Proportional throughput differentiationwith cognitive load-control on WSN channels
© Bodin and Wolosz. 2015
Received: 25 January 2015
Accepted: 8 June 2015
Published: 1 July 2015
Wireless sensor networks are nowadays used in various applications to facilitate monitoring and actuation tasks, e.g., for smart grids and industrial automation. Some of these applications require guarantees or at least assurances on reliability. Such applications expect predictable throughput and delay, which are hard to maintain in environments with changing radio conditions. QoS-aware MAC protocols capable of handling such environments are well explored. They require however protocol changes and are therefore difficult to deploy. This paper presents an application layer forwarding service that offers proportional differentiation while limiting network load to preserve high utilization and predictability. Demands for capacity are expressed as fractions of the overall channel throughput. We show that this service can be implemented with a cognitive load controller (CLC) based on fuzzy logic and quality assessed with utility functions for application layer packet loss and throughput. We evaluate the CLC for 802.15.4 with CSMA/CA through NS-3 simulations showing that it offers the intended service while adjusting load for high overall throughput and low delay.
Smart grid applications that can benefit from wireless network communications include automatic meter reading, remote system monitoring, and equipment fault diagnostics . Such applications need to work in harsh and complex electric-power-system environments that challenge the reliability of WSN communications. Industrial network communications for factory automation need to support a multitude of applications . Communications for smart grid and industrial applications involve data acquisition from devices and sensors at key positions as well as messaging for device control and actuations. For some devices, data is preferably communicated wirelessly, in wireless sensor networks (WSNs). Wireless communications are especially attractive in harsh environments where wiring for communications is difficult and costly and where wires may easily get damaged.
Multi-hop WSNs in which data is transmitted more than once over the wireless media brings several advantages including self-organization, flexibility, and self-healing capabilities attractive for applications demanding availability. Although benefits brought by multi-hop such as redundancy and self-healing, single-hop configurations are sometimes preferable. Such cases include when devices are within reach of wired infrastructures or some of the devices are capable of one-hop long-range communications, e.g., over 3/4G cellular networks . This is because successfully delivered packet then traverses the radio media only once and does not consume battery and transmission capacity twice or more. Multi-hop WSNs using different channels for consecutive hops suffer less from this multiple capacity use and are hence preferable when single-hop WSNs are insufficient.
This paper focuses on the single-hop case for each channel in WSNs. The main contributions are (1) the definition of a proportionally rate-differentiated service for single-hop WSNs that can be implemented at application layer or in middleware together with load control for high network utilization and predictability and (2) the design, implementation, and evaluation of an application layer CLC for this service, easy to deploy with off-the-shelf 802.15.4 CSMA/CA (carrier sense multiple access with collision avoidance) MAC software and hardware without extensive additional signaling.
A dependable communication system for smart grids and industrial automation relies on predictable transmission rates and network quality of service (QoS) for time-sensitive data delivery . Transmission rates in WSNs can however be hard to know before deployment and extensive testing, especially for wireless networks such as IEEE 802.15.4 . This network technology is attractive due to its low-power consumption although it offers limited capacity, typically peaking at around 200 kbps and considerably less at overload when many individual nodes try to use the channel simultaneously . The use of different channels alleviates the overload problem. Avoiding overload remains however important for each channel to make the most of available transmission capacity.
The need for transmission predictability in WSNs has driven research on QoS-aware MAC protocols capable of supporting predictable transmission rate in environments with changing radio conditions and moving object impacting on transmission quality [6–8]. The IEEE is working on standardizing the 802.15.4e which includes time-slotted channel hopping for better support of industrial applications . Also, cross-layer approaches have been shown to help in improving effectiveness and predictability of WSNs [9, 10]. Although tweaking MAC protocols and possibly adjacent protocol layers provide attractive network properties, such solutions come at the cost of protocol changes and imply to abandon widely used and tested protocol implementations. This motivates a middleware or an application layer approach for predictable service, which can be implemented with off-the-shelf MAC hardware and software.
Predictable transmission rates may be understood as strong assurances or even guarantees on throughput, delay bounds, or a combination of those [11–13]. A more relaxed service model is herein presented, which aims at proportionally distributing forwarding capacity to wireless devices based on stated demands. This service model allows for pairing load control with needs for predictability to offer high utilization of wireless channels, low delay, and demand-based distribution of available forwarding capacity. Consequently, the actual throughput offered to devices will vary with the overall throughput, which means that stronger assurances need be provided internally by devices instead of as a network service. For example, mission-critical messages can be scheduled at devices for transmission with strict precedence over other messages.
This paper further presents the design and evaluation of a CLC that provides proportional throughput differentiation between devices. The CLC requires devices to strictly limit transmission rates to their offered forwarding capacity, which will match the demanded part of the overall channel throughput. Devices will send at these full rates defined for each device and measurement period until the CLC finishes its load adaptation. Thereafter, the devices can send at any rate up to their respective upper limit found through the load adaptation made by the CLC. The load adaptation needs to be repeated in case the distribution of demands for capacity alters or if radio conditions change, e.g., due to devices that are re-located.
