmitting; however, because the WiFi devices are closer to node 1, the interference level increases at node 1 and decreases at node 2, resulting in c 3 , 1 , 0 > c 3 , 2 , 0 . In this case, it is desirable that node 3 chooses the route 3,2,0 as much as possible since node 2 is less subject to the WiFi interference.
To analyze the performance of the U-RR procedure in selecting the best route 3,2,0, we varied the traffic level generated by the WiFi access point, and at each traffic level, we repeated the simulation 30 times, each time with a different random seed. Figure 11a through Figure 11f respectively, show the median and the 15th to 85th percentiles of the cumulative route costs 3,1,0 and 3,2,0 ( c ¯ 3 , 1 , 0 and c ¯ 3 , 2 , 0 ), their standard deviations ( σ 3 , 1 , 0 and σ 3 , 2 , 0 ), the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and number of times that node 3 had to retransmit per 1000 messages generated for 30 simulation runs as WiFi traffic load R W i F i varied for the LS-based, the LQI-based, and the U-RR procedures.
Figure 11a,b show that, as the R W i F i increased above 450 kbps, both the LS-based and the U-RR procedures started to detect the higher cost of the route 3,1,0 with respect to route 3,2,0, while the LQI-based procedure still considered both routes having the same cost. It is interesting to observe that the c ¯ 3 , 1 , 0 c ¯ 3 , 2 , 0 0 . 5 in the LS-based procedure, within the standard deviation of the estimates, while c ¯ 3 , 1 , 0 c ¯ 3 , 2 , 0 2 in the U-RR procedure, showing that the U-RR procedure was able to better recognize route 3,2,0 as the best route. It is also interesting to observe that the standard deviations σ 3 , 1 , 0 and σ 3 , 2 , 0 of the LS-based procedure reduced for higher WiFi loads. This behavior can be explained by observing the cumulative route costs c ¯ 3 , 1 , 0 and c ¯ 3 , 2 , 0 : when the WiFi load increased, there was a point in which the cumulative route costs increased above 8. Remembering that each individual path cost is quantized between 0 and 7, this suggests that c 1 , 0 and c 2 , 0 started to saturate at 7, reducing the variations in cost.
As shown in Figure 11e, all of the procedures struggled to recognize route 3,2,0 as the best route when R W i F i < 400 kbps; however, as R W i F i increased above 450 kbps, all of the procedures started to recognize route 3,2,0 as the best route, with the U-RR showing the best performance: when R W i F i = 600 kbps, both the LQI-based and the LS-based procedures were only sending a median of less than 70% of the packets through the route 3,2,0, while the U-RR based procedure sent a median of 90% of the packets through the route 3,2,0. As a result, as shown in Figure 11f, both the LQI-based and the LS-based procedures had more packet losses and retransmissions: while these procedures showed a median of 62 or more node 3 retransmissions/1000 messages generated, the U-RR procedure had an median of less than 50 retransmissions/1000 messages, representing a reduction of 20%.

7.2.3. Scenario A3: Two-Hop Scenario

Consider again the topology of Figure 7 involving routes with more than 1 hop, with sensors at the same locations as described in Section 7.1.3.
In order to investigate the performance of the U-RR procedure when the scenario asymmetry is far from node 3, consider that node 3 generates an average of 20 packets/s; nodes 8 and 9 generate each an average of 0.5 packets/s; node 4 generates an average of 10 packets/s; and we vary the traffic load of node 5.
Because of the higher traffic load generated by node 4, the rate of interfering transmissions in node 1 increases, making the route 3,7,2,0 the best route in this scenario.
Figure 12a,b show that, when node 5 generated 0.5 messages/s, both the LS-based and the U-RR procedures started to detect the higher cost of the routes passing through node 6 instead of node 7, while the LQI-based procedure was not able to differentiate routes 3,6,x,0 and 3,7,x,0. As before, the difference c ¯ 3 , 1 , 0 c ¯ 3 , 2 , 0 was higher in the U-RR procedure than in the LS-based procedure; however, in here, the difference was within the standard deviation of the estimates in both cases. Nevertheless, as shown in Figure 12c,d, the U-RR procedure showed a lower standard deviation of the cumulative costs when compared to the LS-based procedure.
As can be seen in Figure 12e,f, the U-RR procedure was able to choose the best route most often, and as a result, the U-RR procedure was able to deliver more messages from nodes 3, 8, and 9 that use nodes 6 and 7 as relays towards the concentrator. As the average number of messages/s generated by node 5 approached 10 packets/s, which is the same traffic loads generated by node 4, the costs of routes 3,7,2,0 and 3,6,1,0 became the same, and the U-RR procedure selected routes 3,7,2,0 and 3,6,1,0 with approximately the same frequency of around 45%.

