- About this Journal
- Abstracting and Indexing
- Aims and Scope
- Annual Issues
- Article Processing Charges
- Articles in Press
- Author Guidelines
- Bibliographic Information
- Citations to this Journal
- Contact Information
- Editorial Board
- Editorial Workflow
- Free eTOC Alerts
- Publication Ethics
- Reviewers Acknowledgment
- Submit a Manuscript
- Subscription Information
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2012 (2012), Article ID 541258, 14 pages
An Autonomous Packet Transmission Strategy for Opportunistic Wireless Sensor Networks
1Vocational School of Technical Sciences, Karamanoglu Mehmetbey University, 70100 Karaman, Turkey
2Department of Electrical and Electronics Engineering, Fatih University, 34500 Istanbul, Turkey
3Department of Electrical Engineering, Qatar University, P.O. Box 2710, Doha, Qatar
4Department of Electrical and Electronics Engineering, Mevlana University, 42003 Konya, Turkey
Received 24 April 2012; Revised 18 September 2012; Accepted 30 September 2012
Academic Editor: Yunghsiang Han
Copyright © 2012 Hakki Soy et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
We consider a wireless sensor network that comprises a single hop between the sensor nodes and the central controller node with multiple antennas. In this system model, we concentrate on the single-beam opportunistic communication and propose two novel packet transmission schemes that can perform multiuser diversity gain based on the signal-to-noise ratio (SNR) and the normalized SNR (NSNR) measurements at the sensor nodes with single antenna. The main objective of the multiuser diversity is to increase the total throughput over the fast fading channels. Proposed schemes are based on the principle of cross-layer design that integrates with physical layer characteristics of wireless channel and medium access control (MAC) layer characteristics of network. In our design, we assume that the sensor nodes know only their own channels to the controller node and the packet transfer from the sensor nodes to the controller node is initiated when the channel quality of any node exceeds the predefined threshold at the current time slot. To determine the optimum threshold, we maximize the probability of successful packet transmission where only one sensor node transmits its packet in one time slot under the simplified collision model. Simulation results are demonstrated to compare the performance of the proposed schemes in terms of throughput, energy efficiency, and fairness. The obtained results show that the presented opportunistic strategy can be used to improve the network throughput.
In recent years, a rapid growth was seen in availability and deployment of the wireless devices. Advances in energy efficient designs, digital circuitry, signal processing, sensing technology and microelectromechanical systems (MEMS) have enabled the development of wireless sensor networks (WSNs) as a new emerging technology. WSNs may consist of several hundred spatially distributed inch-scale sensor nodes (SNs) which are densely deployed over a sensing area with the aim of measuring environmental phenomena. The SNs have a limited battery energy and finite lifetime while it is expected to operate for months. The major source of the energy consumption is the radio transceiver and the energy efficient solutions are proposed at all layers of communication stack. Especially the MAC layer has direct control over the radio transceiver and it plays a crucial role on the energy efficiency and also the throughput for WSNs .
The MAC protocol is necessary to coordinating packet transmissions of the SNs to optimize the network throughput at an acceptable fairness and minimal energy consumption. When the channel conditions are bad, in other words, when the channel goes into deep fade, a packet transmission attempt is highly failed and may lead to a waste of energy. Therefore, the SNs may wait longer until their channels become better. However, deferring the transmissions to increase the energy efficiency until the channel becomes better may decrease throughput or equivalently cause a longer latency . The MAC protocol designs for WSNs often trade performance characteristics, such as throughput and latency, for a decrease in energy consumption to increase the SNs' lifetime [3, 4]. Thus an efficient packet transmission scheme must be able to adapt to channel variations while maintaining a good balance between the energy efficiency and the throughput for WSNs.
