Next Article in Journal
Special Issue on Algorithms in Computational Finance
Next Article in Special Issue
A Convex Optimization Algorithm for Electricity Pricing of Charging Stations
Previous Article in Journal
A Two-Phase Approach for Single Container Loading with Weakly Heterogeneous Boxes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Cross-Layer Optimization QoS Scheme in Wireless Multimedia Sensor Networks

Audio-Visual and Image Technology Department, Criminal Investigation Police University of China, Shenyang 110854, China
Algorithms 2019, 12(4), 68; https://doi.org/10.3390/a12040068
Submission received: 20 January 2019 / Revised: 15 March 2019 / Accepted: 26 March 2019 / Published: 30 March 2019
(This article belongs to the Special Issue Algorithms in Convex Optimization and Applications)

Abstract

:
There are two main challenges in wireless multimedia sensors networks: energy constraints and providing DiffServ. In this paper, a joint flow control, routing, scheduling, and power control scheme based on a Lyapunov optimization framework is proposed to increase network lifetime and scheduling fairness. For an adaptive distribution of transmission opportunities, a differentiated queueing services (DQS) scheme is adopted for maintaining data queues. In the Lyapunov function, different types of queues are normalized for a unified dimension. To prolong network lifetime, control coefficients are designed according to the characteristics of the wireless sensor networks. The power control problem is proved to be a convex optimization problem and two optimal algorithms are discussed. Simulation results show that, compared with existing schemes, the proposed scheme can achieve a better trade-off between QoS performances and network lifetime. The simulation results also show that the scheme utilizing the distributed media access control scheme in scheduling performs best in the transmission of real-time services.

1. Introduction

Real-time applications, including multimedia applications, have been developed as important services in various types of networks [1,2]. In wireless multimedia sensor networks, real-time and non-real-time applications coexist. In wireless multimedia sensor networks, there are two essential problems. Firstly, as real-time and non-real-time applications have different QoS requirements, it is valuable to design QoS schemes which provide DiffServ. Secondly, as wireless sensor networks are energy-constrained, it is desirable to prolong network lifetime and reduce energy consumption while satisfying the QoS demands of the applications.
The mainstream approach of QoS schemes providing DiffServ is to maintain different data queues for different applications. Queues are assigned different transmission priorities according to the types of applications that the queues support. The existing QoS schemes providing DiffServ can be divided into four categories of algorithms: media access control schemes [3,4], scheduling schemes [5,6,7,8,9,10,11], routing schemes [12,13,14], and cross-layer control schemes [15,16,17]. However, in these works, after initial allocation, the priorities of the queues cannot be re-adjusted according to the real-time end-to-end situation. In the case of a shortage of resources, services with low priorities might obtain hardly any transmission opportunities. In [18], a DQS (Differentiated Queueing Services) scheme was proposed in which packets of all services are buffered in the same data queue at each node. The queueing sequence of a packet in the queue is decided according to its remaining lifetime. This queue structure means that any packet can gain transmission opportunities according to its end-to-end delay requirement and end-to-end situation. In [19], a DQS scheme is applied to wireless mesh networks. In [20], a DQS-based queueing algorithm was proposed in which event QoS parameters are used to reflect the actual need of non-end-to-end applications in wireless sensor networks. However, in [18,19,20] link scheduling was not considered.
Algorithms of energy consumption control consist of three categories: cluster-based schemes [21,22,23,24,25,26,27,28], optimization-based schemes [29,30,31,32,33,34,35,36,37], and backpressure-based schemes [38,39,40,41,42,43]. Cluster-based schemes can balance the energy consumption of nodes and prolong network lifetime through selecting cluster-head nodes and forming clusters according to some ingenious criteria. TDMA (Time Division Multiple Access) scheduling is mostly utilized in clusters. However, cluster-based schemes may result in low utilization of wireless resources when nodes are non-uniformly distributed. This may degrade QoS performances. In optimization-based schemes, network utility, network lifetime, or energy consumption are used as the optimization objective. Optimization-based QoS schemes are designed based on the process of solving optimization problems. Unlike optimization-based schemes, backpressure optimization problems are established based on a Lyapunov optimization framework with time being slotted, and the lower bounds of the time average values of optimization utilities achieved by backpressure-based schemes can be pushed arbitrarily to the optimal values [44]. In [38,39,40], bias factors relating to the residual energy of nodes or distances between nodes are introduced into link-weight calculation to control transmission scheduling. In [41] and [42], both data queues and energy queues are utilized in Lyapunov functions for cross-layer control. In [43], the shortest path is combined with a backpressure scheme in the process of next-hop node selecting to prolong network lifetime. However, two problems are ignored in existing optimization-based and backpressure-based schemes. Firstly, the characteristic that the lifetimes of nodes in the area surrounding the sink node determine the network lifetime is not considered, which causes the trade-off between data transmission and the energy consumption of nodes in the area surrounding the sink node to be ignored. Secondly, how to set weights of data queues and energy queues in the optimization framework is not taken account. The above two problems may cause a reduction in the network lifetime.
Thus, existing QoS schemes for wireless multimedia sensor networks do not achieve a good trade-off between QoS performances and network lifetime. In addition, the scheduling schemes for data packets of different types of applications also need improvement. To solve the above problems, this paper proposes (based on a Lyapunov optimization framework) a joint flow control, routing, scheduling, and power control algorithm in wireless multimedia sensor networks. The key contributions of this paper can be summarized as follows:
  • Considering the characteristics of wireless sensor networks, distance coefficients are introduced into the Lyapunov function to increase network lifetime while maintaining QoS performances.
  • To unify the dimension, different types of queues are normalized in the Lyapunov optimization framework.
  • A DQS scheme and delay coefficients are utilized to adaptively allocate scheduling priorities to packets belonging to different services.
The remainder of this paper is organized as follows. Section 2 introduces the system model and queue structures. In Section 3, the algorithm is designed based on Lyapunov optimization. The simulation results are given in Section 4. Finally, the conclusions are provided in Section 5.