7.3. Random Topologies

Consider the scenario illustrated in Figure 13, where sensors at nodes 3, 4, and 5 send sensor measurements to the concentrator at node 0, and nodes 1 and 2 are available for routing packets. The difference between this and previous scenarios is that nodes 1, 2, 4, and 5 will at this stage be at random locations. More precisely, with node 0 located at (−80,0) and node 3 located at (80,0), node 1 will be uniformly distributed in the rectangular region with opposing vertices at (−10,−45) and (10,0); and node 2 will be uniformly distributed in the rectangular region with opposing vertices at (−10,45) and (10,0). The reason for placing nodes 1 and 2 at these rectangles is to create a scenario with 2 candidate routes; otherwise, if the random drops were such that only one route were available, all procedures would behave in the same way. Once nodes 1 and 2 are placed, as illustrated Figure 13, node 4 is placed 95 m below node 1 and node 5 is placed 95 m above node 2.
Assume that nodes 3, 4, and 5 respectively generate an average of 20, 10, 0.5 packet/s. Although node 5 generates less traffic load than node 4, route 3,2,0 is not necessarily the best route because the random position of nodes can cause different hidden node problems, and we compare the procedures based on the amount of retransmissions per 1000 messages.
We generated 30 sets of random locations for nodes 1 and 2, and for each set or random locations, we ran each of the three procedures using 30 different random simulation seeds.
Figure 14a shows the cumulative distribution of the number of node 3 retransmissions per 1000 messages generated by each procedure. It is possible to see that, with the U-RR procedure, 55% of the scenarios ran showed node 3 with 100 or less retransmissions per 1000 messages generated; and, with the LS-based or LQI-based, only 35% of the scenarios showed node 3 with 100 or less retransmissions per 1000 messages generated.
Figure 14b shows boxplots of the percentage reduction in the number of node 3 retransmissions per 1000 messages generated when compared to the LQI-based and the LS-based procedures. In each boxplot, the whiskers represent the 5th and 95th percentiles, the bottom and top parts of the box represent the 25th and 75th percentiles, and the line inside the box represents the median of the 30 random locations. When comparing against the LS-based and LQI-based procedures, the U-RR procedure reduced the amount of retransmissions by 14% or more in 25% of the random scenarios. In some scenarios, the reduction with respect to the LS-based procedure was 34%.

8. Conclusions and Avenues for Future Research

Although the three procedures offer similar performances at low traffic loads, this paper has shown that, at higher traffic loads, relying solely on link status (LS) messages or on the average of link quality indicators (LQI) of received packets to estimate link costs and select routes can degrade the performance of ZigBee’s route selection algorithm, particularly in asymmetric scenarios. This conclusion is in agreement with conclusions reached by other authors, which showed, in protocols other than ZigBee, that beacon-based link estimation procedures produce degraded performance.
Given the problems of LS-based and LQI-based procedures in higher traffic loads, we proposed the U-RR (unicast round-robin) procedure. The U-RR procedure uses MAC information regarding unicast transmissions to estimate the probability of successful transmissions on a link; and uses a modified route selection mechanism to decide among routes that have the same cumulative route cost. The modified route selection mechanism indirectly makes a node select among such routes in a round-robin fashion in order to improve the link cost estimation of candidate routes. The modified route selection mechanism is particularly important in ZigBee networks because ZigBee nodes have to quantize the link costs in just three bits, causing many route candidates to have the same cumulative route cost.
Our simulation results show that the U-RR procedure reduces the variance of link cost estimations, allowing nodes to better differentiate among routes, and increases the number of times that the best route is selected. The benefits of the U-RR procedure are more relevant under higher traffic loads and in asymmetric scenarios; however, even in other scenarios, the U-RR procedure performs at least as well as the LS-based procedure.
Lastly, it should be mentioned that the U-RR procedure is not necessarily the best link cost estimator and route selection procedure, and algorithms such as those mentioned in Section 3.1 would most likely offer improved performance; however, such algorithms would require a significant revision of the ZigBee protocol and frame formats. In contrast, our U-RR procedure offers improved performance to ZigBee networks while neither requiring new protocol messages nor changes to frame formats.

