A gating mechanism for border node assisted association of wireless personal area networks
© Zafar et al.; licensee Springer. 2012
Received: 6 June 2012
Accepted: 20 July 2012
Published: 16 August 2012
IEEE 802.15.4 based Wireless Personal Area Networks (WPANs) are envisioned to play a vital role in the application centric ubiquitous networks. In IEEE802.15.4 networks, the use of non-interfering logical channels in multiple PANs, operating in a Personal Operating Space (POS) ensures to control the scope of PAN-directed broadcasts, reduce received energy per PAN device, and minimize interference at the physical layer. At the downside the inter-PAN communication is not possible with this setup as PANs in the same region remain unaware of each other’s presence. This situation hinders sharing information of common interest amongst PANs and accessing infrastructure networks hopping through multiple PANs. In this paper, we present a comprehensive architecture enables neighboring PANs to communicate by diffusing into each other through border nodes. The basic idea is to time share logical channels to perform a gating operation by border nodes. Our contribution includes detection of border nodes, discovery of neighboring PAN(s), a common channel based gating protocol, interest diffusion and inter-PAN data transfer. We mathematically analyze the proposed architecture and carry out simulations in Network Simulator (ns2) for performance evaluation. Our simulations show that the proposed architecture gives optimal performance when multiple border nodes are able to perform gating.
KeywordsGating Personal area networks Border nodes Diffusion
IEEE802.15.4 Low-Rate Wireless Personal Area Networks (LR-WPAN) are envisioned to support ubiquitous computing like wireless sensor networks. The standard defines the physical (PHY) layer and medium access control (MAC) layer specifications for low power devices that wirelessly communicate within Personal Operating Space (POS) around 10 meters or less at low data rates. WPANs are expected to find a very important role in the application centric ubiquitous networks. With the emergence of this technology, newer application scenarios of WPANs are also emerging. Body Area Networks (BANs) and Car Area Networks (CANs) are just the snapshots of what applications might evolve into the future. Whatsoever the diversification of these networks, one thing might be said with certainty about them—these networks would need to collaborate at various levels and degrees. Although the collaboration within a PAN is a widely studied area, little work can be found for collaboration across PANs. The focus of this work is inter-WPAN communication.
In IEEE802.15.4 WPANs (IEEE802.15.4-), while a single logical channel may be used for multiple PANs in the same POS each with a unique PAN-Id, the usage of a non-interfering logical channel for each PAN is highly desirable. It ensures to contain PAN-directed broadcasts, reduces receiving energy per PAN device, and minimizes interference at the physical layer. However, it also inhibits inter-PAN communication. The PANs in the same POS remain unaware of each other’s presence and form isolated islands. This situation adversely affects the likelihood to exploit the synergistic role of PANs, e.g., sharing information of common interest amongst PANs and accessing infrastructure networks (e.g., the Internet) hopping through multiple PANs.
In this paper, we take up the problem of allowing communication between PANs in the same POS that are operating in different logical channels. We present an architecture extending an earlier proposal ([Zafar et al. 2010]) that systematically allows neighboring PANs to communicate with each other by diffusing into each other. The diffusion takes place through gating operation performed by nodes that reside at the border of the two non-interfering PANs. Specifically, our contributions include a) border nodes detection algorithm, b) neighbor PAN discovery, c) A common channel based gating mechanism, d) interest advertisement and e) inter-PAN data transfer. The remainder of the paper is organized as follows. In section 2, we discuss the related work. Section 3 presents the proposed architecture in detail. In section 4 we mathematically analyze the proposed architecture and in section 5 we present experimental results based on ns2 simulations. Finally; section 6 summarizes results and concludes the paper.
Broadly speaking, the contribution in this work is two-fold, namely border nodes identification and cluster diffusion. Hence the related work is classified in two sections; border nodes identification methods and the current state of the art in cluster merging and cluster diffusion.
Different boundary nodes identification methods are surveyed in ([Khan et al. 2008]; [Zhang et al. 2009]; [Mallery & Medidi 2008]; [Wang et al. 2006]; [Ahmed et al. 2005]). In ([Khan et al. 2008]) Khan et al. presents a survey of boundary detection algorithms for wireless sensor networks. They categorize the boundary detection algorithms into three types, namely the geometrical approaches, the statistical approaches and topological approaches. In ([Zhang et al. 2009]) Zhang et al. propose two innovative algorithms for individual sensor nodes to detect whether they are located on the coverage boundary, i.e., the boundary of a coverage hole or network separation. Their algorithms are founded on two new computational geometric techniques called localized Voronoi and neighbor embracing polygons. Mallery and Medidi in ([Mallery & Medidi 2008]) highlight the importance of boundary detection in sensor networks by reasoning that the ability to geometrically signify sensed phenomena within a sensor network can offer extra concise view as compared to details of all nodes detecting a phenomenon. Wang et al. propose an algorithm in ([Wang et al. 2006]) which is founded on constructing a shortest path tree by flooding the network. They utilize the Nearest Common Ancestors (NCA) method to find holes in the network. In ([Ahmed et al. 2005]) this algorithm is further improved. The principal behind this algorithm is creating iso-contours on the basis of hop count distance from the root node.
Cluster-merging has been investigated in ([Jung et al. 2007]; [Willig et al. 2010]; [Jurdak et al. 2008]; [Bandara et al. 2008a]; [Ferreira & Rocha 2007a]; [Wei et al. 2006]; [Campos et al. 2005]; [Misic et al. 2005]; [Misic & Fung 2007]). Wei et al. ([Wei et al. 2006]) describe a cluster-merging algorithm where link Optimization gets the priority. In 802.15.4 networks, a very close work to ours has been done by Misic et al. ([Misic et al. 2005]; [Misic & Fung 2007]) where IEEE802.15.4 network clusters are interconnected through a master–slave bridge. However, they take up the issue of cluster merging as a post-neighboring PAN detection process, bypassing the definition of the mechanics to discover a neighboring PAN. They propose inter-PAN communication in beacon-enabled mode. According to their model, inter-PAN communication is established through a single point, viz. the PAN coordinator.
Border nodes identification (BAIT)
Gating mechanism (BIND)
Inter-PAN data communication (SEND)
Bordering nodes indentificAtIon for gaTing (BAIT)
BAIT operation is initiated at the PAN coordinator where border nodes are detected and their Ids are stored at PAN initialization. Node Id assignment in WPAN follows formula, where FC stands for ‘address of first child node’, MC stands for ‘maximum allowed children’, AP stands for ‘address of parent node’ and N represents the ‘Nth child node’. PAN coordinator runs Algorithm 0 (Additional file 1) for border node detection.
Node Ids of border nodes are stored at PAN coordinator, at this stage PAN coordinator sends pre-gate command to border nodes to initiate foreign PAN(s) discovery. Border nodes run algorithm 1 (Additional file 2) and respond to pre-gate command. Response is positive if foreign PAN is discovered and negative otherwise.
Border Nodes for GatINg through Duty cycle assignment (BIND)
The BIND procedure is carried out through Algorithm 2 (Additional file 3). The gate command is issued by the PAN coordinator upon receiving the affirmative acknowledgement [Resp(pre-gate) = true] from border node(s) and executed at the border nodes. The PAN coordinator issues duty cycle and resumes normal operation.
Border SEnsor Node based inter-PAN Data transfer (SEND)
When a neighboring PAN is discovered, coordinator advertises about the presence of the foreign PAN to all sensor nodes. Before data transfer, sensor nodes must use an interest-based mechanism to solicit data. The data structure for such interest is application-specific and does not mandate explanation here. There are three possible ways for inter PAN interest and data transfer.
Paradigm 1: The home-PAN notifies all sensor nodes under its control about the presence of foreign PAN with a specific role. An ordinary sensor node in PAN ‘A’ if interested in information of interest from foreign PAN forwards inter-PAN data to the coordinator of PAN ‘A’. PAN ‘A’ coordinator has information about bridge nodes therefore it sends this data to PAN ‘B’ coordinator through bridge nodes. PAN ‘B’ coordinator then sends data to the destination sensor node of PAN ‘B’.
Paradigm 2: Another option is for the home-PAN to broadcast to all sensor nodes, not only information about foreign-PANs but also the Ids of bridge nodes through which foreign-PANs can be accessed. In this way, sensor nodes in PAN ‘A’ may send data directly to bridge nodes. For this way of communication, coordinator must announce the Ids of bridge nodes along which type of foreign PAN to which a node can connect through some particular bridge nodes. The bridge node then sends data to the destination node in PAN ‘B’.
Paradigm 3: An additional merged mode of data transfer may also be employed where inter-PAN data transfer is mostly through PAN coordinator. But if bridge node is one hop away from the sending sensor node the sensor node directly sends data to bridge node. In this way those sender nodes that are located near bridge nodes do not have to access bridge nodes through PAN coordinator which can be at a large hop-count away from the sender. This mixed mode also requires notification of bridge node Ids along with foreign-PAN information to all sensor nodes of the network.
This section presents a simple mathematical model for estimating total delay in sending data from a sender node Ns in PAN A to receiver node Nr in PAN B using BRIDGE protocol, the ‘Duty Cycle’ estimation for bridge node and the effect of data rates and multiple bridge nodes on network performance and BRIDGE protocol performance. The analysis provides an insight into the behavior of BRIDGE protocol. The model draws on the concepts introduced in ([Bandara et al. 2008b]; [Ferreira & Rocha 2007b]).
Network model for analyzing BRIDGE architecture
List of notations for mathematical analysis of BRIDGE protocol
Delay from Ns in PAN A to Nr in PAN B
Queuing delay at ordinary node
Delay from Ns to PAN coordinator A
T q (av)
Av. queuing delay at bridge node
Total processing delay at PAN coordinator A
Queuing delay at bridge node
Delay from PAN coordinator A to connect node
Data arrival rate at a node
Total delay at bridge node
Data processing rate at a node
Delay at bridge node due to switching WPANs
Number of packets requested by PAN B
Total delay from bridge node to Nr in WPAN B
Time at bridge node in home PAN A
Hop count from Ns to PAN coordinator A
Time at bridge node in PAN B
Hop count from PAN coordinator A to bridge node
Inter-WPAN data at bridge node
Probability that Ns has data to send
Intra-WPAN data at bridge node
Transmission time for successful transmission
Arrival rate of sensed data at a node
Time for unsuccessful transmission of packet
Arrival rate of data to be relayed
Av. # of attempts for successful packet transmit
Number of neighbors of node i
Probability of successful transmission b/w nodes
Probability data from node j is for i
Probability of transmission attempt
Data arrival rate at a bridge node
Max unsuccessful attempts →packet is dropped
Data rate from PAN A to PAN B
No. of neighbors of nodes transferring data
Number of border (bridge) nodes
The propagation delay is negligible and hence ignored.
The terms border node and bridge node are used interchangeably although bridge nodes are those border nodes which discover foreign WPAN and perform gating.
where N b are the number of packets requested by PAN B. Additional processing delay at PAN coordinator A is contributed by: (1) delay in border nodes detection, (2) delay in sending gate command to bridge nodes and (3) delay in calculating the duty cycle. The delays (1) and (2) are one-time delays. These processing delays at PAN coordinator A constitute T PA .
In Eq. (12) h 2 is the number of hops between PAN coordinator A and bridge node. If given condition is satisfied, PAN coordinator A starts transmission immediately and therefore Otherwise, PAN coordinator A waits for the next duty cycle and in this case . T 3 , the total delay from bridge node to N r includes all the processing, transmission and queuing delays in PAN B and is mainly a function of number of hops (intermediate nodes) from bridge node to PAN coordinator B of PAN B and the number of hops from PAN coordinator B to N r .
whereand T A and T B are as defined earlier i.e., the time for which bridge node is in its parent PAN i.e. PAN A and the time for which bridge node is in neighbor PAN i.e. PAN B. f more than one bridge node exists then duty cycle can be settled in such a way that at least one bridge node is present in each PAN.
Performance impact of data rates and multiple paths
This shows that as the number of bridge nodes joining two neighboring PANs increases, data arrival rate at each bridge node decreases resulting in efficient performance.
ns2 simulations setup for BRIDGE
Number of nodes in PAN A
Number of nodes in PAN B
56 kbps – 256 kbps
PAN join time
Number of border nodes
For the impact of border nodes two partitions of IEEE802.15.4 network were connected through one up to three border nodes and we noted down the delivery ratio when the number of flows was increased. The delivery ratio (or packet delivery ratio) is defined as the ratio of number of packets received by the receiver to the number of packets transmitted by the sender. Figure 4 shows plot for delivery ratio from one to four flows when single, two and three border nodes are used for PAN diffusion respectively. As shown in this graph, the delivery ratio is 100% and deteriorates for two, three and four flows. It is noticed that instead of linear reduction, the reduction is less which is due to the fact that all flows are not active at the same time. The contention would be more if all flows were active simultaneously. It is also noted that the increase in the number of border nodes increases the availability of bridging nodes for ordinary sensor nodes therefore, for an arbitrary flow delivery ratio is additionally increased as compared to a single border node. The delivery ratio is improved to nearly 78% when two border nodes are used for gating and is improved to about 88% when three border nodes are used when compared with 65% delivery ratio when a single border node is used for gating. The results also show that the probability of successful delivery of a flow is a function of number of border nodes(s) in the source channel. As number of border nodes increases, cluster diffusion starts to mirror PAN merger.
On the other hand, when a greater number of border nodes are involved in PANs connectivity, the two PANs do not remain independent, and ultimately a single broadcast domain is created. As a result the possibility of broadcast storms increases, reducing the energies of individual sensor nodes thus increasing node failures. It is concluded that an optimal number of border nodes need to be selected for gating in order to realize best performance in the interconnection of two or more PANs. That optimal number depends upon the amount of data to be transferred and background traffic.
Background traffic (inter-PAN)
Data delivery paradigms
In IEEE802.15.4 networks, when non-interfering logical channels are used in multiple PANs operating in a Personal Operating Space the inter-PAN communication is not possible because the PANs in the same region remain unaware of each other’s presence. This situation adversely hinders realizing the pervasive and synergistic vision of PANs, e.g., sharing information of common interest amongst PANs and accessing infrastructure networks hopping through multiple PANs. In this paper, we have presented a novel mechanism to allow communication between multiple PANs in the same POS that are using different logical channels. We have proposed a framework that enables neighboring PANs to communicate with each other by diffusing into each other through “bordering nodes”. The simulation results show improvement in delivery ratio when number of border nodes is increased, and also hinting at the likely detrimental effects when the borders nodes are indefinitely increased.
- Ahmed N, Kanhere S, Jha S: The holes problem in wireless sensor networks: a survey. ACM Sigmobile Mobile Computing and Communications Review J (MC2R) 2005,9(2):4-18. 10.1145/1072989.1072992View ArticleGoogle Scholar
- Bandara H, Jayasumana A, Illangasekare T: Cluster tree based self organization of virtual sensor networks. In Proceedings of IEEE Globecom workshop on Wireless Mesh and Sensor Networks. Paving the Way to the Future or yet Another…? New Orleans; 2008a:1-6. November 2008Google Scholar
- Bandara H, Jayasumana A, Illangasekare T: Cluster tree based self organization of virtual sensor networks. In: Proceedings of IEEE Globecom workshop on Wireless Mesh and Sensor Networks: Paving the Way to the Future or yet Another…?. 2008b.Google Scholar
- Campos R, Pinho C, Ricardo M, Ruela J, Poyhonen P, Kappler C: Dynamic and Automatic Interworking between Personal Area Networks using Composition. In Proceedings of 16th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. IEEE PMIRC2005, Berlin, Germany; 2005. September 2005Google Scholar
- Ferreira LS, Rocha RM: Multi-Channel Clustering Algorithm to Improve Performance of WSNs. In Proceedings of Conference on Telecommunications. ConfTele, Peniche, Portugal; 2007a.Google Scholar
- Ferreira L, Rocha R: Multi-Channel Clustering Algorithm to Improve Performance of WSNs. In Proceedings of 6th Conference on Telecommunications. CONFTELE 2007, Peniche, Portugal; 2007b. 9-11 May 2007Google Scholar
- IEEE802.15.4-2003: “Draft IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Requirements - Part 15: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (WPAN)”. 2003. May 2003Google Scholar
- Jung S, Chang A, Gerla M: Comparisons of ZigBee Personal Area Network (PAN) Interconnection Methods. The IEEE International Symposium on Wireless, Communication Systems (ISWCS); 2007.View ArticleGoogle Scholar
- Jurdak R, Nafaa A, Barbirato A: Large scale environmental monitoring through integration of sensor and mesh networks. Sensors, Special Issue on Wireless Sensor Technologies and Applications, J 2008,8(11):7493-7517.Google Scholar
- Khan I, Mokhtar H, Merabti M: A Survey of Boundary Detection Algorithms for Sensor Networks. In Annual postgraduate symposium on the convergence of telecommunications, networking and broadcasting. Liverpool John Moores University, Liverpool, UK; 2008.Google Scholar
- Kurose J, Ross K: Computer Networking, A Top-Down Approach Featuring the Internet. 2007. Publisher: Addison WesleyGoogle Scholar
- Mallery CJ, Medidi M: Robust Edge Detection in Wireless Sensor Networks. Proceedings of GLOBECOM, 2008 2008.Google Scholar
- Misic J, Fung CJ: The impact of master–slave bridge access mode on the performance of multi-cluster 802.15.4 network. Computer Networks J 2007, 2411-2449.Google Scholar
- Misic J, Fung J, Misic VB: Interconnecting 802.15.4 clusters in master–slave mode: queueing theoretic analysis. In Proceedings of 8th International Symposium on Parallel Architectures, Algorithms, and Networks. ISPAN2005, Las Vegas, Nevada; 2005.7–9December 2005Google Scholar
- Wang Y, Gao J, Mitchell JSB: Boundary recognition in sensor networks by topological methods. Proceedings of MOBICOM, 2006 2006.Google Scholar
- Wei Z, Hui-Min C, Hao W: Cluster Merging Algorithm with Link Optimization for Wireless Sensor Networks. In Proceedings of 2nd International Conference on Wireless Communications, Networking and Mobile Computing. WiCOM2006, Wuhan, China; 2006:1088-1091. 22-24 SeptemberGoogle Scholar
- Willig A, Karowski N, Hauer J: Passive discovery of IEEE 802.15.4-based body sensor networks. Ad Hoc Networks J 2010,8(7):742-754. 10.1016/j.adhoc.2010.02.001View ArticleGoogle Scholar
- Zafar S, Akbar AH, Amjad M, Shams S, Chaudhry SA, Seuk J, Roh B, Kim K: BRIDGE: border-node assistance for common interest-based diffusion through a gating mechanism for collocated WPANs. In Proceedings of International Conference on Emerging Technologies. ICET, 2010, Pakistan; 2010. October 11–13, 2010Google Scholar
- Zhang C, Zhang Y, Fang Y: Localized algorithms for coverage boundary detection in wireless sensor networks. Wireless Networks J 2009,15(1):3-20. 10.1007/s11276-007-0021-1View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.