Even though the energy efficiency is one of the most important design consideration for WSNs, certain applications necessitate the throughput performance. At this point, the cross-layer design proved to achieve better optimization results than its layered counterparts and it has received much attention over the past few years to improve the throughput. Recently, some cross-layer proposals in the literature exploit the interaction between the MAC and physical layers to increase the network throughput. When the physical layer is modeled as a simple collision channel, the MAC protocol is designed considering that packets arrive error-free at the CN only when one SN transmits, because the collisions directly impact the overall networking metrics such as energy efficiency, throughput, and delay. Since the MAC layer coordinates the sharing of the wireless channel, it is also responsible for minimizing the number of collisions. It is clearly that to maximize the throughput of the WSN, during each time slot, the SN with the best channel state should transmit and other SNs should remain in an idle state.
In this study, we consider a WSN with single-hop infrastructure, where besides SNs there is a controller node (CN) on top of the hierarchy that acts as a common sink over wireless links. The SNs collect the data about a physical phenomenon to directly send them to the CN and thus no routing protocol is needed. In a cellular WSN, the channel conditions of the SNs have time-varying behavior due to fading as well as shadowing and propagation loss. Therefore, different SNs experience different channel gains at a given time; this effect is called multiuser diversity (MUD) . The time-varying link quality allows opportunistic usage of the channel and the presence of fading is crucial in order to realize the MUD gain, but it is limited in environments with little scattering and/or slow fading. In such environments, the MUD gain is obtained by opportunistic beamforming (Opp-BF) by using multiple antennas at the CN. By varying the phase and power of the signals allocated to the elements of antenna array, the large and fast channel fluctuations are induced over the deployment area, so that the MUD can still be exploited . Opp-BF method also ensures fairness as the beamforming vector aligns with various SNs' channels at different time slots.
It is well known that making use of channel knowledge of the SNs at the MAC layer allows opportunistic usage of the channel and improves throughput performance through collision elimination. The design and operation of the optimal MAC protocol depends on the availability of channel state information (CSI) of SNs that are available at the CN. Close to perfect CSI at the SNs are available in many downlink (DL) channels, where a pilot signal can be employed for channel estimation. When a training sequence is transmitted by the CN, the large number of SNs can estimate their channel conditions. However, obtaining CSI at the CN requires feedback from each SN. If short-term CSI measurements of active SNs are fed back to the CN through the uplink (UL) channel, an opportunistic scheduler can use this information and receive packet from the SN with the best channel quality. Thus, the network throughput can be maximized by always serving the SN which has most favorable channel conditions in each time slot. Besides, the CN can initiate packet transmission which means that collisions can be completely avoided with perfect scheduling. Consequently, the overall system performance is maximized and the network lifetime is prolonged to the utmost limit.
In practice, the assumption of centralized access to CSI at the CN becomes harder to justify as the number of SNs increases or the wireless channel changes rapidly. Moreover, this requirement results in significant energy consumption, especially due to the fact that the SNs periodically feed back to the CN. Because of the constraints on the UL channel, the idea of using centralized scheduling in multiple access is inappropriate for WSNs. Therefore, there is a need to develop alternative strategies in a nonfeedback system where the CSI of the SNs are unknown by the CN. In this study, we assume that all the SNs can only estimate their own channels but are unaware of others, called decentralized CSI [7, 8]. We propose a threshold-based opportunistic MAC protocol for time slot assignment to the SNs. The proposed method enables the SNs to measure their channel qualities based on SNR and normalized SNR (NSNR) metrics over the common pilot signal broadcasted by the CN. Then, each SN is authorized to send a packet autonomously, when its channel gain is above the predefined threshold. The optimum threshold is obtained through maximizing the probability of successful transmission in the same time slot. Hence, the scheduling of SNs are established without the assistance of the CN.
The remainder of the paper is organized as follows. Section 2 describes the system model. Section 3 discusses the motivation for designed MAC protocol and presents the related work. Proposed opportunistic packet transmission schemes are explained in Section 4. A clear description of the threshold optimization problem is also explained in this section. In Section 5, simulation results of the proposed schemes are presented, in terms of the channel state probabilities, throughput, energy efficiency, and fairness. Finally, the paper is concluded in Section 6.
Notation. The boldface is used for vectors. For a given vector , denotes the th element of the vector and denotes the Hermitian transpose of the vector. denotes the identity matrix. represents the Euclidean norm of the enclosed vector and denotes expectation operator. represents the circularly symmetric complex Gaussian random variable with mean and variance .