Avenues for Future Research

Below are research areas that could complement the results presented here:
  • Although this paper considered some scenarios involving WiFi interference, further scenarios involving WiFi interference would complement the results presented here. More simulations could also reduce the large variation observed in the scenarios with WiFi interference.
  • The U-RR procedure proposed here considers a fixed observation window to estimate the cost of various routes. Since such an estimation depends on the number of unicast packets being transmitted, it would be interesting to study modifications in which the observation window adapts to the amount of unicast traffic generated.
  • The U-RR procedure here was designed for the many-to-one routing algorithm of ZigBee. Although the ideas behind the U-RR procedure could also be applied in the other routing algorithms, new simulations and analysis would be necessary to determine whether the U-RR procedure would be useful in other routing algorithms as well.
  • In this study, we considered the default parameters of the ZigBee network layer and the IEEE 802.15.4 MAC and physical layers. Given that the performance of these systems can vary with such parameters [29,30], it would be interesting to study whether the results reported here could be improved by optimizing such parameters.
  • It would be interesting to study how the proposed route cost estimation procedure could operate together with clustering procedures [54,55,56,57,58]. Clustering procedures build a hierarchical topology in which sensors communicate with clusterheads, which forward the message to other clusterheads that relay the message until it reaches the destination. In the context of this paper, such clusterheads would be selecting routes towards the concentrator by using a route cost estimation procedure, such as the U-RR procedure, and it would be interesting to consider clustering algorithms that select clusterheads while taking into consideration the cost variations in the routes that interconnect them.

Author Contributions

Conceptualization: B.F.; methodology: B.F.; software: S.M., B.F.; validation: S.M.; formal analysis: S.M., B.F.; investigation: S.M., B.F.; resources: B.F.; writing—original draft preparation: S.M.; writing—review and editing: B.F.; visualization: S.M.; supervision: B.F.; project administration: B.F.; funding acquisition: B.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by a confidential sponsor through the NIU grant number G5B70323. The authors thank the confidential sponsor for their support.