2. Network Model and Design of Queues

2.1. Network Model

The wireless multimedia sensor network consists of common nodes and multimedia nodes. Packets of non-real-time sessions are generated from common nodes. Multimedia nodes are the source nodes of real-time sessions. The destination node of all packets in the network is the sink node, which is denoted by d*. m denotes a non-real-time or real-time unicast session that has one source-destination pair. sm is the source node of session m. M represents the set of sessions. Obviously, each node is the source node of one session. Packets from the source nodes traverse one or multiple wireless hops before arriving at the sink node. Both common nodes and multimedia nodes can relay data packets. Multimedia nodes are initialized with higher energy than common nodes. The sink node is assumed to have enough energy in the running process. x ¯ denotes the time average value of x(t), which is a generic variable. x ¯ is calculated using x ¯ = lim t 1 t τ = 0 t 1 E ( x ( τ ) ) . The network runs in a time-slotted fashion. There are two channels in the networks, the control channel and the data channel. The radio frequencies used by the two channels are different. Nodes exchange control information on the control channel. When a node broadcasts local information on the control channel, other nodes can gain the information through monitoring the control channel. Data packets are transmitted on the data channel. If the link (n,j) that is between node n and j is used for data packets transmission in time slot t, we set α n j ( t ) = 1 . If the link (n,j) is idle in time slot t, α n j ( t ) = 0 . In this model, link scheduling is subjected to the following constraint:
j O ( n ) α n j ( t ) + i I ( n ) α i n ( t ) 1 .
O ( n ) represents the set of nodes that can receive packets from node n. I ( n ) denotes the set of nodes which can send packets to node n. Constraint (1) implies that each node can either transmit or receive data in the same time slot.
Assume that node n is the sending node and node i is the receiving node of the link (n,i). The transmission power of node n is subjected to the following constraint:
0 p n i T p n , max T ,
where p n , max T is the maximum transmission power that node n can support. The SINR (Signal to Interference plus Noise Ratio) at the receiving node i can be calculated as follows:
S I N R i = G n i p n i T K n i k n , k i G k i p k k T + n i ,
where k is the target node of the transmission from sending node k. K n i denotes the processing gain of the CDMA system. G n i is the transmission loss from node n to node i. In this paper, G n i = 1 d n i 4 , where d n i is the distance between node n and node i. n i represents the noise at node i. The transmission capacity of link (n,i) can be derived as:
C n i = B log ( 1 + S I N R i ) ,
where B denotes the bandwidth of data channel. If S I N R i is high enough, C n i can also be calculated as follows:
C n i B log ( S I N R i ) .
In the wireless networks, a link may be shared by several sessions. In the same time slot, the total data amount of all sessions transmitted on one link is constrained by the transmission data amount the link can support in a time slot. The constraint is as follows:
m S ( n , i ) μ n i ( m ) ( t ) C n i ( t ) t s l o t ,
where S ( n , i ) is the set of the sessions on link ( n , i ) . t s l o t is the duration of a time slot. C n i ( t ) denotes the transmission capacity of link ( n , i ) in time slot t. μ n i ( m ) ( t ) is the number of transmissions of packets of session m on link ( n , i ) in time slot t.

2.2. Virtual Queue at The Transport Layer

The number of packets generated by session m in time slot t is denoted by A m ( t ) . We assume that A m ( t ) is limited by A max ( m ) , which is the maximum allowable number of packets generated by session m in a time slot. r m ( t ) [ 0 , A m ( t ) ] is the number of packets of session m injected into the network layer in time slot t. η m ( t ) [ 0 , A max ( m ) ] is the auxiliary variable which is used to limit the lower bound of r m ( t ) . The source node of each session maintains a virtual queue. The virtual queue at the source node of session m is denoted by Ym, which is updated as:
Y m ( t + 1 ) = max { Y m ( t ) r m ( t ) , 0 } + η m ( t ) .
If Ym is guaranteed to be stable, η m ¯ r m ¯ can also be guaranteed [45]. Therefore, when Ym is stable, η m ¯ can be used to limit the lower bound of r m ¯ .

2.3. Data Queue at The Network Layer

The sessions in the wireless multimedia sensor networks have different end-to-end QoS requirements. As traditional Diffserv provides a lack of granularity for QoS guaranteed services and cannot adaptively distribute transmission priorities according to the end-to-end QoS requirements and the real-time end-to-end situation of sessions, this paper utilized a Differentiated Queueing Services (DQS) [18] scheme to maintain data queues at the network layers of nodes.
According to the DQS scheme, each node maintains one data queue, which contains all data packets at the network layer. For a packet transmitted in the wireless sensor network, D denotes the maximum allowable end-to-end delay of the packet. Obviously, the maximum allowable end-to-end delay of a real-time application packet is higher than that of a non-real-time application packet. d denotes the actual delay that the packet experiences on the path. T represents the remaining lifetime of the packet. Thus, the following equality is set up:
T = D d .
When the packet arrives at a node, if T of the packet is a positive number, the packet is admitted to the data queue, and its queueing sequence in the queue is decided according to the T of the packet. The smaller the T of the packet is, the closer to the head of the queue the packet is arranged. This implies that packets will receive differentiated services according to their end-to-end delay requirements.
The queue backlog at the network layer of node n in time slot t is denoted by Q n ( t ) , which is updated as:
Q n ( t + 1 ) = max [ Q n ( t ) i O ( n ) μ n i ( t ) , 0 ] + j I ( n ) μ j n ( t ) + m M 1 { n = s m } r m ( t ) ,
where μ n i ( t ) is the amount of packets forwarded from node n to node i in time slot t. μ n i ( t ) is constrained by μ n i ( t ) [ 0 , μ max ] , where μ max denotes the maximum amount of packets that can be transmitted between two nodes in a time slot. 1 { n = s m } is an indicator function which is denoted as 1 if n = s m and 0 otherwise. Similar to (6), the following inequality can be derived:
0 μ n i ( t ) C n i ( t ) t s l o t .
C n i ( t ) denotes the transmission capacity of the link (n,i) in time slot t.

2.4. Design of Energy Queue

Each node maintains an energy queue that relates to the residual energy amount. The energy queue size of node n in time slot t is E n ( t ) , which is updated as:
E n ( t + 1 ) = E n ( t ) i O ( n ) e n i T ( t ) e n s e n s e ( t ) ,
where e n i T ( t ) represents the energy consumption for data transmission from node n to node i in time slot t. Here, the superscript T denotes Transmission. t n i T ( t ) denotes the duration of the data transmission between node n and node i in time slot t. Given that the duration of the data transmission between any two nodes in a time slot cannot be greater than the duration of the time slot, the following inequality can be derived:
0 t n i T ( t ) t s l o t .
Under the assumption that the time for scheduling and routing is much shorter than the data transmission duration, we can derive:
e n i T ( t ) = p n i T ( t ) t n i T ( t ) p n i T ( t ) t s l o t .
e n s e n s e ( t ) is the energy consumption in control packets sensing/processing by node n in time slot t. In this paper, we establish that the packets sensing/processing power of each node is a constant p s e n s e . The following equality can be derived:
e n s e n s e ( t ) = p s e n s e t s l o t .
The initial energy in E n is set to be θ n E , and θ n E E n ( t ) is the energy consumption of node n in time slot t.

3. Problem Formation and Dynamic Algorithm

3.1. Design Throughput Utility Optimization Problem

The traditional optimization problem for cross-layer control is to maximize the sum utilities, which is designed as:
maximize m M U m ( r m ) subject to r ¯ Λ ,
where Λ represents the capacity region of the network. r ¯ = ( r m ¯ , m M ) denotes the time average throughput of session m. The constraint means that the network stability is guaranteed.
However, (15) seeks to maximize the total utilities and cause extreme utility unfairness. (15) is also not applicable to real-time services. Aiming at this issue, the “pseudo utility” function U m ( r m ) [46] was used instead of the utility function U m ( r m ) in the optimization problem. U m ( r m ) is defined as:
U m ( r m ) = r L r m 1 U m ( y ) d y , r L r m r H ,
where r L 0 denotes the minimum transmission rate required by service m. r H is the maximum transmission rate required by service m.
Following the design principle of the utility function in [46], the utility function U m ( r m ) for real-time services will be given by a sigmoid function as follows:
U m ( r m ) = { 0 i f r m B min 1 1 + e a ( r m b ) i f B min r m B max 1 i f r m B max ,
where B min and B max are the minimum and maximum bandwidth constraints on the sigmoid. a is used to control the slope of the sigmoid. b is set to be B max B min 2 + B min .
The utility function U m ( r m ) for non-real-time services is designed as:
U m ( r m ) = log ( r m + 1 ) .
Obviously, U m ( r m ) designed in (18) and U m ( r m ) designed in (17) with r m [ r L , r H ] are both positive ascending functions.
The utility-fair optimization problem is defined as:
maximize m M U m ( r m ) subject to r ¯ Λ .
The derivative of U m ( r m ) : U m ( r m ) = 1 U m ( r m ) . As U m ( r m ) is a positive ascending function, we can get U m ( r m ) > 0 and U m ( r m ) < 0 . Therefore, the optimization problem (19) is a convex optimization problem.
η m ¯ can be used to limit the lower bound of r m ¯ , which is introduced in Section 2.2. The utility-fair optimization problem P1 in this paper is defined as follows:
maximize 1 / B F 2 m M U m ( η m ¯ ) subject to r ¯ Λ , 0 r ¯ λ , η ¯ r ¯ , ( 1 ) , ( 2 )
where B F represents the size of packet buffer in each node of the sensor network.