2. System Model
The system of interest is a single cell of the cellular WSN in which one CN serves SNs. The CN is equipped with antennas whereas each SN is equipped with single antenna. We assume that the CN is more powerful than the SNs in terms of signal processing and communication capabilities. Using multiple antennas at CN is justified by the fact that the power and size constraints of the CN are less stringent. The SNs are randomly deployed in an open field and connect into a WSN and periodically take samples from the environment and forward it through a direct link to the CN for further processing. The sensed data is encapsulated into blocks of symbols called packet and the packet transmission is slotted. Since SNs do not know when the convenient channel conditions will exist for packet transmission, their radio transceivers should be kept turned on at all time slots without any power-saving mechanism which operates alternately in sleep and awake modes. Then, the SN with strong channel gain transmits its own packet, while the SN with bad channel condition stays in an idle state until channel conditions become favorable to be scheduled at the UL channel. We also assume that the SNs are capable of applying adaptive coding and modulation, but the details of the underlying physical layer of WSN operation are beyond the scope of this study.
The channel vector between the th SN and the CN is denoted by vector and the elements of are independent and identically distributed (i.i.d.) adopting circularly symmetric, complex, Gaussian distribution whose mean is zero, and variance which is , . It is assumed that the channel is frequency-flat, block-Rayleigh fading (quasi-static) and the channel vector is considered to be constant over a fixed number of time slots called one frame and changes between different frames independently. In order to simplify the analysis, we accept that the channel statistics of all the SNs are the same. The packet transmission is characterized for the multiple access channel under the simplified collision model, it is meaning that single transmission means success and simultaneous transmissions result in collision. The maximum number of received packets per time slot is 1 for considered time division multiple access (TDMA) system and then the throughput of proposed schemes is limited with regard to the spatial dimension of channel. However, the throughput is a function of not only the average number of received packets per time slot but also the average SNR of successfully received packet. Therefore, the throughput gain is boosted by increasing the received packet's SNR as shown in Shannon's equation .
Proposed scheme consists of two iterative operations following one after another in time, that is, pilot signal broadcast in the DL phase and packet transmission in the UL phase, respectively. The DL and UL phases share the same frequency band with alternating time slots in time division duplex (TDD) system. Therefore, we assume the DL and UL channels are identical in two directions. As shown in Figure 1, the pilot signal broadcast time duration of the blocks of pilot symbols is usually smaller than the packet transmission time duration of the blocks of data symbols, where is the number of symbols in one time slot. At the beginning of each frame, the SNs capture their channel vectors at the channel estimation (CE) slot, but it is essential only for proposed NSNR scheme. The slotted channel structure requires time synchronization to align slot limits and thus a pilot signal (PS) is placed at the beginning of each slot. It is also assumed that the frame duration is less than the coherence time of the channel and the number of time slots in a frame is determined by the coherence time of the wireless channel.
2.1. Pilot Signal Broadcast in the Downlink (DL) Phase
The DL system model of the proposed packet transmission scheme is shown in Figure 2. In pilot signal broadcast operation, the randomly generated beamforming vector is sent out directly over the deployment area and each of the SNs measures its own channel gain. During a particular time slot , the CN forms the beam by choosing the random beamforming vector whose distribution is identical to the distribution of but normalized to keep the transmit power fixed, . The pilot signal with power is transmitted from the CN to the SNs. Hence, the received signal at the th SN may be written as where, is the circularly symmetric, complex, additive white Gaussian noise (AWGN) with distribution and is referred to as the composite channel process associated with the th SN. Note that, by randomly changing the beamforming vector at each time slot, the observed composite channel process of the th SN changes from time slot to time slot due to time-varying beamforming vector. Note that the time slot varying signals are denoted by notation.