The CLC is based on fuzzy logic and assesses channel load with utility functions for packet loss and throughput of each individual device. The mechanism is evaluated for 802.15.4 through NS-3  simulations showing that it can offer the desired proportional differentiation while limiting the collective load to ensure high network utilization and low delay. We discuss how this mechanism can be implemented for resource-constrained networks such as 802.15.4 without requiring extensive signaling of variables for the mechanism itself.
The rest of the paper is organized as follows. Section 2 presents related work on QoS and approaches to battle congestion in WSNs as well as previous work on proportional differentiation models. Also, related work that includes fuzzy logic is presented. Section 3 discusses application needs for service predictability, needs for load-control and introduces the proportional differentiation service model in focus of this paper. Section 4 defines the CLC mechanisms, while Section 5 presents our evaluation of its properties. In Section 6 is implementation aspects discussed regarding variables updates, perceived quality assessment, and transport of data for the CLC. Section 7 presents future work with focus on proportional differentiation in multi-hop WSNs. Finally, the paper is concluded in Section 8.
2 Related work
Differentiation and network QoS in wireless sensor networks (WSNs) have been extensively researched over the past decade and more. Chen et al.  gave a survey of QoS in WSNs where research efforts are identified in the areas of routing over multiple wireless hops for end-to-end QoS, reliability assurance, and application specific QoS. They identify needs for further research on satisfying QoS requirements while ensuring efficient resource usage at network overload, which this paper addresses.
Many QoS-aware MAC protocols for WSNs address how to satisfy QoS requirements and ensure efficient resource usage at network overload [6–8]. They require however changes to off-the-shelf MAC hardware, software of both. Cross-layer approaches to improve effectiveness and predictability in WSNs as surveyed in  and explored in . These approaches also affect adjacent protocol layers, which means comprehensive changes to WSN protocol stacks developed, tested, and deployed in smart grid and industrial production contexts and elsewhere. Instead of adapting the MAC layer or other layers below the application socket interface, we restrict our differentiation service model and implementation to the application layer or middleware. Thereby, it can be created with off-the-shelf hardware and software for available transport layers and below.
Our work differs further from previous research in QoS-aware MAC protocols and cross-layer solutions in that we aim for a more relaxed service model compared to those targeted by MAC-centered solutions for QoS in WSNs. Our service model aims at proportionally distributing forwarding capacity to WSN devices based on stated demands instead of offering strict guarantees or assurances on certain transmission rates. Thereby, it requires less detailed information on network status and can be implemented entirely at the application layer or in middleware. Also, it is less sensitive to changing radio conditions and demands for capacity since the actual throughput assurances are relative to each other and not related to requests for specific transmission rates.
Proportional service models are well explored and previously presented in the context of loss rate and delay differentiation for congestion responsible applications using TCP in wired IP-based networks [16–19]. Wang and Ramanathan further presented mechanisms for proportional delay differentiation in wireless IEEE 802.11-based ad hoc networks . Proportional throughput differentiation for constrained IEEE 802.15.4 WSNs is however not explicitly studied previously.
Proportional loss rate and delay differentiation is of limited use in WSNs since applications commonly use UDP for transporting messages. For example, the Constrained Application Protocol (CoAP) runs over UDP and implements its own mechanism for reliable transport in . Although congestion control is considered for CoAP , we chose to focus on proportional throughput differentiation for the service model defined herein. We motivate this by throughput differentiation that addresses the common use and current standard track approach for protocols such as CoAP.
Several approaches have been proposed to battle sensor network congestion, with different means to detect congestion. In , the authors aim at fairness by having a congestion control unit distribute data rates equally among downstream nodes. Liang and Gao  analyzed current queue lengths and oscillations as signs of congestion. In , aggregate input and output data rates were studied. Based on a fairness factor, they allocate capacity among nodes. Paek et al.  used time to recover loss as congestion indicator. Although application layer or middleware information on WSN load is less precise than looking into lower layer parameters, in our solution, we avoid using other information but loss rate and throughput seen above the network socket interface. This allows for implementing it without changes to off-the-shelf hardware and software for transport layers and below.
Papers related to fuzzy logic include , where Ali El Masri et al. adapt rates based on packet delay and buffer size. The results showed that their traffic regulation mechanism supported QoS. In , threshold management of buffers is realized with fuzzy logic. They defined fuzzy cases that determine how much buffer is occupied and how many packets are rejected. In , the fuzzy logic system provides high throughput under low latency. It aggregates packets in the buffer at busy channel, and buffer delay is distributed among nodes resulting in high performance for voice transmissions. Recently, a fuzzy logical controller for priority-based rate control in multiple-hop WSNs is presented in .
Fuzzy logic controllers are also used in several other applications where low decision-making cost is desired. For example, in , fuzzy logic is applied for web-based self-learning and self-adapting outer loop speed control for permanent magnet synchronous motors (PMSMs). The work of Zhou et al. is based on Takagi-Sugeno fuzzy logic system approximating the optimal control law for the speed control of the particular PMSM that is to be controlled [32, 33]. Fuzzy logic has further been used to control network functions such as routing  and admission control .