3.2. Design Dynamic Algorithm via Lyapunov Optimization

The Lyapunov optimization technique is applied to solve optimization problem P1. Q n ( n d * ) , E n ( n d * ) , and Y m ( m M ) are used in the dynamic algorithm. Let Θ ( t ) = [ Q ( t ) , E ( t ) , Y ( t ) ] be the network state vector in time slot t, and the Lyapunov function is defined as:
L ( Θ ( t ) ) = 1 2 [ m M ( Y m ( t ) / B F ) 2 + n d * q n τ n ( t ) ( Q n ( t ) / B F ) 2 + n d * e n [ ( θ n E E n ( t ) ) / θ n E ] 2 ] .
Normalization of different types of queues is utilized for a unified dimension in the Lyapunov optimization framework. In addition, in Equation (21), there are three coefficients, q n , e n , and τ n ( t ) , that are designed as follows.
In order to relay data to the sink node, the energy of the nodes around the sink node will be easily exhausted. When the nodes around the sink node die out, there is no packet that can be received by the sink node, which means the wireless sensor network is out of action. Therefore, the maximal lifetime of the nodes around the sink node decide the network lifetime. To prolong the network lifetime, nodes around the sink node should reduce transmission power, which may result in the increase of relay hops to the sink node and the end-to-end delay. In this paper, e n , which is the distance coefficient of the energy queue in node n, is used as the weight of queue E n in the Lyapunov function. The design principle of e n is that the nearer node n is to the sink node, the higher the weight of E n will be. e n is defined as:
e n = e max [ 0 , R D i s n ] / R ,
where D i s n denotes the distance between node n and the sink node, R represents the threshold distance, and e is the Euler number. Obviously, (22) fits the design principle of e n .
In the wireless sensor networks, the nodes far from the sink node should be dedicated to increasing the average transmission rates to reduce the end-to-end delay of the packets buffered in them, with little consideration of energy consumption in data transmission. q n is used to indicate the weight of queue Q n of node n in the Lyapunov function. q n is defined as:
q n = e max [ 0 , D i s n R ] / ( D i s max R ) ,
where D i s max denotes the maximal distance between the sink node and any other node in the network. The design principle of q n is that, when the distance between node n and the sink node is longer than the threshold distance, then the farther node n is to the sink node, the higher the weight of Q n .
τ n ( t ) is the delay coefficient of Qn in time slot t. The design principle of τ n ( t ) is that, the lower the total remaining lifetime of packets in Q n ( t ) is, the higher the scheduling priority of Q n . τ n ( t ) is calculated as:
τ n ( t ) = e k K n ( D k T k ( t ) ) k K n D k 1 / e ,
where K n is the set of data packets in node n. D k is defined as the maximum allowable end-to-end delay of packet k. T k ( t ) denotes the remaining lifetime of packet k in time slot t.
The conditional Lyapunov drift in time slot t is:
Δ ( Θ ( t ) ) = E { L ( Θ ( t + 1 ) ) L ( Θ ( t ) ) | Θ ( t ) } .
To maximize a lower bound of 1 / B F 2 m M U m ( η m ¯ ) , the drift-plus-penalty function can be defined as:
Δ V ( Θ ( t ) ) = Δ Θ ( t ) V E { 1 / B F 2 m M U m ( η m ( t ) ) | Θ ( t ) } ,
where V is the weight of the utility defined by the user. The following inequality can be derived:
E { Δ V Θ ( t ) } B ( 1 / B F 2 ) m M [ V U m ( η m ( t ) ) Y m ( t ) η m ( t ) ] ( 1 / B F 2 ) m M r m ( t ) [ Y m ( t ) q n τ n ( t ) Q n ( t ) 1 { n = s m } ] ( 1 / B F 2 ) n d * i O ( n ) μ n i ( t ) [ q n τ n ( t ) Q n ( t ) q i τ i ( t ) Q i ( t ) ] n d * ( e n / ( θ n E ) 2 ) ( E n ( t ) θ n E ) ( i O ( n ) p n i T ( t ) t s l o t + e s e n s e ) .
In (27), B is a constant which can be evaluated as:
B = 1 2 ( e max / ( θ n E ) 2 ) ( | N | p n , max T t s l o t + e s e n s e ) 2 + 2 ( 1 / B F 2 ) ( A max ( m ) ) 2 + 1 2 ( q max τ max / B F 2 ) ( 2 μ max + A max ( m ) ) 2
where | N | is the number of nodes in the network. e max , τ max , and q max are the maximal values of e n , τ n ( t ) , and q n . According to (22), (23), and (24), the values of e max , τ max and q max are e , 1, and e .
The main design principle of the algorithm CLADS (cross-layer algorithm for different services) is to minimize the right-hand side of (27). The algorithm includes four components:
• Source rate control:
For each session m M at source node s m , the admitted rate r m ( t ) is chosen to solve:
maximize r m ( t ) [ Y m ( t ) q n τ n ( t ) Q n ( t ) 1 { n = s m } ] subject to 0 r m ( t ) A m ( t ) .
Problem (29) is a linear optimization problem, and r m ( t ) can be calculated as:
r m ( t ) = { A m ( t ) i f   Y m ( t ) > q n τ n ( t ) Q n ( t ) 1 { n = s m } 0 i f   Y m ( t ) q n τ n ( t ) Q n ( t ) 1 { n = s m } .
• Virtual input rate control:
For each session m M at source node s m , the virtual input rate η m ( t ) is chosen to solve:
maximize V U m ( η m ( t ) ) Y m ( t ) η m ( t ) subject to 0 η m ( t ) A max ( m ) .
Since U m ( . ) is differentiable according to the definition in (16), considering the constraint of (31), η m ( t ) can be calculated as:
η m ( t ) = max [ min [ U m 1 ( V / Y m ( t ) ) , A max ( m ) ] , 0 ] .
When session m is a non-real-time service, the utility function U m ( t ) is defined as (18), and the following equality can be derived:
U m 1 ( V / Y m ( t ) ) = e V / Y m ( t ) 1 .
The utility function of a real-time service is defined as (17), and the following can be derived:
U m 1 ( V / Y m ( t ) ) = { b 1 / a log ( Y m ( t ) / V 1 ) i f   Y m ( t ) > V B max i f Y m ( t ) V .
• Joint routing scheduling and power control:
At each node n d * , the scheme is implemented to route the packets, allocate transmission opportunities to links, and decide the transmission powers. The joint optimization problem of routing, scheduling, and power control is as follows:
maximize Ψ subject to   ( 1 ) ,   ( 2 ) ,   ( 10 ) .
where the expression of Ψ is as:
Ψ = ( 1 / B F 2 ) n d * i O ( n ) μ n i ( t ) [ q n τ n ( t ) Q n ( t ) q i τ i ( t ) Q i ( t ) ] + n d * ( e n / ( θ n E ) 2 ) ( E n ( t ) θ n E ) ( i O ( n ) p n i T ( t ) t s l o t + e s e n s e ) .
We define w n i as the weight value of link (n,i), that is calculated as:
w n i = max [ q n τ n ( t ) Q n ( t ) q i τ i ( t ) Q i ( t ) , 0 ] .
It is assumed that the whole transmission capacity of any link will be devoted to data transmission on the link. It is also assumed that in any time slot, the negotiation time is much shorter than the data transmission time. Based on these two assumptions, the following can be derived:
μ n i ( t ) = C n i ( t ) t n i T ( t ) C n i ( t ) t s l o t
We define δ t = ( e n / ( θ n E ) 2 ) ( E n ( t ) θ n E ) . According to (3) and (5), (35) can be transformed into:
maximize n d * i O ( n ) Ψ 1 subject to   ( 1 ) ,   ( 2 ) ,
where
Ψ 1 = [ ( 1 / B F 2 ) B log ( G n i p n i T ( t ) K n i k i , k n G k i p k k T ( t ) + n i ) w n i + δ t p n i T ( t ) .
I c I is defined as a link set for simultaneous data transmission. I denotes the set of I c . (39) can be transformed as follows.