We assume all the SNs have independent channels and the ratio of the transmit energy to the noise variance is 1. So, without loss of generality, the path loss together with all the other powers is lumped into the channel process. With these assumptions, the SNR of the th SN during time slot can be written as Similarly, the NSNR is defined as the ratio of the received SNR to the maximum SNR. The NSNR expression of the th SN can be computed as below where and the NSNR value is in interval. It is assumed that the SNs can measure their SNR and NSNR metrics based on the pilot signal but these metrics are unknown by the CN. We can take advantage of the MUD technique over the large network, in which there will be one of the SNs that experience good CSI metric compared with the others on formed random beam. If the channel vector of kth SN is matched with the beamforming vector (), this SN will attain its maximum possible SNR or NSNR value.
2.2. Packet Transmission in the Uplink (UL) Phase
The UL system model of the proposed packet transmission schemes is shown in Figure 3. In packet transmission operation, the SNs compare the calculated CSI metric with the predefined threshold. During a particular time slot , the data packet of the th SN which has CSI over the current threshold is denoted by and it is transmitted with the same energy with the pilot signal in the DL phase (). So, the received signal at the CN is written as where the vector represents the additive noise vector which has circularly symmetric, complex, Gaussian distribution with zero mean and covariance .
The signals received from all antennas of the CN are combined to improve the SNR of transmitted packet. The weighting vector in the UL phase is the same as the beamforming vector in the DL phase. The CN combines the received signals by multiplying the weighting vector . Hence, the combined signal at the CN is the weighted sum of the received signals at each diversity branch and it may be obtained as where . Hereby, the CN provides antenna-array gain to increase in the received power due to receive diversity and the packet transmission energy can be reduced in this way. Due to the channel reciprocity principle, we assume that the received packet's SNR in the UL channel is equal to the SNR of the th SN which has an SNR over the threshold in the DL channel given in (2). This fact, which is essential for the proposed method, is due to forming single beam at the CN and it would not be the case if multiple beams were formed.
Under the assumption of simplified collision model, there are three different channel states for SNs in the UL phase, namely, successful packet transmission, collision, and idle listening. If only one of the SNs transmits during a particular time slot, successful packet transmission occurs whereas simultaneous transmissions of more than one SN in the same time slot result in collision as shown in Figure 4. Otherwise, none of the SNs exceeds the threshold, an idle listening eventuates, and the CN will not receive any packet until the next transmission period. In our single-hop scenario, we assume that the energy consumption of the SNs in the idle listening period may be significantly lower than the energy consumption in the packet transmission period.
3. Related Methods
Opportunistic scheduling gives higher throughput in wireless networks than nonopportunistic algorithms like round-robin because priority is given to the users with the most favorable channel conditions. Some of the recent MAC protocols in wireless networks prompt the use of opportunistic scheduling that exploits the variations in channel conditions to improve the network throughput. This opportunistic approach can also be employed for WSNs as in [10–12]. But, since the characteristics of the WSNs differ from wireless networks in several ways, traditional MAC protocols are not suitable for WSNs without modifications. The driving motivation of this study is to investigate the benefits of opportunistic scheduling with limited MUD gain due to a lack of feedback on the UL channel. The proposed MAC protocol is specially tailored for applications that require higher throughput, adaptivity, and autonomy.
3.1. TDMA Scheme
The simple TDMA scheme which uses round-robin scheduling, which we call round-robin (RR) scheme, provides the highest short-term fairness when the time slots are allocated in rounds of time slots, where is the number of SNs . Then, the scheduled SNs do not have to contend for the shared medium nor worry about packet collisions since only the owner of the time slot is allowed to transmit a packet. The throughput of the RR scheme is given as  where is the exponential integral function .
Moreover, TDMA scheme with opportunistic scheduling takes advantage of favorable channel conditions in assigning time slots to the SNs. Accordingly, the time slots are assigned to the SNs that can maximize the network throughput within a round. In maximum SNR/NSNR scheduling, which we call Max-SNR/NSNR scheme, the CN assigns the current time slot to the th SN if and only if its instantaneous SNR/NSNR of the th SN is larger than that of all other SNs, or So, the received packet's SNR in the UL channel is equal to the SNR of the th SN which has the best channel conditions in the DL channel.