Acknowledgments

The authors also thank the reviewers for the useful suggestions that improved the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Farahani, S. ZigBee Wireless Networks and Transceivers; Newnes: Oxford, UK, 2011. [Google Scholar]
  2. Gislason, D. Zigbee Wireless Networking; Newnes: Oxford, UK, 2008. [Google Scholar]
  3. IEEE Standards Association. IEEE Standards Association. IEEE Standard for Low-Rate Wireless Networks. In IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011); IEEE: New York, NY, USA, 2016; pp. 1–709. [Google Scholar] [CrossRef]
  4. Kim, S.H.; Chong, P.K.; Kim, T. Performance study of routing protocols in ZigBee wireless mesh networks. Wirel. Pers. Commun. 2017, 95, 1829–1853. [Google Scholar] [CrossRef]
  5. Happich, J. Zigbee Alliance Wants More of IoT Market with All Hubs Initiative. 2019. Available online: https://www.eenewseurope.com/news/zigbee-alliance-wants-more-iot-market-all-hubs-initiative (accessed on 28 November 2019).
  6. Cravotta, N. Keeping Pace with the Evolution of Standards. 2019. Available online: https://www.embedded-computing.com/iot/keeping-pace-with-the-evolution-of-standards (accessed on 28 November 2019).
  7. Gočal, P.; Macko, D. EEMIP: Energy-Efficient Communication Using Timing Channels and Prioritization in ZigBee. Sensors 2019, 19, 2246. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Li, P.; Yan, Y.; Yang, P.; Li, X.Y.; Lin, Q. Coexist WiFi for ZigBee Networks With Fine-Grained Frequency Approach. IEEE Access 2019, 7, 135363–135376. [Google Scholar] [CrossRef]
  9. Gheorghiu, R.; Iordache, V. Use of Energy Efficient Sensor Networks to Enhance Dynamic Data Gathering Systems: A Comparative Study between Bluetooth and ZigBee. Sensors 2018, 18, 1801. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Li, Y.; Chi, Z.; Liu, X.; Zhu, T. Passive-ZigBee: Enabling ZigBee Communication in IoT Networks with 1000X+ Less Power Consumption. In Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, Shenzhen, China, 4–7 November 2018; pp. 159–171. [Google Scholar]
  11. Vaquerizo-Hdez, D.; Muñoz, P.; F Barrero, D. A low power consumption algorithm for efficient energy consumption in zigbee motes. Sensors 2017, 17, 2179. [Google Scholar] [CrossRef] [Green Version]
  12. Leão, E.; Montez, C.; Moraes, R.; Portugal, P.; Vasques, F. Alternative Path Communication in Wide-Scale Cluster-Tree Wireless Sensor Networks Using Inactive Periods. Sensors 2017, 17, 1049. [Google Scholar] [CrossRef]
  13. ZigBee Alliance, Inc. ZigBee Specification; ZigBee Alliance, Inc.: Davis, CA, USA, 2015. [Google Scholar]
  14. Feng, Y.; Liu, L.; Shu, J. A Link Quality Prediction Method for Wireless Sensor Networks Based on XGBoost. IEEE Access 2019, 7, 155229–155241. [Google Scholar] [CrossRef]
  15. Ancillotti, E.; Vallati, C.; Bruno, R.; Mingozzi, E. A reinforcement learning-based link quality estimation strategy for RPL and its impact on topology management. Comput. Commun. 2017, 112, 1–13. [Google Scholar] [CrossRef] [Green Version]
  16. Panousopoulou, A.; Azkune, M.; Tsakalides, P. Feature selection for performance characterization in multi-hop wireless sensor networks. Ad Hoc Netw. 2016, 49, 70–89. [Google Scholar] [CrossRef]
  17. Liu, T.; Cerpa, A.E. Data-driven link quality prediction using link features. ACM Trans. Sens. Netw. (TOSN) 2014, 10, 37. [Google Scholar] [CrossRef]
  18. Ancillotti, E.; Bruno, R.; Conti, M. Reliable Data Delivery with the IETF Routing Protocol for Low-Power and Lossy Networks. IEEE Trans. Ind. Inform. 2014, 10, 1864–1877. [Google Scholar] [CrossRef]
  19. Di Caro, G.A.; Kudelski, M.; Flushing, E.F.; Nagi, J.; Ahmed, I.; Gambardella, L.M. Online supervised incremental learning of link quality estimates in wireless networks. In Proceedings of the 2013 12th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), Ajaccio, France, 24–26 June 2013; pp. 133–140. [Google Scholar]
  20. Zhang, H.; Sang, L.; Arora, A. Comparison of data-driven link estimation methods in low-power wireless networks. IEEE Trans. Mob. Comput. 2010, 9, 1634–1648. [Google Scholar] [CrossRef] [Green Version]
  21. Kim, K.H.; Shin, K.G. On accurate and asymmetry-aware measurement of link quality in wireless mesh networks. IEEE/ACM Trans. Netw. (TON) 2009, 17, 1172–1185. [Google Scholar]
  22. Zhang, H.; Arora, A.; Sinha, P. Link estimation and routing in sensor network backbones: Beacon-based or data-driven? IEEE Trans. Mob. Comput. 2008, 8, 653–667. [Google Scholar] [CrossRef] [Green Version]