maximize Ψ 2 ( p T ( t ) ) subject to 0 p n i T ( t ) p n , max T , n d * , i O ( n ) , ( n , i ) I c ,
where
Ψ 2 ( p T ( t ) ) = n d * , i O ( n ) , ( n , i ) I c , I c I [ ( w n i / B F 2 ) B log ( G n i p n i T ( t ) K n i k i , k n G k i p k k T ( t ) + n i ) + δ t p n i T ( t ) ] .
Theorem 1.
Optimization problem (41) is a log-convex optimization problem. It implies that if we set P T ( t ) = log p T ( t ) , the new optimization problem (43) is derived:
maximize Ψ 3 ( P T ( t ) ) subject to 0 P n i T ( t ) log p n , max T , n d * , i O ( n ) , ( n , i ) I c . ,
where
Ψ 3 ( P T ( t ) ) = n d * , i O ( n ) , ( n , i ) I c , I c I [ ( w n i B / B F 2 ) log ( G n i K n i e P n i T ( t ) ) ( w n i B / B F 2 ) log ( k i , k n G k i e P k k T ( t ) + n i ) + δ t e P n i T ( t ) ]
The optimization problem (43) is a convex optimization problem.
Proof. 
For problem (43), if the optimization objective function Ψ 3 ( P T ( t ) ) is a convex or concave function in regard to P T ( t ) , and the constraint is a convex set of P T ( t ) , then (43) is a convex optimization problem.
According to the principle that the logarithm of the sum of e exponent functions is a convex function, then [47] and the conclusion from [48], ( w n i B / B F 2 ) [ log ( G n i K n i ) + P n i T ( t ) log ( k i , k j G k i e P k k T ( t ) + n i ) ] , are concave functions. In each time slot, for E n ( t ) θ n E = E n ( 0 ) , we can get δ t 0 . If the exponent function is convex [48], δ t e P n i T ( t ) is a concave function if δ t < 0 . When δ t = 0 , the value of δ t e P n i T ( t ) is zero. According to the principle that the sum of concave functions is a concave function, the optimization objective function of (43) is a concave function.
As the constraint of (43) is linear, it is a convex set of P T ( t ) . Therefore, problem (43) is a convex optimization problem and problem (41) is a log-convex optimization problem. □
In the case of I c I being known, problem (43) can be solved using the interior point method [48]. The optimal transmission powers can then be gained through equality p T ( t ) = e P T ( t ) . However, the interior point method is not suitable for wireless sensor networks, as this method may result in heavy control message overhead.
Two distributed optimization algorithms (Algorithm 1 and Algorithm 2) can be used to solve problem (41).
Algorithm 1 (Distributed gradient projection power control algorithm) [49]:
There are s links in link set I c , which are ( n 1 , n 1 ) , ( n 2 , n 2 ) , , ( n s , n s ) . In each time slot, the optimal transmission power of node n is gained through multiple iterations of p n n T ( t ) . p n n T ( t t ) denotes the ttth iteration of p n n T ( t ) . ( j , j ) represents other links, except for (n, n), in the network. p n n T ( t ) is updated as follows:
p n n T ( t t + 1 ) = p n n T ( t t ) + κ ( n , n ) Ψ ( p T ( t t ) ) ,
where κ is the step size. The gradient of Ψ ( p T ( t t ) ) is calculated as:
( n , n ) Ψ ( p T ( t t ) ) = B w n n B F 2 p n n T ( t t ) + δ t j n B B F 2 w j j G n j k j , k j ( G k j p k j T ( t t ) + n j ) .
If we set
m j ( t t ) = B B F 2 w j j S I N R j ( t t ) p j j T ( t t ) G j j ,
then (45) can be transformed into:
p n n T ( t t + 1 ) = p n n T ( t t ) + κ [ B w n n B F 2 p n n T ( t t ) + δ t j n G n j m j ( t t ) ] .
H denotes the Hessian matrix of Ψ ( p T ( t t ) ) . l is the row-coordinate of H , and c is the column-coordinate of H . The following equality can be derived:
H l , c = { B w l l B F 2 ( p l l T ( t t ) ) 2 + j l B w j j G l j 2 / B F 2 ( k j G k j p k j T ( t t ) + n j ) 2 i f l = c j l , j c B w j j G l j G c j / B F 2 ( k j G k j p k j T ( t t ) + n j ) 2 i f l c .
L and C are defined as:
L = max l [ c , c l j l , j c B w j j G l j G c j / B F 2 ( k j G k j p k j T ( t t ) + n j ) 2 + | B w l l B F 2 ( p l l T ( t t ) ) 2 + j l B w j j G l j 2 / B F 2 ( k j G k j p k j T ( t t ) + n j ) 2 | ]
C = max c [ l , l c j l , j c B w j j G l j G c j / B F 2 ( k j G k j p k j T ( t t ) + n j ) 2 + | B w c c B F 2 ( p c c T ( t t ) ) 2 + j c B w j j G c j 2 / B F 2 ( k j G k j p k j T ( t t ) + n j ) 2 | ]
We set K = L C , ε 2 1 + K . The step size κ is set as: ε κ 2 ε K . If step size is small enough, the algorithm can achieve global convergence.
The details of the algorithm implemented in each iteration t t are as follows: (i) The receiving node of each link ( j , j ) in I c measure and gain S I N R j ( t t ) and G j j . Node j also calculates wjj and m j ( t t ) using (37) and (47), respectively. (ii) Each receiving node j broadcasts m j ( t t ) in the network. (iii) After gathering m j ( t t ) from all receiving nodes, each send node updates its transmission power according to (48). (iv) t t = t t + 1 , and jump to (i) again. (v) The iterations are stopped until convergence is achieved.
Algorithm 2 (Block coordinate descent power control algorithm) [41]:
There are s links in link set I c , which are ( n 1 , n 1 ) , ( n 2 , n 2 ) , , ( n s , n s ) . There are multiple iterations in a time slot. In each iteration, the optimal transmission powers of links in I c are calculated in turn.
The optimization process in each iteration is as follows:
P n 1 n 1 T ( t t + 1 ) = arg max P n 1 n 1 T Ψ ( P n 1 n 1 T , P n 2 n 2 T ( t t ) , P n 3 n 3 T ( t t ) , , P n s n s T ( t t ) )
P n 2 n 2 T ( t t + 1 ) = arg max P n 2 n 2 T Ψ ( P n 1 n 1 T ( t t + 1 ) , P n 2 n 2 T , P n 3 n 3 T ( t t ) , , P n s n s T ( t t ) )
……
P n s n s T ( t t + 1 ) = arg max P n s n s T Ψ ( P n 1 n 1 T ( t t + 1 ) , P n 2 n 2 T ( t t + 1 ) , P n 3 n 3 T ( t t + 1 ) , , P n s n s T ) .
Iterations are stopped until convergence is achieved. As (43) is a convex optimization problem, the BCD algorithm can achieve global convergence. The optimal solutions of (41) can be obtained through equality p T ( t ) = e P T ( t ) .
In essence, the above central joint routing, scheduling, and power control algorithm for (35) is an MWM (maximal weighted matching) algorithm [50]. The computational complexity to obtain link set I c I is O(|N|3). |N| is the number of nodes in the network. The increase of |N| will lead to a sharp rise in the computational complexity. In order to reduce the computational complexity, the distributed media access control scheme proposed in section V of [51] can be used instead of the optimal central algorithm. The computational complexity of the distributed scheme at each node is lower than O(|N||L|2), where |L| is the number of existing links in the network [51]. Under the distributed scheme, the transmission power of node n can be set to p n , max T . Nodes with higher weight values can obtain transmission opportunities with higher probabilities. The distributed scheme is essentially a GMS (greedy maximal scheduling) algorithm. As the capacity region of GMS can reach half the capacity region of MWM, the capacity region of the distributed media access control scheme can also reach half the optimal capacity region. Here, the capacity region of a policy is defined as the collections of all traffic load matrices which are sustainable by the specific policy [44].
• Update of queues:
Y(t), Q(t) and E(t) are updated using (7), (9), and (11) in each time slot.