Our work differs from previous research in several aspects. Based on lightweight observations of per-node throughputs and loss rates, we assess impacts from network load on application usefulness through utility functions. Our CLC is based on fuzzy logic and provides proportional throughput differentiation between devices in a WSN while ensuring high network utilization and low delay when applications would overload the network without load control. The CLC was firstly presented and evaluated regarding network utilization, adaptation delay, and lower layer variables for load assessment in . This paper contributes further with definition and evaluation of proportional throughput differentiation based on this load control mechanism, as well as further evaluation of the CLC properties, implementation aspects, considerations for its practical deployment, and future work on the presented differentiation model.
3 Service predictability and differentiation
Applications for smart grid monitoring and controls as well as applications for factory automation can be assumed to adapt their sending rates to control the load on shared networks like IEEE 802.15.4 CSMA/CA WSNs. Controlling the load is beneficial for network efficiency and can be associated with proportional differentiation to provide additional value to applications for automatic meter reading, remote system monitoring, equipment fault diagnostics, and other data acquisition tasks.
3.1 Application needs for predictability
Smart grid applications such as automatic meter reading, remote system monitoring, and equipment fault diagnostics require reliable two-way WSN communications between electric utilities and the customerŠs metering devices . Furthermore, monitoring systems based on smart sensor nodes and WSNs can provide important information on the conditions of system components, including generation units, transformers, transmission lines, and motors. Part of such information can be especially important and hence need reliable and predictable delivery at short delay. Proportional rate differentiation can provide such predictability to wireless nodes for them to internally ensure that essential information is given precedence by the application or between applications deployed on the same node. This would mean to let the applications decide to communicate less urgent information at time of lower load.
Factory automation involves wireless communications for data acquisition from devices and sensors as well as messaging for device control and actuations. Wireless devices can easily be located at key positions at low cost and without wiring. Industry applications require however the communication system to provide a certain degree of predictability and reliability to assure that processes operate as intended. Some applications have hard real-time requirements on the communication, e.g., those involved in automatic control loops, and may hence need wired connectivity or wireless solutions that offer certain degrees of guarantees such as IEEE 802.15.4 with WiressHART . Other applications accept softer assurances on predictability and reliability and are thereby candidates for wireless IEEE 802.15.4 with CSMA/CA installation and proportional differentiation.
Applications that can manage with softer assurances include time-constrained device control and actuations as well as collection lower volumes of time-critical data. Such data may originate from observations generating larger amounts of data but are then pre-processed by sensor devices to detect urgent matters such as malfunction and critical wear. Thereby, sensor devices can perform accurate monitoring although connected via constrained wireless networks such as IEEE 802.15.4 .
3.2 Load control in collision detect networks
Wireless networks based on collision detection (i.e., CSMA/CA) rely on that competing sources not too often try to use the channel in the same time slots. Collisions occur when sources in dense networks transmit simultaneously, which result in lost data and lower overall throughput .
With 802.15.4 CSMA/CA sources perform a Clear Channel Assessment (CCA) before transmission to avoid collisions. However, when several nodes perform CCA at the same time, more than one of those nodes may detect the channel as free and transmit simultaneously. Alternatively, all sources may detect the channel as busy, which means that none of them will transmit with reduced network utilization as result.
CCA fails more frequently as load increases resulting in collisions and packet loss or in that no packets are being sent. This explains why load control in certain situations can reduce the amount of failed CCAs and thereby improve throughput in 802.15.4 CSMA/CA networks. Load control further reduces delay caused by retransmissions of lost data as well as queuing delay at the MAC layer. Also, fewer packets are lost due to collisions and queue overflow.
3.3 Proportional differentiation and load control
Proportional differentiation has been considered in the context of the IETF differentiated services . The assured forwarding (AF) per-hop behavior (PHB) group defines a drop precedence of a packet that determines its relative importance compared to other packets . In case of congestion, forwarding nodes try to protect packets with lower drop precedences from being lost by preferably discarding packets with a higher drop precedence value. This means that within the AF PHB group, the forwarding assurance of a packet depends on drop precedence and the relation between available forwarding capacity and load. While this service model may be unpredictable in the public Internet with its variable and uncontrollable load, it is more suitable in controlled environments such as industry networks where load can be controlled.
Constrained wireless industry networks face varying capacity due to changing radio conditions and moving object impacting on transmission quality. This makes it hard to offer strict assurances on forwarding capacity to more than a small fraction of all traffic. With a more relaxed service model aiming at proportionally distributing forwarding capacity to wireless devices based on stated demands, available capacity is more efficiently used.
We define a service model that allows for pairing load control with needs for predictability to offer high utilization of wireless channels, low delay, and demand-based distribution of available forwarding capacity. Demands are expressed for each node using a common network resource as fractions of the total available forwarding capacity. By monitoring this capacity, made as stable as possible through load control, each node obtains predictable and reliable throughput with low delay. The delay is not proportionally differentiated but kept low though load control that keeps queues and back-off times short and limits the number of retransmissions.