  23. Woo, A.; Tong, T.; Culler, D. Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, 5–7 November 2003; pp. 14–27. [Google Scholar]
  24. He, T.; Stankovic, J.A.; Lu, C.; Abdelzaher, T. SPEED: A stateless protocol for real-time communication in sensor networks. In Proceedings of the 23th IEEE International Conference on Distributed Computing Systems, Providence, RI, USA, 19–22 May 2003. [Google Scholar]
  25. Krishnan, R.; Raniwala, A.; Chiueh, T.C. Design of a channel characteristics-aware routing protocol. In Proceedings of the IEEE INFOCOM 2008—The 27th Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; pp. 2441–2449. [Google Scholar]
  26. Fonseca, R.; Gnawali, O.; Jamieson, K.; Levis, P. Four-bit wireless link estimation. In Proceedings of the Sixth Workshop on Hot Topics in Networks (HotNets-VI), Atlanta, Georgia, 14–15 November 2007. [Google Scholar]
  27. Kim, K.H.; Shin, K.G. On accurate measurement of link quality in multi-hop wireless mesh networks. In Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, Bretton Woods, NH, USA, 16–19 June 2006; pp. 38–49. [Google Scholar]
  28. De Couto, D.S.; Aguayo, D.; Bicket, J.; Morris, R. A high-throughput path metric for multi-hop wireless routing. Wirel. Netw. 2005, 11, 419–434. [Google Scholar] [CrossRef]
  29. Moravejosharieh, A.; Lloret, J. A survey of IEEE 802.15.4 effective system parameters for wireless body sensor networks. Int. J. Commun. Syst. 2016, 29, 1269–1292. [Google Scholar] [CrossRef]
  30. Moravejosharieh, A.; Lloret, J. Performance evaluation of co-located IEEE 802.15.4-based wireless body sensor networks. Ann. Telecommun. 2016, 71, 425–440. [Google Scholar] [CrossRef]
  31. Ahmadi, H.; Krishna, A.; LaMaire, R.O. Design issues in wireless LANs. J. High Speed Netw. 1996, 5, 87–104. [Google Scholar] [CrossRef]
  32. Tobagi, F.; Kleinrock, L. Packet Switching in Radio Channels: Part II—The Hidden Terminal Problem in Carrier Sense Multiple-Access and the Busy-Tone Solution. IEEE Trans. Commun. 1975, 23, 1417–1433. [Google Scholar] [CrossRef]
  33. Baccour, N.; Koubâa, A.; Mottola, L.; Zúñiga, M.A.; Youssef, H.; Boano, C.A.; Alves, M. Radio link quality estimation in wireless sensor networks: A survey. ACM Trans. Sens. Netw. (TOSN) 2012, 8, 34. [Google Scholar] [CrossRef]
  34. Ngangue Ndih, E.D.; Cherkaoui, S. On Enhancing Technology Coexistence in the IoT Era: ZigBee and 802.11 Case. IEEE Access 2016, 4, 1835–1844. [Google Scholar] [CrossRef]
  35. Ju, X.; Liu, W.; Zhang, C.; Liu, A.; Wang, T.; Xiong, N.; Cai, Z. An energy conserving and transmission radius adaptive scheme to optimize performance of energy harvesting sensor networks. Sensors 2018, 18, 2885. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  36. Lu, T.; Liu, G.; Chang, S. Energy-efficient data sensing and routing in unreliable energy-harvesting wireless sensor network. Wirel. Netw. 2018, 24, 611–625. [Google Scholar] [CrossRef]
  37. Wang, Y.; Zhang, Y.; Zhu, L.; Ji, W.; Liu, Y.; Hei, X. A novel energy-aware trustworthy multi-hop routing model for Internet of things. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718818689. [Google Scholar] [CrossRef]
  38. Ren, J.; Zhang, Y.; Zhang, K.; Liu, A.; Chen, J.; Shen, X.S. Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks. IEEE Trans. Ind. Inform. 2015, 12, 788–800. [Google Scholar] [CrossRef]
  39. Rault, T.; Bouabdallah, A.; Challal, Y. Energy efficiency in wireless sensor networks: A top-down survey. Comput. Netw. 2014, 67, 104–122. [Google Scholar] [CrossRef]
  40. Liu, A.; Ren, J.; Li, X.; Chen, Z.; Shen, X.S. Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks. Comput. Netw. 2012, 56, 1951–1967. [Google Scholar] [CrossRef]
  41. Kandris, D.; Tsioumas, P.; Tzes, A.; Nikolakopoulos, G.; Vergados, D. Power conservation through energy efficient routing in wireless sensor networks. Sensors 2009, 9, 7320–7342. [Google Scholar] [CrossRef]
  42. Vergados, D.J.; Pantazis, N.A.; Vergados, D.D. Energy-efficient route selection strategies for wireless sensor networks. Mob. Netw. Appl. 2008, 13, 285–296. [Google Scholar] [CrossRef]
  43. Chang, J.H.; Tassiulas, L. Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans. Netw. 2004, 12, 609–619. [Google Scholar] [CrossRef]
  44. Gupta, A.; Sharma, M.; Marot, M.; Becker, M. Hybridlqi: Hybrid multihoplqi for improving asymmetric links in wireless sensor networks. In Proceedings of the 2010 Sixth Advanced International Conference on Telecommunications, Barcelona, Spain, 9–15 May 2010; pp. 298–305. [Google Scholar]