4. Simulation

4.1. Simulation Setup

The topology was a multi-hop wireless sensor network with several nodes randomly distributed in a square of 500 m × 500 m. The sink node was in the center of the square. In the simulation, nodes did not move. Each node was aware of the location of other nodes in the network. The messages broadcasted on the common control channel by any node were received by all other nodes. The data transmission scope of a node was 125m. The threshold distance R , which was introduced in Section 3.2, was set to be 150m. Data was transmitted in packets with a length of 4000 bits. There was a total of N nodes in the network, including one sink node, 0.8 N non-real-time nodes, and 0.2 N 1 multimedia nodes. The data buffer sizes of the sink node, non-real-time nodes, and multimedia nodes were 2 × 108 bits, 2 × 107 bits and 2 × 107 bits, respectively, which could also be recorded as 50,000 packets, 5000 packets, and 5000 packets. We assumed that the energy of nodes could only be consumed in data transmission. The available transmission power levels included 2 mW, 5 mW, 8 mW, and 10 mW. The channel bandwidth was 1 MHz. The transmit loss from node j to i was G j i = 1 ( d j i ) 4 , where d j i is the distance between node j and node i. K j i = 5 , n i = 10 13 W, e s e n s e = 0 , V = 50 .
In the network, the sink node was the destination node of all sessions. There were 0.2 N 1 real-time sessions generated at multimedia nodes. A m ( t ) of real-time sessions was set to be 30packets/s. This implies that the data arrival rate of any real-time service in each multimedia node was 120Kbits/s. The end-to-end delay deadline of any real-time session was 1 s. There were 0.8 N non-real-time sessions generated at non-real-time nodes. A m ( t ) of non-real-time sessions was 1 packets/s. This implies that the data arrival rate of any non-real-time service in each non-real-time node was 4Kbits/s. The end-to-end delay deadline of any non-real-time session was 4 s. In this simulation, A max ( m ) = A m ( t ) + 0.1 .
There were two CLADS-based schemes: CLADS-BCD and CLADS-MAC. In CLADS-BCD scheme, I c I were obtained through enumeration on all link sets, and the BCD algorithm was adopted in power control. In the CLADS-MAC scheme, the distributed media access control scheme proposed in [51] was utilized in scheduling and the transmission power was set to be p n , max T . In the distributed media access control scheme, φ = 10 , γ = 10 , DIFS = 50 μ s , SIFS = 20 μ s , Dtime = 50 μ s , and minislot = 20 μ s . In one time slot, the maximum allowable number of times for a sending node to send RTS packets to establish links with the receiving node was 3. In both CLADS-BCD and CLADS-MAC, the utility function for real-time services was (17). The parameters of (17) were set as a = 1 , B min = 0 , and B max = 30.1 . The utility function for non-real-time services was (18). The performances of the CLADS-BCD scheme and the CLADS-MAC scheme were compared with that of EASYO [41]—a backpressure-style scheme—and ACH [24]—a cluster-based scheme. In EASYO, the utility function for both real-time and non-real-time services was (18).
The time slot duration was 40 ms.