3.2. Maximum Likelihood Scheme
An opportunistic MAC protocol, which we call maximum likelihood (ML) scheme, was proposed in  which is very close to the work that we present here. The ML scheme defines the optimum threshold based on maximum likelihood decision rule. When an SN is in the beamforming configuration (), the beamforming vector matches the channel of the th SN and the SNR of the th SN is found as Otherwise, for the SNs that are not in beamforming configuration (), the SNR distribution is given by When the event that the th SN is covered by the beam is denoted by , the distribution of the SNR conditioned on the is given by Similarly, the distribution of the SNR conditioned on the complementary event is given by These two conditional distributions are exploited to derive the maximum likelihood rule. Then, the decision threshold is found as In ML scheme, whenever the SNR of a certain SN is above the threshold , the packet transmission from that SN to the CN takes place in WSN.
4. Proposed Schemes
The proposed packet transmission schemes opportunistically benefit from the channel gain threshold that depends on the channel quality measurements at the physical layer characteristics to regulate the packet transmission decision of SNs in MAC layer. The optimum threshold is determined to maximize the probability of successful packet transmission where only one sensor node transmits its packet in one time slot. This optimization is done by using two well known CSI metrics, SNR and NSNR, respectively. The operation of the proposed packet transmission schemes is summarized in Figure 5.
4.1. Proposed SNR Scheme
Due to its ease of implementation and computational simplicity, the SNR has been applied to many different applications in opportunistic systems benefiting from the MUD technique. The probability of any node having the SNR over the threshold is analyzed by the use of the probability density function (PDF) and corresponding cumulative distribution function (CDF) of SNR metric. The SNR metric in (2) has an exponential distribution therefore the PDF and CDF expressions are given by  respectively.
In a homogeneous WSN, the capability of each SN is the same and thus each SN transmits its own packet with the same probability distribution. The packet transmission probability is expressed as the probability of an SN having an SNR over the threshold. According to this PDF expression, the probability that one of the SNs has an SNR above the threshold is given by For successful packet reception, the probability for which only one SN has an SNR above the threshold (and all the others are below the threshold) may be written as follows: Thus, the optimum threshold which maximizes the successful packet transmission probability given in (16) can be found by setting its first derivative to zero and we obtain the optimum threshold as By using the optimum threshold , we find the successful packet transmission probability as
The system SNR is defined to be the SNR of the successful packet. The PDF of system SNR for proposed SNR scheme can be easily found as follows: Note that the value of system SNR is equal to zero with probability for idle listening or collision states. By substituting (16) and (17) into (19), we can clearly rewrite the PDF of system SNR where is the Dirac delta function and is the unit step function. Due to the Shannon capacity, the achievable throughput of the proposed SNR scheme can be found as where is the exponential integral function of first order . The evaluation of the throughput expression is also derived in Appendix A.
4.2. Proposed NSNR Scheme
In practice, average SNR of the SNs is different due to differences in distances to the CN. In this case, giving priority to the SNs with the good channel conditions causes unfairness in WSN. Instead of giving priority to the SNs that have SNR over the threshold, an alternative CSI metric can be considered that is normalized SNR (NSNR). Therefore, the resource allocation may be provided more efficiently. The PDF and CDF expressions of NSNR metric are given by  respectively.
According to this PDF expression, the probability that one of the SNs has an NSNR above the threshold is given by For successful packet reception, the compact form of the packet success probability in which only one SN has an NSNR above the threshold (and all the others are below the threshold) is written as follows: Then, the optimum threshold which maximizes the probability expression given in (24) can be found by setting its first derivative to zero and we obtain the optimum threshold as By using the optimum threshold , we find the successful packet transmission probability as Note that the successful packet transmission probability of proposed NSNR scheme is the same as the proposed SNR scheme’s successful packet transmission probability in (18).
As shown in Appendix B, the PDF of system SNR for the proposed NSNR scheme, which is denoted by , can be found to be where is the incomplete Gamma function . By substituting (25) and (26) into (27), we can clearly rewrite the PDF of system SNR Finally, the throughput of the NSNR scheme can be obtained by Due to the complicated form of the PDF of system SNR in (28), the achievable throughput of the proposed NSNR scheme is calculated numerically.