  45. Polastre, J.; Szewczyk, R.; Culler, D. Telos: Enabling ultra-low power wireless research. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, Los Angeles, CA, USA, 24–27 April 2005; p. 48. [Google Scholar]
  46. Gungor, V.C.; Sastry, C.; Song, Z.; Integlia, R. Resource-aware and link quality based routing metric for wireless sensor and actor networks. In Proceedings of the 2007 IEEE International Conference on Communications, Glasgow, UK, 24–28 June 2007; pp. 3364–3369. [Google Scholar]
  47. Sun, W.; Lu, W.; Li, Q.; Chen, L.; Mu, D.; Yuan, X. WNN-LQE: Wavelet-neural-network-based link quality estimation for smart grid WSNs. IEEE Access 2017, 5, 12788–12797. [Google Scholar] [CrossRef]
  48. Bote-Lorenzo, M.L.; Gómez-Sánchez, E.; Mediavilla-Pastor, C.; Asensio-Pérez, J.I. Online machine learning algorithms to predict link quality in community wireless mesh networks. Comput. Networks 2018, 132, 68–80. [Google Scholar] [CrossRef] [Green Version]
  49. Mostafaei, H. Energy-Efficient Algorithm for Reliable Routing of Wireless Sensor Networks. IEEE Trans. Ind. Electron. 2019, 66, 5567–5575. [Google Scholar] [CrossRef]
  50. Riley, G.F.; Henderson, T.R. The ns-3 network simulator. In Modeling and Tools for Network Simulation; Springer: Cham, Switzerland, 2010; pp. 15–34. [Google Scholar]
  51. ns-3: A Discrete-Event Network Simulator for Internet Systems. 2019. Available online: https://www.nsnam.org (accessed on 1 December 2019).
  52. ns-3: Low-Rate Wireless Personal Area Network (LR-WPAN). 2019. Available online: https://www.nsnam.org/docs/models/html/lr-wpan.html (accessed on 1 December 2019).
  53. Graybill, F.A.; Deal, R. Combining unbiased estimators. Biometrics 1959, 15, 543–550. [Google Scholar] [CrossRef]
  54. Liu, X. A survey on clustering routing protocols in wireless sensor networks. Sensors 2012, 12, 11113–11153. [Google Scholar] [CrossRef] [PubMed]
  55. Xu, L.; Collier, R.; O’Hare, G.M. A survey of clustering techniques in WSNs and consideration of the challenges of applying such to 5G IoT scenarios. IEEE Internet Things J. 2017, 4, 1229–1249. [Google Scholar] [CrossRef]
  56. Sandeep, D.N.; Kumar, V. Review on Clustering, Coverage and Connectivity in Underwater Wireless Sensor Networks: A Communication Techniques Perspective. IEEE Access 2017, 5, 11176–11199. [Google Scholar] [CrossRef]
  57. Zafar, S.; Bashir, A.; Chaudhry, S.A. Mobility-Aware Hierarchical Clustering in Mobile Wireless Sensor Networks. IEEE Access 2019, 7, 20394–20403. [Google Scholar] [CrossRef]
  58. Naranjo, P.G.V.; Shojafar, M.; Mostafaei, H.; Pooranian, Z.; Baccarelli, E. P-SEP: A prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks. J. Supercomput. 2017, 73, 733–755. [Google Scholar] [CrossRef]
Figure 1. ZigBee network in which sensor data at nodes 3, 4, and 5 are transmitted to a concentrator at node 0 using nodes 1 and 2 as relays.
Figure 1. ZigBee network in which sensor data at nodes 3, 4, and 5 are transmitted to a concentrator at node 0 using nodes 1 and 2 as relays.
Sensors 20 00164 g001
Figure 2. Cumulative route costs using the LS-based procedure, the LQI-based procedure, and the U-RR procedure (defined in Section 6) in topology of Figure 1. Results in (a,c,e) correspond to Example 1 in Section 5.1. Results in (b,d,f) correspond to Example 2 in Section 5.2.
Figure 2. Cumulative route costs using the LS-based procedure, the LQI-based procedure, and the U-RR procedure (defined in Section 6) in topology of Figure 1. Results in (a,c,e) correspond to Example 1 in Section 5.1. Results in (b,d,f) correspond to Example 2 in Section 5.2.
Sensors 20 00164 g002
Figure 3. (a) ZigBee’s treatment of a route request (RREQ) message in the M2O routing procedure; and (b) modified treatment of a RREQ message in the U-RR procedure. This figure illustrates the treatment of a RREQ arriving from node 2 at node 3. Node 3 has previously received a RREQ from node 1 and stored node 1 and the estimated cumulative route cost of the route 3,1,0 in its routing table.
Figure 3. (a) ZigBee’s treatment of a route request (RREQ) message in the M2O routing procedure; and (b) modified treatment of a RREQ message in the U-RR procedure. This figure illustrates the treatment of a RREQ arriving from node 2 at node 3. Node 3 has previously received a RREQ from node 1 and stored node 1 and the estimated cumulative route cost of the route 3,1,0 in its routing table.
Sensors 20 00164 g003
Figure 4. The median and the 15th to 85th percentiles of (a): the cumulative route cost of route 3,2,0 ( c ¯ 3 , 2 , 0 ), (b): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (c): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (d): the number of times that node 3 had to retransmit for every 1000 messages for the symmetric scenario S1.
