Open Access

An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

EURASIP Journal on Wireless Communications and Networking20092009:791201

Received: 20 January 2009

Accepted: 28 July 2009

Published: 22 September 2009


In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF), requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO) protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

1. Introduction

Many deployment scenarios of multihop wireless networks require high transmission reliability; for instance, wireless ad hoc and sensor networks are anticipated to be deployed in disaster recovery areas, battlefields, remote patients' homes, and so forth. While it is sometimes argued that high density of devices can potentially cater for reliability [1], due to energy depletion and lack of battery recharging facilities, even a dense network eventually becomes sparse. Therefore, protocol stack of a data-critical network should have in-built support for transmission reliability.

To cater for the battery constraints of wireless devices, it is important to provide reliable communication without significant energy depletion. Contemporary wireless standards (e.g., 802.15.4 [2], 802.11 [3], and 802.16 [4] standards) support a positive-ACK based retransmission scheme to provide reliable communication. This scheme, referred to as Simple Positive-ACK throughout the paper, has not been designed for energy efficiency. While there have been efforts to improve the energy efficiency of transmission reliability on wireless networks [517], most of the proposed protocols introduce a significant level of resource complexity to replace Simple Positive-ACK. Moreover, most of these protocols are not true hop-by-hop reliability protocols, although it has been acknowledged widely that hop-by-hop reliability is the key to overall network reliability [711]. Some of these protocols are designed for a particular communication model of a specific technology and hence cannot be classified as generic wireless ad hoc reliability protocol [9, 17].

In [13], Modiano proposed a true hop-by-hop reliability mechanism, which has better energy usage than standard Simple Positive-ACK protocol. This protocol, called Packet Length Optimization (PLO), adapts the length of transmitted packets in accordance with the underlying channel conditions; large packets are transmitted during good channel conditions and vice versa.

In this paper, we propose minor modifications to the Simple Positive-ACK protocol to improve its energy efficiency. We note that all the data in a corrupted frame are not in error and therefore it is not necessary to retransmit the complete frame. We propose to localize errors in a MAC frame by dividing the frame into disjoint parts, referred to as virtual fragments. On reception of a corrupted frame, only the virtual fragments in error are retransmitted. The proposed protocol is referred to as Selective Retransmission using Virtual Fragmentation (SRVF).

To determine provable performance benefits of the proposed SRVF protocol, we develop stochastic models for Simple Positive-ACK, PLO, and SRVF protocols. From these models, we derive expected values of the total number of bit transmissions that are required to reliably transmit a frame over a th-order Markov channel. Using these models, we show that SRVF requires significantly lesser energy for reliable transmission than Simple Positive-ACK and PLO protocols.

We verify our theoretical findings through trace-driven simulations of SRVF, PLO, and Simple Positive-ACK protocols. For experimental evaluation, we use a comprehensive corpus of bit-error traces collected over real-life WSN and WiFi networks at different data rates. (These traces are available at Our trace-driven simulations show that SRVF provides significant improvement in average energy efficiency at all data rates. For 250 kbps WSN traces, SRVF has approximately 17% better energy usage than Simple Positive-ACK and 11% better energy usage than PLO. For 802.11 traces, we have recorded an average improvement of approximately 12% over Simple Positive-ACK and 14% improvement over PLO.

The rest of this paper is structured as follows. Section 2 describes proposed protocol in detail. Section 3 develops stochastic models for the protocols under study and provides the analytical comparison of these models. Section 4 elaborates empirical performance analysis based on trace driven simulations. Section 5 summarizes key conclusions of this paper.

2. Protocol Description

The most commonly used hop-by-hop reliability protocol is Simple Positive-ACK. In this protocol, frame is retransmitted completely in spite of the fact that only a small subset of data is in error. In this section, we propose a novel energy-efficiency protocol for hop-by-hop reliability, which is based on the premise that all data in a corrupted frame need not to be retransmitted. The proposed protocol is referred to as Selective Retransmission using Virtual Fragmentation (SRVF) protocol throughout this paper.

