Professional Documents
Culture Documents
Sensors Transducers and Transmitters
Sensors Transducers and Transmitters
Bit volume
(1) (1)
Bit volume
Bit volume
(1)
(2)
(2)
mit nothing. Energy reserves will thus remain The proceedings of IEEE INFOCOM 2001 and
intact in perpetuity. Clearly communication per- 2002 as well as those of recent Mobicom and
formance is also of paramount interest. Thus, Mobihoc conferences are the best examples of
the choice of how to incorporate energy efficien- this diversity. It would be impossible to do them
cy in the overall design is far from clear. One justice by summarizing them here. Additionally,
approach is to try to minimize energy consump- it is too early to detect a common or prevailing
tion subject to throughput (or delay) staying thrust in these investigations. They are charac-
above (or below) a certain threshold. Alterna- terized by the somewhat disorderly and chaotic
tively, one can try to maximize throughput (or nature of a multifront and multi-objective area
minimize delay) per joule of expended energy. of emerging research.
Neither of these approaches led to simple pre- Before we continue with the examination (in
cise formulations or easy solutions. some more detail) of the case of wireless multi-
Then we note that energy consumption (as casting in the next section, we should make an
mentioned earlier) does not occur only through important distinction. We should differentiate
transmission, but also through processing. So, if between treating energy as a cost function and
the decision is made to route via nearest neigh- treating it as a hard constraint. These are two
1 Again, to give proper bor toward any destination, the consequences very different situations. In the former, the view-
credit, it is necessary to are that the delay increases (due to the multiple point of the designer, albeit complex in execu-
mention that the very first hops) and the processing energy increases (due tion, is simple enough in perception. The
attempt to design and to the repeated relaying of the signal). In addi- objective is simply to minimize the amount of
analyze an ad hoc wireless tion, it is far from clear what happens to the energy per communication task. Although the
network intelligently and overall transmission energy, since to implement a definition of a communication task can quickly
systematically can be nearest neighbor routing policy, significantly become convoluted, the idea is to treat energy as
traced back to the design augmented overhead control traffic will be an expensive but inexhaustible resource. For
of an Intra-Task-Force required to coordinate the establishment of the handheld devices, for example, we want the bat-
(ITF) network by a team routing paths and access control protocols across teries to deliver as much functionality as possible
at NRL in the early ’80s the entire network. before they are recharged or replaced. But they
[14–15]. The programs Therefore, the introduction of energy efficien- can be recharged or replaced.
that were initiated by the cy considerations complicates the upper layer On the other hand, when energy is a hard
Defense Advanced designs (e.g., routing) despite the simplistic obser- constraint, it is not a question anymore of using
Research Projects Agency vation in Fig. 3. At a minimum, the use of energy it efficiently because it is expensive. In this case
(DARPA) on low-cost by intermediate relay nodes raises issues of coor- the energy is not renewable at all. It is all you
packet radio and surviv- dination among node transmissions, and of desir- have, period! Of course, for this reason it is even
able radio networks fol- ability or appropriateness that may depend on the more imperative to use it economically. But at
lowed soon thereafter. application supported by the network. the same time we want to perform some com-
In ad hoc (multihop) wireless networks, the munications function. The temptation to slide
2 A complicating issue problem of routing has (not surprisingly) toward the preposterous solution of hoarding
when dealing with a net- received more attention than any other design energy forever by transmitting nothing (men-
work of wireless nodes is and operation problem. For example, see [9, ref- tioned earlier) is clearly increased. But obviously
to define when the net- erences therein]for only a segment of the work this solution does not make sense. So, what is
work “dies;” is it when the on ad hoc network routing.1 So it is no surprise then the right approach?