4 Load control for proportional differentiation
This section defines our CLC. It was firstly defined in . We herein further explain and motivate the preferred configuration for proportional throughput differentiation. With proper configuration, CLC also limits the channel load for high overall throughput and low delay.
4.1 System overview
The CLC iteratively adapts application data rates of all nodes using the same channel, e.g., an 802.15.4 CSMA/CA channel. This means that nodes implement rate control for their applications. That is, data rates are limited before queuing for transmission at the MAC layer.
Iterations consist of a measurement period in which perceived throughputs and loss rates are observed. These values are cognitively processed and matched to stated demands for forwarding capacity of each individual node. Utility functions are used for this processing to assess the quality in terms of application usefulness. The found utilities are matched with stated demands though fuzzy logic. The outcome from processing utilities and demand changes to the data rates of each node, increase or decrease. Transmission rates are adapted until no further changes to these rates are issued by the fuzzy logic, i.e., the load adaptation is finished.
The demands are expressed as fractions of the total capacity of the channel in question. This means that the obtained data rates vary with the capacity, which follows the herein made definition of proportional differentiation.
4.2 Measuring perceived quality
The CLC periodically collects the quality perceived by each transmitting node. Throughput and loss rates at the application layer of each node are used to decide based on the demand for transmission capacity and the proper sending rates of nodes to avoid overload. Nodes are assumed to respect their respective allowed sending rate. The sending rates impact the perceived quality and thereby the decisions for next period, whereby the proper load is iteratively found. It is defined as a centralized unit for the simulation-based evaluation. Later in this paper, we discuss however implementation alternatives such as locating the controller in a gateway node with permanent power and likely to have sufficient processing capabilities and memory.
The CLC tracks packet loss rate and throughput obtained by each individual node over a pre-defined measurement period. Packets issued for transmission during the measurement period only are considered when calculating loss rates and throughput. That is, packets already in queue for transmission when the measurement period starts are excluded from loss and throughput calculations. This means that overload resulting in queuing is detected as high loss rates although packets may not be actually dropped. The CLC tracks and controls hence delay although not directly measured.
4.3 Utility functions
When throughputs and loss rates are obtained, the CLC transforms them via utility functions to assess the quality of transmissions in terms of application usefulness. The utility functions combine these two variables into a single utility value to be used as input to the fuzzy logic. The formulas of these utility functions were defined based on controlled experiments for different network scenarios .
4.4 Fuzzy logic
Table of rules for fuzzy logic
5 Evaluation through simulations
We illustrate the operation of the CLC through simulations. This is to show the adaptive behavior of the CLC and to examine its basic properties with respect to throughput efficiency, adaptation rate, and predictability related to differentiation.
5.1 Simulation setup
5.2 Overall throughput and loss rate
The overall throughput and loss rate with and without CLC was examined over a wide span of loads, starting from 65 kbps and increasing in steps of 65 kbps towards heavy overload, about three times the maximum capacity of 250 kbps. Without CLC, load was increased by incrementing the number of nodes sending at full speed, 65 kbps, and by increasing the total load of all source nodes in steps of 65 kbps, respectively. In the latter case, transmission rates were randomly distributed among the 12 sending nodes. With CLC, the total demand was increased in the same manner, for all nodes in steps of 65 kbps. Resulting throughput and loss rate with CLC was observed after that no further changes to transmission rates are issued by the fuzzy logic. A measurement period of 10 s was used by the CLC. Simulations were repeated 20 times for mean values with confidence intervals.
5.3 Adaptation time and obtained capacity
The adaptation time was evaluated for different values of the measurement period and buffer available for queuing. Shorter measurement period results in less time needed for adaptation unless the number of iteration steps needed to finish the adaptation increases too much.
5.4 Proportional differentiation and delay
6 Implementation aspects and considerations
For a mechanism like CLC aimed for constrained networks, it is essential that the mechanism allows for efficient and low-overhead implementation. Assuming that the CLC is implemented in a central node, e.g., a gateway between a WSN and the Internet, it is important that the variables communicated with each node come at low overhead and are efficiently transported over the constrained WSN.
6.1 Updating variables for assessing perceived quality
As defined in this paper, the CLC relies on periodic measurements of per-node throughput and loss rate. These measurements should not burden constrained wireless devices and instead be processed to largest extent possible by nodes having permanent power supply and enough computational capabilities and memory. In wireless sensor and actuator networks for industry automation, gateway nodes that interconnect these wireless devices into a system for knowledge-based factory automation can be expected to meet these criteria.
For deployments where the gateway node has sufficient processing power, constrained wireless nodes can be relaxed by the use of sequence numbers for transmitted packets. CLC will then run on the gateway node, which communicates changes to allowed data rates to the wireless nodes as well as for its own transmission over the wireless channel. When communicating these changes, the gateway node also offsets the sequence number of each node so that it knows which packets are issued before and after the change, respectively. For example, for each node, it may offset the sequence numbers with a value power of two higher than the last seen packet that arrived. Such an offset can be efficiently implemented using bit shift by the wireless nodes and will hence impose minimal overhead to these constrained devices.