5. Simulation Results
In this section, the system performance of the proposed schemes is analyzed in terms of optimum threshold, channel state probabilities, throughput, energy efficiency, and fairness. To validate our analysis, the proposed schemes are compared to the ML scheme  and the RR scheme as introduced in Section 3. The performance evaluation is realized by using statistical (Monte Carlo) simulation for and cases separately when the average SNR is equal to one, . Here, the number of frames is chosen as 1000 to achieve an acceptable convergence. In order to provide fair comparison with the RR scheme, the number of time slots in each frame is at least the number of SNs in a WSN. The channels of the SNs are randomly generated and kept constant during a frame, while the beamforming vector is generated randomly in each time slot. We assume also that each SN has always a packet to transmit to the CN and the considered WSN is an ideal network in which the transmission of every packet is guaranteed and error free.
5.1. Optimum Threshold Analysis
The optimum threshold for the ML scheme, the proposed SNR, and NSNR schemes are obtained analytically as function of and parameters by (13), (17), and (25), respectively. The variation of the optimum threshold versus the number of SNs is shown in Figure 6 for and . In proposed SNR and NSNR schemes, the optimum threshold increases for larger numbers of SNs and it is meaning that the packet transmission can be made more selective. Contrary to the proposed schemes, the optimum threshold for the ML scheme does not vary according to the SN number. Similarly, Figure 7 shows the variation of the optimum threshold versus the number of antennas for and . When the number of antennas increases the optimum threshold is decreases for proposed NSNR scheme. But the number of antennas does not affect the optimum threshold for proposed SNR scheme. Note that the optimum threshold for ML scheme increases linearly with increasing number of antennas.
5.2. Channel State Analysis
As mentioned before, the SNs with channel quality above the threshold are allowed for packet transmission, while all the others remain silent. Figure 8 shows the probability of successful packet transmission versus the number of SNs for and . Similarly, Figure 9 shows the probability of successful packet transmission versus the number of antennas at the CN for and . Note that, packet success rate does not vary significantly with change in the number of SNs and also the number of antennas for proposed schemes. Besides, proposed schemes perform better than the ML scheme for all cases and the ML scheme has acceptable success only in a WSN that consists of a small number of SNs up to 10 and the number of antennas at the CN range of 10 to 12.
Sometimes none of the SNs exceeds the threshold where the WSN is in an idle listening mode. Even though SNs do not consume excessive energy, idle channel reduces the expected number of successful packets. Figure 10 shows the probability of idle listening versus the number of SNs for and . Similarly, Figure 11 shows the probability of idle listening versus the number of antennas at the CN for and . Proposed schemes have almost constant probability of idle listening for different number of SNs and different number of antennas. Note also that the idle listening probability increases with the increasing number of antennas in the ML scheme.
The useless energy consumption of the SNs is highly dependent on the number of collisions. Energy waste due to frequent collisions can significantly decrease the SN's lifetime. As shown in Figure 12, the collision probability of the proposed schemes is less than that of the ML scheme for and . Similarly, Figure 13 shows the probability of collision versus the number of antennas at the CN for and . The collision probability of the proposed schemes is less than that of the ML scheme when the number of antennas is lower than 10.
On the other hand, the RR scheme has constant channel state probabilities in all cases. In RR scheme, the CN receives all of the packets transmitted over the WSN without collision and the packet success rate is equal to %100. Therefore, the collision and idle listening cases are completely avoided through the RR fashion.
5.3. Throughput Analysis
In this section, we derived the throughput gains of the proposed schemes, evaluated them numerically, and compared to the other schemes mentioned in Section 3, namely, the ML scheme, the RR scheme, and the Max-SNR/NSNR schemes. Figure 14 shows the throughput performance of proposed schemes versus the number of SNs for and . According to these results, proposed SNR scheme has the best throughput performance, while the ML scheme has the worst. Throughput of proposed schemes increases with the increasing number of SNs due to the multiuser diversity gain. However, throughput of the ML scheme suffers when number of SNs is large. Note that the analytical results obtained using (21) and (29) perfectly match with the simulation results. It is also clearly shown in this figure that the proposed SNR scheme has better throughput than the RR scheme when the number of users is above 25.