4.2. Comparison of Performance

In the simulation of Figure 1, Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8, performances of CLADS-BCD, CLADS-MAC, EASYO, and ACH are compared. The initial energy in the sink node, non-real-time nodes, and multimedia nodes were 5 J, 0.5 J, and 2 J, respectively. This simulation lasted for 100,000 time slots.
The stability period is defined as the time duration from the establishment of the network to the death of the first node [24]. The stability period is crucial for the applications which require the feedback from the sensor network to be reliable [22]. In Figure 1, the stability periods of different schemes are compared. It can be seen that the stability period of ACH was the longest. The stability period of CLADS-BCD was longer than that of CLADS-MAC and EASYO. Therefore, in backpressure-style schemes, CLADS-BCD makes the network more stable than CLADS-MAC and EASYO. In wireless sensor networks, the energy of the nodes around the sink node can easily be exhausted, which limits the stability periods of WSNs. Under ACH, in each cluster-setup round, the nodes with more residual energy can be chosen as the cluster heads with higher probabilities, and this can balance the energy consumption of nodes around the sink node. Therefore, networks under ACH had the longest stability periods. CLADS-BCD, CLADS-MAC, and EASYO all consider residual energy states of nodes in scheduling to balance energy consumption. In the CLADS schemes, distance coefficients for energy queues are applied to reduce the energy consumption of nodes around the sink node, and this leads to longer stability periods under CLADS-BCD than under EASYO. The reason why the stability periods under CLADS-MAC were the shortest is that CLADS-MAC adopts a distributed media access control scheme in scheduling, obtaining sub-optimal transmission link sets.
The consumed powers of the network under different schemes are compared in Figure 2. Figure 2 shows that the consumed power of the network under cluster-based ACH was the lowest. Figure 2 also shows that the consumed power of the network under CLADS-BCD was lower than those under EASYO and CLADS-MAC. The reason is that TDMA scheduling was adopted in each cluster, which effectively reduces consumed power. Unlike EASYO, in CLADS-BCD, queues were normalized in a Lyapunov function to unify the dimension of the queues, which led to more valid weights of the energy queues in the framework, and a reduction in consumed power. The transmission link sets obtained by the distributed media access control scheme in the scheduling of CLADS-MAC were sub-optimal, and this increased the consumed power of the network.
In Figure 3 and Figure 4, the ratios of survival nodes in and out of the region of radius R are compared, respectively. From Figure 3 and Figure 4, we can see that ACH performed best most of the time. The reason is that under ACH, energy consumption is well balanced, due to the use of clusters. TDMA scheduling is also utilized in clusters to further reduce energy consumption. The ratios of survival nodes both in and out of the region of radius R under CLADS-BCD were much higher than those under CLADS-MAC and EASYO. This implies that, for backpressure-style schemes, the network lifetime under CLADS-BCD is longer than that under EASYO and CLADS-MAC. The reason is as follows. Transmission powers of the nodes around the sink node are reduced through the utilization of distance coefficients for energy queues and distance coefficients for data queues in the CLADS schemes. Therefore, the average lifetime of nodes in the region of radius R under CLADS-BCD is greatly increased. CLADS also performs better than EASYO in reducing the energy consumption of nodes out of the region of radius R, through applying the normalization of queues in optimization framework. In addition, since CLADS-BCD is optimal and CLADS-MAC is sub-optimal in scheduling, CLADS-BCD performs better than CLADS-MAC.
The average throughput of real-time sessions of different schemes is compared in Figure 5. The average throughput of real-time sessions under CLADS-BCD, CLADS-MAC, and EASYO all increased with the increase in the number of nodes. In Figure 5, we can see that average throughput of CLADS-BCD was lower than that of EASYO. ACH performed much worse than backpressure-style schemes. The average throughput of non-real-time sessions of different schemes is compared in Figure 6. In Figure 6 we can see that the average throughput of non-real-time sessions under CLADS-BCD, CLADS-MAC, and EASYO all increased with the increase in the number of nodes. Figure 6 also shows that the average throughput of CLADS-BCD was lower than that of EASYO, but higher than that of CLADS-MAC and ACH. The reason is as follows. Both the data transmission time and throughput under ACH were reduced, since TDMA scheduling was utilized in clusters. Since the weights of data queues in the optimization framework in CLADS-BCD were lower than those in the EASYO scheme, CLADS-BCD and CLADS-MAC performed worse than EASYO in average throughput. It should be noted that the average throughput of real-time sessions under CLADS-MAC was the highest. The reason is that in CLADS-MAC, using a distributed scheduling scheme, the nodes with more buffering packets could obtain more transmission opportunities. This means that CLADS-MAC is suitable for wireless multimedia ad hoc networks in which nodes are initialed with adequate energy.
The average end-to-end delay of real-time and non-real-time sessions of different schemes is compared in Figure 7 and Figure 8, respectively. As Figure 7 shows, CLADS-MAC performed best in the average end-to-end delay of real-time sessions. The reason is that in the scheduling of CLADS-MAC, the nodes with more buffering packets may obtain transmission opportunities with higher probability, and this can reduce average end-to-end delay. According to the results in Figure 5 and Figure 7, CLADS-MAC is the most effective scheme for real-time services in wireless ad hoc networks in which nodes have enough energy. Though the average end-to-end delay of real-time sessions under CLADS-BCD was the highest, it was lower than the end-to-end delay deadlines of real-time sessions, which was 1 s. In Figure 8, the average end-to-end delay of non-real-time sessions under CLADS-BCD was still the highest, and was lower than the end-to-end delay deadline of non-real-time sessions, which was set to be 4 s. This implies that the differences between the average end-to-end delays of various schemes will not lead to differences in the service qualities of applications. The reason is as follows. The weights of the data queues in the Lyapunov optimization framework, as well as the data transmission priorities under CLADS-BCD, were lower than those under EASYO. Therefore, the average end-to-end delay under CLADS-BCD is higher. However, a DQS scheme is utilized to maintain data queues in CLADS-BCD. In each data queue, a transmission opportunity is distributed to the packet with the lowest survival time. Therefore, CLADS-BCD can provide QoS guarantees on the average end-to-end delay.
CLADS and EASYO are both backpressure-based cross-layer algorithms. In Figure 9, Figure 10, and Figure 11, the performances of CLADS-BCD and EASYO are compared. To limit the duration of this simulation, the initial energy of non-real-time nodes and multimedia nodes was set to be 0.01 J and 0.04 J, respectively.
In Figure 9, network lifetime is compared. As shown in the figure, network lifetime under CLADS-BCD was much higher than that under EASYO. The reason is as follows. According to the characteristics of wireless sensor networks, CLADS-BCD adopts distance coefficients of energy queues in optimization to reduce the energy consumption of nodes in the area surrounding the sink node. This can prolong the lifetime of the nodes near the sink node, as well as increase the network lifetime.
The average number of packets of non-real-time and real-time services arriving at the sink node are compared in Figure 10 and Figure 11, respectively. From these two figures we can see that, for both real-time service and non-real-time service, the number of packets arriving at the sink node under CLADS-BCD was higher than the number under EASYO. This implies that wireless sensor networks using CLADS-BCD can collect more information than networks using EAYSO. The reason is that the network lifetime of CLADS-BCD was much higher than that of EASYO. Thus, the sink node can collect data packets for a much longer time under CLADS-BCD than under EASYO.
The simulations results indicate the conclusions as follows. (i) The network lifetime under ACH is the longest. However, the average throughput under ACH is the lowest. Therefore, ACH is suitable for low-rate wireless sensor networks. (ii) CLADS-MAC is suitable for real-time applications in wireless networks with nodes that have adequate energy. (iii) Though CLADS-BCD performs worse than EASYO in QoS performances, it can obtain a longer network lifetime than EASYO. Thus, networks under CLADS-BCD can collect more data through more working time than networks under EASYO. This indicates that CLADS-BCD achieves the best trade-off between network lifetime and QoS performances in these schemes.

5. Conclusions

This paper proposed a cross-layer QoS scheme, which can achieve good a trade-off between QoS performances and network lifetime in wireless multimedia sensor networks. Transmission opportunities are adaptively distributed to different types of applications based on a DQS scheme. By designing a Lyapunov function according to the characteristics of wireless sensor networks, network lifetime is prolonged, with an acceptable reduction in QoS performances. The proposed cross-layer scheme, combined with a low computational complexity distributed media access control scheme, is suitable for real-time services in wireless ad hoc networks. For future studies, we plan to combine this scheme with video transmission in wireless multimedia sensor networks.

Funding

This work was supported by the National Natural Science Foundation of China under Grant no. 61603415 and Fundamental Research Funds for the Central Universities of Criminal Investigation Police University of China under Grant no. D2018012.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Melodia, T.; Chowdhury, K.R. A survey on wireless multimedia sensor networks. Int. J. Comput. Telecommun. Netw. 2007, 51, 921–960. [Google Scholar] [CrossRef] [Green Version]
  2. Muhammad, F.M.; Syed, H.A.; Siraj, M.; Song, H.B.; Danda, B.R. Multimedia streaming in information-centric networking: A survey and future perspectives. Comput. Netw. 2017, 125, 103–121. [Google Scholar]
  3. Yao, Y.C.; Wen, J.H.; Weng, C.E. The performance evaluation of IEEE 802.11e for QoS support in wireless LANs. Wirel. Pers. Commun. 2013, 69, 413–425. [Google Scholar] [CrossRef]
  4. Mu’Azu, A.A.; Tang, L.J.; Hasbullah, H.; Lawal, I.A.; Shah, P.A. Real-time massage differentiation with priority data service flows in VANET. In Proceedings of the International Conference on Computer and Information Sciences, Kuala Lumpur, Malaysia, 3–5 June 2014. [Google Scholar] [CrossRef]
  5. Qin, Y.; Li, L.; Zhong, X.X.; Yang, Y.Y. A cross-layer QoS design with energy and traffic balance aware for different types of traffic in MANETs. Wirel. Pers. Commun. 2015, 85, 1429–1449. [Google Scholar] [CrossRef]
  6. Wu, K.D.; Liao, W.J. On service differentiation for multimedia traffic in multi-hop wireless networks. IEEE Trans. Wirel. Commun. 2009, 8, 2464–2472. [Google Scholar] [CrossRef]
  7. Liu, C.Y.; Fu, B.; Huang, H.J. Delay minimization and priority scheduling in wireless mesh networks. Wirel. Netw. 2014, 20, 1955–1965. [Google Scholar] [CrossRef]
  8. Brahmia, M.E.A.; Abouaissa, A.; Lorenz, P. Adaptive scheduling mechanism for IPTV over WIMAX IEEE 802.16j networks. Int. J. Commun. Syst. 2014, 27, 1009–1019. [Google Scholar] [CrossRef]
  9. Mezouary, R.E.; Loutfi, A.; Koutbi, M.E. A cross-layer architecture for service differentiation in wireless sensor networks with multiple sinks. In Proceedings of the International Conference on Multimedia Computing and Systems, Marrakech, Morocco, 14–16 April 2014; pp. 843–848. [Google Scholar]
  10. Yuan, D.; Song, M.; Teng, Y.; Ma, D.; Wang, X.J.; Lu, G.F. QoE-oriented resource allocation for multiuser-multiservice femtocell networks. China Commun. 2015, 12, 27–41. [Google Scholar] [CrossRef]
  11. Reis, A.B.; Chakareski, J.; Kassler, A.; Sargento, S. Quality of experience optimized scheduling in multi-service wireless mesh networks. In Proceedings of the International Conference on Image Processing, HongKong, China, 26–29 September 2010; pp. 3233–3236. [Google Scholar]
  12. Lari, A.R.; Akbari, B. Network adaptive multipath video delivery over wireless multimedia sensor networks based on packet and path priority scheduling. In Proceedings of the International Conference on Broadband, Wireless Computing Communication and Applications, Fukuoka, Japan, 4–6 November 2010; pp. 351–356. [Google Scholar]
  13. Djenouri, D.; Balasingham, I. Traffic differentiation based modular QoS localized routing for wireless sensor networks. IEEE Trans. Mob. Comput. 2011, 10, 797–809. [Google Scholar] [CrossRef]
  14. Sahin, D.; Gungor, V.C.; Kocak, T.; Tuna, G. Quality-of-service differentiation in single-path and multi-path routing for wireless sensor network-based smart grid applications. Ad Hoc Netw. 2014, 22, 43–60. [Google Scholar] [CrossRef]
  15. Shah, G.A.; Gungor, V.C.; Akan, O.B. A cross-layer QoS-aware communication framework in cognitive radio sensor networks for smart grid applications. IEEE Trans. Ind. Inform. 2013, 9, 1477–1485. [Google Scholar] [CrossRef]
  16. Zhou, A.F.; Liu, M.; Li, Z.C.; Dutkiewicz, E. Cross-layer design for proportional delay differentiation and network utility maximization in multi-hop wireless networks. IEEE Trans. Wirel. Commun. 2012, 11, 1446–1455. [Google Scholar] [CrossRef]
  17. Vo, N.S.; Duong, T.Q.; Zepernick, H.J.; Fiedler, M. A cross-layer optimized scheme and its application in mobile multimedia networks with QoS provision. IEEE Syst. J. 2016, 10, 817–830. [Google Scholar] [CrossRef]
  18. Jiang, S. Granular differentiated queueing services for QoS: Structure and cost model. Acm Sigcomm Comput. Commun. Rev. 2005, 35, 13–22. [Google Scholar] [CrossRef]
  19. Teng, X.; Jiang, S.; Wei, G.; Liu, G. A cross-layer implementation of differentiated queueing service (DQS) for wireless mesh networks. In Proceedings of the the 67th IEEE Vehicular Technology Conference, Singapore, 11–14 May 2008; pp. 2233–2237. [Google Scholar]
  20. Tang, L.; Jiang, S.M.; Ao, X. Improved differentiated queueing service based on event QoS parameters for wireless sensor networks. In Proceedings of the IEEE 12th International Conference on Communication Technology, Nanjing, China, 11–14 November 2010; pp. 1327–1331. [Google Scholar]
  21. Mammu, A.S.K.; Sharma, A.; Hemandezjayo, U.; Sainz, N. A novel cluster-based energy efficient routing in wireless sensor networks. In Proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications, Barcelona, Spain, 25–28 March 2013; pp. 41–47. [Google Scholar]
  22. Smaragdakis, G.; Matta, I.; Bestavros, A. SEP: A Stable Election Protocol for Clustered Heterogeneous Wireless Sensor Networks. In Proceedings of the 2nd International Workshop on Sensor and Actor Network Protocols and Applications (SANPA), Boston, MA, USA, 2004. [Google Scholar]
  23. Tyagi, S.; Tanwar, S.; Gupta, S.K.; Kumar, N.; Rodrigues, J.J.P.C. A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks. Telecommun. Syst. 2015, 59, 43–62. [Google Scholar] [CrossRef]
  24. Ahmad, A.; Javaid, N.; Khan, Z.A.; Qasim, U.; Alghamdi, T.A. (ACH)2: Routing scheme to maximize lifetime and throughput of wireless sensor networks. IEEE Sens. J. 2014, 14, 3516–3532. [Google Scholar] [CrossRef]
  25. Wu, D.P.; He, J.; Wang, H.G.; Wang, C.G.; Wang, R.Y. A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks. IEEE Commun. Mag. 2015, 53, 92–98. [Google Scholar] [CrossRef]
  26. Han, R.; Yang, W.; Wang, Y.; You, K. DCE: A distributed energy-efficient clustering protocol for wireless sensor networks based on double-phase cluster-head election. Sensors 2017, 17, 998. [Google Scholar] [CrossRef] [PubMed]
  27. Peyman, N.; Saeid, A.; Mahmoud, N.; Younis, O. Hierarchical clustering-task scheduling policy in cluster-based wireless sensor networks. IEEE Trans. Ind. Inform. 2018, 14, 1876–1886. [Google Scholar]
  28. Prince, R.; Pragya, D. Optimized and load balanced clustering for wireless sensor networks to increase the lifetime of WSN using MADM approaches. Wirel. Netw. 2018, 1–37. [Google Scholar] [CrossRef]
  29. Solares, J.; Sboui, L.; Rezki, Z.; Alouini, M. Power minimization of a wireless sensor node under different rate constraints. IEEE Trans. Signal Process. 2016, 64, 3458–3469. [Google Scholar] [CrossRef]