The offsetting of sequence numbers allows the gateway node to simply count received packets issued after the change and detect losses from the sequence numbers. Throughput and loss rates are thereby measured by the gateway without other involvement of wireless nodes but receiving messages for rate changes, rate limiting, and sequence number offsetting. Rate limiting to 10ths of packets per second is generally well achievable through interruptions also at low performance microcontrollers.
Should several gateways be deployed for the same channel, they should be capable of selecting a single node for the CLC. Measured throughputs and loss rates as well as rate changes can then be communicated over wired connections.
6.2 Transport of data for load control
Constrained wireless devices for industrial automation may implement the Constrained Application Protocol (CoAP) . CoAP provides request/response interaction with applications for industrial automation and other machine-to-machine (m2m) applications. It is designed for easily interfacing with HTTP for integration with Web-based systems on the Internet.
For devices already implementing CoAP for control of measurements and actuations, this protocol can be used also to operate the CLC. That is, offsetting the sequence number status and changing the data rate for a device at a CLC iteration can be done with a simple CoAP PUT method message. Without CoAP, similar solutions are possible, e.g., by issuing remote procedure calls over UDP to set those values.
7 Future work
The herein presented approach of a proportionally rate-differentiated service related to load control for WSNs deserves further studies in several possible directions. Such further work can be categorized into the following areas of future research on this approach for differentiated forwarding in WSNs; (1) proportional differentiation in multi-hop WSNs and (2) alternative mechanisms for proportional differentiation in WSNs.
7.1 Proportional differentiation in multi-hop WSNs
Multi-hop WSNs is of particular interesting for further work since multi-hop scenarios may involve greater uncertainty on available forwarding capacity over potentially time-varying topologies and communication quality . Furthermore, in such scenarios, the main part of the end-to-end (e2e) delay appears in transmissions and due to contention and queuing . Contention and queuing in CSMA/CA relates directly to network load in terms of the frequency of simultaneous transmission attempts from different nodes in range of each other. As shown in this paper, by controlling the load of simultaneously transmitting nodes when contention occurs, the network throughput can be improved (Fig. 6) and queuing delay decreased (Fig. 7).
The effect of load control on network throughput and delay in multi-hop scenarios is likely to depend on deployment strategies for WSN coverage and connectivity . For example, in barrier coverage scenarios, sensors are deployed to detect any moving path crossing a belt region. Such deployment typically creates a chain-like topology, while blanket coverage scenario aiming having a sensor node in every point of a field, the deployment typically becomes dense with many possible paths across the WSN. Different types of network coverage and connectivity should be considered in considering load control and proportional throughput differentiation for multi-hop WSNs.
Wireless sensors are most often battery operated. Consequently, careful energy management and use is of outmost importance to ensure long enough lifetimes of wireless sensor systems. Sleep scheduling , data aggregation schemes with compressed sensing (CS) [48, 49], enhanced routing , and topology control by adapting transmission power  are well-explored means to efficiently use available energy. Moreover, the concept of content-centric networking facilitates named based routing of requests for data and in-network caching of content, which can reduce the amount of traffic needed to serve consumers of the data .
Sleep scheduling, also known as duty cycling (DC), has been identified as an important technique for energy conservation in WSNs . DC allows wireless sensor nodes to turn their radio on and off to conserve energy, which can cause varying network topology and load. Hence, further studies on load control for low delay and efficient capacity use with proportional throughput differentiation in multi-hop WSNs should consider sleep scheduling of nodes. Algorithms for DC can be categorized into five types of communication modes, i.e., unicast, anycast, broadcast, multicast, and coveragecast .
Coveragecast is a common communication mode in WSNs with many sensors producing data for one or a few collecting sinks. This communication pattern creates star topologies in which DC has a clear impact on e2e delay. It can be combined with data aggregation schemes that let intermediate nodes combine received data with their own to reduce the amount of data to be transported over the e2e WSN path. Data aggregation can further be combined with CS techniques introducing in-network processing of the aggregated data and enhanced routing to further reduce the amount of communicated data as well as the total energy consumed in the network.
Given the common situation of energy scarcity in WSNs, energy harvesting constitutes an important part of many sensor systems. In , Afzal et al. presents a unified perspective that addresses energy efficiency and harvesting together with cognitive radio (CR) techniques for dynamic spectrum access (DSA) for more efficient use of available radio spectrum. Mobile cloud computing technologies is also included in their proposed architecture incorporating a cognitive Internet of Things (IoT) engine that interacts with a cloud-based engine for reconfiguration, inference, learning, and orientation. A new performance metric called the overall link success probability is introduced to capture both energy and spectrum efficiency constrains.
Should proportional differentiated service models be further considered for multi-hop WSNs, collective metrics such as the overall link success probability may be needed to allow for good overall network performance in the presence of differentiation. Proportional differentiation models bring benefits of allowing for cognitive approaches, e.g., to balance energy and spectrum efficiency constrains while offering differentiation between nodes or streams of data. Stricter differentiation models offering stronger assurances or even guarantees are likely to impact more on performance metrics related to energy and spectrum efficiency. For example, to guarantee a certain throughput at low delay, excessive transmission power may be needed, which can reduce the overall network performance.