first node runs out of that the lion’s share of the recent work on ener- Even at the conceptual level, the finite energy
energy? Is it when all gy efficiency in ad hoc networks seems to be case is far more complicated. One must question
nodes do? (If you think concentrating again on routing [10–13]. Howev- what the fundamental objectives are. Clearly,
about it there may be one er, the community has embraced the notion of longevity of the network is an important one. 2
node, the last, that will energy efficiency in quite a broad way and has But some form of communication performance
not die since all others made energy concerns one of the cornerstones must also be an objective. Since by definition the
have died, and hence it in overall ad hoc network design. The approach- network will only last a finite amount of time,
can’t spend energy any- es taken so far and the particular problems cho- what is a reasonable communication perfor-
more). Or is it when a sen by the various researchers on energy mance objective? The throughput? The total
fraction of them dies? efficiency have been very recent and very diverse. data volume delivered? Consider, for example,
P1
the beginning of the tree has S, A 1 , and A 2 in
tandem with total cost p1 + p3. This is the incre-
mental power cost principle. The subsequent
max(P1, P2) vs. P1 + P2 steps continue along similar lines. That is, we
keep increasing the powers of all three nodes
until a fourth node is reached; then we compare
S the increments on the power levels of all three
nodes required to reach that fourth node and
select (as an addition to our tree) the branch
that requires the smallest increment. Clearly, as
P2 > P1
B this process continues, it is possible to find that
a choice at step k supercedes some earlier choic-
es and reshapes the tree accordingly. For exam-
■ Figure 6. The wireless multicast advantage. ple, if in Fig. 7 we opted for the S, A 1 , A 2
tandem and the fourth node is reached most
economically (in the incremental power sense)
methodologies of optimal routing that are used by increasing the power of S to level p 4 (that
in data traffic are not applicable. manages to reach A 1 and A 2 as well), the tan-
Still, to develop some algorithms for multicast dem is replaced by a star centered at S with
tree construction (albeit suboptimal and heuris- total “cost” p 4 . This procedure will yield a
tic), we do need to decide on a link metric. Alter- broadcast tree and is termed the Broadcast
natively, taking advantage of the node-centric Incremental Power (BIP) protocol. It was first
(rather than link-centric) nature of ad hoc net- proposed and developed in [25].
works, we may decide on a node metric. A simple If the destination node set is a subset of the
choice (that maps reasonably well to the total network node set (i.e., if we want to execute a
energy consumption metric) is simply the mini- multicast rather than a broadcast), the heuristic
mum power needed for a node to transmit suc- we just described can be adjusted by first con-
cessfully to a particular neighbor (that would yield structing a broadcast tree and then proceeding
a link metric) or the minimum power needed for to prune it by removing all leaf nodes that are
a node to reach all of its children nodes on the not destinations (including intermediate nodes
tree (that would correspond to a node metric). that do not have destination nodes among their
Note the important distinction between the way children). This procedure is called the Multicast
these costs accumulate in the case of wireless net- Incremental Power (MIP) protocol (also
works and the way they do in nonwireless net- described first in [25]). There are many ways in
works. In Fig. 6 we see that the cost (power) which this protocol can be modified and/or aug-
needed for S to reach A is p1 and the cost (power) mented. First, there is a “sweep” operation that
to reach B is p2. If the multicast tree includes S can be performed by which, after we complete a
and the downstream neighbors A and B, the total tree, we revisit the intermediate nodes and see
cost for this inclusion in a nonwireless network whether subsequent node additions supercede
would be p1 + p2, while in the wireless network their role and thus eliminate them from the tree
it would be max(p 1, p 2). This important differ- (or adjust their power downward). Then we can
ence (identified essentially at the beginning of consider the case of finite values of F and T,
this section) is termed the wireless multicast and add frequency assignment heuristics to the
advantage, and forms the basis of our approach. tree construction, while at the same time we
So, with these considerations as the back- start registering partial (or total) call blockings.
ground, we now propose and explain a simple Finally, we can consider truly alternative tree
centralized principle for constructing multicast construction methods for comparison purposes.
trees. We focus only on the construction of a A simple alternative is to consider each multi-
single tree (which is equivalent to assuming that cast call as the superposition of several unicast
all call requests are accepted, which in turn calls. Then, using the transmission power metric
implies that the values of T and F are arbitrarily on each link, we may find the least cost unicast
large), and we assume that the intent is to reach tree (by using a Bellman-Ford-type algorithm),
all other nodes in the network (i.e., we want to and then construct the multicast tree by super-
construct a broadcast tree). posing the unicast trees and consolidating the
Looking at Fig. 7 we start from the source needed transmissions (and therefore the costs)
node S and keep increasing its power until it whenever possible. These variations and alterna-
reaches the closest of its neighbors (say, A1); the tives have been explored in [22–25] at consider-
power needed is p 1 . Then we let S’s power able length and will not be expanded on here. It
increase until it reaches its second closest neigh- is worth noting, however, that these investiga-
bor (say, A2). It takes power p2 > p1 to do that. tions and related performance evaluations have
We then compare p 2 –p 1 (i.e., the incremental yielded interesting observations that reveal
power needed to reach one additional neighbor) some of the dynamics that govern the energy-
to the power p 3 that A 1 requires in order to related trade-offs in ad hoc networks. Although
reach A2. If no definitive conclusions can be drawn yet,
plenty of food for thought has been generated.
p3 > p2 – p1,
For one thing, the possibility of implementing