Ad Hoc Networks - Computer Science and...

14
Pushback: A hidden Markov model based scheme for energy efficient data transmission in sensor networks Sha Liu a , Rahul Srivastava b , Can Emre Koksal b, * , Prasun Sinha a a Department of Computer Science and Engineering, The Ohio State University, Columbus, OH 43210, United States b Department of Electrical and Computer Engineering, The Ohio State University, 2015 Neil Avenue, Columbus, OH 43210, United States article info Article history: Received 18 April 2008 Received in revised form 4 September 2008 Accepted 4 September 2008 Available online xxxx Keywords: Sensor networks Channel aware MAC Channel estimation Hidden Markov model abstract In sensor networks, application layer QoS requirements are critical to meet while conserv- ing energy. One of the leading factors for energy wastage is failed transmission attempts due to channel dynamics and interference. Existing techniques are unaware of the channel dynamics and lead to suboptimal channel access patterns. We propose a MAC layer solu- tion called pushback, that appropriately delays packet transmissions to overcome periods of poor channel quality and high interference, while ensuring that the throughput require- ment of the node is met. It uses a hidden Markov model (HMM) based channel model that is maintained without any additional signaling overhead. The pushback algorithm is shown to improve the packet success rate by up to 71% and reduce the number of transmissions needed by up to 38% while ensuring the same throughput. Ó 2008 Elsevier B.V. All rights reserved. 1. Introduction Sensor networking applications often have stringent requirements for QoS parameters such as throughput and delay. In battery operated sensor networks, such QoS requirements must be met while consuming the least amount of energy. Since a high percentage of the energy is spent on data communication, support for efficient and reliable communication is critical. However, high variabil- ity in channel quality caused by factors such as fading, mobility, and time-varying multiuser interference make it difficult to achieve those objectives. Indeed, Woo et al. [1], and Zhao and Govindan [2] have both observed a sig- nificant variability in link quality in wireless sensor net- works with radios in the 433 MHz band. The former paper points out that the instantaneous packet-error prob- ability varies by approximately 30% around its mean. The latter paper, as well as Willig et al. [3], both show that the packet-error stochastic process exhibits significant long-term dependence. Without any effort for adapting to the variability, the system resources are consumed highly inefficiently. Due to high packet loss rates, a high fraction of the energy of a node is consumed by multiple retransmissions per pack- et. However, in the currently available sensor hardware platforms (such as MicaZ or iMotes from Crossbow Inc.), the computational power rules out sophisticated control actions for adaptation. Only very simple strategies (e.g., transmit or do not transmit a packet at a given time) are implementable. Our objective in this paper is to design an optimum packet transmission strategy that meets the required throughput constraint while considering the dynamics of the channel. The existing CSMA protocol is an example of an adap- tive transmission technique. The CSMA protocol uses car- rier sensing to avoid collisions and backoffs to address the problem of contention among nearby nodes. However, packet transmissions may fail due to cumulative interfer- ence from other nodes in the network. Indeed in our test- bed experiments with Mica2 nodes, we have observed that with interfering sources that are sufficiently far away, 1570-8705/$ - see front matter Ó 2008 Elsevier B.V. All rights reserved. doi:10.1016/j.adhoc.2008.09.001 * Corresponding author. Tel.: +1 614 598 1466; fax: +1 614 292 7596. E-mail addresses: [email protected] (S. Liu), [email protected] su.edu (R. Srivastava), [email protected] (C.E. Koksal), [email protected] state.edu (P. Sinha). Ad Hoc Networks xxx (2008) xxx–xxx Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc ARTICLE IN PRESS Please cite this article in press as: S. Liu et al., Pushback: A hidden Markov model based scheme for energy efficient ..., Ad Hoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

Transcript of Ad Hoc Networks - Computer Science and...

Page 1: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

Ad Hoc Networks xxx (2008) xxx–xxx

ARTICLE IN PRESS

Contents lists available at ScienceDirect

Ad Hoc Networks

journal homepage: www.elsevier .com/locate /adhoc

Pushback: A hidden Markov model based scheme for energy efficientdata transmission in sensor networks

Sha Liu a, Rahul Srivastava b, Can Emre Koksal b,*, Prasun Sinha a

a Department of Computer Science and Engineering, The Ohio State University, Columbus, OH 43210, United Statesb Department of Electrical and Computer Engineering, The Ohio State University, 2015 Neil Avenue, Columbus, OH 43210, United States

a r t i c l e i n f o

Article history:Received 18 April 2008Received in revised form 4 September 2008Accepted 4 September 2008Available online xxxx

Keywords:Sensor networksChannel aware MACChannel estimationHidden Markov model

1570-8705/$ - see front matter � 2008 Elsevier B.Vdoi:10.1016/j.adhoc.2008.09.001

* Corresponding author. Tel.: +1 614 598 1466; faE-mail addresses: [email protected] (S.

su.edu (R. Srivastava), [email protected] (C.E. Koksstate.edu (P. Sinha).

Please cite this article in press as: S. LiuHoc Netw. (2008), doi:10.1016/j.adhoc.2

a b s t r a c t

In sensor networks, application layer QoS requirements are critical to meet while conserv-ing energy. One of the leading factors for energy wastage is failed transmission attemptsdue to channel dynamics and interference. Existing techniques are unaware of the channeldynamics and lead to suboptimal channel access patterns. We propose a MAC layer solu-tion called pushback, that appropriately delays packet transmissions to overcome periodsof poor channel quality and high interference, while ensuring that the throughput require-ment of the node is met. It uses a hidden Markov model (HMM) based channel model thatis maintained without any additional signaling overhead. The pushback algorithm is shownto improve the packet success rate by up to 71% and reduce the number of transmissionsneeded by up to 38% while ensuring the same throughput.

� 2008 Elsevier B.V. All rights reserved.

1. Introduction

Sensor networking applications often have stringentrequirements for QoS parameters such as throughput anddelay. In battery operated sensor networks, such QoSrequirements must be met while consuming the leastamount of energy. Since a high percentage of the energyis spent on data communication, support for efficient andreliable communication is critical. However, high variabil-ity in channel quality caused by factors such as fading,mobility, and time-varying multiuser interference makeit difficult to achieve those objectives. Indeed, Woo et al.[1], and Zhao and Govindan [2] have both observed a sig-nificant variability in link quality in wireless sensor net-works with radios in the 433 MHz band. The formerpaper points out that the instantaneous packet-error prob-ability varies by approximately 30% around its mean. Thelatter paper, as well as Willig et al. [3], both show that

. All rights reserved.

x: +1 614 292 7596.Liu), [email protected]

al), [email protected]

et al., Pushback: A hidd008.09.001

the packet-error stochastic process exhibits significantlong-term dependence.

Without any effort for adapting to the variability, thesystem resources are consumed highly inefficiently. Dueto high packet loss rates, a high fraction of the energy ofa node is consumed by multiple retransmissions per pack-et. However, in the currently available sensor hardwareplatforms (such as MicaZ or iMotes from Crossbow Inc.),the computational power rules out sophisticated controlactions for adaptation. Only very simple strategies (e.g.,transmit or do not transmit a packet at a given time) areimplementable. Our objective in this paper is to designan optimum packet transmission strategy that meets therequired throughput constraint while considering thedynamics of the channel.

The existing CSMA protocol is an example of an adap-tive transmission technique. The CSMA protocol uses car-rier sensing to avoid collisions and backoffs to addressthe problem of contention among nearby nodes. However,packet transmissions may fail due to cumulative interfer-ence from other nodes in the network. Indeed in our test-bed experiments with Mica2 nodes, we have observedthat with interfering sources that are sufficiently far away,

en Markov model based scheme for energy efficient ..., Ad

Page 2: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

2 S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx

ARTICLE IN PRESS

69% of the packets for which the CSMA granted a transmis-sion permit are lost. From this example, we can concludethat the combined effect of a large number of interferingsources can be very detrimental and the CSMA based pro-tocols – designed to suppress collisions – are not effectivein avoiding such losses. Immediate solution to this prob-lem is reducing the carrier sense threshold that triggers abackoff and consequently increasing the carrier senserange. This, in effect, would enable a node to sense thiscombined interference and hidden terminals to some ex-tent, and avoid part of the losses. However, the increaseof carrier sense range makes a node overly conservativewith respect to interference and it leads to a lower effec-tive throughput. Therefore, simple adjustment of the car-rier sense range is not sufficient to avoid transmissionsduring poor channel conditions.

In the context of transmission rate adjustment for802.11 networks, several solutions have been proposedbased on estimated channel conditions [4–7]. In contrast,our objective in this paper is to optimize the energy con-sumption with constraint on the throughput. Our solutionmethodology is also different as it explicitly models thechannel based on rigorous estimation techniques. ExistingMAC layer solutions for sensor networks such as [8–11],have not considered direct modeling of the time-varyingchannel quality for optimization of transmission attempts.MAC layer protocols such as [12,13] model the bursty nat-ure of wireless channel as a Markov model. However thesetechniques do not directly incorporate channel estimationinto the transmission scheduler. Several back-pressurebased mechanisms have been proposed at the link layer[14–17] to address high interference and network conges-tion. These approaches are orthogonal to our proposedsolution, and can be used in conjunction with our solutionto improve performance, as shown in Section 5.

In this paper, we systematically study the problem ofaddressing packet losses due to cumulative interference,and propose a binary control technique over CSMA. Our ap-proach is based on exploiting the temporal correlations ofthe interference process. We introduce a new conceptcalled transmission pushbacks, which refers to an appropri-

CSMA with Exponential Backoff

Plain CSMA

CSMA withExponential Backoff andTransmission Pushback Pushb

(bachannel

Channel Quality Indicator

(for illustration only)

Transmitted packet

Fig. 1. Transmission pushback: CSMA unnecessarily transmits during poor channduring poor channel conditions, however opportunities to transmit during gooperiods with poor channel quality, while making use of good channel states.

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

ately computed delay introduced at the MAC layer in orderto avoid periods with bad-channel quality while consider-ing a node’s throughput requirement. Therefore, we reducethe number of transmissions per packet as well as thenumber of transmission attempts per unit time. In caseof bursty losses, avoiding the bad-channel state may alsolead to a higher throughput (visible at higher layers) de-spite lower number of transmission attempts.

The main idea of transmission pushbacks is to deferpacket transmission attempts for an appropriately selectedperiod upon failed packet transmissions. Fig. 1 illustratesthe benefits of using transmission pushbacks in compari-son with CSMA based approaches in the presence oftime-varying channels. Plain CSMA leads to failed trans-missions, and thus wasted energy, during periods withpoor channel quality. CSMA with exponential backoffmay reduce such failed transmissions, but it also cutsdown the transmission attempts, even at times of im-proved channel quality. Our proposed transmission push-back mechanism predicts the duration for which thechannel quality will remain poor. Thus, unnecessary trans-missions can be avoided to conserve energy and the goodchannel states are taken advantage of. The contrast is alsohighlighted in Table 1 which shows that Pushback alongwith CSMA with exponential backoff can handle varioustypes of packet losses. Observe that as pushback operatesover the CSMA algorithm, improvements of the CSMAmechanism such as [18] are orthogonal to pushback.

To determine the pushback time, we need to estimatethe channel quality and how it varies over time. We usean adaptive channel prediction technique, based on esti-mating the parameters of a simple hidden Markov model(HMM), which represents our channel. The parameters ofthe HMM are dynamically updated based solely on the bin-ary ACK sequence (transmission success or failure) for theprevious packet transmissions. We choose the appropriatepushback period by considering the throughput require-ment measured by the incoming data rate, and the pre-dicted quality of the channel. Such an adjustment in rate,based on the throughput requirement is also seen in lazypacket schedulers (e.g., [19]). Designing an ‘‘optimal”

ack period sed on estimation)

Poor

Transmitted but dropped packet

Time

Good

CSMA Resumed

el conditions. With exponential backoff, there will be fewer transmissionsd states will also be lost. With transmission pushback CSMA can avoid

en Markov model based scheme for energy efficient ..., Ad

Page 3: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

Table 1Types of losses addressed by various mechanisms

Mechanisms Designed forcollision losses

Designed for interferenceand channel losses

CSMA Plain Partially NoCSMA/EB Yes PartiallyCSMA/EB + Pushback Yes Yes

S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx 3

ARTICLE IN PRESS

sleep–wake scheduling solution that integrates with push-back is beyond the scope of this paper. The main complex-ity of that task is caused by the missed receiveopportunities: during pushback, if a node goes into sleepmode, then it will miss opportunities to receive packetsfrom other nodes. We assume that nodes are awake at alltimes for potential received packets. However, nodes donot spend extra energy in sensing the channel since thecalculation of the deferral time depends solely on theACK/NACK packets. The proposed approach is simple toimplement over existing CSMA based MAC solutions, aswell as queue and congestion control algorithms. Thereforeit is highly suited for existing sensor network platforms.

This paper makes the following contributions:

� Using data collected from a sensor network testbed,temporal characteristics of the channel variations andthe interference are studied.

� A novel concept called pushbacks is introduced, that isused to increase the packet success rate while consider-ing the throughput constraint at each node.

� Through simulations it is shown that significant gains inenergy and/or throughput can be observed in all scenar-ios using the proposed technique.

The rest of the paper is organized as follows. Section 2presents related work. Section 3 presents our approach tomodel the channel losses. Section 4 presents a descriptionof our pushback algorithm. Section 5 presents evaluation ofthe proposed scheme. Finally, Section 6 concludes the pa-per and presents pointers to future research directions.

2. Related work

2.1. Transmission rate adaptation

Transmission strategies based on channel estimationhas been considered in the context of 802.11 [4–7] andother wireless [12,13] networks. More specifically, the pastpacket success and failure reports have been used to designstrategies to dynamically adapt the physical layer trans-mission rate to optimize the throughput. ARF [4] uses aheuristic to predict the channel quality based on pasttransmission success and failure records, but it is obliviousto the underlying time-varying properties of the channel.RBAR [5] uses RTS/CTS to get immediate feedback fromthe destination to learn about the quality of the channeland determine the transmission rate. However, these pack-ets have high overhead especially in sensor networkswhere the data packet sizes are comparable to the size of

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

RTS/CTS packets. In OAR [6] during good channel periodsthe transmitter opportunistically transmits multiple pack-ets back-to-back at a high data rate. In contrast to theopportunistic nature of [6], our solution uses a rigorouschannel model to predict the duration for which the chan-nel will continue in a poor state. In [7], authors present ahistory based mechanism to predict the quality of thechannel and adjust the transmission rate.

In [12,20,21,13], authors consider different opportunis-tic transmission schemes which use a two-state Markovchannel similar to the one used in this work. In [20], thetransmitter simply retransmits a packet as soon as it isfound in error. The authors concentrate on calculatingthe lateness probability of such packets, and do not usethe ARQ information to determine whether the channel isgood or bad for transmission. On the other hand,[12,21,13], follow a similar approach to ours by detectinga bad-channel state upon receipt of a NACK. However,the way they respond to a bad-channel condition is differ-ent, since the transmission rate is reduced and the channelis probed periodically. The transmitter returns to normaloperation when the channel improves. As mentioned pre-viously, in the context of sensor networks, the overheadof such probe packets can be substantial. In contrast, wedevelop an algorithm that estimates the channel conditionbased on ARQ-level information, which is freely available.We use the ARQ information to find the maximum likeli-hood (ML) estimate of the channel state and accordinglyschedule the transmission. The computational overheadof our approach is also minimal and our algorithm requirestwo table look-ups and three basic arithmetic operations.In [13], the transmitter switches to a greedy mode (imme-diate retransmission on error) when the buffer level ex-ceeds a certain threshold to ensure that the quality ofservice (QoS) requirement is being met. Our algorithm isable to dynamically adapt to the QoS requirement by pre-dicting the incoming traffic flow rate and thus setting anoptimal pushback period that supports this throughput.

Cognitive medium access (CMA) [22] is a design for cog-nitive radio which uses a two-state continuous-time Mar-kov chain approximation for the channel. The mainobjective of this work is to optimize the throughput of acognitive (secondary) radio while limiting the interferenceexperienced by the WLAN (primary radio). The authorshave used a ‘‘sense-before-transmit” strategy in this case,which requires a transmitter design that incorporates achannel sensing mechanism. In addition, since CMA con-siders a frequency hopping radio, it has an additional free-dom to choose the channel to transmit. Our objective ofoptimizing energy consumption (by deferring transmis-sion) for a given throughput constraint is different. Since,our work uses the already available ARQ information forchannel estimation, it does not rely on extra physical layerinformation and it can be implemented on existing radioswithout any hardware modification.

2.2. MAC and link layer for sensor networks

Various MAC layer protocols have been proposed toconserve energy in sensor networks by sleep scheduling.These protocols can be categorized as either synchronized

en Markov model based scheme for energy efficient ..., Ad

Page 4: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

4 S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx

ARTICLE IN PRESS

or unsynchronized. SMAC [10], TMAC [23] and DMAC [11]are examples of synchronized MAC layer protocols. TheseMAC protocols require periodic message exchange for syn-chronization. In these protocols nodes wake up for a shortduration at synchronized times and sleep otherwise toconserve energy. In order to address the overhead of syn-chronization, unsynchronized approaches have also beenproposed. BMAC [24] and SP [25] are two such examplesthat make use of long preambles before data transmissionto ensure that the receiving node will receive the packet.More recently, CMAC [9] and XMAC [8] have been pro-posed to avoid the overhead of long preambles. Anycastinghas been considered in the joint design of MAC and routinglayers to operate in unsynchronized networks [26–29].However, none of these solutions have considered thetime-varying properties of the underlying channels in thedesign of the channel access mechanism.

In order to address high interference and network con-gestion, several back-pressure based mechanisms havebeen proposed for sensor networks [14–17]. CODA [14]uses a moving average of channel samples to detect the on-set of congestion and sends back-pressure messages tocontrol the data rate of upstream nodes. Fusion [15] usesthe concept of hop-by-hop flow control and prioritizedMAC along with token buckets to control the packet rateat each node. IFRC [16] and RAIN [17] use variations ofthe AIMD (additive increase multiplicative decrease) andthe back-pressure mechanisms. Various schemes havebeen proposed, which select the backoff counter [30] andthe backoff window [31,32] based on the channel state.However, MAC protocols with backoffs tuned to channelconditions do not address the time-scales associated withchannel variations. Fig. 1 illustrates that such protocolswill not be able to react quickly enough to changes in chan-nel state.

We conclude this section by observing that most ofthese solutions are unaware of the time-varying character-istics of the channel, and hence still perform blind retrans-missions oblivious to the current channel conditions. EvenMAC protocols that set the backoffs according to the chan-nel state do not address this problem completely. Solutionswhich consider the time-varying channel incur a highoverhead or require advanced transmitter design, both ofwhich are not suitable for sensor networks. On contrary,the pushback algorithm proposed in this paper can learnthe channel characteristics and schedule retransmissionsaccordingly. Our solution methodology is also different asit uses rigorous estimation of dynamic channel properties.In fact, our solutions can be used in conjunction with theabove link layer mechanisms and bring extra benefit asshown in our simulation results.

1 We assume that the process started at time n = �1. In practice the datatransmission is only finite, however we make this technical assumption,since we do not have any information about the initial channel state.

3. Channel model

In this section we describe our channel loss model andits parameters and give an experimental justification forour model. We use this channel loss model to derive thetheoretical expressions for Packet Success Ratio (PSR) andthroughput as functions of channel and system parame-ters. We describe how to estimate these parameters based

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

on the available measurements at the sensor nodes in thenext section.

3.1. Channel model

Let An, n P 1 be the process, which takes on an ‘S’ or an‘F’ depending on whether a packet transmitted at time n issuccessfully decoded at the receiver or not. We assumethat only one packet can be transmitted in each time slotand that An is a wide-sense Markov of order 1 for the pack-et-error process. We will discuss the validity of thisassumption later, but first we describe An further.

A sequence An, n P 1 is said to be wide-sense Markov ifthe probability of a future value, An+m, is completely deter-mined by its most recent value, i.e. An and the time differ-ence (m) between the two events. The autocovariancefunction for such a process is exponential. More specifi-cally, suppose the process is in steady state1 at time nand let P(An = F) = p. Then the autocovariance function ofAn is KA(m) = p(1 � p)ajmj for some a, jaj < 1. Here p is thelong-term loss probability and a quantifies the ‘‘coherence”or correlation between a successful (failed) transmission inthe future based on the present observation. The loss prob-ability p increases with the number of interfering usersand the noise in the channel and a is a measure for the burstlength for the failed transmissions.

For this wide-sense Markov process, the probability of asuccessful (failed) transmission in a future time slot, condi-tioned on a successful (failed) transmission in the presentslot, is unique (Appendix A):

PðAnþm ¼ F j An ¼ SÞ ¼ pð1� amÞ; ð1ÞPðAnþm ¼ S j An ¼ SÞ ¼ 1� pð1� amÞ; ð2ÞPðAnþm ¼ F j An ¼ FÞ ¼ pþ ð1� pÞam; ð3ÞPðAnþm ¼ S j An ¼ FÞ ¼ 1� p� ð1� pÞam: ð4Þ

Hence only a pair of parameters is sufficient to representthe channel with the first order Markov assumption. Forthe purpose of illustration, the conditional probabilitiesof failure for p = 0.6 and a = 0.8 are plotted in Fig. 2. The‘‘deferred time slots” represents the number, m, of timeslots waited before the next transmission attempt afteran event S or F.

We can form an underlying Markov chain correspond-ing to this wide-sense Markov process as follows. The Mar-kov chain has two states S (Good) and F (Bad) and the chainmakes a transition between these states depending on An

taking on an S or an F as shown in Fig. 3. One can evaluatethe parameters p and a for the associated Markov processgiven the transition probabilities, x and y for this Markovchain and vice versa as shown in Section 3.2. The channelmodel is an HMM, since x and y are unknown initiallyand we estimate them based on the observed values ofAn using a maximum likelihood estimator. Based on theseestimated values, we calculate the two channel parametersa and p, which is detailed in Section 4. Note that the reasonfor estimating x and y initially is due to the simplicity of

en Markov model based scheme for energy efficient ..., Ad

Page 5: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

0 5 10 15 20 25 300

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1P(A

n+m=F|A

n=S)

P(An+m

=F|An=F)

Fig. 2. Conditional probability of failure as a function of deferred timeslots setting p = 0.6 and a = 0.8.

S F

xy

1–y

1–x

Fig. 3. Markov chain representation of the channel.

2 Upon a successful transmission, the deferral time is 1 (no deferral).

S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx 5

ARTICLE IN PRESS

the task (based on observation of An). The reason why wepursue our analyses with a and p afterwards, instead of xand y, is that the performance metrics of the pushbackalgorithm are tied to a and p more naturally.

In fact, HMMs have been used to model the channelbehavior previously by representing the (bit or packet le-vel) error process in wireless communications [33–36].While not as simple as a Bernoulli or an independent losschannel model, Markov models are more capable of char-acterizing the statistical dependencies which might occurin a wireless channel. From the two curves in Fig. 2, onecan see the reasoning behind choosing a pushback dura-tion conditional on an event F only. If we schedule the nextpacket for immediate transmission (i.e., m = 1) after an S,we have the best chance of observing another S. Intuitively,we are taking advantage of the good channel state. On theother hand, if we defer scheduling the transmission (i.e.,m > 1) of the next packet after an F, we lower the probabil-ity of failing in that transmission. The longer the deferraltime, the higher the probability of an S in the next trans-mission. However, waiting indefinitely can cause thethroughput to drop significantly. So we need to strike abalance between these two requirements, throughputand probability of success. Hence, with the Markov chan-nel model, the problem reduces to finding the appropriatepushback period after a failed transmission. In the next

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

subsection, we will derive the expressions for the through-put and packet success rate for this scheme using our chan-nel model.

3.2. Channel parameters

To find the channel parameters, packet success ratioand throughput, we sketch the Markov chain associatedwith our first order Markov process. Our main objectivehere is to find the throughput as a function of the numberof deferred time slots, k, on a transmission failure.2 Oncewe have this function, we can choose k according to the de-sired throughput based on the incoming data rate. To val-idate this model using real data, we also find theexpression for the PSR.

Our Markov chain has two states, S and F as illustratedin Fig. 3. The current state is S if the final packet transmis-sion is successful and F, otherwise. Note that a transitiondoes not necessarily occur every time slot, rather it occursfor every packet transmission attempt. Since we schedule atransmission immediately after a successful event, theexpression for x is obtained by substituting m = 1 in (1). Di-rect application of (3) with m = k gives the expression for y.

x ¼ PðAnþ1 ¼ F j An ¼ SÞ ¼ pð1� aÞ; ð5Þy ¼ PðAnþk ¼ F j An ¼ FÞ ¼ pþ ð1� pÞak: ð6Þ

Notice that the transition probabilities at state F are func-tions of k as well as p and a. This is due to the effect of thepushback period of k time slots after the failed transmis-sion attempts. The associated steady state probabilitiesare therefore functions of k as well, and these probabilitiesfor state S and state F are respectively,

pSðkÞ ¼ð1� pÞð1� akÞ

pð1� aÞ þ ð1� pÞð1� akÞ ;

pFðkÞ ¼ 1� pSðkÞ:ð7Þ

We define the packet success ratio (PSR) as the total frac-tion of the packets that are successfully transmitted, i.e.,it is equal to the steady state probability, pS(k) of state S.

Likewise, we define the throughput (q) as the numberof successful packet transmissions in a unit time slot. Toformulate an expression for throughput, consider the fol-lowing: on a transmission attempt, we wait for k time slotsin state F and 1 time slot in state S for the next transmis-sion attempt. Thus, the average number of slots per at-tempt is pS(k) + kpF(k). Consequently the number ofpacket transmissions per slot,

XðkÞ ¼ 1pSðkÞ þ kpFðkÞ

¼ pð1� aÞ þ ð1� pÞð1� akÞkpð1� aÞ þ ð1� pÞð1� akÞ : ð8Þ

The resulting throughput, q(k), is thus

qðkÞ ¼ pSðkÞXðkÞ

¼ ð1� pÞð1� akÞkpð1� aÞ þ ð1� pÞð1� akÞ :

ð9Þ

The theoretical value of the throughput (q) is plotted as afunction of the pushback period k in Fig. 4 for different

en Markov model based scheme for energy efficient ..., Ad

Page 6: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

0 2 4 6 8 10 12 14 16 18 200

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Fig. 4. Theoretical throughput (q) achieved by deferring transmission ona packet loss for different values of p and a.

0 5 10 15 20 250.3

0.32

0.34

0.36

0.38

0.4

0.42

0.44

0.46

0.48

0.5Actual PSRTheoretical PSR Fit

Fig. 5. Comparison of the actual PSR gain achieved by our pushbackalgorithm and the theoretical fit using (7).

6 S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx

ARTICLE IN PRESS

channel parameters p and a. In Fig. 4, by changing the va-lue of p (keeping a constant), we can see that a channelwith lower p gives a better throughput performance. Thistrend is expected as we have defined p as the probabilityof transmission failure and a channel with a smaller p willhave a lower chance of transmission failure which leads toa higher throughput. For the same value of p, larger a im-plies a higher correlation in the channel quality. Sincepushback takes advantage of the correlation in channelquality to schedule transmissions, we can see that thethroughput performance of a channel with higher correla-tion will be better with transmission pushback than achannel with lower correlation.

We tested the validity of our Markov model using anexperimental setup in the Kansei testbed [37] by settingup a wireless link between two sensor motes. This linkwas encircled with seven sensor motes spread aroundthe perimeter of a 20 m2 area. We measured the packetsuccess rate between two motes, while the rest of themotes acted as sources of interference. For this experiment,the wireless link transmitted 36 byte packets at 100 msinterval. We programmed the nodes causing interferenceto transmit bursts of packets once every second. The burstsize was selected according to a uniform distribution be-tween [0,15]. We estimated the two parameters, a and pusing the ACK-level data of the entire trace of 30 min. Notethat the purpose of this experiment was to validate themodel. In our actual algorithm, the estimation of the twoparameters is much simpler and does not depend on a longtrace of data. The theoretical packet success rate based onthe estimated a and its actual experimental value are plot-ted in Fig. 5 as a function of k. This plot gives credence tothe Markov model.

4. The pushback algorithm

The objective of the pushback algorithm is to estimatethe period for which the channel will remain in a poorstate and defer retransmissions accordingly in order toconserve energy. In addition, the algorithm must providesimilar throughput as CSMA for a reduced number of trans-mission attempts.

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

The proposed pushback algorithm is based on CSMA. If atransmission is successful, the next transmission is sched-uled by CSMA. However, in case of a failed transmission,the next transmission is pushed back by k slots after whichCSMA takes effect. Note that a pushback ‘‘slot” is a packetslot, i.e., the time it takes to transmit a packet. Thereforeit is different from the contention slot of CSMA. Also, eventhough the value of k is generated deterministically, therandomness of the backoff period (in contention slots) ofCSMA avoids persistent pushbacks caused by local syn-chronization of nodes due to similar channel conditions.

When nodes boot up, an initial value kinit is assigned tok, and then k is recalculated periodically each time the m-th (predefined) transmission failure happens using a sim-ple mechanism based on the estimates of the channelparameters and throughput constraint. Our computationis both practical to implement and is also shown to per-form well using simulations in Section 5.

The proposed mechanism for computing k is based onthe formulation presented in Section 3. First, k is set toan initial value kinit, and based on the ACK-level observa-tions of success and failure in the recent past, a maximumlikelihood (ML) estimation of parameters a and p is made.In fact, estimating the transition probabilities of the Mar-kov chain (parameters x and y in Fig. 3) is sufficient forthe desired ML estimation. Indeed, given the ML estimatesx and y (of x and y respectively), we show in Appendix Bthat the we show in the technical report [42] that the solu-tion ða; pÞ to the system of Eqs. (5) and (6) gives the MLestimates of a and p which characterize the channel. Inaddition, to ensure that a node can sustain the incomingrate of packets, the computation of k must take the incom-ing packet rate into account. We use the running average ofthe incoming packet rate, qnew = c/te + (1 � c) qold, to rep-resent the throughput constraint. Here qnew(qold) is thenew (previous) estimate of the throughput requirement,

en Markov model based scheme for energy efficient ..., Ad

Page 7: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

Table 2Lookup tables used in the pushback algorithm

Table Equations Purpose

Ta(x,y,k) Eqs. (5), (6) To compute a for given x, y and k.Tk(p,a,q) Eq. (9) To compute k for given p, a and q.

S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx 7

ARTICLE IN PRESS

te is the time elapsed since the last packet arrival and c issmoothing factor. Using qnew (throughput constraint), aand p, Eq. (9) can be used to compute the new value of k.

To avoid the complexity of direct computation of k, wepropose the use of look-up tables. The first table T aðx; y; kÞcontains the values of a corresponding to k and discretizedx and y. The second table Tkðp; a;qÞ contains the values ofq(k) corresponding to k and discretized a and p. A briefdescription of the various tables used is given in Table 2.These tables will not change during the operation of thenode, so they can be computed offline and uploaded. Theavailable storage spaces on the nodes will determine thesize of the tables. From our experimental experience, itshould suffice to have a 10 � 20 � 20 table. For instance,this table can have 10 values of k (2–11), 20 values of p(0–0.95 in increments of 0.05) and 20 values of a (0–0.95in increments of 0.05). These numbers could be stored asintegers between 0 and 100. Hence, the two tables wouldtake 8 K bytes.

In summary, upon the m-th transmission failure, func-tion Pushback() (Algorithm 1) is called. In this algorithm,The ML estimates x and y are calculated in lines 3 and 4.A table lookup is employed to find the value of a corre-sponding to x, y and k, and then p can be calculated accord-ing to Eq. (5). Finally the pushback period k is estimatedusing another table lookup with the appropriate values ofp, a and q.

4.1. Remedial mechanisms

The pushback algorithm above can work well if thereal packet loss pattern is captured well by our channelmodel introduced earlier and the transition probabilitiesare accurately measured. However, either of them maydeviate from reality, in which case the throughput maynot be maintained if k is chosen too aggressively. Hence,we introduce two remedial mechanisms to solve suchproblems.

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

4.1.1. Measuring actual pushback amountIn our pushback algorithm, the delay amount, k slots, is

calculated according to the state transition probabilitiesand the throughput constraint. However, after delaying kslots, nodes may need to delay their retransmissions fur-ther due to contentions from other senders. This could leadto the loss in throughput since the delaying amount islonger than expected by the model. Hence, the runningaverage of the difference between the calculated delayamount and the actual delay amount is maintained, andsubtracted from the newly calculated k.

4.1.2. Controlling the pushback amount at the interface queueOnce our channel model deviates from the actual chan-

nel, simply adjusting the k as in Section 4.1.1 may still notwork very well. To cope with such situations, we let theinterface queue impose a pushback control policy to speedup the packet forwarding once the queue is excessivelybuilt up. This policy simply commands the pushback algo-rithm to fall back to CSMA (using k = 1) if the queue lengthis above a certain threshold. In our evaluations, this valueis set to half of the queue capacity.

5. Simulation evaluation

We conduct simulations in ns2 [38] to compare the per-formance of our pushback algorithm with plain CSMA withand without binary exponential backoff in wireless sensornetworks. Here the CSMA without exponential backoff (de-noted as CSMA) simulates BMAC, the default MAC layerprotocol, while CSMA with exponential backoff (denotedas CSMA/EB) represents other general CSMA protocols.We also study the performance improvement when thepushback algorithm works jointly with other congestioncontrol mechanisms such as based on rate control andback-pressure. In this section, the radio propagation modelused in our simulations is introduced, followed by the sim-ulation results.

5.1. Radio model

The CSMA (MAC and PHY) protocol simulated in ns2 hastwo shortcomings. First, it fails to consider interferencefrom nodes outside the carrier sensing range. However,the cumulative interference from more than one node suf-ficiently far away may still affect packet receptions. Sec-ond, it does not calculate the packet loss probabilityaccording to the signal-to-noise ratio (SNR). In our simula-tions, we extended the physical layer of ns2 to combine allsources of noise and interference to calculate the SNR andthen use Eq. (9) in [39] to calculate the packet success rate.

In our simulations, we use a radio propagation modelbased on the shadowing model implemented in ns2. Con-sequently, the received power level at a receiver is deter-mined by

PrecðdÞPrecðd0Þ

" #dB

¼ �10b logdd0

� �þ XdB;

where Prec(d) is the received power at this receiver which isat a distance d away from the sender, b is the path loss

en Markov model based scheme for energy efficient ..., Ad

Page 8: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

Table 3Simulation parameters

Packet size 100 bytes Ack Size 5 bytesBandwidth 19.2 Kbps Transmit power 0 dBmBackoff slot 0.4167 ls Pushback slot 18.33 msb 4 [39] rdB 4/ 0.8 Data rate 0.1 packet/sNumber of nodes 25 (5 � 5) Node separation 45 m

8 S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx

ARTICLE IN PRESS

exponent, Precðd0Þ is the average received power level at areference distance d0, and XdB is a Gaussian random vari-able with mean 0 and standard deviation rdB (called shad-owing deviation).

In standard ns2, XdB is independent for different packets.However, XdB usually varies according to some randomprocess (see e.g., [39,40]) and we use an order 1 autore-gressive model (AR(1)) as follows.

XdBðtÞ ¼ /XdBðt � 1Þ þ ZðtÞ;

where / is called the channel coherence coefficient whichquantifies the memory in channel variations and Z(t), theerror term, is independently and identically distributedwith normal distribution Nð0;r2

ZÞ. To make the varianceof XdB(t) independent of /, we choose rZ ¼ rdB

ffiffiffiffiffiffiffiffiffiffiffiffiffiffi1� /2

q.

In our simulations, the time is discretized such that 1 slotis roughly equal to the average time to transmit a packet,and the value of XdB(t) is constant within a time slot. Notethat in the modified shadowing model, if the autoregres-sion coefficient / = 0, then the model just falls back tothe default shadowing model provided by ns2. In our eval-uation we also study the impact of different values of thechannel coherence coefficient, /.

5.2. Simulation evaluations

We conduct simulation evaluations on our pushbackalgorithm in data gathering networks. The node locatedat one corner of the area serves as the sink, while all othernodes generate data periodically to be sent to the sink. Weevaluate the performance of all three protocols (CSMA,CSMA/EB and CSMA/EB with Pushback) under differentdata rates, channel coherence coefficients /, shadowingdeviations, network sizes, node densities in grid and ran-dom topology, and packet sizes. We evaluate the perfor-mance of all three protocols (CSMA, CSMA/EB and CSMA/EB with Pushback) under different data rates, channelcoherence coefficients /, and network sizes. We also showthat Pushback can be used to enhance the performance ofrate control and back-pressure based algorithms. Addi-tional results for different shadowing deviations, nodedensities in grid and random topology, and packet sizescan be found in the technical report [42]. The metrics fo-cused on in this study include the following four.

� Throughput: number of packets received at the sink in500 s.

� Packet success rate (PSR): average success rate for eachtransmission attempt in the network.

� Transmission tax: average number of transmissions(including retransmissions) in the network required todeliver one packet to the sink.

� Normalized delay: average delay per hop.

Each set of simulations is carried out for 10 times withdifferent random seeds, and the error bar denoting theminimum and maximum values of each simulation set isalso plotted. In all simulations, the default parameter val-ues simulating the XSM nodes [41] are summarized in Ta-ble 3. In this paper, we show some relevant graphs. A more

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

elaborate set of graphs can be found in the technical report[42].

5.2.1. Data ratesThe pushback algorithm takes advantage of the flexibil-

ity provided by nodes that can afford to delay the retrans-missions (e.g., the ones away from the sink) withoutreducing the throughput. On the other hand, some nodes(e.g., those close to the sink) may have very small roomfor pushback (i.e., k � 1) since they need to accommodatehigher data rates. In this section, we evaluate the pushbackalgorithm for data generation rate at each non-sink nodevarying from 0.01 packets/second (pps) to 0.2 pps. Fig. 6shows the simulation results, from which it can be ob-served that when data rate is low (<0.15 pps in this case),the pushback algorithm can improve the PSR by 51% and71% when compared to CSMA/EB and CSMA respectively.Observe that the network throughput is saturated beyond0.15 pps data rate. For even higher data rates, the improve-ment in PSR is smaller, but the throughput is higher thanthe CSMA protocols. This implies that with pushbacks thequeue drop rates are reduced. Similar improvement intransmission tax can also be observed. Note that for datarates higher than 0.18 pps the queuing delay caused bythe pushback algorithm results in higher normalized delay.The queuing delay is also caused due to the higherthroughput provided by pushback. In this region, the net-work’s capacity is reached, as depicted by the throughputcurve. If applications can tolerate delay then even at datarates beyond the network’s capacity, pushback is prefera-ble over CSMA protocols.

The peak throughput point is the critical point beyondwhich all protocols start to experience packet losses dueto queue overflows. In such an event of congestion, manyof the lost packets are lost either at the intermediate nodesor at nodes closer to the sink. Consequently, the overallthroughput decreases, since the lost packets consume re-sources (e.g., queue occupancy, spectrum) along the path,without an ultimate positive contribution to the through-put. In other words, the resources consumed by lost pack-ets can be viewed as wasted opportunities for otherpackets and thus the end-to-end throughput decreases atthe point we start to observe packet losses. On the otherhand, as the arrival rate is further increased, the through-put increases slightly. This is because, in the event of heavycongestion, packets tend to be lost closer to their sourcesbefore they consume much of the network resources.

5.2.2. Channel coherence coefficientThe pushback algorithm is very effective in the presence

of temporal correlation in channel losses. Such correlations

en Markov model based scheme for energy efficient ..., Ad

Page 9: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

0

0.1

0.2

0.3

0.4

0.5

0.6

0.2 0.15 0.1 0.05

Pack

et S

ucce

ss R

ate

Data Rate (Packets/Second)

PushbackCSMA/EB

CSMA

(a) Packet Success Rate

0

5

10

15

20

0.2 0.15 0.1 0.05

Tra

nsm

issi

on T

ax

Data Rate (Packets/Second)

PushbackCSMA/EB

CSMA

(b) Transmission Tax

0 200 400 600 800

1000 1200 1400 1600 1800

0.2 0.15 0.1 0.05

Thr

ough

put

Data Rate (Packets/Second)

PushbackCSMA/EB

CSMA

(c) Throughput

0

10

20

30

40

50

60

0.2 0.15 0.1 0.05

Nor

mal

ized

Del

ay

Data Rate (Packets/Second)

PushbackCSMA/EBCSMA

(d) Normalized Delay

Fig. 6. Simulation results for various data rates.

S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx 9

ARTICLE IN PRESS

may be caused by channel coherence or correlated interfer-ence. In this section, we evaluate the performance of thepushback algorithm under channel coherence coefficient/ ranging from 0 to 0.8. Fig. 7 shows the simulation results.It can be seen that by utilizing the pushback algorithm, theimprovement in PSR over CSMA/EB is between 46% and63%, and it increases with /. Meanwhile, the throughputis maintained. As expected, the pushback algorithm is moreeffective when the channel is more coherent. The results alsoshow that even in case of low channel coherence, our pushbackalgorithm can bring significant benefit in PSR.

5.2.3. Shadowing deviationIn our simulations, the shadowing deviation rdB is a

major factor besides the interference that affects packet

0

0.1

0.2

0.3

0.4

0.5

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

Pack

et S

ucce

ss R

ate

Coherence Coefficient

PushbackCSMA/EB

CSMA

(a) Packet Success Rate

Fig. 7. Simulation results for various channel co

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

receptions. According to the shadowing radio propagationmodel, larger shadowing deviation causes more packetlosses. In this section, we evaluate the performance ofthe pushback algorithm for rdB values as suggested in[40]. Fig. 8 shows the results for the two evaluation met-rics. The results show that the PSR for all three protocolsdecreases with rdB, but the pushback algorithm can pro-vide improvement of up to 91% compared to CSMA/EB.For rdB = 0 in which case the shadowing model does not di-rectly cause packet losses, our pushback algorithm can stillimprove the PSR from 66% to 76% (or 15% improvement).For throughput, we can observe that the channel capacityis reached for larger rdB with the pushback algorithm,which brings steady improvement of up to 27% than CSMAand CSMA/EB. It can observed that for large rdB, CSMA/EB

0

200

400

600

800

1000

1200

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9

Thr

ough

put

Coherence Coefficient

PushbackCSMA/EB

CSMA

(b) Throughput

herence coefficients / in a 5 � 5 network.

en Markov model based scheme for energy efficient ..., Ad

Page 10: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0 2 4 6 8 10 12

Pack

et S

ucce

ss R

ate

Shadowing Deviation

PushbackCSMA/EB

CSMA

(a) Packet Success Rate

0

200

400

600

800

1000

1200

0 2 4 6 8 10 12

Thr

ough

put

Shadowing Deviation

PushbackCSMA/EBCSMA

(b) Throughput

Fig. 8. Simulation results for various shadowing deviations rdB in a 5 � 5 network.

10 S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx

ARTICLE IN PRESS

has lower throughput than CSMA due to the inefficiency ofthe exponential backoff mechanism.

5.2.4. Network sizeIn a large network, even though the rate of data gener-

ated at each node may be low, the cumulative data rates atnodes close to the sink may still be high. Hence, we evalu-ate the pushback algorithm for various network sizes inthis section. We vary the number of rows and columns ina grid network from 2 to 10 (i.e., the network size variesfrom 4 to 100 nodes) while keeping other parameters fixedas in Table 3. The results are shown Fig. 9. One can observethat the pushback algorithm can bring the most benefit inPSR when the network size is smaller than 64. For largernetworks, the pushback algorithm can still provide overallimprovement due to the relatively lower data rates atnodes not in the hot-spots. Throughput for large networksizes can also be improved.

5.2.5. Node density in random topologyWe evaluate the performance of the pushback algo-

rithm with nodes randomly placed in a 150 m � 150 marea. We vary the number of nodes from 25 to 100 withother parameters fixed as in Table 3. As shown by the re-sults in Fig. 10, even though the absolute improvement inPSR decreases with the increase of node density, steadyimprovement of about 33% is maintained except for thecase of 100 nodes which represents quite high node den-sity and thus high data rates at nodes in hot-spots. The

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8

0 10 20 30 40 50 60 70 80 90 100

Pack

et S

ucce

ss R

ate

Network Size

PushbackCSMA/EB

CSMA

(a) Packet Success Rate

Fig. 9. Simulation results for

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

pushback algorithm can lead to higher throughput com-pared to CSMA.

5.2.6. Packet sizeLarger packet size implies smaller control overhead of

header size and acknowledgment. But using larger packetsize usually also means the transmission is more vulnera-ble to errors. Hence, we evaluate the performance of thethree protocols with various payload sizes in this sectionand the results are summarized in Fig. 11. It can be seenthat with the increase in packet size, the PSR decreasesfor CSMA and CSMA/EB. But for the pushback algorithm,the PSR is steady, except for packet sizes as large as250 bytes, and the improvement is more significant formedium packet sizes. For the packet size of 250 bytes,the SNR with fixed node separation is not sufficient to sus-tain a high success rate, which leaves smaller room forimprovement.

5.2.7. BandwidthIn this section, we evaluate the performance of the

pushback algorithm with different bandwidths rangingfrom 19.2 kbps provided by XSM nodes [41] to 250 kbpssupported by IEEE 802.15.4. The results plotted in Fig. 12show that the pushback algorithm can provide improve-ment in PSR, but the improvement is smaller for higherrates. However, for radios with higher rates, if the packetsize is proportionally increased, we can still observe simi-lar improvement as small packet sizes in Fig. 12.

0

200

400

600

800

1000

1200

1400

1600

0 10 20 30 40 50 60 70 80 90 100

Thr

ough

put

Network Size

PushbackCSMA/EB

CSMA

(b) Throughput

various network sizes.

en Markov model based scheme for energy efficient ..., Ad

Page 11: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

100 81 64 49 36 25

Pack

et S

ucce

ss R

ate

Number of Nodes

PushbackCSMA/EB

CSMA

(a) Packet Success Rate

0

500

1000

1500

2000

100 81 64 49 36 25

Thr

ough

put

Number of Nodes

PushbackCSMA/EB

CSMA

(b) Throughput

Fig. 10. Simulation results for various node densities in a random topology.

0

0.1

0.2

0.3

0.4

0.5

200 150 100 50 29

Pack

et S

ucce

ss R

ate

Packet Size (Bytes)

PushbackCSMA/EB

CSMA 0

200

400

600

800

1000

1200

200 150 100 50 29

Thr

ough

put

Packet Size (Bytes)

PushbackCSMA/EB

CSMA

(a) Packet Success Rate (b) Throughput

Fig. 11. Simulation results for various packet sizes.

0

0.1

0.2

0.3

0.4

0.5

0.6

250 200 150 100 76.8 38.4 19.2

Pack

et S

ucce

ss R

ate

Bandwidth (kbps)

PushbackCSMA/EB

CSMA 0

200

400

600

800

1000

1200

250 200 150 100 76.8 38.4 19.2

Thr

ough

put

Bandwidth (kbps)

PushbackCSMA/EB

CSMA

(a) Packet Success Rate (b) Throughput

Fig. 12. Simulation results for various bandwidth.

S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx 11

ARTICLE IN PRESS

5.2.8. Cooperation with rate control and back-pressureMany link layer protocols [14–17] use packet rate con-

trol and back-pressure techniques to mitigate the conges-tion in the network. These techniques can work inconjunction with and benefit from the pushback algorithm.To show this, we implement and test the rate limiting andback-pressure mechanisms (denoted as RC/BP) proposed in[15] along with the pushback algorithm. Fig. 13a shows thePSR when CSMA/EB and RC/BP are used with and withoutthe pushback algorithm under different data rates. It canbe seen that the two metrics have similar variation trendsas in Fig. 6, which shows that the pushback algorithm can

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

still bring significant benefit when other congestion con-trol mechanisms are used in conjunction. The results forthroughput (Fig. 13b) also show similar trends as in Fig. 6.

6. Conclusions and future research

This paper introduces a channel aware transmissionpushback mechanism to optimize energy efficiency. Usinga simple but effective packet loss model, this approachdoes not incur high computational overhead on the sensornodes. Using simulations we show that the pushback algo-rithm can significantly improve the packet success rate and

en Markov model based scheme for energy efficient ..., Ad

Page 12: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

0

0.1

0.2

0.3

0.4

0.5

0.6

0.2 0.15 0.1 0.05

Pack

et S

ucce

ss R

ate

Data Rate (Packets/Second)

Pushback+RC/BPRC/BP

(a) Packet Success Rate

0 200 400 600 800

1000 1200 1400 1600 1800

0.2 0.15 0.1 0.05

Thr

ough

put

Data Rate (Packets/Second)

Pushback+RC/BPRC/BP

(b) Throughput

Fig. 13. Simulation results for the cooperation of the pushback algorithm and RC/BP.

12 S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx

ARTICLE IN PRESS

the energy tax without degrading the throughput. In addi-tion, this algorithm is easy to implement over existing MACand link layer protocols. Hence, we conclude that the push-back algorithm is highly suitable for energy constrainedwireless sensor networks.

Future research directions based on the concepts intro-duced in this paper are described below.

6.1. Pushbacks in other networks

This paper has focused on the application of the novelconcept of pushbacks in the context of sensor networks.However, the concept of pushbacks when applied to othernetworking scenarios such as ad hoc networks and meshnetworks, can be used to optimize other parameters suchas the number of transmissions. In these networks, re-duced interference due to reduction in number of trans-mission is expected to result in increased throughput.

6.2. Joint optimization of transmission parameters

In this work we have used channel quality prediction toappropriately delay transmissions. However, channel qual-ity prediction can be used to adjust other parameters suchas physical layer data rate, transmission power, and car-rier-sense threshold, some of which are inter-related.

Acknowledgements

This material is based upon work partially supported bythe National Science Foundation under Grants CNS-0546630 (CAREER Award), CNS-0721434, CNS-0721817and CNS-0403342. Any opinions, findings, and conclusionsor recommendations expressed in this material are thoseof the author(s) and do not necessarily reflect the viewsof the National Science Foundation.

Appendix A. Derivation of the conditional probabilities

In this section we derive the conditional probabilities ofa wide-sense Markov process given in Eqs. (1)–(4). A wide-sense Markov process has an exponential autocovariancefunction. In our analysis, we assume that the autocovari-ance function is of the form KA(m) = p(1 � p)ajmj and the

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

unconditioned probability of failure (P(An = F)) and success(P(An = S)) are p and 1 � p respectively.

First, we derive the probabilities conditioned on failure,i.e., Eqs. (3) and (4). To facilitate the evaluation of theexpectation, we code the event of Failure (F) as ‘1’ andthe event of Success (S) as ‘0’. Covariance is defined as,

KAðmÞ ¼ E½AnþmAn� � E½Anþm�E½An�

¼X

x2f0;1g

Xy2f0;1g

xyPðAnþm ¼ x j An ¼ yÞPðAn

¼ yÞ �X

x2f0;1gxPðAnþm ¼ xÞ

Xy2f0;1g

yPðAn ¼ yÞ

¼ PðAnþm ¼ 1 j An ¼ 1Þp� p2: ð10Þ

For m P 0, we can compare Eq. (10) to the autocovariancefunction for a wide-sense Markov process,

KAðmÞ ¼ pð1� pÞam ¼ PðAnþm ¼ 1 j An ¼ 1Þp� p2;

to get Eq. (3) or P(An+m = 1jAn = 1) = p + (1 � p)am. Using thefact, P(An+m = 0jAn = 1) = 1 � P(An+m = 1jAn = 1), we get Eq.(4) or P(An+m = 0jAn = 1) = 1 � p � (1 � p)am.

To derive the probabilities conditioned on success, i.e.,Eqs. (1) and (2), we follow the same steps with minor mod-ifications. In this case, we code the event of Success (S) as‘1’ and the event of Failure (F) as ‘0’. From the definition ofCovariance, we get,

KAðmÞ ¼ pð1� pÞam ¼ PðAnþm ¼ 1 j An

¼ 1Þð1� pÞ � ð1� pÞ2: ð11Þ

On simplification of Eq. (11), we get Eq. (2) or P(An+-

m = 1jAn = 1) = 1 � p(1 � am). Finally, P(An+m = 0jAn = 1)= 1 � P(An+m = 1jAn = 1) gives Eq. (1) or P(An+m = 0jAn

= 1) = p(1 � am).

Appendix B. Maximum likelihood estimation of thechannel parameters

In this section we consider the ML estimation of theMarkov channel parameters, a,p, based on the binary errorrealization sequence. We assume that the initial state ofthe chain is picked according to its steady statedistribution.

Suppose a transmitter transmits n� 1 packets and ob-serves the associated ACK sequence. Let the number of suc-

en Markov model based scheme for energy efficient ..., Ad

Page 13: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

S. Liu et al. / Ad Hoc Networks xxx (2008) xxx–xxx 13

ARTICLE IN PRESS

cessful transmissions be Ns (i.e., the number of failed trans-missions is Nf = n � Ns), the number of successive successfultransmissions be Nss and the number of successive failedtransmissions be Nff. First we find the estimates of the Mar-kov chain transition probabilities x,y based on the observa-tions Ns = ns, Nss = nss and Nff = nff. For notational simplicity,we drop the random variables and use P(nss) instead ofP(Nss = nss) for instance. The ML estimate for the pair

ðxML; yMLÞ ¼ arg maxðx;yÞ2ð0;1Þ

Pðns;nss;nff j x; yÞ

¼ arg maxðx;yÞ2ð0;1Þ

Pðnss;nff j ns; x; yÞPðns j x; yÞ

¼ arg maxðx;yÞ2ð0;1Þ

ns

nss

� �ð1� xÞnss xns�nss

|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}ðIÞ

�n� ns

nff

� �ð1� xÞnss ynff ð1� yÞn�ns�nff

|fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}ðIIÞ

� Pðns j x; yÞ|fflfflfflfflfflfflffl{zfflfflfflfflfflfflffl}ðIIIÞ

: ð12Þ

The value of x 2 (0,1) that maximizes Term (I) is xm ¼ 1� nssns

and the value of y that maximizes Term (II) is ym ¼nff

n�ns. If

we show

ðxm; ymÞ ¼ arg maxðx;yÞ

Pðns j x; yÞ; ð13Þ

then ðxML; yMLÞ ¼ ðxm; ymÞ. For n� 1, P(Ns = nsjx,y) is maxi-mized for ns ¼ nps ¼ n 1�y

xþ1�y. Thus, if we verify

ns

n¼ 1� ym

xm þ 1� ym;

then (13) is proved. Note that the number of transitionsfrom state ‘S’ to state ‘F’ is nsf = ns � nss and the number oftransitions from state ‘F’ to state ‘S’ is nfs = nf � nff. Sincensf = nfs 1, nsf

nfs! 1 as n ?1 (x,y 2 (0,1), therefore nsf,

nfs ?1). Consequently

1� ym

xm þ 1� ym¼

1� nff

n�ns

1� nssnsþ 1� nf f

n�ns

¼ nfs=nf

nsf =ns þ nfs=nf

¼ 1=nf

1=ns þ 1=nf¼ ns

n�

Since p, a is deterministic given x, y, the ML estimatespML; aML can be found by solving the system of equations

1� nss

ns¼ pMLð1� aMLÞ

nff

ns¼ pML þ ð1� pMLÞak

ML:

References

[1] A. Woo, T. Tong, D. Culler, Taming the underlying challenges ofreliable multihop routing in sensor networks, in: Proceedings of theACM SenSys, October 2003, pp. 14–27.

[2] J. Zhao, R. Govindan, Understanding packet delivery performance indense wireless sensor networks, in: Proceedings of the ACM SenSys,October 2003, pp. 1–13.

[3] A. Willig, M. Kubisch, H. Christian, A. Wolisz, Measurements of awireless link in an industrial environment using an 802.11-compilant physical layer, IEEE Trans. Ind. Electron. 49 (6) (2002)1265–1282.

[4] A. Kamerman, L. Monteban, WaveLAN II: a high-performancewireless LAN for the unlicensed band, Bell Labs Technical Journal2(3) (1997) 118–133.

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

[5] G. Holland, N. Vaidya, P. Bahl, A rate-adaptive MAC protocol formulti-hop wireless networks, in: Proceedings of ACM MOBICOM,July 2001, pp. 236–251.

[6] B. Sadeghi, V. Kanodia, A. Sabharwal, E. Knightly, Opportunisticmedia access for multirate ad hoc networks, in: Proceedings of ACMMOBICOM, July 2002, pp. 24–35.

[7] S.H.Y. Wong, H. Yang, S. Lu, V. Bharghavan, Robust rate adaptationfor 802.11 wireless networks, in: Proceedings of ACM MOBICOM,September 2006, pp. 146–157.

[8] M. Buettner, G.V. Yee, E. Anderson, R. Han, X-MAC: A short preambleMAC protocol for duty-cycled wireless sensor networks, in:Proceedings of ACM SenSys, November 2006, pp. 307–320.

[9] S. Liu, K.-W. Fan, P. Sinha, CMAC: An energy efficient MAC layerprotocol using convergent packet forwarding for wireless sensornetworks, in: Proceedings of IEEE SECON, June 2007.

[10] W. Ye, J. Heidemann, D. Estrin, Medium access control withcoordinated adaptive sleeping for wireless sensor networks, IEEE/ACM Trans. Networking 12 (3) (2004) 493–506.

[11] G. Lu, B. Krishnamachari, C.S. Raghavendra, An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensornetworks, in: Proceedings of IPDPS, April 2004, pp. 224–231.

[12] M. Zorzi, R.R. Rao, Error control and energy consumption incommunications for nomadic computing, IEEE Trans. Comput. 46(3) (1997) 279–289.

[13] C.-F. Chiasserini, M. Meo, Impact of ARQ protocols on QoS in 3GPPsystems, IEEE Trans. Veh. Technol. 52 (1) (2003) 205–215.

[14] C.-Y. Wan, S.B. Eisenman, A.T. Campbell, CODA: congestion detectionand avoidance in sensor networks, in: Proceedings of ACM SenSys,October 2003, pp. 266–279.

[15] B. Hull, K. Jamieson, H. Balakrishnan, Mitigating congestion inwireless sensor networks, in: Proceedings of ACM SenSys, November2004, pp. 134–147.

[16] S. Rangwala, R. Gummadi, R. Govindan, K. Psounis, Interference-aware fair rate control in wireless sensor networks, in: Proceedingsof ACM SIGCOMM, September 2006, pp. 63–74.

[17] C. Lim, H. Luo, C.-H. Choi, RAIN: A reliable wireless networkarchitecture, in: Proceedings of IEEE ICNP, November 2006, pp.228–237.

[18] M. Heusse, F. Rousseau, R. Guillier, A. Duda, Idle sense: an optimalaccess method for high throughput and fairness in rate diversewireless LANs, in: ACM SIGCOMM, November 2005, pp. 134–147.

[19] B. Prabhakar, E.U. Biyikoglu, A.E. Gamal, Energy-efficienttransmission over a wireless link via lazy packet scheduling, in:Proceedings of IEEE INFOCOM, April 2001, pp. 386–394.

[20] M. Zorzi, R.R. Rao, Lateness probability of a retransmission schemefor error control on a two-state Markov channel, IEEE Trans.Commun. 47 (10) (1999) 1537–1548.

[21] C.-F. Chiasserini, M. Meo, Energy efficiency of radio link protocols in3GPP systems, in: Proceedings of IEEE VTC’01-Spring, May 2001, pp.2615–2619.

[22] S. Geirhofer, L. Tong, B.M. Sadler, Cognitive medium access:constraining interference based on experimental models, IEEE J.Select. Areas Commun. 26 (1) (2008) 95–105.

[23] T. van Dam, K. Langendoen, An adaptive energy-efficient MACprocotol for wireless sensor networks, in: Proceedings of ACMSenSys, November 2003, pp. 171–180.

[24] J. Polastre, J. Hill, D. Culler, Versatile low power media access forwireless sensor networks, in: Proceedings of ACM SenSys, November2004, pp. 95–107.

[25] J. Polastre, J. Hui, P. Levis, J. Zhao, D. Culler, S. Shenker, I. Stoica, Aunifying link abstraction for wireless sensor networks, in:Proceedings of ACM SenSys, November 2005, pp. 76–89.

[26] M. Zorzi, R.R. Rao, Geographic random forwarding (GeRaF) for ad hocand sensor networks: multihop performance, IEEE Trans. MobileComput. 2 (4) (2003) 337–348.

[27] M. Zorzi, R.R. Rao, Geographic random forwarding (GeRaF) for ad hocand sensor networks: energy and latency performance, IEEE Trans.Mobile Comput. 2 (4) (2003) 349–365.

[28] S. Jain, S.R. Das, Exploiting path diversity in the link layer in wirelessad hoc networks, in: Proceedings of WoWMoM, June 2005, pp. 22–30.

[29] R.R. Choudhury, N.H. Vaidya, MAC-layer anycasting in ad hocnetworks, SIGCOMM Computer Commun. Rev. 34 (1) (2004) 75–80.

[30] J.-G. Choi, S. Bahk, Channel aware MAC scheme based on CSMA/CA,in: Proceedings of IEEE VTC’04-Spring, May 2004, pp. 1559–1563.

[31] L. Bononi, M. Conti, L. Donatiello, A distributed mechanism for powersaving in IEEE 802.11 wireless LANs, Mobile Networks Appl. 6 (2001)211–222.

en Markov model based scheme for energy efficient ..., Ad

Page 14: Ad Hoc Networks - Computer Science and Engineeringweb.cse.ohio-state.edu/~sinha.43/publications/journal/adhoc08_pushback.pdfPushback: A hidden Markov model based scheme for energy

14 S. Liu et al. / Ad Hoc Network

ARTICLE IN PRESS

[32] P. Papadimitratos, A. Mishra, D. Rosenburgh, A cross-layer designapproach to enhance 802.15.4, in: Proceedings of IEEE MILCOM,October 2005, pp. 1719–1726.

[33] E.N. Gilbert, Capacity of a burst-noise channel, Bell Syst. Tech. J. 39(1960) 1253–1266.

[34] B.D. Fritchman, A binary characterization using partitioned Markovchains, IEEE Trans. Inform. Theory 13 (2) (1967) 221–227.

[35] W. Turin, M.M. Sondhi, Modeling error sources in digital channels,IEEE J. Select. Areas Commun. 11 (3) (1993) 340–347.

[36] M. Zorzi, R.R. Rao, L.B. Milstein, On the accuracy of a first-orderMarkov channel for data transmission on fading channels, in:Proceedings of IEEE ICUPC’95, November 1995, pp. 211–215.

[37] A. Arora, E. Ertin, R. Ramnath, W. Leal, M. Nesterenko, Kansei: a high-fidelity sensing testbed, IEEE Internet Computing 10 (2) (2006) 35–47.

[38] The Network Simulator – ns-2, <http://www.isi.edu/nsnam/ns/>.[39] M. Zuniga, B. Krishnamachari, Analyzing the transitional region in

low power wireless links, in: Proceedings of IEEE SECON, October2004, pp. 517–526.

[40] T.S. Rappaport, Wireless Communications: Principles and Practice,second ed., Prentice Hall, 2001.

[41] P. Dutta, M. Grimmer, A. Arora, S. Bibyk, D. Culler, Design of awireless sensor network platform for detecting rare, random, andephemeral events, in: Proceedings of IPSN, April 2005, pp. 497–502.

[42] S. Liu, R. Srivastava, C.E. Koksal, P. Sinha, Optimizing energyconsumption with transmission pushbacks in sensor networks,Technical Report, Department of Computer Science andEngineering, Ohio State University, February 2008. <http://www.cse.ohio-state.edu/prasun/publications/tr/pushback.pdf>.

Sha Liu received his BS degree in statisticsand MS degree in computer science at Uni-versity of Science and Technology of China in2001 and 2004, respectively. Currently he is aPh.D. student in computer science of the OhioState University. His research interestsinclude low latency routing, wake-up sched-uling and data aggregation in wireless sensornetworks.

Rahul Srivastava received the B.Tech. degreein Electrical Engineering from the IndianInstitute of Technology (IIT), Madras, India, in2002 and the MS degree in Electrical andComputer Engineering from Rice University,Houston, in 2005. He is currently workingtowards the Ph.D. degree in Electrical andComputer Engineering at The Ohio State Uni-versity, Columbus. His current researchinterests include communication theory,wireless networks and optimization theory.

Please cite this article in press as: S. Liu et al., Pushback: A hiddHoc Netw. (2008), doi:10.1016/j.adhoc.2008.09.001

Can Emre Koksal received the BS degree in

electrical engineering from the Middle EastTechnical University, Ankara, Turkey, in 1996,and the SM and Ph.D. degrees from the Mas-sachusetts Institute of Technology (MIT),Cambridge, in 1998 and 2002, respectively, inelectrical engineering and computer science.He was a Postdoctoral Fellow in the Networksand Mobile Systems Group in the ComputerScience and Artificial Intelligence Laboratory,MIT, until 2003 and a Senior Researcherjointly in the Laboratory for Computer Com-

munications and the Laboratory for Information Theory at EPFL, Swit-zerland, until 2006. Since then, he has been an Assistant Professor in theElectrical and Computer Engineering Department, Ohio State University,

s xxx (2008) xxx–xxx

Columbus. His general areas of interest are wireless communication,computer networks, information theory, stochastic processes, and finan-cial economics.

Prasun Sinha received his Ph.D. from Uni-versity of Illinois, Urbana-Champaign in 2001,MS from Michigan State University in 1997,and B.Tech. from IIT Delhi in 1995. He workedat Bell Labs, Lucent Technologies as a Memberof Technical Staff from 2001 to 2003. Since2003 he is an Assistant Professor in Depart-ment of Computer Science and Engineering atOhio State University. His research focuses ondesign of network protocols for sensor net-works and mesh networks. He served on theprogram committees of various conferences

including INFOCOM (2004–2007) and MOBICOM (2004–2005). He haswon several awards including Ray Ozzie Fellowship (UIUC, 2000), MavisMemorial Scholarship (UIUC, 1999), and Distinguished Academic

Achievement Award (MSU, 1997). He received the prestigious NSFCAREER award in 2006.

en Markov model based scheme for energy efficient ..., Ad