Clearly, several interacting techniques can be used to improve the overall multi-hop WSN performance in terms of energy and spectrum efficiency, energy consumption and sensor system lifetime, communication delay, overall throughput, and reliability and predictability in capacity allocations. We believe that load control with proportional throughput differentiation can contribute to improving these quality metrics. A mechanism like the CLC needs to be integrated with other techniques to come to its best. Also, the potential negative impact from the proportional differentiation on overall network performance should be analyzed and quantified in relation to the fundamental performance limits of the medium access control (MAC) protocol in question.
Upper bounds on network utilization for any MAC protocol and for fixed linear and grid topologies are defined and proven by Xiao et al. in . They aim at extending their results for other topologies such as deployments where both sides of a sink node can have sensor nodes and the larger communication ranges but two-hop or more neighbors can hear messages. Thereby, these upper bounds may hold also for the coveragecast communication modes, which we believe is of fundamental importance for the type of industrial applications through of in this paper.
7.2 Alternative mechanisms for proportional differentiation in WSNs
As shown in Section 5.3, short measurement periods for quick load adaptation results in slightly less overall throughput, i.e., reduced overall network performance. Although smaller buffers improve the network performance, short measurement periods still typically come with reduced throughput. Faster load adaptation resulting in both high overall network performance and targeted proportional throughput differentiation may be possible by using information below the socket interface. In particular, information on the queuing delay that appears at the MAC layer would provide a quicker feedback on contention and overload than changes in detected throughput and loss at the application layer.
Wireless connectivity is attractive for industrial automation when low cost deployment is desired and in harsh environments where wiring is difficult, costly, and may easily get damaged. Predictable throughput and delay is important for industrial wireless communications. This paper defines and motivates demand-based proportional differentiation of forwarding capacity with low loss rates and delay. For wireless networks such as 802.15.4 with CSMA/CA, such differentiation can be implemented through cognitive load control.
We show through NS-3 simulations that a cognitive load controller (CLC) can differentiate the forwarding service given to individual devices based on stated demands for capacity. The CLC further offers high utilization and low loss rates and delay. When changing the distribution of demands between devices, the CLC is shown to adapt the proportional differentiation in reasonable time, down to around 10 s and less than a minute. It offers slightly higher overall throughput and more precise differentiation when configured for longer adaptation time.
The CLC can be implemented without burdening constrained wireless devices, which makes demand-based proportional throughput differentiation a tractable choice for wireless communications in industrial automation.
- VC Gungor, B Lu, GP Hancke, Opportunities and challenges of wireless sensor networks in smart grid. IEEE Trans. Ind. Electron. 57, 3557–3564 (2010).View ArticleGoogle Scholar
- VC Gungor, GP Hancke, Industrial wireless sensor networks: challenges, design principles, and technical approaches. IEEE Trans. Ind. Electron. 56, 4258–4265 (2009).View ArticleGoogle Scholar
- Z Sheng, S Yang, Y Yu, AV Vasilakos, J McCann, K Leung, A survey on the IETF protocol suite for the Internet of Things: standards, challenges, and opportunities. IEEE Wireless Commun. 20, 91–98 (2013).View ArticleGoogle Scholar
- IEEE Standard for local and metropolitan area networks, Part 15.4: low-rate wireless personal area networks (LR-WPANs). IEEE Std 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006), 1–314 (IEEE Computer Society, 2011). http://ieeexplore.ieee.org/servlet/opac?punumber=6012485.
- G Anastasi, M Conti, M Di Francesco, A comprehensive analysis of the MAC unreliability problem in IEEE 802.15.4 wireless sensor networks. IEEE Trans. Ind. Inform. 7, 52–65 (2011).View ArticleGoogle Scholar
- MA Yigitel, OD Incel, C Ersoy, QoS-aware MAC protocols for wireless sensor networks: a survey. Comput. Netw. 55, 1982–2004 (2011).View ArticleGoogle Scholar
- P Suriyachai, U Roedig, A Scott, in Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom 2009). Implementation of a MAC protocol for QoS support in wireless sensor networks (IEEEGalveston, TX, USA, 2009), pp. 1–6. IEEE, Galveston, TX, USA.Google Scholar
- B Yahya, J Ben-Othman, Energy efficient and QoS aware medium access control for wireless sensor networks. Concurrency Comput. Pract. Exp. 22, 1252–1266 (2010).View ArticleGoogle Scholar
- LDP Mendes, JJPC Rodrigues, A survey on cross-layer solutions for wireless sensor networks. J. Netw. Comput. Appl. 34, 523–534 (2011).View ArticleGoogle Scholar
- GA Shah, VC Gungor, OB Akan, A cross-layer QoS-aware communication framework in cognitive radio sensor networks for smart grid applications. IEEE Trans. Ind. Inform. 9, 1477–1485 (2013).View ArticleGoogle Scholar
- B Davie, A Charny, JCR Bennett, AK Benson, JY Le Boudec, W Courtney, S Davari, V Firoiu, D Stiliadis, An expedited forwarding PHB (per-hop behavior). IETF RFC 3246 (Network Working Group, 2002). https://datatracker.ietf.org/doc/rfc3246/.
- A Charny, JCR Bennett, K Benson, JY Le Boudec, A Chiu, W Courtney, S Davari, V Firoiu, C Kalmanek, KK Ramakrishnan. IETF RFC 3247 (Network Working Group, 2002). https://datatracker.ietf.org/doc/rfc3247/.
- G Armitage, B Carpenter, A Casati, J Crowcroft, J Halpern, B Kumar, J Schnizlein, RFC 3248: a delay bound alternative revision of RFC 2598. IETF RFC 3248 (Network Working Group, 2002). https://datatracker.ietf.org/doc/rfc3248/.
- The NS-3 Network Simulator. http://www.nsnam.org/.
- D Chen, PK Varshney, in Proceedings of the International Conference on Wireless Networks, ICWN ’04, June 21–24, 2004. QoS support in wireless sensor networks: a survey (CSREA PressLas Vegas, NV, USA, 2004), pp. 227–233.Google Scholar
- C Dovrolis, P Ramanathan, A case for relative differentiated services and the proportional differentiation model. IEEE Netw. 13, 26–34 (2002).View ArticleGoogle Scholar
- C Dovrolis, D Stiliadis, P Ramanathan, Proportional differentiated services: delay differentiation and packet scheduling. ACM SIGCOMM Comput. Commun. Rev. 29, 109–120 (1999).View ArticleGoogle Scholar
- C Dovrolis, P Ramanathan. Proceedings of Eighth International Workshop on Quality of Service (IWQOS 2000) (IEEEPittsburgh, PA, USA, 2000), pp. 53–61.Google Scholar
- U Bodin, A Jonsson, O Schelen, in Lecture Notes in Computer Science, Quality of Service - IWQoS 2001, 2092. On creating proportional loss-rate differentiation: predictability and performance (SpringerBerlin Heidelberg, Germany, 2001), pp. 372–386.View ArticleGoogle Scholar
- K-C Wang, P Ramanathan, QoS assurances through class selection and proportional differentiation in wireless networks. IEEE J. Selected Areas Commun. 23, 573–584 (2005).View ArticleGoogle Scholar
- Z Shelby, K Hartke, C Bormann, The Constrained Application Protocol (CoAP). IETF RFC 7252 (Constrained RESTful Environments Working Group, 2014). https://datatracker.ietf.org/doc/rfc7252/.
- AP Castellani, M Rossi, M Zorz, Back pressure congestion control for CoAP/6LoWPAN networks. Ad Hoc Netw. 18, 71–84 (2014).View ArticleGoogle Scholar
- CT Ee, R Bajcsy, in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. Congestion control and fairness for many-to-one routing in sensor networks (ACMBaltimore, MD, USA, 2004), pp. 148–161.View ArticleGoogle Scholar
- L Liang, D Gao, VCM Leung, Queue-based congestion detection and multistage rate control in event-driven wireless sensor networks. Wireless Commun. Mobile Comput. 14, 818–830 (2014).View ArticleGoogle Scholar
- S Brahma, M Chatterjee, K Kwiat, in Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). Congestion control and fairness in wireless sensor networks (IEEEMannheim, Germany, 2010), pp. 413–418.Google Scholar
- J Paek, R Govindan, RCRT: Rate-controlled reliable transport protocol for wireless sensor networks. ACM Trans. Sensor Netw. (TOSN). 7, 1–45 (2010).View ArticleGoogle Scholar
- L Khoukhi, A El Masri, A Sardouk, A Hafid, D Gaiti, in Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC). Traffic adaptation in wireless mesh networks: fuzzy-based model (IEEEIstambul, Turkey, 2011), pp. 41–46.Google Scholar
- L Khoukhi, S Cherkaoui, in Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet ’05). FuzzyCCG: a fuzzy logic QoS approach for congestion control in wireless ad hoc networks (ACMMontreal, Quebec, Canada, 2010), pp. 105–111.Google Scholar
- P Dely, A Kassler, N Bayer, H Einsiedler, D Sivchenko, in Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). FUZPAG: a fuzzy-controlled packet aggregation scheme for wireless mesh networks (IEEEChangsha, China, 2005), pp. 778–782.Google Scholar
- Y-L Chen, H-P Lai, A fuzzy logical controller for traffic load parameter with priority-based rate in wireless multimedia sensor networks. Appl. Soft Comput.14 Part C, 594–602 (2014).View ArticleGoogle Scholar
- C Zhou, D-C Quach, N Xiong, S Huang, Q Zhang, Q Yin, AV Vasilakos, An improved direct adaptive fuzzy controller of an uncertain PMSM for web-based E-Service Systems. IEEE Trans. Fuzzy Syst. 23, 58–71 (2015).View ArticleGoogle Scholar
- DC Quach, S Huang, Q Yin, C Zhou, An improved direct adaptive fuzzy controller for an uncertain DC Motor Speed Control System. TELKOMNIKA Indonesian J. Electrical Eng. 11, 1083–1092 (2013).View ArticleGoogle Scholar
- XZ Ban, X Gao, X Huang, AV Vasilakos, Stability analysis of the simplest Takagi?Sugeno fuzzy control system using circle criterion. Inform. Sci. 177, 4387–4409 (2007).MathSciNetView ArticleGoogle Scholar
- A Vasilakos, C Ricudis, K Anagnostakis, W Pedryca, A Pitsillides, in The 1998 IEEE International Conference on Fuzzy Systems Proceedings, 1998. IEEE World Congress on Computational Intelligence). Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks (IEEEAnchorage, AK, Canada, 1998), pp. 1488–1493.Google Scholar
- K Uehara, K Hirota, Fuzzy connection admission control for ATM networks based on possibility distribution of cell loss ratio. IEEE J. Selected Areas Commun. 15, 179–190 (1997).View ArticleGoogle Scholar
- K Wolosz, U Bodin, E Osipov, J Eliasson, in Proceedings of the Wireless Days (WD). Cognitive load-control for congested wireless sensor network channels (IEEEValencia, Spain, 2013), pp. 1–6.Google Scholar
- J Song, S Han, AK Mok, D Chen, M Lucas, M Nixon, in Real-Time and Embedded Technology and Applications Symposium, 2008. RTAS ’08. IEEE. WirelessHART: applying wireless technology in real-time industrial process control (IEEESt. Louis, MO, USA, 2009), pp. 377–386.Google Scholar
- Z Shi, C Beard, K Mitchel, in Proceedings of the Wireless Communications and Networking Conference, WCNC 2007. Misbehavior and MAC Friendliness in CSMA Networks (IEEEKowloon, Hong Kong, China, 2007), pp. 355–360.View ArticleGoogle Scholar
- S Blake, D Black, M Carlson, E Davies, Z Wang, W Weiss, An architecture for differentiated service. IETF RFC 2475 (Network Working Group, 1998). https://datatracker.ietf.org/doc/rfc2475/.
- J Heinanen, F Baker, W Weiss, J Wroclawski, Assured Forwarding PHB Group. IETF RFC 2597 (Network Working Group, 1999). https://datatracker.ietf.org/doc/rfc2597/.
- K Rerkrai, J Nasreddine, Z Wang, J Riihijarvi, P Mahonen, in Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC). Design and implementation of utility-based radio resource optimization using CAPRI (IEEEIstanbul, Turkey, 2011), pp. 2262–2267.Google Scholar
- Z Jiang, Y Ge, Y Li, Max-utility wireless resource management for best-effort traffic. IEEE Trans. Wireless Commun. 4, 100–111 (2005).View ArticleGoogle Scholar
- C Boutremans, J-Y Le Boudec, in Proceedings of INFOCOM 2003, the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. Adaptive joint playout buffer and FEC adjustment for Internet telephony (IEEESan Francisco, CA, USA, 2003), pp. 652–662.Google Scholar
- S Rajasekaran, GA Vijayslakshmi Pai, Neural networks, fuzzy logic and genetic algorithms (PHI Learning Private Limiteds, New Delhi, India, 2011).Google Scholar
- M Li, Z Li, AV Vasilakos, in Proceedings of the IEEE, 101. A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues (IEEE, 2013), pp. 2538–2557.Google Scholar
- XM Zhang, Y Zhang, F Yan, AV Vasilakos, Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans. Mobile Comput. 14, 742–754 (2015).View ArticleGoogle Scholar
- K Han, J Luo, Y Liu, AV Vasilakos, Algorithm design for data communications in duty-cycled wireless sensor networks: a survey. IEEE Trans. Mobile Comput. 51, 107–113 (2013).Google Scholar
- L Xiang, J Luo, AV Vasilakos, in 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Compressed data aggregation for energy efficient wireless sensor networks (IEEESalt Lake City, UT, USA, 2011), pp. 46–54.View ArticleGoogle Scholar
- X Xi, R Ansari, A Khokhar, AV Vasilakos, Hierarchical data aggregation using compressive sensing (HDACS) in WSNs. ACM Trans. Sensor Netw. 11, 45–14525 (2015).Google Scholar
- Y Yao, Q Cao, AV Vasilakos, in 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks (IEEEHangzhou, hina, 2013), pp. 182–190.View ArticleGoogle Scholar
- V Jacobson, DK Smetters, JD Thornton, MF Plass, NH Briggs, RL Braynard, in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT). Networking named content (ACMRome, Italy, 2009), pp. 1–12. ACM, Rome, Italy.View ArticleGoogle Scholar
- A Afzal, SAR Zaidi, MZn Shakir, MA Imran, M Ghogho, AV Vasilakos, DC McLernon, K Qaraqe, The cognitive Internet of Things: a unified perspective. Mobile Netw. Appl. 20, 20:72–20:85 (2015).View ArticleGoogle Scholar
- Y Xiao, M Peng, J Gibson, G Xie, D-Z Du, AV Vasilakos, Tight performance bounds of multihop fair access for MAC protocols in wireless sensor networks and underwater sensor networks. IEEE Tran. Mobile Comput. 11, 1538–1554 (2012).View ArticleGoogle Scholar
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.