Similarly, Figure 15 shows the throughput performance of proposed schemes versus the number of antennas at the CN for and . It is observed that increasing the number of antennas at the CN does not increase the throughput in proposed SNR scheme. On the contrary, as the number of antennas at the CN increases, throughput gain increases in proposed NSNR scheme. The ML scheme achieves optimum throughput for 10 to 12 antennas at the CN when there are 100 SNs in the WSN, even though this throughput performance is still low compared to proposed schemes. It is also clearly shown in this figure that the proposed NSNR scheme has better throughput than RR scheme when the number of antennas is above 8. On the other hand, the Max-SNR/NSNR schemes have more powerful throughput performance by using advantage of the feedback from SNs.
5.4. Energy Efficiency Analysis
In , the energy efficiency is defined as the ratio of the number of successful transmissions over the number of transmission attempts. According to this definition, the energy efficiency is related to the minimization of packet loss due to collision. Proposed schemes optimize the probability of successful packet transmission; therefore they are expected to have good performance in terms of energy efficiency. Figure 16 shows the energy efficiency versus the number of SNs for and . As seen from this plot, when the number of SNs increases, the energy efficiency of proposed schemes stays around about %58. Figure 17 shows the energy efficiency versus the number of antennas at the CN for and . When the number of antennas increases, the energy efficiency of the ML scheme increases and beats the proposed schemes. But successful packet probability and throughput is very low for high number of antennas in ML scheme and the increment of energy efficiency resources from the high idle listening probability. Although not shown in these figures, the RR scheme has %100 energy efficiency, where all of the packets are received successfully.
5.5. Fairness Analysis
The throughput maximization could cause unbalanced use of the network resources. In order to improve the service quality, the fairness among the SNs should be maintained. In this study, the fairness is defined as the ratio of the number of SNs successfully transmitting at least in one time slot to the total number of SNs. We measure fairness in the case where the total number of time slots is equal to the number of SNs in the WSN. Therefore, if a different SN transmits successfully in each time slot then the fairness will be %100 as in RR scheme. As seen in Figure 18, the fairness decreases with the increasing number of SNs for the proposed SNR scheme and the ML scheme for and . Note that, the proposed NSNR scheme has best fairness, while the ML scheme has the worst. In Figure 19, the fairness is plotted as a function of different number of antennas at the CN for and . The fairness of the proposed NSNR scheme is still the best among the others, although it remains almost constant. Besides, the ML scheme has the worst fairness, but it is comparable to the proposed SNR scheme for 10 to 12 antennas at the CN.
In this study, we employed an opportunistic packet transmission strategy to exploit MUD gain without the UL feedback channel in an autonomous manner. We proposed a threshold-based opportunistic MAC protocol for WSNs that operates on simplified collision model. Each SN is allowed to transmit only when it has a strong channel gain. The optimum threshold is determined to maximize the probability of successful packet transmission where only one SN transmits packet in the same time slot. Simulation results were provided to show the performance of the proposed schemes. It was shown that the proposed SNR scheme provides higher performance in terms of throughput, while the proposed NSNR scheme achieves better fairness at the cost of a slight performance loss. The simulations also indicate that our implementation achieves higher system performance than existing work in  through better optimization of channel gain threshold. We furthermore compared the throughput performance of the proposed MAC protocol with the simple TDMA-based MAC protocol which uses round-robin scheduling. According to obtained results, the proposed SNR scheme also provides higher network throughput than RR scheme as more SNs being deployed. Another important attribute of the proposed MAC protocol is the scalability to the change in network size. In practice, some SNs may die over time and some new SNs may join the WSN later and the time-varying nature of the network size does not affect the performance of the proposed method due to preferred optimization framework. Whereas if the number of SNs dynamically changes in the RR scheme, the scheduling process must be readapted.