SRVF is an ACK-based protocol, which operates as follows. Before transmitting a data frame, the sender logically divides the checksum field in the frame header into distinct equal-sized blocks. Each checksum block then covers a distinct logical block in the data or header part of the frame. These distinct data and header blocks are referred to as virtual fragments. After including the partial checksums in the headers on these virtual fragments, the sender transmits the MAC data frame. The receiver calculates the checksum for each virtual fragment separately. If the checksum is correct for every fragment, an ACK frame is sent to the sender indicating no error. If the ACK frame is received correctly at the sender, data frame transmission is considered successful. SRVF messaging is described pictorially in Figure 1.
Figure 1

Typical protocol messaging for the SRVF protocol: (a) data and ACK Frames received correctly, (b) one or more fragments in error, and (c) ack in error.

If any fragment checksum fails at the receiver, the receiver sends a fragment ACK frame that contains information about which fragments are in error. This information is in the form of a bitmap. One bit is reserved for each virtual fragment. A fragment ACK frame is not sent if all virtual fragments are in error. In that case, the sender times-out and retransmits the entire frame. Otherwise, if the sender receives the fragment ACK without errors, it only retransmits those virtual fragments that have errors.

Stochastic models of energy efficiency of SRVF and other existing protocols understudy are developed in the next section.

3. Stochastic Modeling and Theoretical Performance of Reliable Protocols

In this section, we first describe the basic parameters and assumptions about the models being constructed. Then we develop analytical models for Simple Positive-ACK, PLO, and SRVF. Finally, we perform a comparative analysis of the energy efficiency of these models. In each of these models, we derive energy efficiency in terms of the total number of transmitted bits that are required to reliably transmit a MAC layer frame over a multihop network.

3.1. System Model, Assumptions and Notation

Let and represent the number of data and header bits in the MAC data frame; for example, in 802.15.4,  bits are used in the short addressing mode [18] and the minimum header size is  bytes in 802.11 networks. Similarly, let represent the number of bits in an acknowledgment (ACK) frame; for example,  bits for 802.15.4 short addressing mode, while ACK size is  bytes in 802.11.

Number of retransmissions to achieve reliable communication on a wireless link is inherently dependent on the bit-error statistics of the underlying channel. Prior studies have shown that the MAC layer wireless channels generally exhibit high-order dependence structure in which each bit is dependent on multiple prior bits [19, 20]. Such a correlation structure is accurately captured by a high-order, say th-order, Markov channel model in which each received bit is dependent upon the previous bits; the order of the Markov channel model can vary for different MAC layer channels.

Let the output of the binary bit-error random process at a discrete time instance be represented as , where an error-free bit. Then the states of a th order Markov channel model represent possible combinations of consecutive bits as shown in Figure 2 for . Based on this notation, if the last received bit is error-free, then the current state of the Markov channel has a zero in the least significant bit (LSB) position, while for the last bit received with errors, the LSB is one (see Figure 2). Due to this structure, henceforth the error-free states of the Markov channel model are referred to as even states, while the corrupted state are referred as odd states.
Figure 2

A 3-rd Order Markov Chain.

Throughout this section, we assume that all hops of the network are independent th-order Markov channels, where is a fixed arbitrary integer. Thus although the parameters of the channel on each hop might differ, we realistically assume that the order of the Markov channel model at each hop is fixed. From prior studies, we know that for 802.15.4 residual channels [19] and for 802.11 residual channels [21], and we perform all our analysis for a parameterized value of so that the analysis is valid for Markov channels of arbitrary order. For the single-hop analysis, we do not use any superscript for the transition and steady-state probabilities. For the complete -hop expression, and are used to denote the steady-state and transition probabilities of the channel model on the th hop to the destination and the subscript represents a transition from Markov state to state .

We quantify energy efficiency of a protocol as the number of bits that are required to reliably transmit one fixed-sized data frame of length bits over an -hop ad hoc network. As in the 802.11 and 802.15.4 standards, we assume that link layer reliability is provided on a hop-by-hop basis. To theoretically compare the energy efficiencies, we develop stochastic models of the three protocols under consideration. In case of a collision, all the protocols will have to retransmit the entire packet. Therefore, we ignore collision overhead in our analysis.

3.2. Simple Positive-ACK Protocol

Simple Positive-ACK is the de-facto standard for hop-by-hop reliable transmission over multihop ad hoc networks. In this protocol, a MAC layer acknowledgment is sent for every correctly received frame. If a frame or its acknowledgment is lost en-route due to collisions or received with bit errors, the complete frame is retransmitted. The transmission is not considered successful until the successful reception of complete frame. Usually a retry threshold is associated for retransmission attempts; for example, the Default Retry Limit = in 802.11 networks. Simple Positive-ACK is a mandatory part of the MAC protocol in 802.11 networks, whereas it is optional in 802.15.4 networks.

3.2.1. Probability of Frame Error for the Simple-ACK Protocol

As a first step to analytically model retransmissions of a Simple-ACK protocol, we compute the probability of receiving an error-free frame of length bits on a single-hop th-order Markov model. This probability is dependent on the present (even or odd) state of the model.

Let us first focus on the scenario of being in an even state and receiving consecutive good bits. Throughout this paper, we follow a realistic assumption that , where is the memory-length of the Markov process.. Every state , , of this model can transit to only two other states: either to state (even state) or to state (odd state). Since there are a total of states in a th-order Markov channel model, for ease of notation we do not repeat the operation on state indices; henceforth all state indices are implicitly defined as .

Let Markov state , , be the current even state of the th-order Markov channel model. State can transit to either state or state +1. Since we are only concerned with bursts of error-free bits, the probability of getting an error-free bit starting in state is . Recall that if next bit is error free, then next state is an even state. To get an error-free frame, we must stay in the even states for every remaining state transition, which implies that after (at most) transitions, system will be in state , giving the following state sequence:


From that state, to get the remaining error-free bits, the next transitions will be from state to state . To generalize the above discussion in terms of the parameters of the channel model, the probability of getting a burst of good bits starting in state is given by . This probability summed over all possible even Markov states yields .

Based on the above discussion, the probability that a data frame will be corrupted by bit-errors during transmission is


The above expression gives the overall probability of getting one or more bit-errors in bits by summing over all possible state paths, starting in any state. Similarly, probability of receiving an error-free frame is .

Similarly, the probability that an ACK frame will be corrupted is


These probabilities of corrupted data and ACK frames are used to define state transition probabilities for the Markov protocol models that are developed in subsequent sub-sections.

3.2.2. Stochastic Model of Simple Positive-ACK

Simple Positive-ACK uses automatic repeat request (ARQ) with a retry threshold for retransmissions [18]. We use a Markov chain model to characterize the Simple Positive-ACK protocol. This model comprises of three states and is shown in Figure 3. Whenever a data frame needs to be transmitted, the process starts in the "Send Frame" state. Recall that is the probability that a data frame is received without errors at the receiver, that is, the probability of exiting the "Send Frame" Markov state. Since there are only two possible next states from the "Send Frame" state, the probability of staying and leaving the "Send Frame" state is geometrically distributed.
Figure 3

Markov model of Simple Positive-ACK.

Once a frame is received without errors at the receiver, the Markov chain process enters the "Send ACK" state. In accordance with 802.15.4 and 802.11 specifications, if the ACK frame is received without errors at the sender, then the process transits back to the "Send Frame" state for transmission of a new data frame. If either the data frame or the ACK frame is corrupted, the sender times out and retransmits the frame. This scenario is characterized by the "Retransmit Frame" state. The expected number of bits needed to reliably transmit one data frame over a single hop using above model is

where denotes

Similarly, the expected number of bits needed for successful transmission of the ACK frame corresponding to the above data frame is


The above expectation holds because the reverse probabilistic path to return to the "Send Frame" state must pass through the "Send ACK" state. This state structure and the assumption that the retransmissions are always less than the retry threshold give a geometric distribution on the "Send ACK" state.

Adding the data and ACK bits gives the expected number of total bits that are required to successfully transmit the data frame to the next hop as


Now assuming independent links on all hops to destination yields

where denotes

represents the steady-state probability of being in channel state on the th hop, and denotes the transition probability of going from state to state on the th hop.

Equation (8) defines the expected number of bits that are required to communicate a data frame of bits over an -hop reliable channel. An obvious observation that can be made from (8) is that the number of transmitted bits and, consequently, the energy efficiency is an inverse function of the probability of staying in the good state. In other words, and as can be argued intuitively, the energy efficiency is directly proportional to the probability of having errors on the channel. More importantly, note in (8) that the energy efficiency of Simple Positive-ACK is an increasing function of the number of bits that are used for data retransmission: , and . Unlike the channel parameters discussed above, sizes of MAC frames are controllable parameters that can be adapted to improve energy efficiency. Thus the SRVF protocol that reduces the size of the retransmitted frame should intuitively improve the energy efficiency of a reliable transmission. The extent of this improvement will be highlighted in the performance evaluation sections.

3.3. Packet Length Optimization

Prior studies [1315] have suggested packet length optimization approaches to increase the energy efficiency of reliable protocols. The basic idea in these approaches is to increase the packet size when channel conditions are good (i.e., in case of low BER) and decrease the packet size when the channel exhibits more error prone behavior. In [13], authors have adopted the idea of maintaining a retransmission history. Current channel conditions are inferred from this retransmission history. Under this approach, small number of retransmissions suggests good network conditions, whereas a large number of retransmissions indicate bad network conditions. We evaluate the protocol proposed in [13] as a representative of packet length optimization-based schemes. Throughout the paper, this protocol of [13] is generically referred to as the Packet Length Optimization (PLO) protocol.

3.3.1. Stochastic Model of Packet Length Optimization

In this section, we extend the PLO model presented in [13] to cater for the more realistic Markovian channel model with arbitrary memory length. In [13], expected energy efficiency of PLO measured in terms of probability of number of retransmission is described as:


where is the size of frame data for retransmissions in a history window of size . It should be emphasized that is not the same for different values of because the frame size varies based upon the number of retransmissions in current history.

Probability that a frame is received in error over a Markovian channel is already derived in (2). Probability of retransmissions can hence be calculated easily using the following binomial probability density function:


Equations (2) and (12) are substituted in (11) and after some simplifying steps we obtain the following expression for the energy efficiency of PLO:


Assuming independence between each hop, (13) can be extended to hops as


where superscript denotes value of a particular parameter on the th hop. For example, denotes the length of history window on th hop.

Note that (13) describes energy efficiency averaged over all possible retransmissions. In low error rate conditions, probability of small number of retransmissions is high. Similarly probability that a frame is received correctly is also high. Moreover, because we use larger frame size for small number of retransmissions, the ratio of data bytes to actually transmitted bytes is also high. However, in case of high error rate channels, such as the 11 Mbps 802.11 networks, probability of large number of retransmissions is high. In this setting, we expect less energy efficiency from PLO, a fact that is substantiated later in this section using theoretical analysis and in the next section using empirical analysis.

3.4. Selective Retransmission Using Virtual Fragmentation (SRVF)

As described earlier, the basic premise of SRVF is to localize bit-errors by using virtual fragments. SRVF divides frames into virtual fragments and each virtual fragment is covered by a separate checksum. In this section, we develop a stochastic model of SRVF by operating over a Markov chain of arbitrary order.

3.4.1. Stochastic Model of SRVF

Let denote the number of virtual fragments in a MAC data frame. For simplicity of analysis, we assume that all virtual fragments are of equal size bits. We also assume that is a multiple of , and therefore is an integer; this assumption can be easily satisfied in a real system by appending virtual zero bits to the data bits in the MAC frame. As mentioned in earlier discussions, fragment error information is piggybacked on the ACK frames. We assume that the overhead of additional bits for this piggybacking is negligible. The size of the bitmap for correctly received and corrupted packets is dependent on the number of virtual fragments and stays same as long as number of virtual fragments is kept same. Therefore, even if new bits have to be added to the ACK frames, the overhead of these bits would be negligible.

Based on our preceding discussion, the probability that a fragment is received with errors is

and hence the probability that out of the fragments are corrupted is , and the expected number of corrupt fragments at the receiver is


Assuming that , the probability that the expected number of retransmitted fragments will encounter errors during a retransmission is


Here we emphasize that the expected number of retransmitted fragments, and consequently , will be monotonically decreasing functions of the number of retransmissions. However, we assume a fixed which implies that all of the virtual fragments corrupt in the first transmission are included in each retransmission. Thus the results provided by the present model will be worse than what would be observed in reality.

Based on the parameters defined above, we propose a Markov chain model of SRVF shown in Figure 4. The SRVF model starts in the "Send Frame" state. If a data frame is received correctly, the Markov chain transits to the "Send ACK" state, which is reached only when all of the virtual fragments in a data frame have been received without errors. If some of the virtual fragments are corrupted, the process transits to the "Send Fragment ACK" state. The fragment ACK frame contains a bitmap of correctly-received and corrupted virtual fragments. The fragment ACK is retransmitted until it reaches the sender correctly. We assume that even in case of retransmissions, the fragment ACK frame will reach the sender before it times out. As with the Simple Positive-ACK model, the distribution of next possible states in each Markov state is geometric.
Figure 4

Markov model of SRVF.

The expected number of data bits required to reliably transmit a data frame using SRVF is


Again invoking the assumption of independent hops, we obtain

where denotes

and represent the steady-state and transition probabilities on the th hop, and denotes the fragment error probability on the -th hop.

3.5. Analytical Performance Evaluation

At this point, we have developed models for Simple Positive-ACK, PLO, and SRVF. For the performance evaluation of these models, realistic values of steady-state and transition probabilities are required. These values can be obtained from residual bit-error traces collected over operational networks. We have collected a comprehensive set of bit-error traces over WSN and WiFi networks. Steady-state and transition probabilities used to compare stochastic models of Simple Positive-ACK, PLO, and SRVF are derived from these traces. Detailed description of trace collection setup and properties of collected traces are elaborated in the next section on empirical analysis. In this section, we first define a criterion for performance comparison and then compare performance of each protocol analytically using this criterion.

We compute energy efficiency, as the ratio of the number of bytes in the original frame, , and the total bytes, , transmitted to reliably communicate the data frame:

where is an additive function of the number and size of data transmissions and the number and size of ACK transmissions that are required to reliably communicate a data frame over an ad hoc network. Maximum value of using (22) can be 1 (100% efficiency) only when communication overhead is zero (No Acknowledgments, Headers, and/or Retransmissions). An energy efficient protocol must exhibit higher values of as compared to other protocols for the same number of data bytes to be transmitted.

To evaluate energy efficiency for 802.15.4, we use a data payload size of   bytes and header and ACK of bytes. For SRVF, the data payload of each frame is divided into four virtual fragments of bytes each. For 802.11 evaluations, we use a data payload size of bytes and header and ACK of bytes. For SRVF, the data payload is divided into four virtual fragments of bytes each. For Packet Length Optimization, we use packet sizes of and bytes with a retransmission history window size . Throughout this section, we report results for reliable transmission over a single hop. Multihop results are similar and are skipped for brevity. For Packet Length Optimization, we use packet sizes of 15, 20 and 25 bytes with a retransmission history window size = .

For each trace, we first compute the transition and steady-state probabilities. These probabilities are then plugged into (7), (13), and (22) to ascertain realistic theoretical improvements in energy efficiency that can be provided by SRVF. Results shown in this paper are averaged over each setup due to brevity (details of setups are available in next section.)

The average theoretical improvements are given in Figure 5. SRVF improvement in Figure 5 refers to the difference in the theoretical energy usage of SRVF and Simple Positive-ACK. Similarly, Packet Length Optimization improvement refers to the difference in the theoretical energy usage of Packet Length Optimization and Simple Positive-ACK.
Figure 5

Average theoretical improvement in energy consumption over Simple Positive-ACK.

It can be seen that SRVF has consistently better energy usage than Simple Positive-ACK. Packet Length Optimization is also better than Simple Positive-ACK in general. However, margin of improvement is high for SRVF as compared to PLO. The average improvement for SRVF over all data-rates is around 35% whereas for Packet Length Optimization average improvement is around 25%.

Absolute theoretical energy efficiency results are tabulated in Table 1. It can be seen that the lowest values are recorded for the highest data-rate (11 Mbps). Simple Positive-ACK yields very low energy efficiency value of 17%. PLO improves it significantly and doubles the energy efficiency (34%). SRVF improves it further and approximately triples the energy efficiency (48%) as compared to Simple Positive-ACK.
Table 1

Theoretical energy efficiency.


Simple positive-ACK

Packet length optimization



250 Kbps





11 Mbps





5 Mbps





2 Mbps




SRVF also reduces number of computations required to calculate CRC checksum. It is trivial to see that for a frame of length bits and CRC polynomial degree , non-SRVF-based protocols require XOR operations and Left Shift operations. In SRVF, frame with fragments requires XOR operations and Left Shift operations.

These results show that SRVF is theoretically better than both Simple Positive-ACK and PLO. These findings are substantiated further in the next section using trace driven simulations.

4. Empirical Performance Comparison of Reliable Protocols

We now use wireless traces collected over real networks to empirically evaluate protocols under study. The first part of this section is dedicated to the description of trace collection setups and properties of the collected traces. The second part comprises of comparative analysis based on trace driven simulations.

4.1. Data Collection

We collected a comprehensive data set of 802.15.4 and 802.11 residual bit-error traces by making modifications to the wireless device drivers. (All traces are available at [22].)

We used Crossbow's Micaz motes and TinyOS to collect bit-error traces of wireless sensor networks. MAC layer configurations of TinyOS were modified to bypass checksum verification so that all frames were passed to upper layer regardless of errors in the frame. These traces were collected in four different locations/setups (shown in Figure 7). At least 6 traces per setup are collected and each trace consists of approximately 30 000 frames. Each setup is characterized based on distance and impairment between sender and the base station. These setups exhibited very low bit-error rate (BER) except location/setup named Room 3. This is due to longer distance and a concrete wall between Room 3 sender and the base-station. Average BER for Room 3 is 0.0133. All other setups exhibit BER below order of We are concerned only with high bit-error rates; therefore we restricted our analysis to only Room 3 setup. Further details of these traces are available in [19].

802.11 traces were collected using three different data rates (2, 5, and 11 Mbps) and three different settings representing home, office and university environments (shown in Figure 8). For each data rate at least 15 traces were collected. In each setup at least 5 traces per data rate were collected. Each trace was obtained by transmitting more than 100 000 frames. To capture bit-errors, receiver's MAC layer device drivers were modified to pass corrupted packet to upper layer. In addition to bit-errors, Signal to Silence Ratio (SSR) was also logged. Detailed description of these traces is available in [21].

4.2. Comparison of Experimental Energy Efficiency

To confirm our theoretical findings, we use trace driven simulations to empirically compare the energy efficiency of the protocols under consideration. For empirical analysis, two different traces are taken from the same setup. These traces represent sender and receiver channels, respectively. Total number of transmitted frames per simulation is bound by number of frames in the traces. In the simulations, we assume that sender timeout is significantly longer than receiver timeout.

Table 2 shows the experimental average energy efficiency for each data rate. Each entry in the table is obtained by reliably transmitting more than 12.6 million bits for 802.15.4 traces. For 802.11, each entry is obtained by reliably transmitting more than 4.4 billion bits per data-rate.
Table 2

Empirical energy efficiency.


Simple positive-ACK

Packet length optimization






















Average energy efficiency improvement is shown in Figure 6. Similar to the theoretical findings, we observe that SRVF improves energy efficiency for all evaluated traces. PLO also improves the energy efficiency in case of 250 Kbps, 2 Mbps, and 5 Mbps data-rates. But the margin of improvement for PLO is significantly lesser than SRVF. Average improvement recorded by PLO is 0.37% whereas SRVF provides an average improvement of 13.6%.
Figure 6

Average empirical improvement in energy consumption over Simple Positive-ACK.

Figure 7

Setup for 802. 15.4 trace collection.

Figure 8

Experimental setups for 802. 11 trace collections.

In case of the 11 Mbps channel, PLO has actually a degraded performance and Simple Positive-ACK is better than PLO in this particular case. SRVF, for the same data-rate, has improved the efficiency by 21%. This has happened because PLO optimizes packet sized based on number of retransmissions in the current history. Simple BER statistics are not enough to analyze this factor and packet level statistics are required. It has been shown in [21] that mean packet error burst length for 11 Mbps traces is 4.16 packets. For traces other than 11 Mbps, mean packet error burst length is less than 2 packets. This explains the reason of failure of PLO because PLO adjusts the packet size based on the packet retransmission history. Given that 802.11 channels encounter large number of packet drops as compared to other traces, it is highly probable that most of the time PLO will transmit packets smaller than the optimal size and will degrade its energy efficiency.

Theoretical findings in the previous section have shown that the performance of SRVF increases with data rate and the performance of Packet Length Optimization decreases with increasing data rates. The empirical analysis also confirms these findings. Energy efficiency improvements by Packet Length Optimization are recorded to be 2%, 1.7% for 2 and 5 Mbps, respectively. For 11 Mbps, the performance of PLO is degraded by 8%. For similar settings, SRVF shows improvements of 6.5%, 9.2%, and 21.6%.

The comparative analysis of theoretical and experimental results reveals that experimental results are consistent with theoretical findings in terms of improvement over other protocols. The magnitude of energy efficiency improvement is however not same in theoretical and experimental evaluation. We argue that this minor inconsistency exists because theoretical results only quantify the expected value of energy improvement whereas during the experimental results we observed that traces collected under the same setup also largely exhibit varying behaviors. These variations are highlighted in the experimental results.

5. Conclusion

In this paper, we proposed an energy-efficient and reliable link layer transmission protocol called SRVF. Theoretical and simulation results showed that SRVF provides significantly better energy efficiency than the widely deployed Simple Positive-ACK protocol. SRVF was also compared with Packet Length Optimization, another popular protocol to improve energy usage of reliable protocols. We found that in most cases Packet Length Optimization improves over Simple Positive-ACK, but SRVF outperforms PLO by a significant margin.



This work is supported by Nokia Research, China. Part of this work has appeared in the proceedings of IEEE International Conference on Communications (ICC), Beijing, China, May 2008 [18]. New contributions of this paper include: Theoretical performance analysis of SRVF over 802.11 traces, Empirical performance analysis of SRVF over 802.11 traces, 802.11 Trace collection, Stochastic modeling of Packet Length Optimization and Theoretical and empirical analysis of Packet Length Optimization over 802.11 and 802.15.4 traces.

Authors’ Affiliations

School of Electrical Engineering and Computer Sciences, National University of Sciences and Technology (NUST)


  1. Ye W, Heidemann J, Estrin D: An energy-efficient MAC protocol for wireless sensor networks. Proceedings of the IEEE Conference on Computer Communications (INFOCOM '02), June 2002, New York, NY, USAGoogle Scholar
  2. IEEE 802.15.4 WG : Part 15.4: wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE Std 802.15.4-2003, October 2003Google Scholar
  3. IEEE 802.11 : Part 11: wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.Google Scholar
  4. IEEE 802.16 : Part 16: air Interface to Fixed Broadband Wireless Access System.Google Scholar
  5. Zhang H, Arora A, Choi Y, Gouda MG: Reliable bursty convergecast in wireless sensor networks. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC '05), May 2005, Urbana-Champaign, Ill, USAGoogle Scholar
  6. Park S-J, Vedantham R, Sivakumar R, Akyildiz IF: A scalable approach for reliable downstream data delivery in wireless sensor networks. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC '04), May 2004, Roppongi Hills, Tokyo, Japan 78-89.View ArticleGoogle Scholar
  7. Gnawali O, Yarvis M, Heidemannt J, Govindan R: Interaction of retransmission, blacklisting, and routing metrics for reliability in sensor network routing. Proceedings of the IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON '04), October 2004, Santa Clara, Calif, USA 34-43.Google Scholar
  8. Sankarasubramaniam Y, Akan ÖB, Akyildiz IF: ESRT: event-to-sink reliable transport in wireless sensor networks. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC '03), June 2003, Annapolis, Md, USA 177-188.View ArticleGoogle Scholar
  9. Wan CY, Campbell AT, Krishnamurthy L: PSFQ: a reliable transport protocol for wireless sensor networks. Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications (WSNA '02), September 2002, Atlanta, Ga, USA 1-11.View ArticleGoogle Scholar
  10. Ngai ECH, Zhou Y, Lyu MR, Lin J: Reliable reporting of delay-sensitive events in wireless sensor-actuator networks. Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS '06), October 2006, Vancouver, Canada 101-108.Google Scholar
  11. Zhou Y, Lyu MR, Liu J, Wang H: PORT: a price-oriented reliable transport protocol for wireless sensor networks. Proceedings of the International Symposium on Software Reliability Engineering (ISSRE '05), November 2005, Chicago, Ill, USA 117-126.View ArticleGoogle Scholar
  12. Shaikh FK, Khelil A, Suri N: On modeling the reliability of data transport in wireless sensor networks. Proceedings of the15th EUROMICRO International Conference on Parallel, Distributed and Network-Based Processing (PDP '07), February 2007, Naples, Italy 395-402.Google Scholar
  13. Modiano E: An adaptive algorithm for optimizing the packet size used in wireless ARQ protocols. Wireless Networks 1999, 5: 279-286. 10.1023/A:1019111430288View ArticleGoogle Scholar
  14. Sankarasubramaniam Y, Akyildiz IF, McLaughlin SW: Energy efficiency based packet size optimization in wireless sensor networks. Proceedings of the IEEE Workshop on Sensor Network Protocols and Applications (SNPA '03), May 2003, Anchorage, Alaska, USAGoogle Scholar
  15. Lettieri P, Srivastava MB: Adaptive frame length control for improving wireless link throughput, range, and energy efficiency. Proceedings of the IEEE Conference on Computer Communications (INFOCOM '98), March 1998, San Francisco, Calif, USA 2:Google Scholar
  16. Kumar R, Paul A, Ramachandran U, Kotz D: On improving wireless broadcast reliability of sensor networks using erasure codes. Proceedings of the 2nd International Conference on Mobile Ad-hoc and Sensor Networks (MSN '06), December 2006, Hong KongGoogle Scholar
  17. Huang L, Setia S: CORD: energy-efficient reliable bulk data dissemination in sensor networks. Proceedings of the IEEE Conference on Computer Communications (INFOCOM '08), April 2008, Phoenix, Ariz, USA 1247-1255.Google Scholar
  18. Iqbal A, Shahzad K, Khayam SA: SRVF: an energy-efficient link layer protocol for reliable transmission over wireless sensor networks. Proceedings of the IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 146-150.Google Scholar
  19. Iqbal A, Khayam SA: Improving WSN simulation and analysis accuracy using two-tier channel models. Proceedings of the IEEE International Conference on Communications (ICC '08), May 2008, Beijing, China 349-353.Google Scholar
  20. Konrad A, Zhao BY, Joseph AD, Ludwig R: A Markov-based channel model algorithm for wireless networks. ACM WINET 2003, 9(3):189-199.Google Scholar
  21. Khayam SA, Radha H, Aviyente S, Deller JR Jr.: Markov and multifractal wavelet models for wireless MAC-to-MAC channels. Elsevier Performance Evaluation 2007, 64(4):298-314.View ArticleGoogle Scholar
  22. WisNeT


© A. Iqbal and S.A. Khayam. 2009

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.