International Journal of Distributed Sensor Networks, 3: 289–310, 2007 Copyright © Taylor & Francis Group, LLC ISSN: 1550-1329 print/1550-1477 online DOI: 10.1080/15501320601062130
Architecture of Wireless Sensor Networks with Mobile Sinks: Multiple Access Case
1550-1477 Journal of Distributed Sensor Networks, 1550-1329 UDSN International Networks Vol. 3, No. 3, June 2007: pp. 1–26
Architecture L. Song and D. of WSNs Hatzinakos
LIANG SONG, Member, IEEE, and DIMITRIOS HATZINAKOS, Senior Member, IEEE Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, Toronto, Canada
We propose to develop Wireless Sensor Networks with Mobile Sinks (MSSN), under high sensor node density, where multiple sensor nodes need to share one single communication channel in the node-to-sink transmission. By exploiting the tradeoff between the successful information retrieval probability and the nodes energy consumption, a number of multiple nodes transmission scheduling algorithms are proposed. Both optimal and suboptimal algorithms, which exhibit exponential and linear complexity respectively, are discussed under the desired application. Computer simulations show that suboptimal algorithms perform nearly as good as the optimal one. The study leads to the cross-layer Wireless Link layer design for MSSN. Keywords Wireless Sensor Networks; Transmission Scheduling; Multiple Access; Wireless Link Layer; Energy Consumption
1. Introduction The unique nature of wireless sensor networks, which are resource-limited and applicationspecific, requires new approaches in the system design. Recently [1], we proposed to develop Sensor Networks with Mobile Sinks (MSSN) for two application areas, environment monitoring systems with high latency tolerance [19], and intelligent-space [17]. This new architecture features very high energy-efficiency, because multi-hop transmissions of high volume data over the network is converted to single-hop transmissions. Additional advantages of MSSN include: infrastructure free, high security, and ease of implementation. In [1], we discussed the transmission scheduling algorithm TSA-MSSN in a sparsely deploying network setup, where it is assumed that only one sensor node is communicating with the mobile sink on a given channel. However, when the density of sensor networks increases, multiple nodes can be within the transmission range to the sink, and the assumption of a sparsely deploying setup no longer holds. Consider for example the application of micro spies [5]. A micro spy is a micro aircraft with the size of less than six inches. For the purpose of battlefield observation and strategic reconnaissance, sensor networks can be deployed in a remote place with limited wireless infrastructures. A micro spy can, on the other hand, Part of the manuscript was presented in “Dense Sensor Networks with Mobile Sinks,” IEEE International Conference on Acoustics. Speech and Signal Processing (ICASSP), vol. 3, pp. 677–680, Philadelphia PA, Mar. 2005. Manuscript was submitted to International Journal on Distributed Sensor Networks, in Sept. 2005, revised in May 2006. Address correspondence to Dimitrios Hatzinakos, Department of Electrical and Computer Engineering, 10 King’s College Road, Toronto, ON, M5S 3G4, Canada. Tel.: 416-978-1613, Fax: 416-978-4425. E-mail:
[email protected]
289
290
L. Song and D. Hatzinakos
act as a mobile sink, which flies over the sensor deployed region and delivers the collected information back to the commander. In the communication setup, a number of sensor nodes need to send packets to the micro spy simultaneously, because of the importance of the desired information. Also, it may be risky to have the micro spies stay in the air for too long a time, hence, the communication time slots available are limited. The wireless architecture in this scenario is centralized, which is analogous to cellular networks, star network setup in IEEE 802.15.4 [6], and Point Coordination Function (PCF) in IEEE 802.11 [7]. Although there is a large number of classical multiple access schemes [15] available, such as TDMA, FDMA, CDMA, etc., all of them assume that multiple wireless channels are available for node-to-sink communication. In our case, the sink can assign one such distinctive channels to any individual node. The TSA-MSSN, proposed in [1], can then operate on different channels respectively. However, when the number of nodes exceeds the number of channels, multiple nodes will need to share one channel. Thus, multiple nodes scheduling algorithms are needed to ensure the Quality of Service (QoS) of the wireless network. Under different types of wireless networks, there are numerous works investigating the desired scheduling problem. Under cellular networks, from an information theoretic approach, [8] showed that, to maximize the total uplink capacity, it is sufficient to have only the user with the strongest channel to the base station transmit at any given time. Such a power control scheme is known as multiuser diversity, which is also extended to downlink channels in [9], and other forms of channel capacity such as delay-limited capacity [10] and outage capacity [11]. Although strategies in [8] are optimal in the sense of capacity, in the service layer implementations, more QoS factors should be considered, such as fairness, delay, and connection admission control (CAC). Recent references on this topic can be found in CDMA cellular networks [12] and IEEE 802.11 enabled home networking [13]. In the area of sensor networks, SENMA [20] (Sensor Networks with Mobile Agents) studied the sensor network topology similar to MSSN, and proposed distributed random access scheduling. However, SENMA assumes a simple reachback sensor network, which differentiates it from the proposed MSSN. Compared to the existing works, the MSSN is distinctive for the following reasons: In MSSN, the objective of scheduling algorithms is to retrieve integrated/compressed information [14] stored on sensor nodes with the minimum energy consumption. Combined with the mobility of the sink, this guideline, [1], makes the system design different from the conventional wireless networks. More specifically, in the MSSN transmission scheduling, we exploit the tradeoff between the successful information retrieval credit and the nodes energy consumption cost, under the latency limitations imposed by the sink mobility. Instead, in conventional wireless networks, “throughput” is usually emphasized, which is the number of retrived packets per second. Next, we discuss the scenario where multiple sensor nodes are sharing one communication channel in sending information to the mobile sink which is travelling through the deployed sensor networks. The system description is provided in Section II. The proposed optimal multiple nodes transmission scheduling algorithm (MTSAMSSN) is described in Section III. The optimal MTSA-MSSN has the complexity which grows up exponentially with the number of nodes N. Thus, in Section IV, we propose suboptimal algorithms with the complexity as low as O(N). A comparison and validation of the suboptimal algorithms performance are given in Section V, by means of computer simulations. Discussions and concluding remarks are given in Section VI and VII, respectively.
Architecture of WSNs
291
2. System Description 2.1. Concepts and Assumptions The concept of the scheduling design is to reduce the sensor nodes energy consumption, in the process of information retrieval, by exploiting the sink mobility. Utilizing the higher energy, computing, and storage resources at the sink, the proposed scheduling algorithms are centralized, and executed solely at the sink. The problem of finding the optimal scheduling policy is formulated as a Markov Decision Process (MDP), and solved in the framework of dynamic programming [22]. Essentially, the tradeoff between the successful information retrieval credit and the sensor nodes energy consumption cost is explored. Let N denote the number of nodes sharing one specific communication channel. Assume that the location and the number of residual packets of every node are known at the sink, by a registration procedure. More specifically, the registration can be conducted on a separate control channel, where the nodes send the registration, i.e, the location and the packet number, upon the detection of the sink arrival, by means of carrier sensing multiple access (CSMA). The sink acknowledges the registration by assigning the node a generated identification number. At the current time slot i0, the problem to formulate is how the sink decides the transmission strategy, i.e., which one of the N nodes is going to transmit and what is the transmission power. The scheduling algorithm is executed at the beginning of every communication time slot. One time slot is composed of the transmission of two different packets in sequence, which are the acknowledgement (ACK) packet from the sink, and the data packet from one of the sensor nodes, respectively. The obtained scheduling strategy can be piggybacked on the ACK packet broadcasted by the sink to the N associated sensor nodes. The ACK packet, on the other hand, also serves to acknowledge successful or failed data transmission in the previous time slot. It is assumed that the lost data packets will be retransmitted. Assume that the sink has an estimation of its current mobility, which can be obtained from the Global Positioning System (GPS). We do not assume that the future mobility pattern is available at the sink. Instead, we make two approximations: 1. No new node is admitted to the channel until all N nodes have finished the transmission; 2. The mobility of the sink is maintained constant in future time slots. Both assumptions are realistic, because the scheduling algorithm is run at the beginning of every time slot, where both the nodes and the sink mobility information are updated. In the scheduling design, we do not consider the possibility of new data arrival at sensor nodes, in the procedure of information retrieval. The sensor nodes is dissociated with the sink, whenever all the data packets have been retrieved. 2.2. System State Vector Ê(i0) Let Range denote the communication range of the sensor node. It is assumed that Range is the same for all nodes. Let {L1,….LN} denote the location of the N sensor nodes respectively, which are fixed throughout the transmission. At the current time slot i0, let {Kn(i0)|n = 1…N} denote the number of residual packets awaiting for transmission at node n. The location, direction, and the speed of the sink are denoted by Ls(i0), qs(i0), vs(i0), respectively. Then, the current system state is composed of these 2N + 3 elements,
292
L. Song and D. Hatzinakos
E (i0 ) = {L s (i0 ), qs (i0 ), vs (i0 ), L1 ,… , L N , K1 (i0 ),… , K N (i0 )}.
(1)
Let Dn(i0) denote the distance between the sink and the sensor node n, n = 1…N,
Dn (i0 ) = L s (i0 ) − Ln .
(2)
The communication channel gain for the node n can be modeled as [16].
Gn (i0 ) = 10 ⋅ log( A) − 10 ⋅ log( Dn (i0 )) + ( dB),
(3)
where A is a constant decided by the antenna gain; b is the path loss exponent decided by the propagation environment, e.g. b = 2 for free space; and x is a random variable under normal distribution N(0, s x2 ), indicating the shadowing effect. s x2 denotes the variance of x. Let Tn(i0) denote the estimated transmission time slots available for node n, n = 1…N. Since the sink is assumed to have constant mobility when passing through all the N circular regions, centered at {Ln|n = 1…N} with the radius Range, there is,
⎢ L s (i0 ) − L s_out,n Tn (i0 ) = ⎢ vs (i0 ) ⋅ Δt ⎢⎣
⎥ ⎥, ⎥⎦
(4)
Fd + Fb is the time duration of one slot. Fd and Fb are the size of the data and R ACK packets respectively. R is the transmission data rate. Ls_out,n is illustrated in Fig. 1, and is defined as the point at which the sink goes out of the communication range of sensor node n. (See Appendix I for a mathematical definition.) Let, where Δt =
T (i0 ) = max {Tn (i0 )}. n =1…N
(5)
Then, the vector of estimated states can be defined as, ^
^
^
^
E(i0 ) = {E(i0 ), E(i0 + 1),… , E(i0 + T (i0 ) + 1)},
(6)
where Ê(i0) is known as,
E (i0 ) = E (i0 ),
(7)
⎧^ ⎪L s (i0 + j ) = L s (i0 ) + j ⋅ vs ⋅ Δt ⋅ [cos(qs ),sin(qs )]; ⎪^ ⎪q s (i0 + j ) = qs (i0 ) = qs ; ⎨ ⎪^ ⎪v s (i0 + j ) = vs (i0 ) = vs ; ⎪ j = 1… T (i ) + 1. 0 ⎩
(8)
and,
Architecture of WSNs
293
FIGURE 1 The mobile sink passes through the circular region centered on Ln.
Thus, the only variable parameters of each estimated state {Ê(i), i0 < i ≤ i0 + T(i0) + 1} are {K^ n(i)}, which ranges from 0 to Kn(i0). The vector Ê(i) (i0 < i ≤ i0 + T(i0) + 1) can then take
∏ n=1 (K n (i0 ) + 1) discrete values. N
2.3. Markov Chain Model of Ê(i0) The transmission strategy S(i) at time slot i, where i0 ≤ i ≤ i0 + T(i0), is decided by two parameters,
S(i ) = {h (i ) ⋅ Pt (i )},
(9)
where η(i) ∈ {1…N} denotes the ID of the transmitting node in time slot i. Pt(i) is, on the other hand, the transmission power at the sensor node h(i). Note that Pt(i) can be 0 if all N nodes are forced to sleep. We assume the discrete levels transmission power, and that the number of optional levels is Sizeof {Pt}. Given Ê(i) and S(i), Ê(i + 1) is not related to any previous states before i. Thus, {Ê(i)} can be modelled as a Markov chain in time domain, that is,
^
^
^
Prob ( E (i + 1) | E (i0 ),… , E (i ), S(i0 ) … , S(i )) ^
^
= Prob ( E (i + 1) | E (i ), Pt (i ), h (i )).
(10)
294
L. Song and D. Hatzinakos
The state transferring probability function can be written as,
^
^
Prob( E (i + 1) | E (i ), Pt (i ), h (i )) = ⎧ ^ ⎪ P E R(i ), ⎪ ⎪1 − P E^ R(i ), ⎨ ⎪ ⎪ ⎪0, ⎩
^
^
K n (i + 1) = K n (i ), ∀n = 1… N ; ^
(11)
^
K h (i ) (i + 1) = K h (i ) (i ) − 1, ^
^
K n (i + 1) = K n (i ), ∀n ≠ h (i ); others;
where PÊR(i) is the packet error rate of transmission in time slot i. Consider a BPSK modulated uncoded data packet. And assume that the sink is unaware of the shadowing effect ξ, i.e. in the channel model Eq.(3). Then, the PÊR(i) can be written as, [15],
⎛ ⎛ 2 Pt (i ) ⋅ Λ PER(i ) = 1 − ⎜ 1 − Q ⎜ ⎜ ⎜ 2 ^ b ⎜⎝ ⎝ s n ⋅ D h (i ) (i ) where s n2 is the noise power. And Q( x ) =
1
⋅∫
∞ x
⎞⎞ ⎟⎟ ⎟⎟ ⎠ ⎟⎠
Fd
,
(12)
e − t dt. 2
p 2 In the definition of the transmission strategy S(i), Eq.(9), we preclude the possibility of multiple nodes transmitting simultaneously in one time slot. Although the scenario is not physically infeasible, it will require highly sophisticated coding schemes on sensor nodes, which is generally impractical due to the limited hardware resource on one single sensor node. Instead, by adopting the definition in Eq.(9), we reduce the size of strategy space from Sizeof {Pt} N to Sizeof {P t}·N. Furthermore, from an energy conservation perspective, it is also preferable to not allow multiple nodes transmitting simultaneously on one channel. The proof is provided in Appendix II.
3. Optimal MTSA-MSSN Strategy At current time i0, the objective of the MTSA-MSSN is to decide the optimal strategy S(i0) so as to maximize the probability of successful transmission while minimizing the energy consumption. However, these two goals can not be achieved simultaneously. The optimal strategy, S* ( E (i0 )) = {h * ( E (i0 )), Pt* ( E (i0 ))}, is searched by maximizing a utility function, J(S(i0), Ê(i0)), ^
S* ( E (i0 )) = arg max{J ( S(i0 ), E (i0 ))}. S(i0 )
For i0 ≤ i ≤ i0 + T(i0), we define,
(13)
Architecture of WSNs
^
295
^
J (S(i ), E (i )) = J m (S(i ), E (i )) − l ⋅ J c (S(i )).
(14)
In Eq. (14), Jm (S(i), Ê(i)) denotes the figure of credit, which is the expected achievable utility by adopting S(i) at Ê(i). Jc (S(i)), on the other hand, is the figure of cost, which is decided by the energy consumption. λ is a coefficient deciding the tradeoff between the two. Since {Ê(i)} is modeled as a Markov chain, there is: ^
J m (S(i ), E (i )) = Σ^
^
E (i +1)
max S(i +1) {J (S(i + 1), E (i + 1))}. ^
(15)
^
Prob ( E (i + 1) | E (i ), Pt (i ), h (i )), and,
J c (S(i )) =
1 ⋅ Pt (i ). max{Pt }
(16)
where max{Pt} is the maximum available RF (Radio Frequency) transmission power and acts as a normalization factor in Jc. Thus, by combining Eq.(14,15,16), the function J can be written recursively as, ^
^
J (S(i ), E (i )) = J (h (i ), Pt (i ), E (i )) = Σ^
E (i +1)
^
max S(i +1) {J (S(i + 1), E (i + 1))}, ^
^
Prob ( E (i + 1) | E (i ), Pt (i ), h (i )) −
(17)
l ⋅ Pt (i ). max{Pt }
At the final state of the algorithm, i = i0 + T(i0) + 1, the utility function is decided only by Ê(i0 + T(i0) + 1), that is, ^
^
J (S(i0 + T (i0 ) + 1), E (i0 + T (i0 ) + 1)) = J ( E (i0 + T (i0 ) + 1)).
(18)
The definition of J (Ê(i0 + T(i0) + 1)) is, however, application dependent. For example, assuming that each packet is equally credited, say “1”, then it can be defined as, N
J ( E (i0 + T (i0 ) + 1)) = ∑ {K n (i0 ) − K n (i0 + T (i0 ) + 1)}. ^
^
(19)
n =1
If we set λ = 1 in Eq.(14), Eq.(19) suggests that the cost of a maximal power transmission time slot equal to the credit of successfully transmitting one packet. As such, the optimal MTSA-MSSN can be solved by means of dynamic programming, and is summarized in Table 1. Compared with the TSA-MSSN [1], the size of strategy space in MTSA-MSSN has increased N times, from Sizeof {Pt} to N · Sizeof {Pt}.
296
L. Song and D. Hatzinakos TABLE 1 Optimal MTSA-MSSN Algorithm Given E(i0); Get T(i0) by Eq.(5); Initialize final-state utility function J(Ê(i0) + T(i0) + 1)) by Eq.(19); For i equals i0 + T(i0) down to i0, For all S(i) and Ê(i), Calculate J (S(i), Ê(i)) by Eq.(17); Decide the optimal transmission strategy S* (E(i0)) by Eq.(13).
Moreover, the size of the state space Ê(i) is ∏ N ( K n (i0 ) + 1) . Hence, Eq. (17) is executed n =1
O{N ⋅ Sizeof {Pt } ⋅ ∏ nN=1 ( K n (i0 ) + 1)} times in any one iteration of i. The TSA-MSSN, in this framework, becomes a special case of MTSA-MSSN, where N = 1. Since there are T(i0) iterations, the complexity of optimal algorithm is,
C (Optimal ) = O{N ⋅ Sizeof {Pt } ⋅ T (i0 ) ⋅ ∏ n =1 ( K n (i0 ) + 1)} N
(20)
= O(e ). N
Due to the fact that ∏ nN=1 ( K n (i0 ) + 1) (the number of discrete states) increases exponentially with the number of nodes N, the complexity of the optimal algorithm also increases at least exponentially with N. Moreover, if a continuous power level control is implemented, the concavity of the utility function is only proved under the condition N = 1, [1]. It is unclear whether a computational simple way can be found for the optimization in Eq. (17), when N > 1.
4. Suboptimal Algorithms Since the optimal algorithm has the complexity, C(Optimal) given by Eq.(20), which increases exponentially with the number of nodes N, it is infeasible for implementation on a mobile sink, such as a “micro spy.” In developing suboptimal algorithms, the idea is to run the TSA-MSSN (i.e. N = 1) algorithm individually for each node n, and combine the N individual strategies. We denote this suboptimal multiple-access transmission strategy as Ss(i). As presented in [1], the complexity of TSA-MSSN can be reduced to O(1), when a feasible storage capability is available on the sink. Then, the complexity of the proposed suboptimal algorithms, requiring the same sized storage capability, equals N times the complexity of TSA-MSSN. Thus,
C (Suboptimal ) = O( N ).
(21)
4.1. Preprocessing: TSA-MSSN Runs We outline the preprocessing procedure of TSA-MSSN for the integrity of this paper. Assume the current time slot is i0. Let Pt,n(i) denote the strategy (transmission power) of
Architecture of WSNs
297
TSA-MSSN run on node n, and let Ên(i) denote the estimated system state on node n, which is, ^
^
^
^
E n (i ) = {L s (i ), q s (i ), v^ s (i ), Ln , K n (i )},
(22)
i = i0 ,… , i0 + Tn (i0 ) + 1. ^
The definition of L s (i ), q s (i ), and v s (i ) follows from Eq.(8). The TSA-MSSN searches the maximum of a utility function J (Pt,n(i0), Ên(i0)) in obtaining the optimal transmission power decision, Pt*,n ( En (i0 )), ^
Pt*,n ( En (i0 )) = arg max{J ( Pt ,n (i0 ), E n (i0 ))}. Pt ,n (i0 )
(23)
The utility function for each node n, Jn, is recursively defined as, ^
J n ( Pt ,n (i ), E n (i )) = ^
Σ^
E n (i +1)
max Pt ,n (i +1) {J ( Pt ,n (i + 1), E n (i + 1))}, (24)
l ⋅ Pt ,n (i ), Prob( E n (i + 1) | E n (i ), Pt ,n (i )) − max{Pt } ^
^
i = i0 ,… , i0 + Tn (i0 ). where, ^
^
Prob( E n (i + 1) | E n (i ), Pt ,n (i )) = ⎧ ^ ^ ^ ⎪ P E Rn (i ), K n (i + 1) = K n (i ); ⎪⎪ ^ ^ ^ ⎨1 − P E Rn (i ), K n (i + 1) = K n (i ) − 1; ⎪0, others; ⎪ ⎪⎩
(25)
And,
⎛ ⎛ ⎞⎞ 2 Pt ,n (i ) ⋅ A ⎟ ⎟ ^ P E Rn (i ) = 1 − ⎜ 1 − Q ⎜ ⎜ ⎟ ⎜ ^ 2 ⎟ ⎜⎝ ⎝ D n (i ) ⋅ s n ⎠ ⎟⎠
Fd
,
(26)
assuming that BPSK modulated uncoded signal is transmitted. The final state configuration function is Jn (Ên(i0 + Tn(i0) + 1)). In compliance with Eq.(19), it is defined as,
^
^
J n ( E n (i0 + Tn (i0 ) + 1)) = K n (i0 ) − K n (i0 + Tn (i0 ) + 1).
(27)
298
L. Song and D. Hatzinakos TABLE 2 Suboptimal MTSA-MSSN Algorithm Preprocessing Given E(i0); For n equals 1 to N. Get En(i0) from E(i0); Get Tn(i0) by Eq.(4); Initialize final-state utility function Jn (Ên(i0 + Tn(i0) + 1)) by Eq.(27); For i equals i0 + Tn(i0) down to i0. For all Ên(i). Calculate Jn (Pt,n(i), Ên(i)) by Eq.(24); Decide the TSA-MSSN transmission power Pt*,n ( En (i0 )) by Eq.(23). end
Table 2 summarizes the TSA-MSSN preprocessing in suboptimal algorithms. After the preprocessing we obtain the TSA-MSSN power decision on each node, {Pt*,n ( En (i0 )) | n = 1… N}. Due to the constraint on Eq. (9), only one node has a transmitting power greater than zero at any time slot. Different suboptimal algorithms will operate in different ways in deciding ηs (E(i0)) ∈ {1…N}, and then,
Pts ( E (i0 )) = Pt*,h s ( E (i )) ( Eh s ( E (i )) (i0 )). 0
(28)
0
4.2. Suboptimal Algorithm I: Maximal Sensor Power Strategy (MSPS-MSSN) The strategy here is to choose the node with maximum Pt*,n ( En (i0 )) as the transmitting node, that is,
h s ( E (i0 )) = arg max{Pt*,n ( En (i0 ))}, n
(29)
and then by Eq.(28),
Pts ( E (i0 )) = max{Pt*,n ( En (i0 ))}. n
(30)
Thus, in general, the MSPS-MSSN assumes that the sensor node with higher TSA-MSSN power level has higher “urgency” in transmission. 4.3. Suboptimal Algorithm II: Maximal Sensor Utility Strategy (MSUS-MSSN) Based on the TSA-MSSN preprocessing results, MSUS-MSSN chooses the node with the maximal achievable TSA-MSSN utility summation, which is conceptually interpreted as
Architecture of WSNs
299
the associated utility functions summation by selecting one node n for transmitting. The specific summation is mathematically defined as, for n = 1…N, N
U n ( E (i0 )) =
∑
^
^
{J p (0, E p (i0 ))} + J n ( Pt*,n ( En (i0 )), E n (i0 )).
(31)
p =1: p ≠nn
We have,
h s ( E (i0 )) = arg max{U n ( E (i0 ))},
(32)
n
and Pts ( E (i0 )) is obtained through Eq. (28). 4.4. Comparisons of Optimal and Suboptimal Algorithms To provide an analytical performance comparison between optimal and suboptimal algorithms is difficult. However, we discuss two case studies. 1. Case 1: TSA-MSSN Active Case: The definition of “active” is that at least one of the N TSA-MSSN power decisions {Pt*,n ( En (i0 )) | n = 1… N} is nonzero. Consider a simplified scenario where “ideal coding” is utilized on every sensor node, and the power control level Pt,n(i0) on the sensor node is continuous. Furthermore, we assume that there is no shadowing uncertainty about the channel, that is s x2 = 0. These imply that,
⎧0, Pt ,n (i0 ) ≥ B ⋅ Gn (i0 ); PERn (i0 ) = ⎨ ⎩1, Pt ,n (i0 ) < B ⋅ Gn (i0 );
(33)
holds, instead of Eq.(26) where an uncoded binary information sequence has been 2 assumed. B in Eq.(33) is a constant that depends on the noise power s n and the transmission rate R. Under this scenario, in both optimal and suboptimal algorithms, we have the following equations,
⎧ * ⎪ Pt ( E (i0 )) = B ⋅ Gh *( E (i0 )) (i0 ); ⎨ s ⎪⎩ Pt ( E (i0 )) = B ⋅ Gh s ( E (i0 )) (i0 );
(34)
Eq. (34) can be interpreted as follows: For the selected transmitting node n, since Pt,n(i0) = B · Gn(i0) is the minimum power which guarantees the successful packet transmission with probability one, it must be the optimal power decision for both suboptimal and optimal algorithms. According to the simplified model of Eq.(34), the optimal and suboptimal algorithms differ only in the way of choosing the transmission node, h* (E(i0)) or hs (E(i0)), respectively. Note that under more realistic settings, this claim holds only approximately. When comparing MSPS-MSSN and MSUS-MSSN, we note that
300
L. Song and D. Hatzinakos the latter takes into considerations both the energy consumption and the number of residual packets on every node, while the former takes into considerations only the transmitting power. A simulation comparison of the optimal and suboptimal algorithms is given in Section V. 2. Case II: TSA-MSSN Sleeping Case: The definition of TSA-MSSN “sleeping” case is that the TSA-MSSN power decision by Eq.(23) is zero for all nodes, that is,
Pt*,n ( E (i0 )) = 0,
n = 1… N .
(35)
Under this condition, all suboptimal algorithms will keep all nodes sleeping in the current time slot i0. The optimal MTSA-MSSM performs strictly better, since it avoids this restriction by jointly deciding the transmission strategy over all N nodes. Consider the following illustrative example. We set N = 2, and L1 = L2 = [0,5]. Let qs = 0, Ls = [−10,0], and K1(i0) = K2(i0) = 11. The vs is set in such a way that vs. Δt = 1. The TSA-MSSN run on each node will provide the result that Pt*,n ( E (i0 )) = 0, n = 1, 2, since there are enough “better” time slots available for transmission when the sink is moving along the x-axis. However, when jointly considering two nodes, the scheduling algorithm will force one node to transmit, which is equivalent to running TSA-MSSN on one node with K = 20. Since virtually all the configurations in nodes/sink fall under the two described cases, one should avoid Case II when employing suboptimal scheduling algorithms. This, however, can be achieved by the special design in the Media Access Control (MAC) layer channel selecting algorithm. 4.5. Implementation of Suboptimal Algorithms As it has already been mentioned, to avoid the performance degradation in suboptimal algorithms, one should avoid “Case II.” This can be accomplished by running the channel selection algorithm for one specific node n only when it is active, i.e. Pt*,n ( En (i0 )) > 0. This criterion, on the other hand, also enhances the spectrum efficiency by keeping all the occupied channels busy. At the current time i0, assume that there are Nall(i0) nodes associated to the mobile sink. And there are M(i0) occupied channels, where obviously M(i0) < Nall(i0). Define a sensor nodes subset A(i0) of {n | n = 1…Nall(i0)} to be,
A(i0 ) = {n | Pt*,n ( En (i0 )) > 0, n = 1… N all (i0 )}.
(36)
Then, at time i0, the channel selection algorithm only runs on the newly activated nodes n ∈ Anew(i0), where
Anew (i0 ) = A(i0 ) − A(i0 ) ∩ A(i0 − 1).
(37)
Suppose that the maximum number of available channels is Mmax. If M(i0) < Mmax, the channel selecting algorithm can always randomly pick one vacant channel for the new active node, n ∈ Anew(i0). However, if M(i0) = Mmax, the channel selection algorithm selects one of the Mmax occupied channels for the new node, according to some criterion. Although
Architecture of WSNs
301
TABLE 3 Channel Selecting Algorithm Given Em(i0), m = 1…M(i0); Get Km(i0) from Em(i0), m = 1…M(i0) by Eq.(38); Get Anew by Eq.(37); For every n ε Anêw If M(i0) < Mmax Get m* = M(i0) + 1; M(i0) = M(i0) + 1; else Get m* = arg minm {Km(i0)|m = 1…Mmax}; end; Add node n to Em* (i0); Update Km* (i0) by Eq.(38); end a further discussion on channel selection algorithms is outside the scope of this paper, we give an illustrative example. When M(i0) = Mmax, assume that the system states associated with Mmax channels are Em(i0) (m = 1…Mmax), respectively. Let Am(i0) denote the set of nodes sharing the channel m. We define the overall packets number of channel m, Km(i0), as,
K m (i0 ) =
∑
K n (i0 ).
nεA m (i0 )
(38)
A simple criterion on deciding the selected channel m* for the new node is that Km*(i0) be minimal. This criterion, however, expresses a rule of thumb, which simply prevents overcrowding any one particular channel. Table 3 describes this algorithm.
5. Simulations The following simulations scenario is considered. The sink is passing through the sensor network region. Some parameters generally comply with IEEE 802.15.4 [6], and are listed in Table 4. The number of transmission power levels is set to 10, and the set of discrete levels is,
Pt (i ) ε {−∞, − 32, − 28, − 24, − 20, −16, − 12, − 8, − 4, 0}(dBm).
(39)
λ, which is the parameter to decide the tradeoff between successful transmission and energy consumption, is set to be ‘1’ throughout all the simulations. The setups of the stimulations in Section V-A and V-B, i.e. the nodes/sink locations and the packet numbers, are randomly chosen, satisfying the “active” and “sleeping” conditions, respectively. All the results in the figures are the average of 500 Monte-Carlo runs. 5.1. Case 1: TSA-MSSN Active Case We compare the optimal and suboptimal algorithms under “Case I” specified in Section IV-D.1. We assume that two sensor nodes are sharing one specific communication channel, that is N = 2. Without loss of generality, let L1 = [−5, 5], L2 = [0, −4], and K1(i0) = K2(i0) = 10.
302
L. Song and D. Hatzinakos TABLE 4 Communication Parameters Setup Parameter
Unit
Fd Fb R b A Range s n2
Value
bit bit
128 × 8 20 × 8
bits/sec
20000 3 −31 50 −92 20
dB m dBm m/sec
vs
Set θs(i) = 0. With Ls(i0) = [22, 0], the sink passes through the circular communication region of the nodes in a straight line. That is, the sink is moving away from the nodes. Simulations are performed to measure the energy consumption Eall and successful transmission rate Pall of MTSA-MSSN, MSPS-MSSN, and MSUS-MSSN, respectively. In calculating the energy consumption, we omit the RF circuits energy consumption, since it is the same for all algorithms. Then, the definitions of Eall and Pall will be,
Eall =
i0 +T (i0 )
∑
i −i0
Ptr (i ) ⋅
Fd , R
(40)
N
Pall = ∑ {K n (i0 ) − K n (i0 + T (i0 ) + 1)},
(41)
n −1
respectively, where, * ⎪⎧ Pt ( E (i )), Ptr (i ) = ⎨ s ⎩⎪ Pt ( E (i )),
for optimal;
(42)
for suboptimal;
Figures 2 and 3 plot Eall and Pall, respectively, when s x2 changes. The following observations are made: The energy consumption Eall of MSPS-MSSN is much higher than the other two algorithms everywhere; however, it also has a higher Pall than others when s x2 is relatively small. Compared with MSPS-MSSN, the MTSAMSSN and MSUS-MSSN offer a better tradeoff between energy consumption and a successful transmission rate. Although MTSA-MSSN is theoretically optimal and has a much higher complexity, the suboptimal MSUS-MSSN surprisingly performs at least as good as MTSA-MSSN in the simulation. When s x2 is small, MTSA-MSSN outperforms MSUSMSSN slightly, as shown in Figs. 2 and 3. However, when s x2 becomes large, the suboptimal MSUS-MSSN becomes better than the optimal algorithm in both energy consumption and the successful transmission rate. The result may seem to be strange at first glance.
Architecture of WSNs
303
0.26
0.25
Eall (mJ)
0.24
0.23
0.22
0.21
0.2 MTSA−MSSN MSPS−MSSN MSUS−MSSN 0.19 0
0.5
1
1.5
2
2.5
3
2 σξ
FIGURE 2 Case I: total energy consumption Eall vs. s n2.
This is, however, due to the fact that scheduling algorithms are unaware of the shadowing effect of the channel in Eq.(3) (see Eq.(12)). Suboptimal MTSA-MSSN chooses a higher transmission power level, which consumes more energy on one hand, and enhances the probability of successful transmission on the other. Generally, in “Case I,” suboptimal algorithms are efficient alternatives to the optimal one. Especially for the MSUS-MSSN, it performs as good as the optimal algorithm in terms of total energy consumption Eall and successful transmission rate Pall.
5.2. Case II: TSA-MSSN Sleeping Case We compare Eall and Pall of MTSA-MSSN, MSPS-MSSN, and MSUS-MSSN under “Case II” specified in Section IV-D.2. Again, we assume two sensor nodes are associated with one specific communication channel, which is N = 2. let L1 = [15, 5], L2 = [15, −8], and K1(i0) = K2(i0) = 8. Set qs(i) = 0. With Ls(i0) = [0, 0], the sink passes through the circular communication region of the nodes in a straight line. That is, the sink is moving toward the nodes. Since the number of available time slots are much higher than the number of packets in this simulation, Pall for all the algorithms is 16, which implies that no packet is lost in the transmission. Figure 4 shows the variation of Eall when s x2 changes. We observe that the suboptimal algorithms consume much higher energy than the optimal one for all s x2. The result agrees with our analysis in Section IV-D.2.
304
L. Song and D. Hatzinakos 20 MTSA−MSSN MSPS−MSSN MSUS−MSSN
19.9
19.8
19.7
Pall
19.6
19.5
19.4
19.3
19.2
19.1
0
0.5
1
1.5
2
2.5
3
2
σξ
FIGURE 3 Case I: successfully transmitted packets Pall vs. s x2 .
6. Discussions 6.1. Centralized vs. Distributed Scheduling We hereby compare the multiple access MSSN with the SENMA [20], [21]. Although the two have similar network topology, they are nevertheless different types of networks. In MSSN, we assume certain signal processing capability on individual sensor nodes, which can be viewed as the high level event acquisition [4], instead of raw data acquisition. The sink is dominant in MSSN, since the deterministic scheduling is decided on the sink. SENMA, on the other hand, assumes a simple reachback sensor network, where the sensor nodes transmit raw data to the sink (mobile agent), with no inter-node signal processing. The sink in SENMA, on the other hand, consecutively retrieves the packets from the node with the best channel state. SENMA is a sensor nodes dominant network, because the random access is implemented. SENMA claims low complexity of the sensor nodes. MSSN, however, achieves a higher efficiency and a higher application specific flexibility [1], because of the high level event acquisition. The proposed scheduling algorithms better utilize the higher processing/power capability of the sink, and keep the simplicity of sensor nodes. The choice between MSSN and SENMA should be dependent on the application requirements. The proposed scheduling algorithms are centralized, since the mobile sink completely decides the transmission strategies. Under the setup of SENMA, [21] proposed the distributed opportunistic scheduling algorithm, by assuming channel state information on sensor
Architecture of WSNs
6.5
305
x 10−3
6 5.5
EaII (mJ)
5 4.5 4 3.5 3 MTSA−MSSN MSPS−MSSN MSUS−MSSN
2.5 2
0
0.5
1
1.5
2
2.5
3
2 σξ
FIGURE 4 Case II: total energy consumption Eall vs. s 2. x
nodes. Compared with centralized algorithms, distributed algorithms can save protocol overheads. However, in the multiple access MSSN, since the scheduling criterion is more complicated, we consider that the development of distributed scheduling algorithms for MSSN is not cost-efficient. 6.2. Algorithmic Extensions and Cross-layer Design First, the final state configuration function, given by Eq. (19,27), corresponds to the “Application scenario 1” in [1]. As described in [1], the final state configuration is application specific. Different configurations can be applied with the algorithms proposed in this paper without further difficulty. In both [1] and this paper, we have assumed that the transmission rate R is constant. When this assumption does not hold, and multi-rate channel coding is feasible on sensor node, the strategy space of MTSA-MSSN will be the size of N·Sizeof {Pt}·Sizeof {R}, which corresponds to an increase by a factor of Sizeof {R}, the number of rate control levels. Suboptimal algorithms, such as the MSUS-MSSN, can also be extended to this multi-rate case. Second, in the channel mode Eq. (3), the small scale multipath fading was not considered. By assuming a small scale fading model, e.g. the Rayleigh fading, in Eq. (3), we need to recalculate the PÊR function in Eq. (12), which is a function of the separating distance D(i), the transmission power level Pt(i), and the transmission rate R. The fading may not be overlooked in some scenarios, especially when the transmission rate is high, and
306
L. Song and D. Hatzinakos
the time diversity over fading states is not achievable. Although multiple receiving antenna diversity can be a solution, another more cost-efficient alternative is the cooperative transmission in a densely deployed sensor network [2]. It utilizes, by the theory of MIMO structure, nodes space diversity instead of receiving antenna diversity. Diverse coding schemes and channel models can be implemented in this framework with non-significant modifications on the scheduling algorithms. The details of the implementations are subject to future research. Traditionally, packet transmission scheduling is included in the data link layer. However, by exploiting the tradeoff between the successful transmission and the energy consumption, the cross layer design of a consolidate physical and data link layer is needed. In [3], [4], Embedded Wireless Interconnect (EWI) was proposed as the potential universal architecture of wireless sensor networks. EWI is composed of two layers, which are the Wireless Link layer and the System layer, respectively. Under the architecture of EWI, the proposed transmission scheduling algorithms work on the Wireless Link layer of MSSN. It interacts with the upper System layer by the syntax of application information credits, which is then translated into the final state configuration function of the scheduling algorithms.
7. Conclusion In this paper, we have studied the operation of MSSN when multiple nodes share one communication channel during the information retrieval. First, we have developed the optimal multinode scheduling algorithm MTSA-MSSN. Since the complexity of MTSAMSSN increases exponentially with the number of nodes, we propose suboptimal algorithms, which run the single node scheduling algorithm TSA-MSSN individually on every node and then combine the results. The two suboptimal algorithms, MSPS-MSSN and MSUS-MSSN, exhibit the complexity as low as O(N). The performances of optimal and suboptimal algorithms are compared by means of computer simulations. It is shown that the suboptimal algorithms achieve nearly the same performance as the optimal MTSAMSSN when the channel is “active.”
About the Authors Liang Song (S’03,M’06) received the Bachelor’s degree in Electrical Engineering from Shanghai Jiaotong University, China, in 1999; and the M.S. degree in Electronic Engineering from Fudan University, China, in 2002. He obtained the Ph.D. degree from the Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, Canada, in 2005. His research interests and expertise are in the area of signal processing, communications, networking, and information theory, with the focus on the applications in wireless sensor and pervasive computing networks. His experience also includes industrial consulting through SENNET Communications and CANAMET Inc. His email address is
[email protected] Dimitrios Hatzinakos (M’90,SM’98) received the Diploma degree from the University of Thessaloniki, Greece, in 1983, the M.A.Sc degree from the University of Ottawa, Canada, in 1986 and the Ph.D. degree from Northeastern University, Boston, MA, in 1990, all in Electrical Engineering. In September 1990 he joined the Department of Electrical and Computer Engineering, University of Toronto, where now he holds the rank of Professor with tenure. Also, he served as Chair of the Communications Group of the Department during the period July 1999 to June 2004. Since November 2004, he is the holder of the Bell Canada Chair in Multimedia, at the University of Toronto. His research
Architecture of WSNs
307
interests are in the areas of Multimedia Signal Processing and Communications. He is author/co-author of more than 150 papers in technical journals and conference proceedings and he has contributed to 8 books in his areas of interest. His experience includes consulting through Electrical Engineering Consociates Ltd. and contracts with United Signals and Systems Inc., Burns and Fry Ltd., Pipetronix Ltd., Defense Research Establishment Ottawa (DREO), Nortel Networks. Vivosonic Inc. and CANAMET Inc. He has served as an Associated Editor for the IEEE Transactions on Signal Processing from 1998 till 2002 and Guest Editor for the special issue of Signal Processing. Elsevier, on Signal Processing Technologies for Short Burst Wireless Communications which appeared in October 2000. He was a member of the IEEE Statistical Signal and Array Processing Technical Committee (SSAP) from 1992 till 1995 and Technical Program co-Chair of the 5th Workshop on Higher-Order Statistics in July 1997. He is a senior member of the IEEE and member of EURASIP, the Professional Engineers of Ontario (PEO), and the Technical Chamber of Greece. His email address is
[email protected]
References 1. L. Song, and D. Hatzinakos, “Architecture of wireless sensor networks with mobile sinks: sparse deploying case,” IEEE Trans. on Vehicular Technology, vol. 56, no. 4, July 2007. URL: www.comm.utoronto.ca/∼songl/pdf/mssnl.pdf 2. L. Song, and D. Hatzinakos, “Cooperative transmission in poisson distributed wireless sensor networks: protocol and outage probability.” IEEE Trans. on Wireless Communication, vol. 5, no. 10, pp. 2834–2843, Oct. 2006. URL: www.comm.utoronto.ca/∼songl/pdf/ctp.pdf 3. L. Song, and D. Hatzinakos, “Embedded wireless interconnect for sensor networks: concept and example,” In Proc. IEEE 4th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, 2007. URL: www.comm.utoronto.ca/∼songl/pdf/cwi.pdf 4. L. Song, and D. Hatzinakos, “A cross-layer architecture of wireless sensor networks for target tracking,” IEEE/ACM Trans. on Networking, vol. 15, no. 1, pp. 145–158, Feb. 2007. URL.: www.comm.utoronto.ca/∼songl/pdf/lesop.pdf 5. Peter Garrison, “Microspics,” Air & Space Smithsonian, pp. 54. April/May 2000. 6. Standard IEEE 802.15.4. MAC and PHY Layer specification for low-rate wireless personal area networks (PR-WPANs). 7. Standard IEEE 802.11. Wireless LAN medium access control(MAC) and physical layer(PHY) specifications. 8. D. Tse and S. V. Hanly, “Multiaccess fading channels - Part I: polymatroid structure, optimal resource allocation and throughput capacities,” IEEE Trans. Inform. Theory, vol. 44, no. 7, pp. 2796–2815. Nov. 1998. 9. L. Li and A. J. Goldsmith, “Optimal resource allocation for pading broadcast channels - Part II: outage capacity,” IEEE Trans. on Information Theory, vol. 47, no. 3, pp. 1103–1127, Mar. 2001. 10. S. V. Hanly and D. Tsc, “Multiaccess fading channels - Part II: Delay-limited capacities,” IEEE Trans. on Information Theory, vol. 44, no. 7, pp. 2816–2831. Nov. 1998. 11. L. Li, N. Jindal and A. Goldsmith, “Outage capacities and optimal power allocation for fading multiple-access channels,” IEEE Trans. on Information Theory, vol. 51, no. 4, Apr. 2005. 12. D. Zhao, X. Shen, and J. W. Mark, “Radio resource management for cellular CDMA systems supporting heterogeneous services,” IEEE Trans. on Mobile Computing, vol. 2, no. 2, pp. 147–169, Apr.–Jun. 2003. 13. C. Oottamakorn and D. Bushmitch, “Resource management and scheduling for QoS-Capable home network wireless access point,” in Proc. IEEE CCNC’2004, pp. 7–12. 5–8 Jan. 2004. 14. S. S. Pradhan, J. Kusuma, and K. Ramchandran, “Distributed compression in a dense microsensor network,” IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 51–60. Mar. 2002. 15. J. G. Proakis, Digital Communications, NJ: McGraw-Hill Inc., 1995. 16. H. L. Bertoni, Radio Propogation for Modern Wireless Systems, NJ: Prentice Hall PTR, 2000. 17. A. Pentland, “Smart Rooms,” Scientific American, April 1996.
308
L. Song and D. Hatzinakos
18. T. M. Cover and J. A. Thomas, Elements of Information Theory, NJ: John Wiley & Sons. Inc. 1991. 19. R. C. Shah, S. Roy, S. Jain, and W. Brunette. “Data MULES: Modeling a three-tier architecture for sparse sensor networks,” in Proc. of the First IEEE International Workshop on Sensor Network Protocals and Applications, Anchorage, Alaska, 11 May, 2003. 20. L. Tong, Q. Zhao, and A. Adireddy, “Sensor networks with mobile Agents,” in Proc. IEEE MilCom’2003. 21. Q. Zhao and L. Tong, “Distributed opportunistic trabsmission for wireless sensor networks,” in Proc. IEEE ICASSP’2004. 22. D. Bertsekas, Dynamic Programming and Optimal Control, Belmont, MA, Athena Scientific, 1995.
APPENDIX I Formula on Ls_out,n The coordinates vector Ls_out,n is shown geometrically in Fig. 1. and can be computed as following:
⎡cos qs L s_out,n = ⎡ Range2 − L[ y]2 , L[ y]⎤ ⋅ ⎢ ⎢⎣ ⎥⎦ ⎣ − sin qs
sin qs ⎤ + Ln , cos qs ⎥⎦
(43)
where,
⎡cos qs L = (L s (i0 ) − Ln ) ⋅ ⎢ ⎣sin qs
− sin qs ⎤ . cos qs ⎥⎦
(44)
APPENDIX II More on the Strategy Definition of MTSA-MSSN Eq.(9) precludes the possibility of multiple nodes transmitting simultaneously on a single communication channel. This, however, is possible, when sophisticated coding procedures are feasible on individual sensor nodes, dealing with the co-channel interference. When sufficient time slots are available, under a simplified channel coding model, we hereby prove that having multiple nodes transmitting simultaneously is strictly worse than the strategy prescribed by Eq.(9) under energy efficiency considerations. We define the following two strategies: • Strategy 1: At time slot i0, Q out of N nodes associated with the communication channel are transmitting with power P1,q (q = 1…Q), simultaneously. • Strategy 2: During the time slots from i0 to i0 + Q – 1, node q transmits with power P2,q at time slot i0 + q – 1, where q = 1…Q. Moreover, we assume a simplified coding model. For 1 ≤ q ≤ Q, there is,
⎪⎧1, R p,all (i0 + q − 1) ≥ g ⋅ C p (i0 + q − 1); PER(i0 + q − 1) = ⎨ ⎪⎩0, R p,all (i0 + q − 1) < g ⋅ C p (i0 + q − 1); p = 1, 2.
(45)
Architecture of WSNs
309
where γ is a constant satisfying 0 < γ < 1. Under the strategy p, Rp.all(i0 + q – 1) is the summation of the transmission rate over the nodes at time i0 + q – 1. Assume the transmission rate is a constant R. In “Strategy 1”, R1,all(i0) = Q·R, while it is zero when q > 1. In “Strategy 2”, R2,all (i0 + q – 1) = R, for all q. Cp(i0 + q – 1) denotes the channel capacity at time i. For “Strategy I”, we have [18], Q ⎛ ∑ q=1{P1,q ⋅ Gq (i0 )}⎞⎟ ⎜ C1 (i0 ) = W ⋅ log 1 + , ⎜ ⎟ s n2 ⎝ ⎠
(46)
where W is the channel bandwidth. For “Strategy II”, on the other hand, we have,
⎛ P2,q ⋅ Gq (i0 + q − 1) ⎞ C2 (i0 + q − 1) = W ⋅ log ⎜ 1 + ⎟. s n2 ⎝ ⎠
(47)
Theorem. Under the coding model specified by Eq.(45), when the condition Q⋅R
2 r⋅W − 1 < min q {Gq (i0 + q − 1)} ⎛ R ⎞ Q ⋅ ⎜ 2 r⋅w − 1⎟ ⎜⎝ ⎟⎠ max q {Gq (i0 )}
(48)
is satisfied, “Strategy 2” is strictly more energy-efficient than “Strategy 1,” in the sense that, Q
Q
q =1
q =1
∑ P2,q < ∑ P1,q .
(49)
Proof. Due to the coding model in Eq.(45), any power control algorithms will have
R1,all (i0 ) = Q ⋅ R ≤ g ⋅ C1 (i0 ),
(50)
R2,all (i0 + q − 1) = R = g ⋅ C2 (i0 + q − 1),
(51)
and,
for 1 ≤ q ≤ Q. Due to Eq.(46) and Eq.(47), Eq.(50) and Eq.(51) can be written as,
⎛ Q⋅ R ⎞ P ⋅ G ( i ) ≥ ∑ 1,q q 0 ⎜⎜ 2 r⋅w − 1⎟⎟ ⋅ s n2 , ⎝ ⎠ q =1 Q
(52)
310
L. Song and D. Hatzinakos
and,
P2,q
⎛ R ⎞ 2 ⎜ 2 r⋅w − 1⎟ .s n ⎜⎝ ⎟⎠ = , Gq (i0 + q − 1)
(53)
respectively. Therefore,
∑ q =1 P1,q Q
(a)
≥
1 Q ⋅ ∑ q =1{P1,q ⋅ Gq (i0 )} max q {Gq (i0 )}
(b)
≥
1 ⎛ Q⋅R ⎞ 2 ⋅⎜2 − 1 ⋅ sn max q {Gq (i0 )} ⎝ r ⋅ W ⎟⎠
(c )
>
⎛ R ⎞ 1 ⋅ Q ⋅ ⎜ 2 r ⋅W − 1⎟ ⋅ s n2 ⎜⎝ ⎟⎠ min q {Gq (i0 + q − 1)}
(d )
=
1 Q ⋅ ∑ q =1{P2,q ⋅ Gq (i0 + q + 1)} min q {Gq (i0 + q − 1)}
(e)
≥ ∑ q =1 P2,q ,
(54)
Q
where (a) and (e) are obvious; (b), (d) are due to Eq.(52) and Eq.(53) respectively; (c) is due to the condition Eq.(48). The theorem is hence proved. We further comment that the condition of Eq.(48) is usually satisfied, when Q is relatively small. Under this small Q condition, we have
max q {Gq (i0 )} min q {Gq (i0 + q − 1)}
≈ 1.
(55)
On the other hand, we have Q⋅ R ⎞ ⎛ R 2 g ⋅W − 1 > 1 + Q ⋅ ⎜ 2 g ⋅W − 1⎟ − 1 ⎟⎠ ⎜⎝
⎞ ⎛ R = Q ⋅ ⎜ 2 g ⋅W − 1⎟ , ⎟⎠ ⎜⎝ R
due to the fact that 2 g⋅W > 1. Thus, the inequality of Eq.(48) holds.
(56)