A. Derivation of the Throughput for Proposed SNR Scheme
In this appendix, we briefly describe the derivation of the throughput for proposed SNR scheme in (21). We can write the throughput expression as By using the identity , we get the desired expression as and substituting (16) and (17) into (A.2), the throughput is found as follows:
B. Derivation of the PDF of System SNR for Proposed NSNR Scheme
For the proposed NSNR scheme, the system NSNR, which is denoted by , is defined to be the NSNR of the single SN above the threshold and its value is zero for idle listening or collision. The PDF of system NSNR for NSNR scheme can be expressed as follows: where is the Dirac delta function and is the unit step function. Note that due to the Dirac delta function system NSNR is equal to zero with probability . As seen from (2) and (3), the system SNR is calculated by multiplying the system NSNR with the . In order to derive the system SNR for the NSNR scheme, we need to use the Chi-square PDF of the given as follows : The product is a continuous random variable whose PDF can be found using Plugging (A.1) and (B.2) into (B.3), we obtain Finally, the PDF of system SNR for the proposed NSNR scheme can be obtained as follows:
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–105, 2002.
- C. Van Phan and J. G. Kim, “An energy-efficient transmission strategy for wireless sensor networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '07), pp. 3408–3413, March 2007.
- K. Kredo and P. Mohapatra, “Medium access control in wireless sensor networks,” Computer Networks, vol. 51, no. 4, pp. 961–994, 2007.
- W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proceeding of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), pp. 1567–1576, usa, June 2002.
- R. Knopp and P. A. Humblet, “Information capacity and power control in single-cell multiuser communications,” in Proceedings of the IEEE International Conference on Communications (ICC '95), Gateway to Globalization, vol. 1, pp. 331–335, Seattle, Wash, USA, June 1995.
- P. Viswanath, D. N. C. Tse, and R. Laroia, “Opportunistic beamforming using dumb antennas,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1277–1294, 2002.
- D. Wang, H. Minn, and N. Al-Dhahir, “A distributed opportunistic access scheme and its application to OFDMA systems,” IEEE Transactions on Communications, vol. 57, no. 3, pp. 738–746, 2009.
- Y. Yu and G. B. Giannakis, “Opportunistic medium access for wireless networking adapted to decentralized CSI,” IEEE Transactions on Wireless Communications, vol. 5, no. 6, pp. 1445–1455, 2006.
- C. Shannon, “A mathematical theory of communication,” Tech. Rep. 27:379, Bell System Technical Journal, Paris, France, 1948.
- P. Coronel, S. Furrer, and W. Schott, “An opportunistic energy-efficient medium-access scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '05), vol. 2, pp. 1082–1086, May 2005.
- H. Jeon, J. Choi, H. Lee, and J. Ha, “Channel-aware energy efficient transmission strategies for large wireless sensor networks,” IEEE Signal Processing Letters, vol. 17, no. 7, pp. 643–646, 2010.
- P. Venkitasubramaniam, S. Adireddy, and L. Tong, “Opportunistic ALOHA and cross layer design for sensor networks,” in Proceedings of the IEEE Military Communications Conference (MILCOM '03), vol. 1, pp. 705–710, October 2003.
- V. Hassel, M. R. Hanssen, and G. E. Øien, “Spectral efficiency and fairness for opportunistic round robin scheduling,” in Proceedings of the IEEE International Conference on Communications (ICC '06), vol. 2, pp. 784–789, July 2006.
- F. Florén, O. Edfors, and B. A. Molin, “Throughput analysis of three multiuser diversity schemes,” in Proceedings of the 57th IEEE Semiannual Vehicular Technology Conference (VTC '03), vol. 4, pp. 2686–2690, April 2003.
- I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, Translated from the Russian, Translation edited and with a preface by Alan Jeffrey and Daniel Zwillinger, Elsevier/Academic Press, Amsterdam, The Netherlands, 7th edition, 2007.
- N. Sharma and L. H. Ozarow, “A study of opportunism for multiple-antenna systems,” IEEE Transactions on Information Theory, vol. 51, no. 5, pp. 1804–1814, 2005.
- M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, Dover, New York, NY, USA, 10th edition, 1964.