Figure 4. The median and the 15th to 85th percentiles of (a): the cumulative route cost of route 3,2,0 ( c ¯ 3 , 2 , 0 ), (b): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (c): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (d): the number of times that node 3 had to retransmit for every 1000 messages for the symmetric scenario S1.
Sensors 20 00164 g004
Figure 5. Topology where ZigBee devices share same spectrum as WiFi devices.
Figure 5. Topology where ZigBee devices share same spectrum as WiFi devices.
Sensors 20 00164 g005
Figure 6. The median and the 15th to 85th percentiles of (a): the cumulative route cost of route 3,2,0 ( c ¯ 3 , 2 , 0 ), (b): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (c): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (d): the number of times that node 3 had to retransmit for every 1000 messages for the symmetric scenario S2.
Figure 6. The median and the 15th to 85th percentiles of (a): the cumulative route cost of route 3,2,0 ( c ¯ 3 , 2 , 0 ), (b): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (c): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (d): the number of times that node 3 had to retransmit for every 1000 messages for the symmetric scenario S2.
Sensors 20 00164 g006
Figure 7. Topology with one-hop and two-hop routes.
Figure 7. Topology with one-hop and two-hop routes.
Sensors 20 00164 g007
Figure 8. The median and the 15th to 85th percentiles of (a): the cumulative route cost of routes 3,7,x,0 ( c ¯ 3 , 7 , x , 0 ), (b): the standard deviation of the estimated costs measured at node 3 for the routes 3,7,x,0 ( σ 3 , 7 , x , 0 ), (c): the ratio of times that packets were relayed by the best routes 3,6,1,0 and 3,7,2,0 ( r 3 , 6 , 1 , 0 + r 3 , 7 , 2 , 0 ), and (d): the delivery rate of messages originated at nodes 3, 8, and 9 in the symmetric scenario S3.
Figure 8. The median and the 15th to 85th percentiles of (a): the cumulative route cost of routes 3,7,x,0 ( c ¯ 3 , 7 , x , 0 ), (b): the standard deviation of the estimated costs measured at node 3 for the routes 3,7,x,0 ( σ 3 , 7 , x , 0 ), (c): the ratio of times that packets were relayed by the best routes 3,6,1,0 and 3,7,2,0 ( r 3 , 6 , 1 , 0 + r 3 , 7 , 2 , 0 ), and (d): the delivery rate of messages originated at nodes 3, 8, and 9 in the symmetric scenario S3.
Sensors 20 00164 g008
Figure 9. The median and the 15th to 85th percentiles of (a): the cumulative route costs of the route 3,1,0 ( c ¯ 3 , 1 , 0 ), (b): the cumulative route costs of the route 3,2,0 ( c ¯ 3 , 2 , 0 ), (c): the standard deviation of the estimated costs measured at node 3 for the route 3,1,0 ( σ 3 , 1 , 0 ), (d): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (e): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (f): the number of times that node 3 had to retransmit per 1000 messages generated in the scenario A1.
Figure 9. The median and the 15th to 85th percentiles of (a): the cumulative route costs of the route 3,1,0 ( c ¯ 3 , 1 , 0 ), (b): the cumulative route costs of the route 3,2,0 ( c ¯ 3 , 2 , 0 ), (c): the standard deviation of the estimated costs measured at node 3 for the route 3,1,0 ( σ 3 , 1 , 0 ), (d): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (e): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (f): the number of times that node 3 had to retransmit per 1000 messages generated in the scenario A1.
Sensors 20 00164 g009
Figure 10. Topology where ZigBee devices share same spectrum as WiFi devices.
Figure 10. Topology where ZigBee devices share same spectrum as WiFi devices.
Sensors 20 00164 g010
Figure 11. The median and the 15th to 85th percentiles of (a): the cumulative route costs of the route 3,1,0 ( c ¯ 3 , 1 , 0 ), (b): the cumulative route costs of the route 3,2,0 ( c ¯ 3 , 2 , 0 ), (c): the standard deviation of the estimated costs measured at node 3 for the route 3,1,0 ( σ 3 , 1 , 0 ), (d): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (e): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (f): the number of times that node 3 had to retransmit per 1000 messages generated in the scenario A2.
Figure 11. The median and the 15th to 85th percentiles of (a): the cumulative route costs of the route 3,1,0 ( c ¯ 3 , 1 , 0 ), (b): the cumulative route costs of the route 3,2,0 ( c ¯ 3 , 2 , 0 ), (c): the standard deviation of the estimated costs measured at node 3 for the route 3,1,0 ( σ 3 , 1 , 0 ), (d): the standard deviation of the estimated costs measured at node 3 for the route 3,2,0 ( σ 3 , 2 , 0 ), (e): the ratio of times that route 3,2,0 was chosen ( r 3 , 2 , 0 ), and (f): the number of times that node 3 had to retransmit per 1000 messages generated in the scenario A2.