  30. Liao, S.B.; Zhang, Q.F. A multiutility framework with application for studying tradeoff between utility and lifetime in wireless sensor networks. IEEE Trans. Veh. Technol. 2015, 64, 4701–4711. [Google Scholar] [CrossRef]
  31. Yetgin, H.; Cheung, K.T.K.; Hajjar, M.E.; Hanzo, L. Cross-layer network lifetime maximization in interference-limited WSNs. IEEE Trans. Veh. Technol. 2014, 64, 3795–3803. [Google Scholar] [CrossRef]
  32. Kurt, S.; Yildiz, H.U.; Yigit, M.; Tavli, B.; Gungor, V.C. Packet size optimization in wireless sensor networks for smart grid applications. IEEE Trans. Ind. Electron. 2016, 64, 2392–2401. [Google Scholar] [CrossRef]
  33. Luo, J.; Iyer, A.; Rosenberg, C. Throughput-lifetime tradeoffs in multihop wireless networks under an SINR-based interference model. IEEE Trans. Mob. Comput. 2010, 10, 419–433. [Google Scholar] [CrossRef]
  34. Lee, J.H.; Moon, I. Modeling and optimization of energy efficient routing in wireless sensor networks. Appl. Math. Modeling 2014, 38, 2280–2289. [Google Scholar] [CrossRef]
  35. Lu, T.; Liu, G.H.; Chang, S. Energy-efficient data sensing and routing in unreliable energy-harvesting wireless sensor network. Wirel. Netw. 2018, 24, 611–625. [Google Scholar] [CrossRef]
  36. Fabian, C.; Andre, R.; Marc, S.; Nubia, V. An exact approach to extend network lifetime in a general class of wireless sensor networks. Inf. Sci. 2017, 433–434, 274–291. [Google Scholar] [CrossRef]
  37. Shalli, R.; Syed, H.A.; Rajneesh, T.; Jyoteesh, M.; Song, H.B. IoMT: A reliable cross layer protocol for Internet of multimedia Things. IEEE Internet Things J. 2017, 4, 832–839. [Google Scholar]
  38. Jiao, Z.Z.; Tian, R.; Zhang, B.X.; Li, C. A gradient-assisted energy-efficient backpressure scheduling algorithm for wireless sensor networks. Int. J. Distrib. Netw. 2015, 2015. [Google Scholar] [CrossRef]
  39. Song, Y.; Zhang, C.; Fang, Y.G. Minimum energy scheduling in multi-hop wireless networks with retransmissions. IEEE Trans. Wirel. Commun. 2010, 9, 348–355. [Google Scholar] [CrossRef] [Green Version]
  40. Liu, Z.; Yang, X.Y.; Zhao, P.; Yu, W. On energy-balanced backpressure routing mechanisms for stochastic energy harvesting wireless sensor networks. Int. J. Distrib. Sens. Netw. 2016, 12. [Google Scholar] [CrossRef] [Green Version]
  41. Xu, W.Q.; Zhang, Y.S.; Shi, Q.J.; Wang, X.D. Energy management and cross layer optimization for wireless sensor network powered by heterogeneous energy sources. IEEE Trans. Wirel. Commun. 2015, 14, 2814–2826. [Google Scholar] [CrossRef]
  42. Miguel, C.F.; Carles, A.H.; Javier, M.; Alejandro, R. Stochastic routing and scheduling policies for energy harvesting communication networks. IEEE Trans. Signal Process. 2018, 66, 3363–3376. [Google Scholar]
  43. Qiu, T.; Qiao, R.X.; Wu, Q.D.P. EABS: An event-aware backpressure scheduling scheme for emergency Internet of Things. IEEE Trans. Mob. Comput. 2018, 17, 72–84. [Google Scholar] [CrossRef]
  44. Georgiadis, L.; Neely, M.J.; Tasiulas, L. Resource allocation and cross-layer control in wireless networks. Found. Trends Netw. 2006, 1, 1–144. [Google Scholar] [CrossRef]
  45. Neely, M.J. Optimizing Time Average. In Stochastic Network Optimization with Application to Communication and Queueing Systems; Morgan & Claypool Publishers: San Rafael, CA, USA, 2010; pp. 45–48. ISBN 9781608454563. [Google Scholar]
  46. Jin, J.; Sridharan, A.; Krishnamachari, B.; Palaniswami, M. Handling inelastic traffic in wireless sensor networks. IEEE J. Sel. Areas Commun. 2010, 28, 1105–1115. [Google Scholar] [CrossRef] [Green Version]
  47. Julian, D.; Chiang, M.; O’Neill, D.; Boyd, S. Qos and fairness constrained convex optimization of resource allocation for wireless cellular and ad hoc networks. In Proceedings of the INFOCOM, 21th Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 23–27 June 2002; pp. 477–486. [Google Scholar]
  48. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004; pp. 67–112. ISBN 0521833787. [Google Scholar]
  49. Cohen, M.; Azaiza, F. Balancing transport and physical layers in wireless ad hoc networks: Jointly optimal congestion control and power control. IEEE J. Sel. Areas Commun. 2006, 23, 104–116. [Google Scholar]
  50. Lin, X.J.; Shroff, N.B. The impact of imperfect scheduling on cross-layer congestion control in wireless networks. IEEE/Acm Trans. Netw. 2006, 14, 302–315. [Google Scholar]
  51. Fan, S.; Zhao, H.L. Delay-based cross-layer QoS scheme for video streaming in wireless ad hoc networks. China Commun. 2018, 15, 215–234. [Google Scholar] [CrossRef]
Figure 1. Stability period with varying number of nodes.
Figure 1. Stability period with varying number of nodes.
Algorithms 12 00068 g001
Figure 2. Consumed power of the network with varying number of nodes.
Figure 2. Consumed power of the network with varying number of nodes.
Algorithms 12 00068 g002
Figure 3. Comparison of the ratio of survival nodes in the region of radius R.
Figure 3. Comparison of the ratio of survival nodes in the region of radius R.
Algorithms 12 00068 g003
Figure 4. Comparison of the ratio of survival nodes out of region of radius R.
Figure 4. Comparison of the ratio of survival nodes out of region of radius R.
Algorithms 12 00068 g004
Figure 5. Average throughput of real-time sessions under different number of nodes.
Figure 5. Average throughput of real-time sessions under different number of nodes.
Algorithms 12 00068 g005
Figure 6. Average throughput of non-real-time sessions under different number of nodes.
Figure 6. Average throughput of non-real-time sessions under different number of nodes.
Algorithms 12 00068 g006
Figure 7. Average end-to-end delay of real-time sessions under different numbers of nodes.
Figure 7. Average end-to-end delay of real-time sessions under different numbers of nodes.
Algorithms 12 00068 g007
Figure 8. Average end-to-end delay of non-real-time sessions under different numbers of nodes.
Figure 8. Average end-to-end delay of non-real-time sessions under different numbers of nodes.
Algorithms 12 00068 g008
Figure 9. Network lifetime.
Figure 9. Network lifetime.
Algorithms 12 00068 g009
Figure 10. Average number of packets of non-real-time services arriving at the sink node.
Figure 10. Average number of packets of non-real-time services arriving at the sink node.
Algorithms 12 00068 g010
Figure 11. Average number of packets of real-time services arriving at the sink node.
Figure 11. Average number of packets of real-time services arriving at the sink node.
Algorithms 12 00068 g011

Share and Cite

MDPI and ACS Style

Fan, S. A Cross-Layer Optimization QoS Scheme in Wireless Multimedia Sensor Networks. Algorithms 2019, 12, 68. https://doi.org/10.3390/a12040068

AMA Style

Fan S. A Cross-Layer Optimization QoS Scheme in Wireless Multimedia Sensor Networks. Algorithms. 2019; 12(4):68. https://doi.org/10.3390/a12040068

Chicago/Turabian Style

Fan, Shu. 2019. "A Cross-Layer Optimization QoS Scheme in Wireless Multimedia Sensor Networks" Algorithms 12, no. 4: 68. https://doi.org/10.3390/a12040068

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop