Wireless Communications and Mobile Computing

Wireless Communications and Mobile Computing / 2020 / Article
Special Issue

Wireless Internet of Things: Enabling Future Generation Connectivity and Communications

View this Special Issue

Research Article | Open Access

Volume 2020 |Article ID 8876705 | https://doi.org/10.1155/2020/8876705

Yansu Hu, Ang Gao, Changqing Wang, Wen Cao, Maode Yan, "The Lyapunov Optimization for Two-Tier Hierarchical-Based MAC in Cloud Robotics", Wireless Communications and Mobile Computing, vol. 2020, Article ID 8876705, 11 pages, 2020. https://doi.org/10.1155/2020/8876705

The Lyapunov Optimization for Two-Tier Hierarchical-Based MAC in Cloud Robotics

Academic Editor: Chaoyun Song
Received10 Apr 2020
Revised10 Jun 2020
Accepted20 Jul 2020
Published28 Aug 2020


Cloud robotics can largely enhance the robot intelligence by offloading tasks to the cloud dynamically. However, the robots differ in their own hardware configuration such as battery and processing capacity, while the transmission frames are also a mixture of different quality of service (QoS) requirements. As the competition for limited channel resource is inevitable, how to optimize the system performance by effective resource allocation is a key problem. The paper proposes a two-tier hierarchical-based MAC (Two-Tier MAC) which means the classification exists not only in frames but also in robots. The Lyapunov optimization technique is used to maximize the time-averaged quality satisfaction. The experiments show the superior performance of the Two-Tier MAC compared with other MAC protocols especially in overloaded networks. Meanwhile, the system also presents a longer lifetime because the Two-Tier MAC takes energy balance into consideration.

1. Introduction

Robotics is evolving from a single platform to cluster collaboration for the applications with high complexity, uncertainty, and real time. Although robots share information and cooperate with each other by a decentralized wireless network, the intelligence is still limited by their own hardware configuration. Cloud robotics [1] provides a novel concept to break the individual limitation in low intelligence and processing capacity. By means of the offloading task to cloud dynamically, robots get rid of the huge storage and intensive computing bottleneck.

As shown in Figure 1, the offloading task is divided into a series of flows and is processed on cloud hosts in parallel by virtualization technology. Task flows are then repacked by upper layers with header information and finally encapsulated into MAC frames in the data link. For enhancing the survival ability in complex environment, robots adopt a decentralized ad hoc network and contend for communication channel in the carrier sense multiple access/collision avoidance (CSMA/CA) mode.

As the competition is inevitable, how to allocate the limited resource to guarantee the QoS performance and maximize the total system utility is a big challenge for the offloading scenario. Frame differentiation is easily thought of. For example, simultaneous localization and mapping (SLAM) should enjoy a better real-time than environment monitoring application. However, robots themselves also differ in processing capacity, hardware configuration, task emergency, and so on which is often overlooked. Meanwhile, the network condition is time varying which is hard to predict. When the network is overloading, the system cannot support the QoS for all robots. The data arrival rate should be adjusted to avoid blocking.

For the problems above, the paper proposes a two-tier hierarchical-based MAC (Two-Tier MAC) to realize the classification on both frames and robots. The Lyapunov optimization technique as well as isolated time slots and admission control is adopted to maximize the system utility even in poor network condition. The main contributions are as follows:(i)The classification on both frames and robots is considered. All frames are divided into different priorities waiting in corresponding queues with isolated time slots to reduce collision consumption. Frames in the same queue but from different robots are allocated diverse accessing probability to ensure the energy balance(ii)The system optimization can be decoupled into two independent issues by the Lyapunov method. One is admission control (AC) in which the frames will be rejected when the network is overloading. The other is resource allocation (RA) to adjust the accessing probability to maximize the system utility function

The rest of the paper is organized as follows. Chapter II reviews related works. In Chapter III, the scheme of the Two-Tier MAC is detailed. The Lyapunov optimization method is described in Chapter IV. In Chapter V, a series of experiments are operated to test the effectiveness of the Two-Tier MAC. The conclusion and future work are illustrated in Chapter VI.

Since the widespread of heterogeneous, crosslayered “thin robots,” it is the best way to control the network transmission in the MAC layer or transceivers in the physics layer.

Some researches based on multiqueuing architecture have realized QoS support by assigning different queues with different resource or CSMA/CA parameters, such as contention window size, interframe space, active time, transmission power, TCP congestion window, and data rate [2, 3]. In specific, QoS-based MAC [2] adjusts the contention window for diverse QoS requirements and duty cycle to preserve sensory energy. PRIN-MAC [4] can minimize energy consumption and increase system throughput by varying the interarrival time according to the packets priorities. ASMAC [5] avoids overhearing and reduces contention and delay by asynchronously scheduling the wake-up time of neighboring nodes. RF-MAC [6] focuses on how the placement, chosen frequency, and number of RF energy transmitters impact the sensor charging time. CACC-MAC [7] is proposed for crosslayer congestion control by the dynamic TCP congestion window and MAC contention window scheme. The mechanism proposed in [3] operates QoS provisioning at the MAC layer for urgent traffic and provides data rate adjustment at the application layer. Each algorithm can improve QoS performance in certain scenarios. However, they are verified from the view of system realization or protocol design without theory analysis such as system stability and dynamic performance.

Based on this problem, we have tried to apply control theory in this area in recent years. FD-MAC [8] designs a less-step controller to provide proportional delay differentiated (PDD) QoS support. It adopts a linear model for system identification which is not precisely enough and without taking energy consumption into consideration. On this basis, CSFD-MAC [9] proposes a cascade self-tuning architecture as well as active power management, and MQEB-MAC [10] adopts a back propagating (BP) neural network to develop an all-in-one mixed QoS insurance and energy-balanced scheme. Although the algorithms above are verified to be valid by experiments, they still have the following limitations: Firstly, they only focus on the difference in frames but neglect the heterogeneity of the robots themselves. Secondly, channel condition is time varying, but few papers notice the system performance under poor channel conditions which is actually a common scenario in the wireless network. Thirdly, the mathematical model above is either too simple such as the linear system or low in real time such as the BP neural network.

3. System Model

3.1. Two-Tier Hierarchical Architecture

Figure 1 shows the Two-Tier MAC architecture for cloud robotics, and Table 1 exhibits all the variables present in the paper. There are robots, and all frames are divided into types waiting in the isolated queues without interference. Note that blocks with the same color come from the same robot, while blocks fulfilled with the same shape have the same frame priority.

Number of robots
Number of frame types
Size of contention window
Accessing probability of th frame type in robot
Total number of time slots in a duty-cycling
Number of time slots allocated to th frame
Arrival rate for th queue
Admission rate for th queue
Positive weight th queue
Utility function for th queue
Service rate for th queue
Data backlog for th queue
PHY transmission ratio for th robot
Class factor for th robot
Mathematical expectation
Fitness function
Normalized value of
Binary chromosome vector
Coding function
Decoding function

To avoid blocking, the arrival rate should be adjusted according to the channel condition. For example, if one queue is fulfilled, the robot should reject new corresponding arrived frames. Queues will be allocated different time slots according to the frame priority, and frames in the same queue are allocated diverse accessing probability according to robot classification.

3.2. Time Slot Isolation

Actually, the robots are power driven related to system lifetime. Isolated time slots are adopted to reduce the collision energy consumption. Frames contend for communication channel by the CSMA/CA mode, with the key algorithm that once the collision is detected, the node will wait for a random back off in the range of where is called the contention window. The more intensive a robot attempts to transmit frames, the higher the probability collision and retransmission occur, which will not only cause the unnecessary energy wasting but also induce a large end-to-end delay. Define to be the accessing probability, then

Figure 1 also shows a dynamic time slot isolation framework. There are time slots in total, and means the number of time slots allocated to the th queue (). Frames with the same priority content for channel medium in specified time slots are actually a kind of resource reservation mechanism to avoid the across-class contention. Data arrival rate of robots is independently and identically distributed (i.i.d). Without loss of generality, assume the data priority is prefixed or dynamically negotiated by high level protocol, and robots are classified by battery capacity.

3.3. Utility Function

In the th queue, suppose that the arrival rate and the admission rate are and , respectively. Although each frame expects a higher admission rate, it is still limited by data arrival rate, i.e.,

It is known that user experience and satisfaction follow logarithmic laws [11]. Since the normalized positive weight vector is prefixed by a high level protocol, the utility function for the th queue can be written as

3.4. Queuing Model

Define to be the data backlog (number of frames waiting in the queue) for the th queue at time . The queue grows with the admission rate and gets short with the service rate . According to the queue theory [12], the recursive formula of queue length is

As mentioned before, frames are with the same priority content for the channel medium in specified time slots in the manner of CSMA/CA. So the service rate mainly depends on both the time slots and accessing probability. For every robot, supposing PHY transmission ratio is , the class factor is , then the service rate iswhere is the accessing probability of the th frame type in robot . So there is

According to paper [13], an individual queue is the mean-rate-stable ifand a network is stable if all individual queues in the network are stable. In a real system, the mean rate stability implies that the long-term average departure rate from the queue is greater than or equal to the long-term average input rate injected into the queue, i.e., . Thus, all frames placed in the queue will be finally transmitted when the data queue is mean-rate-stable.

3.5. Problem Formulation

In summary, the utility function can be optimized by adjusting the time slots and accessing the probability dynamically. The problem can be described ass.t.where , , and are the optimized parameter vector/matrix to be solved. C1 constrains the admission rate which cannot exceed the arrival rate. C2 constrains the accessing probability which is in the range of [0,1], and the total value of different frame priorities in one robot at a time should equal to 1. C3 constrains the time slots which are limited by an upper bound for energy consumption, and C4 constrains the queue which is mean-rate-stable.

4. Lyapunov Optimization

4.1. Problem Transformation

The queue system should be stable, so the Lyapunov method is used to ensure the stability in the long term. Define the Lyapunov function as

Without loss of generality, assume all queues are empty when , i.e., . Lyapunov function drift is

The drift-minus-reward term has an upper bound according to Lemma 1.

Lemma 1 (see [14]). For any nonnegative real number , , and , there holds thatwhere is defined as a finite constant to simplify the inequation above, and is a nonnegative constant parameter that controls the trade-off between drift and satisfaction function. By the Lyapunov optimization technique, problem P1 can be transformed into minimizing the right-hand side (RHS) of (12) subjected to constraints C1-C4.

Furthermore, according to Equation (12), P1 can be decoupled into two subproblems: the first one is the admission control (AC) related to , which means the new frames will be rejected if the queue is full. The second one is the resource allocation (RA) related to and to guarantee the higher priority could enjoy a better QoS performance.

4.2. Admission Control

Due to the resource limitation, admission control is adopted to ensure that the QoS performance will not degrade below an acceptable level even in the overloading case. Based on Equation (12), the AC problem is formulated ass.t.

Easily verify that P2 is a convex optimization problem. Set the derivative of with respect to to be 0 to solve the service rate:

Since the admission rate is also limited by arrival rate, the optimal AC decision is

4.3. Resource Allocation

For the RA problem, both the time slots and accessing probability should be optimized to maximize P3:s.t.

P3 is nonconvex and may have several local minima, which make it different to find the closed-form solution. In recent years, some heuristic algorithms have been applied and proven to be valid. In this paper, the genetic algorithm (GA) as shown in Algorithm 1 is used for it can jump out of local minimal points and obtain the global optimization by finding a better artificial population iteratively.

Input: size of the population T, maximum generation G, crossover probability pc, mutation probability pm.
1 Initialization
2 Randomly initialize sets T of optimization’s variables as the initial population with constrains C2 and C3’
3 Coding into by function , i.e.,
4 Whiledo
5 Calculate the individual fitness according
6 Calculate the selection probability
7 Save the best fitness and the corresponding individual
8 If, then
9 Return
10 End
11 Selection: randomly choose T chromosomes as a new population by Roulette Wheel selection
12 Crossover: for every two pair of individuals in , take multi-point crossover at every gene position with probability
13 Mutation: for every individual in , take binary-reverse at every gene position with the probability
16 End
17 Return

For the unified value range of variables, take to replace original :

The fitness function is denoted as . Since , are interpreted into a binary chromosome by a 16-bit Gray code, each individual can be represented by a -bit-long binary vector, i.e., . The coding and decoding functions used in Algorithm 1 are defined as and , respectively. The superscript denotes the number of generations. The output of GA is , and can be adjusted by CW according to Equation (1).

Since P3 is nonconvex, it is hard to prove the convergence in a mathematical way. However, as shown in Figure 2, the GA algorithm can converge with a finite number of generations by simulation with different crossover probability and mutation probability .

5. Experiments and Results

The experiments are operated by ZigBit TM 900 hardware module with Atmel R AVR2025 software package. Specifically, ZigBit TM 900 is a 784/868/915 MHz IEEE 802.15.4 OEM module, while AVR2025 is a configurable MAC stack for ZigBit 900, which provides the fundamental abstract methods for hardware operation and a secondary development supported the MAC stack.

30 robots classified into 3 groups according to their battery configuration are deployed in the radius of 100 m. Every node randomly sends data packets to the other. Packets are encapsulated into MAC frames with 3 different priorities which are preset by upper layers as . A larger value means a better service.

The interval of frames obeys the normal distribution with the average of , where is the offered traffic normalized by service data rate. The frame length follows the Pareto distribution with the shape parameter of 1.1 and average of bits. The transmitted power is 1 mW, , . The average frame length is 105 bytes and the symbol rate is 256 kbps.

5.1. Static Performance

Static performance concerns the throughput, power consumption, and energy efficiency changing with time, which are related to system utility, lifetime, and data transmission efficiency, respectively. Energy efficiency is defines as

The experiments last 800 s, and 4 different MAC protocols (IEEE 802.15.4, FD-MAC, MQEB-MAC, and Two-Tier MAC) are compared.(1)During 0-200 s, it runs the original IEEE 802.15.4 MAC without any classification scheme(2)During 200-400 s, FD-MAC operates for frame differentiation. However, the throughput remains nearly the same, and the presented energy efficiency drops slightly. That is because in channel contention, energy is consumed once a node transmits whether or not the data is correctly received. FDMAC which makes a small CW size with high priority increases the collision probability, which will induce unwanted re-transmission and energy wasting(3)During 400-600 s, MQEB-MAC presents its advance in both throughput and energy efficiency because of the time slot isolation and BP self-tuning control. However, energy saving by only reducing the time slots allocated to soft QoS traffic limits further performance improvement(4)During 600-800 s, Two-Tier MAC takes over to maximize the system utility. Throughput is increased because of Lyapunov optimization, and the power consumption is reduced because of the time slot isolation scheme for avoiding across-class collision. As a result, the energy efficiency is largely improved compared with the other three MAC protocols, specifically, about 50.1%, 55.4%, and 23.8% enhancement compared with IEEE 802.15.4, FD-MAC, and MQEBMAC, respectively

Notice that for a specific MAC protocol, frames with high priority enjoy a large throughput but at the same time will lead to more power consumption. So no matter which frame priority, there is no big difference in energy efficiency of the same protocol (Figure 3(c)). The phenomenon will also be present in Section 5.2.

5.2. Statistic Performance

Figure 4 shows the statistic performance of the Two-Tier MAC on each robot. 30 robots are classified into 3 groups according to their battery configuration as shown in Table 2, and the factor is .

ClassificationRobot numberBattery configuration

Class 1No.01-no.102000 mAh/3.7 V
Class 2No.11-no.201800 mAh/3.7 V
Class 3No.21-no.301500 mAh/3.7 V

For one robot itself, the frames with different priorities are distinguished. Frames with a higher priority enjoy a better throughput which is in accordance with the results shown in Figure 3.

Among different robots, the ones in the higher class still have a better throughput statistically (Figure 3(a)) but lead to more power consumption (Figure 3(b)). As a result, no matter which frame priority or robot class, the energy efficiency is always approximately equal (Figure 3(c)). This conclusion is greatly meaningful to the system lifetime discussed below.

Define the system lifetime as the moment when the first robot is out of battery. The lifetime in different protocols is shown in Table 3. Obviously, the lifetime in the Two-Tier MAC will be extended to take energy balance into consideration.

MAC protocolsLifetime (min)

IEEE 802.15.4102
Two-Tier MAC117

5.3. Dynamic Performance

The experiments above only consider the normal load scene. However, traffic burst is more common in cloud robotics. Here, we focus on the effect of varying arrival rates to the system performance, i.e., dynamic performance, especially in the overloading situation. The parameter setting is the same as the former except that the arrival rate changes in the range of 50-350 frame/s.

As shown in Figure 5, when the system capacity is unsaturated (50-250 frame/s), the throughput is proportional to the growth of the arrival rate for all protocols. The features of power consumption and energy efficiency present similar characteristic with Section 5.1. After that, robots suffer from traffic bursting which leads to distinct performance in the four protocols.

For 802.15.4, FD-MAC, and MQEB-MAC, network congestion occurs, and the system performance is reduced because of the noncongesting protection mechanism. Data loss will consume extra energy and lead to the degradation of throughput and energy efficiency. On the contrary, thanks to the admission control, the Two-Tier MAC could reject new frames when the network is overloading to avoid network congestion. So the energy efficiency can be maintained even in this severe network environment.

6. Conclusion

Considering the heterogeneity on both robots and frames, a two-tier hierarchical-based MAC is proposed to guarantee the differentiated QoS performance and maximize the system throughput. Experiments show that compared with IEEE 802.15.4, FD-MAC, and MQEB-MAC, the Two-Tier MAC can improve the overall throughput by the Lyapunov theory, reduce power consumption by the time slot isolation scheme, and expend system lifetime by the energy balance. Even in the overloading condition, the QoS performance can be guaranteed thanks to the admission control.

In the future, we would like to do more work to find the close-formed solution for the optimized problem instead of the heuristic algorithm. In addition, in this paper, all robots operate task offloading to the central cloud which suffers from large end-to-end delay. Along the development of 5G, offloading in the distributed mobile edge computing (MEC) scenario should be studied in the future.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there is no conflict of interests regarding the publication of this paper.


This work is supported by the Fundamental Research Funds for the Central Universities (nos. 300102328105 and 300102320203), Xi’an Technology Plan (no. GXYD21.1), China Postdoctoral Science Foundation (no. 2017M623243), Shaanxi Province Postdoctoral Science Foundation (no. 2018BSHYDZZ26), Shaanxi and Guangxi Keypoint Research and Invention Program (nos. 2019ZDLGY13-02-02, 2017ZDXMGY-101, and AB19110036), Taicang Keypoint Science and Technology Plan (nos. TC2018SF03 and TC2019SF03), National Natural Science Foundation of China (nos. 61803042 and 61803040), National Natural Science Foundation of Shaanxi Province (no. 2019JLZ-06), and IoT Innovation and Fusion Application Project of MIIT (no. [2018]470).


  1. H. Liu, S. Liu, and K. Zheng, “A Reinforcement Learning-Based Resource Allocation Scheme for Cloud Robotics,” IEEE Access, vol. 6, pp. 17215–17222, 2018. View at: Publisher Site | Google Scholar
  2. N. Saxena, A. Roy, and J. Shin, “Dynamic duty cycle and adaptive contention window based QoS-MAC protocol for wireless multimedia sensor networks,” Computer Networks, vol. 52, no. 13, pp. 2532–2542, 2008. View at: Publisher Site | Google Scholar
  3. N. B. Yunus Ozen and C. Bayilmis, “Two tiered service differentiation mechanism for wireless multimedia sensor network MAC layers,” in 2015 23nd Signal Processing and Communications Applications Conference (SIU), pp. 2318–2321, Malatya, Turkey, 2015. View at: Publisher Site | Google Scholar
  4. A. K. Subramanian and I. Paramasivam, “PRIN: A Priority-Based Energy Efficient MAC Protocol for Wireless Sensor Networks Varying the Sample Inter-Arrival Time,” Wireless Personal Communications, vol. 92, no. 3, pp. 863–881, 2017. View at: Publisher Site | Google Scholar
  5. B. Jang, J. B. Lim, and M. L. Sichitiu, “An asynchronous scheduled MAC protocol for wireless sensor networks,” Computer Networks, vol. 57, no. 1, pp. 85–98, 2013. View at: Publisher Site | Google Scholar
  6. M. Y. Naderi, P. Nintanavongsa, and K. R. Chowdhury, “RF-MAC: A Medium Access Control Protocol for Re-Chargeable Sensor Networks Powered by Wireless Energy Harvesting,” IEEE Transactions on Wireless Communications, vol. 13, no. 7, pp. 3926–3937, 2014. View at: Publisher Site | Google Scholar
  7. B. J. Chang and S. P. Chen, “Cross-layer-based adaptive congestion and contention controls for accessing cloud services in 5G IEEE 802.11 family wireless networks,” Computer Communications, vol. 106, pp. 33–45, 2017. View at: Publisher Site | Google Scholar
  8. A. Gao and Y. Hu, “A Feedback Approach for QoS-Enhanced MAC in Wireless Sensor Network,” Journal of Sensors, vol. 2016, Article ID 8365217, 12 pages, 2016. View at: Publisher Site | Google Scholar
  9. Y. Hu, A. Gao, T. Xu, and L. Li, “Cascade self-tuning control architecture for QoS-aware MAC in WSN,” IET Wireless Sensor Systems, vol. 7, no. 5, pp. 146–154, 2017. View at: Publisher Site | Google Scholar
  10. A. Gao, Y. Hu, L. Li, and X. Li, “BP Network Control for Resource Allocation and QoS Ensurance in UAV Cloud,” Journal of Sensors, vol. 2018, Article ID 1419843, 14 pages, 2018. View at: Publisher Site | Google Scholar
  11. P. Reichl, B. Tuffin, and R. Schatz, “Logarithmic laws in service quality perception: where microeconomics meets psychophysics and quality of experience,” Telecommunication Systems, vol. 52, no. 2, pp. 587–600, 2013. View at: Publisher Site | Google Scholar
  12. S. Lakshminarayana, M. Assaad, and M. Debbah, “Transmit Power Minimization in Small Cell Networks Under Time Average QoS Constraints,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 10, pp. 2087–2103, 2015. View at: Publisher Site | Google Scholar
  13. M. J. Neely, “Stochastic network optimization with application to communication and queueing systems,” Synthesis Lectures on Communication Networks, vol. 3, no. 1, pp. 1–211, 2010. View at: Publisher Site | Google Scholar
  14. Y. Guo, Q. Yang, and K. S. Kwak, “Quality-oriented Rate Control and Resource Allocation in Time-Varying OFDMA Networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2324–2338, 2017. View at: Publisher Site | Google Scholar

Copyright © 2020 Yansu Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.