ISRN Sensor Networks

Volume 2012 (2012), Article ID 452981, 17 pages

http://dx.doi.org/10.5402/2012/452981

## Dynamic Architectural Reconfiguration Algorithms and Transmission Protocols for Clustered Sensor Network Topologies with Prioritized Data

^{1}Electrical Engineering Department, University of Colorado Denver, Denver, CO 80217, USA^{2}Computer Science Department, Oklahoma State University, Stillwater, OK 74078, USA

Received 14 May 2012; Accepted 4 June 2012

Academic Editors: A. Alomainy and S. Ozdemir

Copyright © 2012 Fatma Salem et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

The objective of a sensor network is the execution of specific signal processing functions on data that are collected in a distributed fashion. The transmission of the data is facilitated by protocols whose operations may be constrained by physical limitations of the network units, while their performance must simultaneously comply with the performance requirements of the deployed signal processing operations. At the same time, the network architecture affects the performance of both the signal processing and the data transmission operations, while some of the sensors may generate high-priority data. In this paper, we consider clustered sensor network topologies deploying a specific stable random access transmission algorithm per cluster, which facilitates high-priority data. We then introduce a dynamic architectural reconfiguration algorithm which controls individual cluster rates for optimal overall network performance. The latter algorithm is facilitated by a high-level traffic rate monitoring protocol.

#### 1. Introduction

Wireless sensor networks satisfy signal processing objectives; their performance metrics are thus determined by those of the latter objectives [1]. When time constraints are imposed on high-accuracy signal processing operations, the consequence is increased required overall data rates. At the same time, in wireless sensor networks, observation data are transmitted via appropriate multiple access protocols [2–5], whose performance is a function of the their input data rates, and are collected and processed by life-limited nodes, whose life span is a function of the data rates they process, [6–9]. Thus, required overall data rates, in conjunction with rate-dependent transmission protocol performance and node life spans, necessitate network-architecture and network-operations adaptations, so that the nodes’ survivability limitations do not interfere with the required network overall performance [10, 11]. Since the network-architecture and network-operations adaptations are functions of the acting data rates, it is eminent that data rates be monitored and that rate changes be detected accurately and rapidly [12].

The distinguishing feature in wireless sensor networks is limited life spans of the nodes, induced by energy consumption. Interesting results focusing on energy consumption have been obtained by several researchers: Bounds on energy conservation techniques have been derived in [13], role assignments targeting energy conservation have been developed in [10], energy conservation routing techniques have been proposed in [7, 8, 14], and issues arising due to energy conservation have been discussed in [14]. In addition, topological and node-cooperation issues have been included in [11, 15], while approaches to performance monitoring have been presented in [16]. An interesting rate allocation algorithm has been presented in [9], which is based on a modification of the max-min routing in [17] and the lexicographic linear programming approach in [18]. In [12], a dynamic rate allocation methodology has been presented that is facilitated by a powerful data rate monitoring algorithm. In [19], energy-efficient clustering algorithms are proposed, including a discussion on LEACH approaches, where energy consumption is assumed to be strictly a function of geographical distances and where transmission collisions are completely ignored. Considering transmission protocols, those proposed or partially implemented (in ZigBee, IEEE802.15.4, etc.) within the random access class are ALOHA-based and are characterized by well-known instabilities that pull the throughput down rapidly to zero, as the user population increases.

In this paper, we consider clustered sensor network topologies containing many randomly distributed sensors some of which may generate high-priority data. We deploy specific stable random access transmission protocols per cluster, that facilitate high-priority data. Data rates are time-varying in such a network, mainly due to expiring life-limited nodes. We focus on the problem of dynamic architectural reconfigurations, facilitated by a data rate monitoring higher-level protocol. The organization of the paper is as follows. In Section 2, we present the system model and the problem formalization. In Section 3, we propose an architectural reconfiguration algorithm. In Section 4, we describe and evaluate a data transmission random access protocol that we recommend for deployment in each cluster. In Section 5, we summarize the data rate monitoring protocol used to facilitate the architectural reconfiguration process and discuss its performance. In Section 6, we discuss overall system issues. In Section 7, we include numerical results. In Section 8, we draw conclusions.

#### 2. System Model and Problem Formalization

We consider a clustered network architecture, as in [9, 12], shown in Figure 1. The components in the architecture are microsensors, microsensor clusters, and a backbone network of cluster heads and a fusion center. In [9, 12], the microsensors, the cluster heads, and the fusion center have been, respectively, termed microsensor nodes (MSNs), aggregation and forwarding nodes (AFNs), and base station (BS). We will use the same terminology for consistency. Given a predetermined signal processing objective, the MSNs, AFNs, and BS perform the following functions. (a) The MSNs are grouped into distinct clusters, where each cluster contains a single AFN. Each MSN collects local data and transmits them to its local AFN, via some multiple access transmission protocol implemented on a distinct channel associated with the AFN, that is, the overall network encompasses distinct separate channels (e.g., distinct frequency bands), each associated with a single AFN. Since the identities of the sensors contained in each cluster are time-varying due to possible sensor expirations and to possible subsequent architectural reconfigurations, the unknown user population model per cluster arises dictating the deployment of multiple access protocols from the random access class (RAs) [2–5, 16]. We will further elaborate upon this concept in Section 4. The AFNs and the BS are connected via separate channels (or frequencies) comprising the backbone network. Commands regarding routing adaptations in the latter network and system architectural reconfigurations propagate through the backbone network and do not interfere with the MSN transmissions. Possible reconfiguration broadcasts to MSNs are implemented via their local AFN, either on separate channels (frequencies) or on dedicated minislots of the MSN transmission channel(s) and do not interfere with the MSN transmissions. The MSNs are of low cost and low energy; thus, short-life devices, and some of them generate high-priority data that must be received by the corresponding AFNs in relatively short time. (b) Each AFN collects the data sent by its local MSNs and processes them, using an operation determined by the network signal processing objective [1]; it also receives processed data sent by other neighboring AFNs. The AFN then processes the compounded processed data, utilizing an operation that is determined by the network signal processing objective [1], and transmits the outcome to selected neighboring AFNs or the BS. The AFNs have processing capabilities and are devices with energy and life spans that are much higher than those of the MSNs; their life spans and energy are still limited, however. (c) The BS fuses data transmitted to it by neighboring AFNs, utilizing an operation that is determined by the network signal processing objective [1]. The BS has practically unlimited life span and processing power.

The MSNs transmit to their assigned AFN via an RA protocol. Operations are performed at all nodes of the backbone network: at the AFNs and the BS. The nature of the operations is determined by the network signal processing objective, the environment that generates the data, and the data rates [1]. At the same time, the energy consumption of the AFNs is a function of the data rates they receive and produce, and the complexity of the operations they perform. Each AFN performs operations on its input data rates, to produce the data rates it outputs to neighboring AFNs and/or the BS. Let us define the notation shown in Table 1.

We will assume that the MSNs per cluster are spatially randomly and independently distributed, and their number is large. In addition, their life span is short; thus, each MSN basically transmits a short-duration data message/or signal and expires. This, gives rise to a limit Poisson data packet user model per cluster [3], that is, the cluster user model reflects infinitely many independent Bernoulli users, each generating a single data packet, where an overall Poisson data packet traffic is induced.

##### 2.1. The Static Problem

We initially consider the static problem stated in [9, 12]. The network signal processing objective is specified, the network architecture is fixed, the data environments and the RA transmission protocols are known and unchanged, the operations performed by the AFNs are determined and the data rates generated in the clusters are fixed. Given, in addition, the time constraint , for the completion of the signal processing objective, the performance of the network will be maximized when the maximum number of data is fused in time length [9]. Since the fusion operation is performed by the BS and since the maximum number of data in corresponds to the maximum attainable data rate, maximum network performance is then attained when the data rate in Table 1 is maximized. A generally nonlinear dynamic programming problem is then formalized to determine the optimal routing protocol in the backbone network comprised of the AFNs and the BS. This is known as the *static rate allocation* problem [12, 20].

##### 2.2. The Dynamic Problem

The network is required to complete its signal processing objective within time units. During this time period, some MSNs generally expire, since their life spans are only fractions of the time period . This causes changes in the cluster data rates , and thus induces dynamics, first in the rate allocation problem, and then in network architectural configurations. Specifically, the rates may generally change during the time period, when the network operates towards the satisfaction of its objective. For rate changes that are relatively modest, a dynamic rate allocation problem arises: if such changes of the rates can be detected, then the constants of the static rate allocation problem will be adjusted accordingly, and the new data rate allocations will be then dictated by the solution of the adjusted problem. For more dramatic detected rate changes, the satisfaction of the overall system performance requirements may necessitate network architectural reconfigurations. To detect changes in cluster data rates, an algorithm must be devised, that detects changes accurately and rapidly. Such algorithm will be deployed at the AFNs, as an upper level protocol, it will detect changes and will communicate them across the AFNs. Then, either a static rate allocation algorithm on the unchanged network architecture will be initiated that uses the newly detected cluster rates as constants, or an architectural network reconfiguration will be implemented with a matching rate allocation technique. The data rates required for the communication among the AFNs will be a fixed algorithmic characteristic, they will be added as a permanently fixed constants in the functions that interrelate network data rates [12] and will not interfere with the dynamics of the resulting rate allocation and architectural reconfiguration problems. The important performance characteristics of the rate monitoring algorithm are accuracy, speed, and stability: the detection time induced by the algorithm (convergence rate) compounded by the time to solve the static rate allocation and architectural reconfiguration problems must be shorter than the time taken for actual changes across the network (rate changes), while false detections must simultaneously occur infrequently.

#### 3. An Architectural Reconfiguration Algorithm

The allowable values of the cluster data rates in the network are determined by the throughput/delay characteristics of the transmission random access (RA) algorithms deployed in the clusters. Specifically, given the cluster transmission RA algorithm, the highest allowable cluster data rate should be such that the induced delays and retransmissions are nondetrimental to the network mission, in the sense of causing the expiration of an unacceptable percentage of MSNs. We will elaborate upon this concept in Section 4. We note that algorithmic delays induced by RAs are dependent on their algorithmic throughput. Thus, the cluster data rates are all bounded from above by bounds determined by the characteristics of the per cluster deployed transmission protocols from the MSNs to the corresponding AFN. In addition, as induced by the deployed transmission algorithm, when the data rate in a cluster drops below a certain level, the existence of the cluster becomes wasteful, due to the then unnecessary induced increase in the size of the backbone network. Assuming that the transmission RA protocol per cluster is fixed, identical for all clusters and known, let us denote by and the common determined lower and upper bounds to each cluster data rate, respectively. If the aggregate data rate from all MSNs in the overall network is denoted by , the smallest possible number of clusters in the network is then , while the largest such number is then .

We will assume that a rate monitoring algorithm is deployed at the AFNs. When the data rates in all clusters remain within the range, then detected data rate changes dictate only rate reallocations in the backbone network of the overall structure, without any imposed architectural reconfigurations, as in [12]. When, instead, some cluster data rates fall outside the range then architectural reconfigurations are first imposed, dictated by an architectural reconfiguration algorithm, followed by data rate reallocations on the new backbone network topology, as dictated by the deployed routing algorithm. In this section, we focus on the architectural reconfiguration algorithm.

##### 3.1. The Algorithm

The original overall network architecture is based on the aggregate network data rate and the upper and lower rate bounds and determined by the transmission protocols in the clusters. In particular, assuming that transmission range is not a limiting factor in the geographical region covered by the network, . AFNs are originally deployed, each heading a cluster of MSNs with equal cluster data rates . The latter number of AFNs selected minimizes the size of the backbone network, subject to the rates per cluster remaining within the target range ; thus, it minimizes routing complexities and delays as well as network propagation delays. When the data rate monitoring algorithm detects that one or more cluster data rates fall outside the range, the architectural reconfiguration algorithm is initiated.

Let denote the sequence of time instants when network architectural reconfigurations are initiated, where denotes the time when the original network architecture is deployed, based on the principles stated in the above paragraph. Let be the aggregate network data rates at the instants , respectively, where . Assuming no MSN replacement during the time when the network objective is satisfied, the sequence of rates in is monotonically nonincreasing with increasing index . According to the above notation, denotes the *i*th time when the data rate monitoring algorithm detects that one or more cluster data rates fall outside the range. At , the architectural reconfiguration algorithm implements the following steps.

*Step 1. * The aggregate network data rate and subsequently are computed.

*Step 2. *(a) If , then, as compared to the network architecture at time , the architecture of the backbone network remains unchanged, while the MSNs are reallocated to formulate rate-equivalent clusters. The reallocation is initiated by the BS, broadcast to the MSNs by the AFNs, via logically separate channels than those used for MSN transmissions, and is implemented by each MSN independently via equiprobable selection among the active clusters. For the high-priority MSNs, the equiprobable selection will be among cluster groups, instead, as explained in Section 4. We note that MSN reallocation may be judged as inappropriate in cases where it may cause unacceptable increase in MSN extinction rate. This issue will be further discussed in Section 6.

(b) If , then some clusters are eliminated. The clusters are first ranked according to their aggregate local data rate, and clusters possessing the lowest such rates are eliminated. The survived AFNs are decided upon by the BS and become known to the MSNs via broadcasting. The MSNs are then reallocated among the survived clusters, for rate-equivalence. The implementation of the reallocation is as in (a).

#### 4. The Per Cluster Random Access Transmission Protocol

Due to the dynamically changing architectural reconfigurations in the considered sensor topologies, the identities of all sensors are not known to the AFNs at all times. Thus, the unknown user population model arises, where the sensors are the users in this case: the identity of each sensor becomes known to the system, only after the sensor accesses successfully some AFN. The only possible class of transmission protocols for the unknown user population model is the random access (RA) class [21]. In addition, within the RA class of transmission protocols, the only implementable stable subclass is the class of limited sensing random access algorithms (LSRAAs), where it is required that upon generation of a message, each user start monitoring the channel feedbacks continuously, until this message is successfully accepted for transmission [2–5]. We emphasize that the ALOHA-based protocols currently proposed (e.g., ZigBee, IEEE802.15.4, etc.) are unstable, leading to rapidly decreasing throughputs with increasing MSN rates.

As stated in Section 2, we assume a limit Poisson data packet user model per cluster. We will also assume a synchronous system, where all AFN channels are slotted synchronously across all AFNs, and where a slot is the time corresponding to the transmission of a single packet. In this model, each packet represents a separate independent user (separate MSN here); thus, any number of packets may simultaneously attempt transmission, unless organized by some protocol; an LSRAA, in this case.

As stated in Section 2, the MSNs in a single cluster transmit through a single channel (to their AFN) and overall system connectivity is attained via the backbone network. Due to the possible MSN mobility or the dynamics of the architectural topology, some MSNs may move across clusters, while they have a packet to transmit. At cluster boundaries, such MSNs are exposed to feedbacks from more than one cluster channels and have the capability to transmit through anyone of those channels. The latter phenomenon can be exploited to avoid temporary isolation of users moving across clusters, and especially to reduce their transmission delays while in transit across clusters. In addition, some MSNs may generate high-priority data, requiring accelerated transmission. We encompass boundary MSNs into the high-priority category and name them all *high-priority* MSNs. We name non-high-priority MSNs, *regular *MSNs. The following approach can be then taken: to each regular MSN assign as a single channel for its transmissions that corresponded to its local AFN. To each MSN that is of high-priority, provide the capability to monitor and possibly transmit through a group of channels, instead, associated with the corresponding group of AFNs. The MSNs can be then partitioned into two categories: the regular MSNs transmitting through a single local channel and the high-priority MSNs having access to several cluster channels. If we consider the environment where high-priority MSNs have access to *M* AFN channels, then incorporating the regular MSNs, classes of MSNs arise: (a) classes of regular MSNs, each class transmitting through one of the distinct *M* AFN channels and (b) the ()th class of high-priority MSNs that has access to all the *M* AFN channels. The objective is the design of limited sensing random access algorithms (LSRAAs) for the system that requires no knowledge of the system state by the users and present the high-priority MSNs with a delay advantage (compared to the non-high-priority MSNs), even when the traffic rates in the system change dynamically, while keeping the delays of the regular MSNs as low as possible. When architectural reconfigurations, as in Section 3, are in place, each regular MSN selects one of the AFNs equiprobably, while each high-priority MSN selects one *M*-size group of AFNs, equiprobably among all possible such groups, for their transmissions.

For the multichannel system considered in the above paragraph, let the *M* channels be indexed from 1 to *M*. Then, the regular MSNs assigned to channel *i* deploy a limited sensing random access algorithm, named LSRAAi, for their transmissions. For each of these LSRAAs, we adopt the class of limited sensing random access algorithms in [2] due to their simple operational properties and their performance characteristics: the algorithms are easily implemented in the limited sensing environment, they operate with binary (collision versus noncollision) feedback, they have superior resistance to feedback errors and in the presence of the limit Poisson user model they attain a throughput of 0.43. Throughput is here defined as the highest traffic rate for which the algorithmic system is stable, where within the algorithm’s stability region the traffic is maintained by the algorithm with finite delays. The high-priority MSNs in the system deploy the same LSRAA as that deployed by the local MSNs, in conjunction with a *selection policy* via which they choose their transmission channel. A selection policy may be either dynamic or probabilistic. The operations of a dynamic selection policy are dictated by the feedback sequences that the boundary MSNs observe. In contrast, a probabilistic selection policy is represented by a priori assigned probabilities. A probabilistic selection policy is simple, but it does not generally present the high-priority MSNs with significant advantage, especially in the presence of changing rates of the regular MSN traffics. In this paper, we propose a dynamic selection policy which does not require any a priori system state knowledge, and which indeed presents the high-priority MSNs with a significant delay advantage. The policy, which was first introduced in [4], induces light delay penalization for the regular MSNs, at the expense of a reduction in overall system throughput.

Considering an *M*-channel system as above, we assume that some synchronous LSRAA is deployed by all the MSNs in the system. In particular, (1) time is divided into slots of length equal to the duration of a packet, and the starting instants of the slots are identical in all channels. (2) Per channel, feedback per slot exists and corresponds to the outcomes induced by the local LSRAA. This feedback is binary, Collision (C) versus NonCollision (NC). (3) Each regular MSN is required to monitor the feedbacks from its assigned channel continuously, from the time it generates a new packet to the time that this packet is successfully transmitted. We initially assume that no propagation delays and no forward or feedback channel errors exist in the system.

We also assume that each high-priority MSN receives the feedbacks from all channels correctly and without propagation delays. At the time when a high-priority MSN generates a new packet, it starts monitoring the feedbacks from all channels continuously, until it decides to join the operations of one of the LSRAAs for the transmission of his packet. Upon this decision, it maintains the continuous monitoring of only those feedbacks that correspond to the LSRAA it chose, until its packet is successfully transmitted.

The regular MSN populations for each channel and the high-priority MSN population are all modeled as limit Poisson. That is, it is assumed that the regular data packet traffic , , is a limit Poisson process with intensity , , and that the data packet traffic generated by the high-priority MSNs is another independent limit Poisson process with intensity . As an interesting remark, for a large class of LSRAAs, including that considered in this paper, the limit Poisson user model provides a lower bound in performance within the class of identical and independent users whose packet generating process is memoryless.

##### 4.1. The Algorithm for the Two-Channel System

We assume that the two LSRAAs in the two-channel system are identical and belong to the class of window algorithms in [2], all of which induce throughput 0.43 and operate with binary feedback.

Upon generation of a new packet, a high-priority MSN imagines itself belonging to the systems of both LSRAAs and follows their algorithmic steps until the first time that they enter a collision resolution event in one of them: the rules of this first entry are stated by the channel selection policy. Then, the MSN remains with the latter LSRAA system, until its packet is successfully transmitted.

Let time be measured in slot units, where slot occupies the time interval . Let denote the feedback that corresponds to slot for channel , , where and represent collision and noncollision slot for channel , respectively. The LSRAA for channel is implemented independently by each MSN in the system; its steps are dictated by the feedback sequence . Each regular MSN is assigned one of the channels a priori and thus observes only the feedback sequence corresponding to the latter channel. Each high-priority MSN observes, instead, the feedback sequences of both channels until it selects the channel which it will transmit its packet through. Below, we first explain the algorithmic steps implemented by each local MSN, dropping the channel index , for simplicity in notion.

Each algorithm in the class in [2] utilizes a window of size as an operational parameter and induces a sequence of consecutive collision resolution intervals (CRIs). The window length is subject to optimal selection for throughput maximization. Each CRI corresponds to the successful transmission of all packet arrivals within an arrival interval of length . The length of the CRI is determined by the number of MSNs in the window and the algorithmic steps of the collision resolution process. The placement of the -size window on the arrival access is determined asynchronously by the MSNs and is named the *examined interval *if the CRI. We will first describe the collision resolution process induced by the algorithm. Then, we will explain the process which determines the placement of the -size window per CRI.

The algorithmic class contains algorithms whose collision resolution process can be depicted by a stack with finite number of cells. Let us consider this algorithm in the class which can be described by a *K*-cell stack. Then, in the implementation of the collision resolution process, each MSN utilizes a counter whose values lie in the set of integers, . We denote by the counter value of some MSN at time . The different possible values of the counter place the user in one of the cells of a -cell stack. When its counter value is 1, the MSN transmits; it withholds at different stages otherwise. When a CRI begins, all MSNs in the -size window set their counters at 1; thus, they all transmit within the first slot of the CRI. If the window contains at most one packet, the first slot of the CRI is a noncollision slot and the CRI lasts one slot. If the window contains at least two packets, instead, the CRI starts with a collision which is resolved within the duration of the CRI via the following rules.

The MSN transmits in slot if and only if . A packet is successfully transmitted in if and only if and .

The counter values transition in time as follows: If and , then . If and , then . If and , then, .

For any given , the throughput of the algorithm is 0.43. This throughput is attained for different optimal window sizes , as varies. For . For .

From the above rules, it can be seen that a CRI that starts with a collision slot ends with consecutive noncollision slots, an event which cannot occur at any other instant during the CRI. Thus, the observation of consecutive noncollision slots signals the certain end of an CRI to all users in the system; it either signifies the end of an CRI that started with a collision or the end of a sequence of consecutive length-one CRIs. Therefore, a MSN packet that arrives in the system without any knowledge of the channel feedback history can synchronize with the system upon the observation of the first -tuple of consecutive noncollision slots. This observation leads to the asynchronous by the MSNs generating of the size- window placement on the arrival axis. Specifically, if a CRI ends with slot , the window of the next CRI is selected with its right most edge slots to the left of slot and it contains those packets whose *updates *fall in the interval . The *updates * of a packet are generated as follows. Let be the slot within which a packet is generated. Then define to be equal to . Starting with slot , the corresponding regular MSN senses continuously the channel feedbacks. It does so passively, until it observes the first -tuple of consecutive NC slots, ending with slot . If , the MSN participates in the CRI that starts with slot . Otherwise, it updates its arrival instant to and waits passively until the end of the latter CRI, ending with slot . If , the MSN packet participates in the CRI which starts with slot ; otherwise, the MSN updates its arrival instant by again and repeats the above process. In general, if denotes the sequence of consecutive CRI endings since the first -tuple of consecutive NC slots, the MSN packet participates in the *k*th CRI if and for all . In the latter case, denotes the beginning slot of the first after the packet’s arrival CRI whose examined interval the packet’s update falls into.

Each high-priority MSN observes both feedback sequences and and follows the evolution of both time sequences and and their corresponding sequences of updates. Given a high-priority packet, let denote the beginning slot of the first after the packet’s arrival CRI in channel whose examined interval the channel update of the packet falls into. Then, if , the packet enters a CRI within the LSRAA of channel 1 in slot and is successfully transmitted during its process. , instead, then the MSN packet joins a CRI in channel 2, in slot . If , then the MSN selects one of the local LSRAAs with probability 0.5. The evolution of the updates for each LSRAA and each high-priority MSN is exactly as those of the local MSNs. That is, the arrival sequences are always updated by and the -size window is equally divided between the two LSRAAs whenever .

##### 4.2. Expiration of MSNs during the Transmission Process

The MSNs that have a packet to transmit consume energy due to channel monitoring and due to retransmissions within the CRI which accommodates the transmission of the packet. If the energy consumed this way exceeds their limit, the MSNs expire and their generated packet is lost. We will assume that the energy consumed per single monitored channel slot is a constant, and so is the energy consumed per retransmission slot. Then, assuming the deployment of an *M*-channel system LSRAA, we form a linear expiration expression, as explained below. Let us first define the following: *β*: the amount of per MSN energy consumed by the monitoring of a single channel slot; *η*: the amount of per MSN energy consumed by a single packet (re)transmission; : the number of slots during which an MSN monitors both channels in the system; : the number of slots during which an MSN monitors a single channel in the system; *m*: the number of retransmissions during the CRI; *ξ*: the total energy stored in a single MSN for packet transmission.

Using the above notation, we assume that the MSN expires, with subsequent loss of its generated packet, if:

As first stated in Section 2, the MSN expiration, as given by expression (1), causes packet rejections and subsequent reduction of cluster traffic rates, where, as the number *M* of monitored by the high-priority MSNs channels increases, the life span of these MSNs decreases. Other causes of MSN expiration may be environmental hazards or random electronic failures. Regardless of the causes, MSN expirations may result in traffic rate reductions that dictate architectural reconfigurations.

##### 4.3. Algorithmic Analysis of the Two-Channel System

We index the two channels from 1 to 2. Then, for convenience in notation, we will refer to the regular MSNs in channel 1, the regular MSNs in channel 2 and the high-priority MSNs as subsystem 1, subsystem 2, and subsystem 3, respectively. In the algorithmic analysis, we will assume that the three subsystem traffics are mutually independent and that the user traffic in subsystem , is limit Poisson with intensity .

Consider either one of the local LSRAAs, whose operations are described in Section 4.1. Let us select the 3-cell algorithm among those in the class in [2]. In Appendix A, the algorithmic analysis of the 2-channel system is presented. This analysis includes stability, which provides the maintainable by the system traffic rates. In Table 2, we include the maximum rate ; maintained by the system, for varying and values as well as the maximum maintained symmetric rate for varying values. We also include the maximum rate ; maintained by the system, when . We note that due to the symmetries appearing in the system, for each fixed rate we only need to compute for values in the interval . In Figure 2, we plot the boundaries of the acceptable regions of maintainable traffic, parameterized by various values. Those boundaries are clearly symmetric around the 45° straight line and determine the stability regions for the algorithmic system.

From Table 2 and Figure 2, we observe that whenever is strictly positive, the sum is strictly less than 0.86, that is, strictly less than twice the throughput of each local LSRAA. The reason for this is twofold: (a) when , some percentage of the traffic generated by the high-priority MSNs is always assigned for transmission to an LSRAA already overloaded by local MSN traffic. This is true because the expected CRI length is upper bounded by the window size if the algorithm operates in its stability region, and it is slightly larger than if the system is temporarily overloaded. Thus, if the rate of the regular local MSN traffic is close to the algorithmic throughput, then the presence of high-priority MSNs results in overloading of the LSRAA. (b) The rate traffic sometimes uses the window size that is optimal for the local LSRAAs, while sometimes it uses the window , instead. This causes throughput reduction even in the absence of regular local MSN traffics. In fact, in the latter case the maximum such reduction results because a higher percentage of the overall system traffic uses then the suboptimal window size .

We point out that the stability regions in Table 2 and Figure 2 represent the case where the traffic is *maintained*, meaning that no MSNs expire. We also point out that when traffic is maintained, the collision resolution process induced by the deployed LSRAAs changes the traffic statistics, that is, when the input traffic is limit Poisson, the output traffic is not Poisson then, while it simultaneously maintains the input rate and can be closely approximated by a Poisson process.

The 2-channel algorithmic system induces regenerative points within its stability region. Thus, the regenerative theory, as applied in [4, 5], is applicable here as well, for the computation of the expected delays in each of the three subsystems. The details of this approach can be found in [4]. In Figures 3 and 4, we plot expected delays for two symmetric systems, with the systems’ 1 and 2 rates being equal to 0.1 and 0.3, respectively. From these figures, we observe that the delays of the high-priority MSNs are very little affected by their traffic rate and remain low, while the same delays for the regular MSNs are significantly increasing as the rate of the high-priority traffic increases. From the latter figures, we decide that: (a) below the rate region, the system is wasteful, and (b) above the rate region, the delays of the regular MSNs are unsatisfactory. Rate region reflects 0.15 rate per cluster and 33% of the total MSN population being high-priority MSNs. Rate region reflects 0.325 rate per cluster and 7.6% of all MSNs being high-priority MSNs. Referring to the architectural reconfiguration algorithm in Section 3 and the notation there, we may initially subsequently select and , between 0% and 10% of total traffic generated by high-priority MSNs.

As we will further discuss in Section 5, the selection of the and values should be finally tuned depending on the MSN expiration constants in (1).

##### 4.4. The -Channel System

In the *M*-channel system, with , the algorithms operate as in Section 4.1, with the following simple modification: when a high-priority MSN with a packet to transmit observes simultaneous beginnings of *N *CRls and its updates are within the examined intervals of all of them, it selects each one of the *N* LSRAAs with probability . The stability conditions for the *M*-channel case are along the same lines as in Theorem 4 in Appendix A. However, they induce interactions among the *M* LSRAAs, and the evolving recursions for their evaluation give rise to multidimensional couplings. It is possible to devise a simplified recursive methodology which will basically first decompose the *M*-channel system into lower-dimensionality subsystems, and then use these subsystems as units towards an overall system evaluation. Specifics on this methodology and throughput/delay results can be found in [4]. For , the delays of the high-priority users decrease, while, via expression (1) in Section 4.2, their life span simultaneously decreases. The latter tradeoff may weigh favorably towards the 2-channel system selection, for a considerable range of values for the constants involved in expression (1).

#### 5. The Data Rate Monitoring Protocol

As stated in Section 2, the architectural reconfiguration algorithm in Section 3 is facilitated by a high-level data rate monitoring protocol. In this section, we present the highlights of the algorithm that implements the latter protocol, as presented and fully analyzed in [12]. Isolating a single cluster in the system, we first denote by the data rate accessing the AFN of the cluster: this data rate encompasses MSN expirations, whose occurrence is explained in Section 4.2. We subsequently decide on the and rate values to be monitored, where 0.15 and 0.325 have been respectfully selected in Section 4.3. The objective is then to decide rate shifts from to . Below, we will summarize the generalized algorithm from [12], which monitors shifts among a set of rates.

The proposed algorithm is sequential, with its operational values updated at discrete, equally spaced, time instants , where the time interval between consecutive is a fraction of the life expectancy of MSNs. We name the time interval between two consecutive ’s, *frame.* Let us denote by the subsequence of the sequence such that is the beginning of time when the system starts operating, and is the *i*th after time instant (corresponding to the beginning of some frame) at which the monitoring algorithm decides that a shift in the acting rate has just occurred. Let us assume that, given any fixed rate , the cluster data arrival process is stationary, and let denote its *q*-dimensional distribution in frame lengths, that is, is the probability that, in a sequence of *q* consecutive frames, data arrivals occur in the first frame, and so on, with data arrivals finally occurring in the *q*th frame, given that the active rate is throughout. Let us assume that the distributions are well known for all ’s (or all ’s). Then, we propose the following sequential data rate monitoring algorithm, from [12], which traces consecutive data rate shifts.

##### 5.1. The Algorithmic System

(1) The monitoring algorithmic system is designed at rates . (2) Let at some the rate be decided as just starting, by the monitoring algorithmic system. Then, immediately (at ), a set of parallel algorithms starts operating. The *j*th such algorithm is monitoring a possible shift from the rate to the rate , where , sequentially, with adaptations occurring at beginnings of frames. The parallel algorithms use a reflective threshold at zero and a common decision threshold, . Let (0) denote the operating value of the algorithm monitoring shift at , when it starts operating; let denote its operating value at its *r*th adaptation step. Then, the operating values of the algorithm are sequentially updated as follows:
is then the first time after that one of the above algorithms *first* crosses the common decision threshold . If the latter algorithm is the one which monitors a shift, it is decided that the latter shift occurred and a set of parallel algorithms, each monitoring a shift from to one of the remaining rates, is immediately initialized. The latter algorithmic system has operational characteristics as those stated above, utilizing a common decision threshold .

A summary of the performance characteristics of the algorithm, taken from [12], is included in Appendix B. The algorithm induces correct decisions as well as false alarms whose relative relationship is controlled by the value of the selected decision threshold.

When the data rate monitoring algorithm is deployed for both architectural reconfiguration purposes and dynamic routing adaptations, as in [12], then, multiple rates are monitored and multiple parallel algorithms are simultaneously operating, as stated above. When focusing solely on the architectural reconfiguration problem, the data rate monitoring per cluster is implemented by a single algorithm as in (2) that monitors to possible shifts.

##### 5.2. The Algorithm for the Poisson Model

As explained in Section 2, the data generated by the MSNs in cluster may be modeled as cumulatively comprising a homogeneous limit Poisson process, with rate bits/time unit. As stated in Section 4.4, the traffic accessing the AFN of the cluster, while not Poisson then, it can be closely approximated by a Poisson process. The Poisson arrival process is memoryless: the conditioning in the log-ratio updating step of the algorithm is (2) then drops. If denotes the length of a frame in time units, the monitoring algorithm in (2) takes the following form: where denotes the number of transmitted data within the th frame from the beginning of the monitoring algorithm.

Let us define the following: where min. We may select rates such that are rational numbers for all and , and we then define the integers and , as follows:

The algorithmic thresholds can then all be selected as positive integers, and without lack in generality, the algorithmic adaptation in (3) can be transformed as follows: where

#### 6. Overall System Issues

As induced by the architectural reconfiguration algorithm in Section 3, when a shift is detected by at least one of the cluster data rate monitoring high-level protocols, the overall system reconfigures itself, where all MSNs reselect the AFN(s) that they will be connected to for their transmissions. This reselection halts the transmission process, until reconfiguration of the clusters is completed, causing interruptions of those transmissions that are in progress at the time of the halting. The latter transmissions need to be restarted by the corresponding MSNs, resulting in additional delays and retransmissions that may exceed the limit imposed by the low energy MSN characteristic, (see Section 4.3). Thus, architectural reconfigurations may cause increased MSN expiration rates. The so caused MSN expiration rate increase may be reduced if, Step 2(a) of the architectural reconfiguration algorithm in Section 3 is modified so that no cluster reselection by the MSNs occurs then, that is, in the case where the rate shift in one or a few clusters does not change the number of clusters in the system, the MSNs remain, instead, with the AFN(s) they were associated with before data rate shifts were detected, and do not interrupt any transmissions in progress. In the latter case, however, the overall system is not balanced: MSNs that are located in relatively overloaded clusters will suffer higher delays in their future transmissions, since they are not allowed to reallocate, at the risk of exhausting their life span. In summary, maintaining Step 2 in the Architectural Reconfiguration Algorithm, as described in Section 3, versus modifying it to exclude MSN reallocations induces a tradeoff between MSN expirations due to transmission interruptions and MSN expirations due to delays in relatively overloaded clusters. Given a specific clustered sensor environment, this tradeoff needs to be numerically evaluated, before a final decision regarding MSN reallocations in Step 2 of the architectural reconfiguration algorithm is made.

The false alarms induced by the data rate monitoring algorithm in Section 5 may occasionally dictate erroneous cluster reconfigurations and subsequent backbone network reductions. In particular, the monitoring algorithm may erroneously lead to the Step 2(b) case of the architectural reconfiguration algorithm in Section 3, imposing elimination of some clusters, while the actual overall network data rate has not been sufficiently reduced to necessitate such reduction. Implementation of cluster elimination will then result in traffic overloading of some clusters, with subsequent increase of the MSN expiration rate in them. The latter expiration rate increase must be evaluated against such increase due to the excessive routing and the propagation delays in the nonreduced backbone network, for the subsequent adjustment of the data rate monitoring decision threshold, in harmony with the per cluster boundary rates .

Given a member of the LSRAA class in Section 4, given the upper bound of the maintained data rate per cluster, given the MSN-expiration formula in (1), a specific value of the MSN expiration rate is induced. When the latter value is subtracted from , the result should be bounded from below by the data rate lower bound . In addition, if it is desirable that the MSN expiration rate, solely due to (1), be upper bounded, then, an upper bound to the value of is induced. As a conclusion, the pair of rate values are dependent on the MSN-expiration formula in (1).

#### 7. Numerical Results

We first simulated a two-cluster network, where the high-priority MSNs may transmit via either one of the two cluster channels. We assumed limit Poisson traffics generated by both the regular and the high-priority MSN populations, and we considered high-priority traffics from 0% to 10% of the regular traffics. We used the expression in (1) to model MSN expiration, with various values of the , and constants, while we adopted the LSRAA transmission protocol for two channels in Section 4. We simulated the two-cluster system and computed the resulting MSN expiration rates as well as the delay distributions of the successfully transmitted packets. In accordance with the results and the subsequent discussion in Section 4, we selected and , with 0% to 10% high-priority MSNs. We plot some of our results in Figures 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, and 16. We observe that, as expected, for fixed constant values , and , the expiration rates of all three subsystems converge to identical values, while the nonexpired nodes of subsystem 3 are presented with a substantial delay advantage. When the constants and increase, the rejection rates increase uniformly, at the benefit of substantial decrease in the delays of the nonexpired MSNs. We note that within our , and value selections, the only case where the effective transmission rate falls below the 0.15 per cluster value is that corresponding to , and .

We simulated the two channel system for the total per cluster traffic rate being the as selected above and for the high-priority traffic being between 0% and 10% of the per cluster regular traffic. We monitored the input to the two AFNs traffics deploying the high-level protocol in Section 5 and implemented the architectural reconfiguration algorithm in Section 3. We selected frame length equal to 11 units and we chose the integers and in (5) equal to 11 and 50, respectively. We selected the threshold value of the monitoring algorithm equal to 1000, via inspection of the power and false alarm curves induced by various threshold values. For the , and constant values used in Figures 5–16, we simulated the monitoring algorithm. In all cases, the monitoring algorithm detected the rate change correctly. In particular, it detected such a change only when it actually occurred, in the case of the , and constants selection. In the latter case, we computed the distribution of the decision delay for the to change, as induced by the monitoring algorithm. The result is exhibited in Figure 17. From the latter figure, we observe the effective response of the monitoring system.

#### 8. Conclusions

We presented an algorithm for the architectural reconfiguration of clustered wireless sensor networks, where power consumption per sensor is modeled as a linear function of retransmission and channel monitoring periods imposed upon it. The algorithm is based on per cluster cumulative rate control, in contrast to other existing cluster formation schemes (LEACH-based) that ignore the composite rate factor; it is facilitated by a distributed and highly efficient rate monitoring algorithm. We evaluated the algorithm for a system deploying a powerful stable random access transmission protocol that accommodates high-priority data transmissions. The latter protocol is limited sensing and stable, reducing effectively the high-priority delays, while simultaneously accommodating low-priority delays satisfactorily. In contrast, the existing alternative proposals for transmission protocols (e.g., ZigBee, IEEE802.15.4) are unstable with rapidly decreasing throughput, while they also do not accommodate high-priority data. The overall system proposed in this paper is robust and highly effective, controlling expiration rates and transmission delays with high efficiency.

#### Appendices

#### A. Throughput Analysis of the Random Access Transmission Protocol

Consider either one of the local LSRAAs, whose operations are described in Section 4.1. Let us select the 3-cell algorithm among those in the class in [2]. Consider some CRI within the system of the LSRAA, which starts with transmissions from packet arrivals in an arrival interval of cumulative length . We will call , the “length of the examined interval.” Let us then define the following: : given that the length of the examined interval is equal to , the expected number of slots needed for its resolution, that is, for the successful transmission of all the arrivals in the examined interval.Let denote the expected length of a CRI given that it starts with a collision of multiplicity . We can then write the following: since depends only on . In [2], and focusing on the 3-cell algorithm, we have shown that:(1) can be computed recursively;(2) is quadratically upper bounded.As found in [2], in the presence of the limit Poisson user model, each local LSRAA has then a throughput of 0.43, attained for window size . Thus, in view of the system considered in this paper, the Poisson intensities must satisfy the following necessary conditions, for overall system stability: The necessary conditions in (A.3) determine a hyperplane, which generally contains the region that determines the system throughput. Tight bounds on the space, which provide the system throughput, will be attained via the system stability analysis below.

We consider the evolution of the algorithms in the two-channel system, and we assume that the system starts operating at time zero. Let us consider the sequence in time of the CRls induced by the two LSRAAs in the system. Let the sequence be such that: (a) for each corresponds to the starting point of a slot which is the beginning of some CRI. We note that at , two CRIs may simultaneously begin; one for each of the two LSRAAs in the system. (b) is the first after time instant which corresponds to the beginning of some CRI. (c) , and at two CRIs begin; one for each of the two LSRAAs in the system.

Let be the subsequence of sequence which consists of those time instants when two CRIs begin simultaneously; one for each of the two LSRAAs in the system. Clearly, . Let denote the total length of the unresolved arrival intervals in subsystem , at the time instant . is then called “the lag of subsystem at time .” From the algorithmic operations in the system, we conclude the following: (a) and the values of are denumerable for all and . (b) . (c) At time , the LSRAA in cluster , examines two arrival intervals: one from subsystem which has length min and contains arrivals generated by a Poisson process with intensity , and one from subsystem 3 which has length min and contains arrivals generated by a Poisson process with intensity . (d) The triple () describes the state of the system at time , and the sequence is a three-dimensional irreducible and aperiodic Markov chain.

The stability of the system is represented by the ergodicity of the three-dimensional Markov chain , [20]. In addition, at time , the backlogs of each of the two LSRAAS and of the overall system are all represented by the three lags, . Given , the expected system backlog at time is , where is a Lyapunov function of the three systems lags . Let denote the state space of the Markov chain , and let us then define the operator called a generalized drift, as follows: Thus, the generalized drift in state is the expected change in backlog over one slot time, starting in state , and it can be used to establish necessary and sufficient conditions for the ergodicity of the Markov Chain [20]. To see that, let us define the following: where is the generalized Kaplan function on the Lyapunov function [22]. From the results in [1], we can then express the following proposition.

Proposition 1. *Assume that the following hold:*(i)*(ii)**there exist finite subset and some nonnegative finite constant such that
**Then,*(A)*if there exists a finite subset of , and some such that
then the Markov chain is ergodic;*(B)*if is a proper subset of such that
then the Markov chain is nonergodic.*

*Remark 2. * Condition (A.7) is trivially satisfied for Markov chains, which are uniformly downward bounded with respect to the Lyapunov function , that is, for Markov chains such that, , for all , for some positive and finite constant and for all in . In the problem studied in this paper, when , two decoupled systems arise. Each of those systems corresponds to a local LSRAA, whose lags at collision resolution points form a uniformly downward bounded Markov chain; the Lyapunov function reduces then to , for the system in channel , and the constant equals then .

We now express a lemma whose proof is as in Lemma 1 in [4].

Lemma 3. *Consider the Markov Chain and its Lyapunov function , and let be the state space of . Let and be as in (A.4) and (A.5), respectively. Then, *(i)*(ii)**there exist a positive finite constant and some finite subset of such that
*

Due to Lemma 3, and in view of the proposition, the search for the ergodicity versus the nonergodicity of the Markov chain reduces to the identification of appropriate properties for the satisfaction of conditions (A) and (B) in the proposition, respectively.

Consider , and let the lags be sufficiently long, so that in the time interval , each CRI from each of the two LSRAAs in the system, resolves an arrival interval of length Δ. Given system Poisson rates , and for as in (A.1), let us then define the following: : given , the number of CRIs generated by the algorithm in channel in [], when each CRI resolves arrival intervals of length Δ, from both its low- and high-priority users. The first such CRI starts at , and the last such CRI ends at . : The generalized drift in (2), for given Poisson rates , when, in [], each CRI generated by either algorithm in the system, resolves arrival intervals of length Δ. Then, via (3), we easily derive the following expression: where We note that in (A.12) is a generalized drift for the algorithm in cluster . We now state a theorem whose proof is as in Theorem 1 in [4].

Theorem 4. *
(i) Let there exist some such that the two conditions below are satisfied:
**Then, the Markov chain is ergodic at the Poisson rates .**
(ii) Let at least one of the two generalized drifts, , be nonnegative. **Then, the Markov chain is nonergodic at the Poisson rates .** The conditions (A.15) in the theorem define lower bounds on the regions for which the Markov chain is ergodic. Since the constant in (A.15) can be arbitrarily small, and in combination with the statement in part (ii) of the theorem, we conclude that the ergodicity bounds determined by (A.15) are tight.**In [4], a methodology regarding the computation of the values, for which the Markov chain is ergodic, is described, leading to the system stability regions.*

#### B. Performance of the Data Rate Monitoring Protocol

In this appendix, we summarize the performance of the data rate monitoring high-level protocol.

##### B.1. Performance Characteristics of a Simple Algorithmic System

Let us consider the distinct rates , and the corresponding arbitrary dimensionality distributions of the arrivals, as defined in the beginning of this section. For given rates , let the latter distributions be well known, and consider then the algorithmic system of algorithms, each monitoring a change from the rate to one of the remaining rates. The algorithm utilizes the observed per frame number of arrivals and the distributions and in its updating log-ratio steps (see (2) in Section 5), while the parallel algorithms utilize a common threshold . We now state a lemma that is included in [12].

Lemma 5. * Let the distributions satisfy mixing conditions as and consider the system of the parallel algorithms , from the time instant when they start operating. Let the rate be acting throughout the total observation time interval, and let then denote the stopping variable of the algorithm, given the decisive common threshold η_{k}, that is, is the random variable denoting the number of frames needed for the algorithm to first cross the threshold , when arrivals are generated by the distribution/process throughout. Then,
*

*where is the Kullback-Leibler number [1] of the distribution/process of , with respect to the process , subject to the existence of the latter number.*

As a direct consequence of (4), when the rate acts throughout, then, asymptotically (for ), the algorithm stops first, in the expected stopping time sense. That is, acting throughout, and :

If acts throughout, on the other hand, the expected stopping time of each algorithm is asymptotically of the same order with that of the threshold value.

The implementation of the algorithm is clearly determined by its nonasymptotic performance: its performance for finite values of the threshold . Given a threshold value , the performance of the () monitoring algorithm is basically characterized by two time curves: the power and false alarm curves, denoted, respectively, by and , where denotes the time instant , as in (B.1), and where : the probability that the monitoring algorithm crosses threshold before or at time , given that the acting rate is throughout, named power curve; : the probability that the monitoring algorithm crosses threshold before or at time , given that the acting rate is throughout, named false alarm curve.

##### B.2. Reinitialization Performance

Above, we summarized the performance of a simple single-shot system of parallel algorithms, that monitor a shift from a given rate to any one of the remaining rates. Incorporating the common threshold utilized by this system, we denote it . The algorithmic system in ([19, Section 5]) reinitializes each time it makes a decision. When the algorithm decides in favor of a rate , a new algorithm immediately starts and this process continuous on. The latter reinitialization process gives rise to stability issues: descriptively, the rate of the actual rate changes cannot be faster than the rate of algorithmic decisions. Below, we define stability in precise mathematical terms.

Let denote disjoint rate regions, respectively, centered around the rates . Let the traffic monitoring systems be designed at the latter central rates. Let denote the acting rates, where for all . Let us assume that the arrival processes are all memoryless, and let the process which generates the actual rate shifts, from some to some , be homogeneous Markov. Let for all . Let us then define the following: : the expected length, in time units, during which the rate is continuously acting; : the vector [].

Consider the sequence of time instants when shifts in rates are declared by the algorithmic system. Let denote the acting data rate, and let denote the rate decided by the rate monitoring system at . Let be the random variable denoting the data backlog at . Let be the random variable which denotes the distance from of the instant when started acting. Then, due to the memoryless and homogeneous Markov assumptions given above, forms a Markov chain. System stability corresponds, then, to ergodicity of the latter Markov chain [20], which by the way, is clearly uniformly downward bounded [20]. We now express a Lemma, stated in [12].

Lemma 6. * Let the data arrival processes be memoryless, and let the processes that generate the actual rate shift be homogeneous Markov. Let the algorithmic thresholds be such that ; for all . Then, the following sufficient and necessary conditions for the algorithmic stability hold, where is the Kullback-Leibler number as in Lemma 1, where
**Sufficient condition:
**Necessary condition:
*

The sufficient and necessary conditions for system stability in the above Lemma are asymptotic. In general, both asymptotic and nonasymptotic conditions relate rates of actual data rate changes to rates of convergence of the algorithmic monitoring system, for stability, where stability translates to maintaining the data traffics with finite delays (nonincreasing expected backlogs). All conditions basically require that acting high rates be bursty.

#### References

- D. Kazakos and P. Papantoni-Kazakos,
*Detection and Estimation*, Computer Science Press, New York, NY, USA, 1990. - A. T. Burrell and T. P. Papantoni, “A class of limited sensing random access algorithms with resistance to feedback errors and effective delay control,”
*Journal of Communications and Networks*, vol. 8, no. 1, pp. 21–27, 2006. View at Google Scholar · View at Scopus - P. Papantoni-Kazakos, “Multiple-access algorithms for a system with mixed traffic: high and low priority,”
*IEEE Transactions on Communications*, vol. 40, no. 3, pp. 541–555, 1992. View at Publisher · View at Google Scholar · View at Scopus - P. Papantoni-Kazakos, H. Delic, M. Paterkis, and M. Liu, “Transmission algorithms for a multi-channel packet radio system with priority users,”
*International Journal of Digital and Analog Communication Systems*, vol. 6, no. 4, pp. 193–212, 1993. View at Google Scholar · View at Scopus - M. Paterakis and P. Papantoni-Kazakos, “Simple window random access algorithm with advantageous properties,”
*IEEE Transactions on Information Theory*, vol. 35, no. 5, pp. 1124–1130, 1989. View at Publisher · View at Google Scholar · View at Scopus - I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,”
*Computer Networks*, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus - J. H. Chang and L. Tassiulas, “Energy conserving routing in wireless ad-hoc networks,” in
*Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '00)*, pp. 22–31, March 2000. View at Scopus - Y. T. Hou, Y. Shi, and H. D. Sherali, “On node lifetime problem for energy-constrained wireless sensor networks,”
*Mobile Networks and Applications*, vol. 10, no. 6, pp. 865–878, 2005. View at Publisher · View at Google Scholar · View at Scopus - Y. T. Hou, Y. Shi, and H. D. Sherali, “Rate allocation and network lifetime problems for wireless sensor networks,”
*IEEE/ACM Transactions on Networking*, vol. 16, no. 2, pp. 321–334, 2008. View at Publisher · View at Google Scholar · View at Scopus - M. Bhardwaj and A. P. Chandrakasan, “Bounding the lifetime of sensor networks via optimal role assignments,” in
*Proceedings of the IEEE Infocom*, pp. 1587–1596, June 2002. View at Scopus - R. Wattenhofer, L. Li, P. Bahl, and Y. M. Wang, “Distributed topology control for power efficient operation in multihop wireless ad hoc networks,” in
*Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies*, pp. 1388–1397, April 2001. View at Scopus - T. Papantoni-Kazakos and A. T. Burrell, “The implementation of dynamic rate allocation in sensor networks,”
*Journal of Intelligent and Robotic Systems*, vol. 58, no. 3-4, pp. 211–238, 2010. View at Publisher · View at Google Scholar · View at Scopus - D. M. Blough and P. Santi, “Investigating upper bounds on network lifetime extension for cell-based energy conservation techniques in stationary ad hoc networks,” in
*Proceedings of The 8th Annual International Conference on Mobile Computing and Networking*, pp. 183–192, September 2002. View at Scopus - Y. T. Hou, Y. Shi, J. H. Reed, and K. Sohraby, “Flow routing for variable bit rate source nodes in energy-constrained wireless sensor networks,” in
*Proceedings of the IEEE International Conference on Communications (ICC '05)*, pp. 3057–3062, May 2005. View at Scopus - V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, “Cooperation in wireless ad hoc networks,” in
*Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies*, pp. 808–817, April 2003. View at Scopus - A. T. Burrell and P. Papantoni-Kazakos, “Performance monitoring in sensor networks,” in
*Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG '09)*, pp. 607–612, Las Vegas, Nev, USA, April 2009. View at Publisher · View at Google Scholar · View at Scopus - D. Bertsekas and R. Gallager,
*Data Networks*, Prentice Hall, Englewood Cliffs, NJ, USA, 1992. - H. Luss and D. R. Smith, “Resource allocation among competing activities: a lexicographic minimax approach,”
*Operations Research Letters*, vol. 5, no. 5, pp. 227–231, 1986. View at Google Scholar · View at Scopus - S. Bandyopadhyay and E. J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks,” in
*Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies*, pp. 1713–1723, April 2003. View at Scopus - S. P. Meyn and R. L. Tweedie,
*Markov Chains and Stochastic Stability*, Springer, 1993. - A. Papoulis and S. U. Pillai,
*Random Variables and Stochastic Processes*, McGraw-Hill, New York, NY, USA, 4th edition, 2002. - M. Kaplan, “A sufficient condition for nonergodicity of a Markov chain,”
*IEEE Transactions on Information Theory*, vol. 25, no. 4, pp. 470–471, 1979. View at Google Scholar · View at Scopus