Sensors 20 00164 g011
Figure 12. The median and the 15th to 85th percentiles of (a): the cumulative route cost of the routes 3,6,x,0 ( c ¯ 3 , 6 , x , 0 ), (b): the cumulative route cost of the routes 3,7,x,0 ( c ¯ 3 , 7 , x , 0 ), (c): the standard deviation of the estimated costs measured at node 3 for the routes 3,6,x,0 ( σ 3 , 6 , x , 0 ), (d): the standard deviation of the estimated costs measured at node 3 for the routes 3,7,x,0 ( σ 3 , 7 , x , 0 ), (e): the ratio of times that packets were relayed by the best routes 3,6,1,0 and 3,7,2,0 ( r 3 , 6 , 1 , 0 + r 3 , 7 , 2 , 0 ), and (f): the delivery rate of messages originated at nodes 3, 8, and 9 in the scenario A3.
Figure 12. The median and the 15th to 85th percentiles of (a): the cumulative route cost of the routes 3,6,x,0 ( c ¯ 3 , 6 , x , 0 ), (b): the cumulative route cost of the routes 3,7,x,0 ( c ¯ 3 , 7 , x , 0 ), (c): the standard deviation of the estimated costs measured at node 3 for the routes 3,6,x,0 ( σ 3 , 6 , x , 0 ), (d): the standard deviation of the estimated costs measured at node 3 for the routes 3,7,x,0 ( σ 3 , 7 , x , 0 ), (e): the ratio of times that packets were relayed by the best routes 3,6,1,0 and 3,7,2,0 ( r 3 , 6 , 1 , 0 + r 3 , 7 , 2 , 0 ), and (f): the delivery rate of messages originated at nodes 3, 8, and 9 in the scenario A3.
Sensors 20 00164 g012aSensors 20 00164 g012b
Figure 13. Topology where nodes 1, 2, 4, and 5 are randomly located.
Figure 13. Topology where nodes 1, 2, 4, and 5 are randomly located.
Sensors 20 00164 g013
Figure 14. (a): Cumulative distribution of the number of node 3 retransmissions per 1000 messages generated. (b): Boxplots of the percentage reduction in the number of node 3 retransmissions per 1000 messages generated obtained by the U-RR procedure when compared to the LQI-based and the LS-based procedures.
Figure 14. (a): Cumulative distribution of the number of node 3 retransmissions per 1000 messages generated. (b): Boxplots of the percentage reduction in the number of node 3 retransmissions per 1000 messages generated obtained by the U-RR procedure when compared to the LQI-based and the LS-based procedures.
Sensors 20 00164 g014
Table 1. Mapping between the average link quality indicators (LQIs) of transmissions from a node z 1 and successfully received at node z 2 ( L Q I ¯ z 1 , z 2 ( t ) ), and the estimated link cost c ^ z 1 , z 2 ( L Q I ) ( t ) .
Table 1. Mapping between the average link quality indicators (LQIs) of transmissions from a node z 1 and successfully received at node z 2 ( L Q I ¯ z 1 , z 2 ( t ) ), and the estimated link cost c ^ z 1 , z 2 ( L Q I ) ( t ) .
Average LQI Interval c ^ z 1 , z 2 ( LQI ) ( t ) Average LQI Interval c ^ z 1 , z 2 ( LQI ) ( t ) Average LQI Interval c ^ z 1 , z 2 ( LQI ) ( t )
239 < L Q I ¯ z 1 , z 2 ( t ) 255 1 185 < L Q I ¯ z 1 , z 2 ( t ) 195 4 L Q I ¯ z 1 , z 2 ( t ) 170 7
206 < L Q I ¯ z 1 , z 2 ( t ) 239 2 174 < L Q I ¯ z 1 , z 2 ( t ) 185 5
195 < L Q I ¯ z 1 , z 2 ( t ) 206 3 170 < L Q I ¯ z 1 , z 2 ( t ) 174 6
Table 2. Mapping between the cost estimate c ^ z 1 , z 2 ( L S ) ( t ) received from node z 2 and the highest probability of successful transmissions that maps into c ^ z 1 , z 2 ( L S ) ( t ) .
Table 2. Mapping between the cost estimate c ^ z 1 , z 2 ( L S ) ( t ) received from node z 2 and the highest probability of successful transmissions that maps into c ^ z 1 , z 2 ( L S ) ( t ) .
c ^ z 1 , z 2 ( LS ) ( t ) p ¯ z 1 , z 2 ( LS ) ( t ) c ^ z 1 , z 2 ( LS ) ( t ) p ¯ z 1 , z 2 ( LS ) ( t ) c ^ z 1 , z 2 ( LS ) ( t ) p ¯ z 1 , z 2 ( LS ) ( t ) c ^ z 1 , z 2 ( LS ) ( t ) p ¯ z 1 , z 2 ( LS ) ( t )
11.00030.79550.68670.626
20.90340.73160.652

Share and Cite

MDPI and ACS Style

Meka, S.; Fonseca, B., Jr. Improving Route Selections in ZigBee Wireless Sensor Networks. Sensors 2020, 20, 164. https://doi.org/10.3390/s20010164

AMA Style

Meka S, Fonseca B Jr. Improving Route Selections in ZigBee Wireless Sensor Networks. Sensors. 2020; 20(1):164. https://doi.org/10.3390/s20010164

Chicago/Turabian Style

Meka, Srikar, and Benedito Fonseca, Jr. 2020. "Improving Route Selections in ZigBee Wireless Sensor Networks" Sensors 20, no. 1: 164. https://doi.org/10.3390/s20010164

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop