lifetime communication
TRANSCRIPT
-
7/27/2019 Lifetime Communication
1/19
Rate-lifetime tradeoff for reliable communicationin wireless sensor networks q
Junhua Zhu a, Ka-Lok Hung a, Brahim Bensaou a,*, Farid Nait-Abdesselam b
a Department of Computer Science and Engineering, The Hong Kong University of Science and Technology,
University Road, Clear Water Bay, Kowloon, Hong Kongb IRCICA/LIFL, CNRS UMR 8022, Batiment M3, University of Sciences and Technologies of Lille, 59655 Villeneuve dAscq Cedex, France
Available online 29 September 2007
Abstract
The network lifetime and application performance are two fundamental, yet conflicting, design objectives in wirelesssensor networks. There is an intrinsic tradeoff between network lifetime maximization and application performance max-imization, the latter being often correlated to the rate at which the application can send its data reliably in sensor networks.In this paper we study this tradeoff by investigating the interactions between the network lifetime maximization problemand the rate allocation problem with a reliable data delivery requirement. Severe bias on the allocated rates of some sensornodes may exist if only the total throughput of the sensor network is maximized, hence we enforce fairness on source ratesof sensor nodes by invoking the network utility maximization (NUM) framework. To guarantee reliable communication,
we adopt the hop-by-hop retransmission scheme. We formulate the network lifetime maximization and fair rate allocationboth as constrained maximization problems. We characterize the tradeoff between them, give the optimality condition, andderive a partially distributed algorithm to solve the problem. Furthermore, we propose an approximation of the tradeoffproblem using NUM framework, and derive a fully distributed algorithm to solve the problem. 2007 Elsevier B.V. All rights reserved.
Keywords: Wireless sensor networks; Network utility maximization; Rate allocation; Energy efficiency; Reliability
1. Introduction
Self-organized and -configurable wireless sensor
networks have invaluable potential in military andcivilian applications where distributed sensing, col-lection and dissemination of information are
required. Examples of such applications includebattlefield surveillance, environmental monitoring,home automation[1], and so on.
Typically, sensor nodes are battery operated, andhence have to run on a limited energy budget. Fur-ther, battery replacement is impossible in manywireless sensor network applications. Thus, energysupply is limited, and sensor networks have a finiteoperational lifetime. Although substantial improve-ments have been achieved in the chip design forenergy conservation, advances in battery design stilllag behind, making energy efficiency one of the fun-damental challenges in sensor networks.
1389-1286/$ - see front matter 2007 Elsevier B.V. All rights reserved.
doi:10.1016/j.comnet.2007.09.011
q This work is supported in part under grant Hong Kong RGCDAG05/06.EG42.* Corresponding author.
E-mail addresses: [email protected] (J. Zhu), [email protected] (K.-L. Hung), [email protected] (B. Bensaou),[email protected](F. Nait-Abdesselam).
Available online at www.sciencedirect.com
Computer Networks 52 (2008) 2543
www.elsevier.com/locate/comnet
mailto:[email protected]:ether@mailto:[email protected]:[email protected]:[email protected]:[email protected]:ether@mailto:[email protected] -
7/27/2019 Lifetime Communication
2/19
Tremendous research efforts have been spent onthe problem of energy conservation in wireless sen-sor networks. One important perspective is to max-imize the network lifetime [2,1113,30], wherenetwork lifetime usually refers to the time interval
between the initialization of the network and theexhaustion of the battery of the first sensor node.The lifetime of a sensor node is generally inverselyproportional to the average rate of information gen-erated and the information relayed by itself, andhence network lifetime is determined by the sourcerates of sensor nodes in the network.
The application performance is often evaluatedby the accuracy and latency of information obtainedin wireless sensor networks[3]. The precise seman-tics of accuracy and latency are application-depen-dent. For instance, in wireless video sensor
networks, the accuracy of information can be quan-tized by rate distortion analysis [4]. Roughly, thelarger the source rate, the smaller the distortionlevel. In general wireless sensor networks, both met-rics depend on the rates of application data reliablydelivered from the sensor nodes to the sink nodes.Thus, the application performance can be indirectlymeasured by the rate allocation in the network.Motivated by this reason, many works have beenconducted on the rate allocation problem withenergy constraint in wireless sensor networks
[5,14,16]. These works try to strike a balancebetween fully utilizing the network resources andmaintaining a certain fairness on source ratesamong sensor nodes.
Since the application performance correlates tothe rates of data obtained reliably in sensor net-works, we need to consider the data delivery reli-ability requirement in sensor networks. Manydefinitions of reliability have been proposed byresearchers, e.g., the end-to-end reliability, theevent-to-sink reliability proposed by Akan andAkyildiz for event-based sensor networks [6], andso on. Here we focus on the first one, that is, datafrom sensor nodes are delivered to the sink nodeswithout loss or error. Due to the error-prone natureof wireless channels, there are two approaches toimprove the reliability: reducing the probability ofdata loss or error and retransmitting data once lossor error occurs. Here we adopt the retransmissionscheme. Under this category, there exist twoapproaches: the end-to-end retransmission schemeand the hop-by-hop retransmission scheme. In thefirst method, the source node will initialize a
retransmission when loss or error is detected either
by the source or the destination, while in the secondmethod, the intermediate node will start a retrans-mission as soon as loss or error is detected. The sec-ond method is well known to be more effective thanthe first one in wireless networks since losses or
errors are recovered locally, and resources used todeliver data to the current node will not be wasted.Thus we use the hop-by-hop retransmission schemeto guarantee the reliable data delivery from sensornodes to sink nodes.
From the above discussion, we notice that thereare intrinsic tradeoffs between network lifetimemaximization and rate allocation in wireless sensornetworks. Although both problems have beenextensively studied in recent years separately, fewworks consider these two goals together, and studythe tradeoff between them with a reliability require-
ment. In this paper, we address this problem with amulti-path routing approach and observe that, onlymaximizing the throughput of the sensor network,leads sensor nodes that are far away from the sinknodes to suffer extremely small data rates, whichmakes the performance of these sensor nodes extre-mely bad. Thus, a certain fairness in rate allocationof sensor nodes is required, and should be achievedin a distributed way. This motivates the usage of anetwork utility maximization (NUM) framework[7]for our rate allocation problem, which has been
proved efficient in such a case.In this paper, we first consider network lifetime
of wireless sensor networks as global informationshared among all sensor nodes. We find that thesolution maximizing the network lifetime also min-imizes the maximum normalized power dissipationof sensor nodes with the latter one being relativelymore tractable. Thus, the problem of minimizingthe maximum normalized power dissipation of sen-sor nodes is solved instead. For the sake of simplic-ity, we still call this problem the network lifetimemaximization problem. Given a set of routes, thetradeoff between network lifetime maximizationand fair rate allocation is formulated as a multipleobjective programming problem with a set of con-vex constraints. By introducing a system parameterc, we can combine these two objectives together as asingle weighted objective. The tradeoff betweenthem can be characterized by the parameterc. Thenwe study the optimality condition, and derive a sub-gradient algorithm. Note that at this stage the infor-mation of network lifetime is shared among allsensor nodes, so global exchange of this information
cannot be avoided in this algorithm; for example, it
26 J. Zhu et al. / Computer Networks 52 (2008) 2543
-
7/27/2019 Lifetime Communication
3/19
-
7/27/2019 Lifetime Communication
4/19
routing and rate allocation. They obtain a distrib-uted algorithm via dual decomposition of the origi-nal problem. In our paper, although we have thesame objective function, we focus on addressing thisproblem at the transport layer, and hence have dif-
ferent set of constraints. Also, the derived algorithmis different.
3. Problem formulation
We consider a wireless sensor network consistingof sensor nodes and sink nodes. Sensor nodes arebattery driven, non-rechargeable and irreplaceable.They periodically perform some sensing tasks, col-lect data about phenomena of interest, and reportthe measurements to the sink nodes. Data fusion
is not considered here, i.e., data will not be aggre-gated along the routes to the sink nodes. Thereare multiple sink nodes in the network, and eachsensor node is assigned to only one sink node. Theperformance of the sensor network is characterizedby two metrics, the network lifetime and the qualityof information received at the sink nodes. The qual-ity of information is roughly proportional to theallocated rate at the source node. The larger thesource rate, the more fine grained and accurate theinformation, and vice versa. We assume that sink
nodes accept information of any quality level. Thus,there is no source rate requirement for sensor nodes.
The wireless sensor network is modeled as adirected graph GN;L, where N S [T isthe set of all sensor and sink nodes in the network;S denotes the set of sensor nodes;T denotes the setof sink nodes andL is the set of all directed links inthe network. We define Lout(i) to be the set of alloutgoing links of node i, and Lin(i) to be the set ofall incoming links of node i.
In general, in wireless sensor networks, proactiverouting is preferred since nodes in the network arestatic and the traffic requirement is also fixed. Thus,each sensor node will first find a set of routes to deli-ver its collected data to the sink node, and thendetermine the data rate on each of its routes. LetR be the set of all routes in the network, andRs R be the set of routes for sensor node s.Let yr be the data rate on route r. Denoting thesource rate of sensor node s by xs, we have the fol-lowing flow conservation constraint:
xs Xr2Rs
yr 8s2 S: 1
Also the data rate on all routes should be non-neg-ative, i.e.,
yr P 0 8r2 R: 2
To ensure data from sensor nodes to be delivered tosink nodes reliably, we use the hop-by-hop retrans-mission method. At each node, a packet will beretransmitted at the MAC layer until it is success-fully received at the next hop node on the route.Assuming the network to be under-loaded, whichis common in most sensor networks applications,most packet losses are due to link errors becauseof interference. Under this assumption, it is reason-able to assume that the frame retransmission prob-ability is independent of the source rates vectory. Amodel that considers collision errors in a heavilyloaded networks and their dependence on the rate
vector is considered in[23]. To model this, for eachlink l, denoting the link error probability by sl, theaverage number of transmissions until successfuldelivery of one packet is 1
1sl.
Since in most types of sensor nodes, communica-tion modules dominate the energy consumption[24], we ignore energy consumed by other tasks suchas sensing and data processing. The same simpleenergy consumption model as in [25] is used forthe communication module of all nodes. Assumingall nodes have the power control functionality, the
power dissipation at node ifor transmission is deter-mined by
ptij esij fij; 3
where ptij is the power dissipated at nodeiwhen it istransmitting to nodej,fijis the rate of data transmit-ted at the physical layer, and esij, the transmissionenergy consumption cost of link (i,j), is given by
esij l g dmij : 4
Here, l denotes the energy cost of the transmit elec-tronics of node i, g is a coefficient term correspond-
ing to the energy cost of transmit amplifiers, dij isthe distance between nodeiand j, andm is the pathloss exponent, with values ranging between 2 and 4.Typically, l= 50nJ/b, g= 0.0013pJ/b/m4 (for m=4). The power dissipation at a receiver ican be ex-pressed as
pri er Xj6i
fji; 5
whereer is the energy consumption cost of the radioreceiver, and Pj6ifji is the rate of data received atthe physical layer of node i. Typically, er = 50nJ/b.
28 J. Zhu et al. / Computer Networks 52 (2008) 2543
-
7/27/2019 Lifetime Communication
5/19
Since we adopt a link layer retransmissionscheme, for a link l, the actual average data rateat the physical layer is the product of the data rateat the network layer and the average number oftransmissions at the MAC layer. Let Rl be the
set of routes on link l
, we have flP
r2Rlyr=1 sl. The total power dissipation at node i isthe sum of total power dissipation by radio trans-mitter and receiver. Thus, the total power dissipa-tion at node iis given by
pti X
l2Louti
esl
Pr2Rlyr
1 slX
l2Lini
er
Pr2Rlyr
1 sl: 6
Assuming that each sensor node ihas an initial en-ergy budgetEi, the lifetime of sensor node iis given
by
TiEi
pti: 7
3.1. Fair rate allocation problem
Since the accuracy of information depends on theallocated source rate, only maximizing the totalthroughput of the network is not good. It is not suf-ficient to guarantee the application performance asthis objective may be achieved at the expense ofsome source rates. For example, in a sensor networkthat tracks objects mobility in a large field, smallerrates means lesser location tracking accuracy andlarger rates equate to a finer grained accuracy. Bymaximizing the total throughput instead of consid-ering the fairness issue among source rates, onecan end up with a solution that shuts off manysources in the network and enables only thosesources whose transport energy-cost to the sink isthe smallest. Hence some fairness on the rates allo-cated to the different sensor nodes is desired. One
good methodology to achieve this goal is to adoptthe NUM framework, in which a concave, non-decreasing, and twice differentiable utility functionUs(xs) measures the satisfaction of sensor node swith the assigned rate xs, and the goal is to maxi-mize the sum of the individual utilities. One classof utility functions that has been extensively usedto achieve fair resource allocation [8] in economicsand distributed computing is
Uax logx; a 1;
11ax
1a
; a> 1: 8
When a = 1, the utility function leads to the so-called proportional fairness, whereas when a ! 1the utility function leads to maxmin fairness.
What class of fairness is required for rate alloca-tion in a sensor network is determined by the appli-
cation and is beyond the scope of this paper. Whilemaxmin fairness maximizes the smallest rate in thenetwork, allowing thus for the best possible accu-racy in monitoring the whole network, proportionalfairness may favor nodes that are nearer the sinksover those that are located further away. One canimagine many application scenarios, both militaryand civilian, that match these two requirements.
Typically, the average data rate generated byeach sensor node is small, so it is reasonable toassume that there is sufficient bandwidth for eachlink in the network. That is, resource constraints
below the network layer are not present. Under thisassumption, the fair rate allocation problem givennetwork lifetime requirements can be formulatedas a NUM problem
maximizeXs2S
wsUsxs
subject to Ti P Tnet 8i2 S;
constraints 1; 2; 6; 7;
9
wherewsis a weight associated with the utility func-tion, andTnetis the lifetime requirement of the sen-
sor network. With the help of parametersw, furtherdifferentiation among sensor nodes can be achieved.For example, sensor nodes deployed in the area thatattracts most interest can get fairly large allocatedrates by setting their weights relatively large. In thisway, we can achieve weighted fairness on sourcerates of sensor nodes.
3.2. Network lifetime maximization problem
All sensor nodes are assumed to be of equal impor-
tance, which is a reasonable assumption since thedeath of one sensor node may cause the network tobe partitioned, or some area requiring monitoringto be uncovered. Thus the lifetime of a sensor networkis defined as the time until the death of the first sensornode, i.e., Tnet mini2STi. Given source ratedemandsof all sensornodes, the problem of maximiz-ing the lifetime of a sensor network can be stated as
maximize mini2S
Ti
subject to xs x0
s 8s2 S;
constraints 1; 2; 6; 7;
10
J. Zhu et al. / Computer Networks 52 (2008) 2543 29
-
7/27/2019 Lifetime Communication
6/19
where x0s is the source rate requirement of sensornode s. This formulation is very similar to that of[11], and the heuristic in[11]can be used. Generally,constraints(7) are not convex, and hence the opti-mization problem (10) is not convex. This usually
makes the problem difficult to solve. To overcomethis, we introduce a new variable zi= 1/Ti, whichis the inverse of the lifetime of sensor node i. Notethat from(7), it is also the normalized power dissi-pation of nodeiwith respect to initial energyEi. It iseasy to verify that maximizing the minimum lifetimeof all sensor nodes is equivalent to minimizing themaximum normalized power dissipation of all sen-sor nodes. Hence the original problem(10)is refor-mulated as
maximize maxi2S
zi
subject to pti Eizi 8i2 S
xs x0
s 8s2 S;
constraints 1; 2; 6:
11
Notice that problem (11) is a linear programmingproblem, which is much easier to solve than the ori-ginal problem in(10). For the sake of simplicity, wewill still call this problem the network lifetime max-
imization problem.
4. Tradeoff between network lifetime and fair rate
allocation
From problems(9) and (11), we observe that wehave two important but conflicting objectives whenoptimizing the sensor network performance, i.e.,achieving fair rate allocation among sensor nodes(problem (9)) and maximizing the network life-time (problem (11)). Both can be formulated asconstrained maximization problems. Hence, thetradeoff between them can be formulated as amulti-objective programming problem, and a simpleand efficient way to achieve desired tradeoff betweenthem is the weighting method[26]. That is, we intro-duce a new system parameterc 2 [0,1], and combinethese two objective functions into a single objectivefunction. Sinceccharacterizes the tradeoff, we call ittradeoff factor. With the constraint that data rateson all routes should be non-negative, the tradeoffbetween fair rate allocation and network lifetimemaximization is formulated as a constrained optimi-
zation problem
maximize cXs2S
wsUsxs 1 c maxi2S
zi
subject toX
l2Louti
esl
Pr2Rlyr
1 slX
l2Lini
erP
r2Rlyr
1 sl
Eizi 8i2 S;Xr2Rs
yr xs 8s2 S;
yr P 0 8r2 R:
12
The above weighted objective function is a concavefunction sinceU() is concave and the maximum of aset of linear functions is convex, and both x and zare linear functions ofy. The constraint sets are alsoconvex, thus it is a convex optimization problem,and there is only a unique optimal objective value,i.e., a locally optimal solution is also a globally opti-mal solution[27]. Denote the column vector of {yr},{xi}, and {zi} by y,x, andzrespectively. Note thatzandx depend ony, and can be represented by func-tions ofy. Therefore,x and z are dummy variablesin (12), and the only optimization variables are y.Define the weighted objective function as Qy cP
s2SwsUsxs 1 cmaxi2Szi. We have the fol-lowing optimality condition.
Proposition 1. Let znet maxi2Sfzig, J(z) ={ijzi=znet}, andRi be the set of routes on node i. then
(a) a solution {x*, y*, z*} is globally optimal if andonly if for alld 2 Rn, there holds
min cryXs2S
wsUsx
s
(
1 cryzi
!0dji2 Jz
)6 0; 13
(b) if a solution {x*, y*, z*} is optimal, then for alli2 J(z*), there holds
cryrXs2S
wsUsxs 1 cryrzi 6 0 8r2Ri:
14
Proof. The proof of the proposition is given inAppendix A.
Part (a) ofProposition 1 gives a necessary andsufficient condition for a solution to be optimal,however, it does not give us any insight on thestructure of the optimal solution. From part (b), wefind that at the optimal point, all the routes on the
sensor nodes with the minimum lifetime would not
30 J. Zhu et al. / Computer Networks 52 (2008) 2543
http://-/?-http://-/?- -
7/27/2019 Lifetime Communication
7/19
-
7/27/2019 Lifetime Communication
8/19
-
7/27/2019 Lifetime Communication
9/19
Problem(19)is very similar to that of[30], and hasthe following property:
Lemma 4. When b ! 1, the network lifetime deter-mined by the optimal solution y* of problem (19)approximates the maximum network lifetime of the
wireless sensor network.
Proof. The proof of the lemma is given inAppendixB. h
Thus, we call b the lifetime approximation expo-nent. The tradeoff between network lifetime maximi-zation and fair rate allocation of sensor nodes canbe unified in the network utility maximizationframework as
maximize
Xs2ScwsUsxs 1 cV
bs zs
subject toX
l2Louti
esl
Pr2Rlyr
1 slX
l2Lini
erP
r2Rlyr
1 sl
Eizi 8i2 S;Xr2Rs
yr xs; 8s2 S;
yr P 0 8r2 R:
20
Here, since both x and z are dummy variables, we
can define the weighted objective function asPy cP
s2SwsUsxs 1 cVbs zs. Note that
bothU() andV() are twice differentiable, and hencethe objective functionP(y) is differentiable. The gra-dient with respect to data rate yrexists and is givenby
ryrPy cwsU0
sxs 1 cX
i2r\S
zbi ryrzi; 21
where s is the source sensor node of route r. A fea-sible solution y* is locally optimal if and only if forall r2 R,
yrP 0;
ryrPy 6 0;
yrryrPy 0: 22
Since both U() and V() are strictly concave, andbothxand z are linear functions ofy, the objectivefunction P(y) is also concave. Hence a locally opti-mal solution is also a globally optimal solution.Generally, the optimal solutiony* is not necessarilyunique. However, the strict concavity of functions
U() and the strict convexity of functions V(
) imply
that the optimal solution x* and z* are unique. Wecan use the gradient projection method[28]to solve(20). Here we adopt a similar algorithm to the oneused in [31]. At each iteration t, the data rate yr isupdated by
Dyrt j yrt
cU0sxstryrPyt
jyrt ws 1 c
cU0sxst
Xi2r\S
zbi tryrzit
!:
23
From Eq.(23), we observe that the update rule alsosuffers from the same problem as previously viz.any route r cannot increase its rate once it reacheszero. Thus, we need to bound its data rate yraway
from zero. With AssumptionA1, which sets a smallminimum rate requirement d for each route, thisproblem can be solved. Hence, at each iteration t,the data rate yris updated by
yrt 1 maxd;yrt Dyrt: 24
The detailed gradient algorithm is given in Algo-rithm 2. We observe that this algorithm is a varia-tion of the scaled gradient projection algorithm.To demonstrate its convergence property, we firstintroduce an additional assumption:Assumption
A2: The data rate yr on each route r is upper-bounded by a constant cr.
This assumption is reasonable in wireless sensornetworks since the bandwidth at the MAC layer isfinite, and the data rate of routes cannot exceedthe bandwidth. With Assumptions A1 and A2, wefind that the source rates x are also bounded, andthe gradient $yP(y) is Lipschitz continuous, whichguarantees the convergence of the gradient projec-tion algorithm with constant step size. DefineR jRj, / maxs2SwsU
0sxs, and w maxr2Ryr=
U0
sxs. We have the following convergence result:Proposition 5. Let Y* be the set of optimal solutions
of problem (20). With Assumptions A1 and A2, ifconstant step size j satisfies 0< j < 2=R1=2/w,then for any initial feasible solution y0, Algorithm 2converges to an optimal solution y* 2 Y*.
Proof. The proof of the proposition is given inAppendix C. h
Algorithm 2. Fully distributed algorithm to solve
(20)
J. Zhu et al. / Computer Networks 52 (2008) 2543 33
http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?- -
7/27/2019 Lifetime Communication
10/19
At each iteration tStep 1: Each sensor node i computes its price1 czbi ryrzi, and its revenue for all of its routescwsU
0sxs.
Step 2: Compute the costs of all routes.for
each route r2R do
Routes a message from source to destination,aggregate the prices 1 czbi ryrzi charged bysensor nodes on it, and finally deliver this infor-mation back to the source node s.end for
Step 3: Update the rate of all routes.for each sensor node s2 S do
for each route r2 Rs do1. Compute Dyr(t) with formula(23).2. y(t+ 1) = max(d,y(t) + Dyr(t)).
end for
end for
InAlgorithm 2, a sensor node igives its route ran amount of revenue based on its marginal rateutility cwsU
0sxs, and charges any route on it a price
1 czbi ryrzi, which is a product of the marginalpower dissipation utility and normalized power dis-sipation for this route. A route rdelivers a messageto the sink node, and aggregates all the prices itreceives from the relaying nodes. Then the sink nodeforwards this message back to the source node i.After receiving this message, sensor node i willadd its price for route r to the aggregate price fromrelaying nodes, and then computes the new data rateyrbased on the revenue and aggregate price of router. When achieving the optimal solution, the revenueand price of each route with positive data rateshould be equal. By iteratively updating the datarates of the routes with a constant step size, oneoptimal solution can be guaranteed, and this canbe done asynchronously.
6. Performance evaluation
In this section, we use some numerical results toevaluate our rate allocation algorithms. We con-sider the wireless sensor network illustrated inFig. 1, where the topology is simple yet sufficientlylarge for us to investigate the performance of ouralgorithms. In this network, we have twenty sensornodes indexed 120, and one sink node. The loca-tions of sensor nodes were randomly generated over
a 300 m 300 m square area, and the location of the
sink node was randomly generated at the lower leftcorner of this square area.
We assume that each sensor node has a maxi-mum transmission range of 80 m, and the powerdissipation for transmitting to and receiving froma neighboring node is determined by (3) and (5) inSection 3, respectively, where l= 50nJ/b, g=0.0013pJ/b/m4,m = 4, and er = 50nJ/b[25]. The ini-tial energy budget of each sensor node is 5 kJ. Theutility function U() used here is logarithmic, andthe weight ws of each sensor node s is set to 1.
The initial data rates and minimum data raterequirement are set to 1 bps and 0.01 bps,respectively.
First we consider the scenario where the linkerror probabilities of all links are equal. We setthese probabilities to 0.01. To gain a better under-standing of the optimal performance of our rateallocation algorithms, we determine all the possibleroutes in the network for each sensor node.
6.1. Convergence results and tradeoff byAlgorithm 1
Fig. 2depicts the convergence property ofAlgo-rithm 1 described in Section 4 with a step sizej= 0.05.
Here the tradeoff factor c is set to 1.0 108. Weonly show the convergence results of sources rates;the convergence results of other variables are omit-ted due to space limitations. Here, we only showpart of the sensor nodes as we find that sensor nodes9, 15 and 18 have the same allocated rates as sensornode 4, and the remaining sensor nodes (not shownhere) have the same allocated rates as sensor node 1.
We can see that source rate allocation of sensor
0 50 100 150 200 2500
50
100
150
200
250
300
Xm
Ym
S16
S6
S12
S5 S4
S1
S2
S3
S7
S8
S9
S10
S11
S13
S14
S15
S17
S18
S19
S20
Fig. 1. Wireless sensor network topology.
34 J. Zhu et al. / Computer Networks 52 (2008) 2543
-
7/27/2019 Lifetime Communication
11/19
-
7/27/2019 Lifetime Communication
12/19
6.2. Convergence results and approximation ratio of
Algorithm 2
Figs. 6 and 7show the convergence results of thefully distributed Algorithm 2 derived in Section 5with step size j= 0.1 andj= 0.2, respectively.
Here we set the tradeoff factor c to 1.0 1080,and the lifetime approximation exponent b to 10.We see that if the step size j is selected accordingto the step size rule proposed in Proposition 5, thenthe larger the step size is, the faster the algorithmconverges. We also observe that the fully distributedAlgorithm 2 converges to an optimal solution ofproblem (20) in Section 5 in a few hundred itera-tions, and faster than the partially distributedAlgo-
rithm 1. Thus,Algorithm 2has a better convergenceproperty thanAlgorithm 1.
However,Algorithm 2may not achieve the opti-mal tradeoff since it is only an approximation algo-rithm. Thus it is interesting to investigate the impactof the lifetime approximation exponent b on theperformance ofAlgorithm 2. If the performance issatisfactory given a reasonably large b, thenAlgo-rithm 2 is preferred as it requires less communica-tion overhead, and is easier to implement than
Algorithm 1. We evaluate the performance by theapproximation ratio of the optimal solutionobtained byAlgorithm 2with respect to the optimalsolution of problem(12). Comparing the two trade-off curves in Fig. 5, which are obtained by Algo-rithms 1 and 2, respectively, we observe that thesame value ofc can result in different optimal trade-offs between network lifetime and fair rate alloca-tion of sensor nodes. Thus the naive way of fixingparameter c, and comparing the optimal solutionobtained byAlgorithm 2under different value ofbwith the optimal solution obtained byAlgorithm 1does not work. Hence we use another approach.First we fix the tradeoff factor c, and obtain theoptimal network lifetime and rate allocation ofproblem (12), then we set b for problem (20), andvary c such that the optimal aggregate rate utilityis the same as that of problem(12), or the differenceis extremely small. After that, we normalize theoptimal network lifetime of problem (20) withrespect to the optimal network lifetime of problem(12), and regard this ratio as the approximationratio. Here, we set c= 1.0 108 for problem(12),
and the results are shown inFig. 8.
0 5 10 15
x 107
60
80
100
120
140
160
180
200
Network Lifetime (s)
AggregateRateUtility
= 1.0109
= 1.0107
= 1.01090
= 1.01070
Algorithm 1
Algorithm 2 with = 10
Fig. 5. The impact of tradeoff factor c on the tradeoff betweennetwork lifetime and fair rate allocation of sensor nodes.
0 200 400 600 8000
0.2
0.4
0.6
0.8
1
1.2
1.4
Iteration Number
SourceRate(kbps
)
Sensor 1
Sensor 2
Sensor 3
Sensor 4Sensor 5
Sensor 12
Sensor 16
Fig. 6. The evolution of source rates of sensor nodes with step
size j = 0.1 in Algorithm 2.
0 200 400 600 8000
0.2
0.4
0.6
0.8
1
1.2
1.4
Iteration Number
SourceRate
(kbps)
Sensor 1
Sensor 2
Sensor 3
Sensor 4
Sensor 5
Sensor 12
Sensor 16
Fig. 7. The evolution of source rates of sensor nodes with stepsize j= 0.2 in Algorithm 2.
36 J. Zhu et al. / Computer Networks 52 (2008) 2543
-
7/27/2019 Lifetime Communication
13/19
From this figure, we can see that when b = 2, wealready guarantee a fairly good approximationratio, i.e., 90.7%, and when b P 14, the approxima-tion ratio exceeds 99%. Thus, the performance ofAlgorithm 2is very good. Another intuitive example
can be obtained fromFig. 5. Although the ranges ofc are different, the two tradeoff curves obtained byAlgorithms 1 and 2withb= 10 respectively are veryclose to each other.
We compare the lifetime and source rates of sen-sor nodes obtained byAlgorithms 1 and 2under dif-ferent value ofb with the same aggregate rate utilityinTable 1.
FromTable 1, we observe that when the tradeofffactor cis set to 1.0 108 inAlgorithm 1, the life-time of sensor nodes 2, 5, 12 and 16 is very close tothe network lifetime. This means that these sensor
nodes are bottleneck nodes in the sensor network(the slight difference between their individual life-time is due to the precision of the implementation).With Algorithm 2, we find that the larger the life-time approximation exponent b is, the closer thenetwork lifetime gets to the optimal network life-time obtained by Algorithm 1, and the larger thenumber of bottleneck nodes in the network is. Thisimplies when b grows large, Algorithm 2 can bal-ance the energy consumption rate of sensor nodesmore efficiently. Also, from the table, we see that
although the aggregate rate utilities are the same,
the sources rates allocated to sensor nodes are notthe same. We observe that the larger b is, the closerthe rate allocation obtained by Algorithm 2approaches to the rate allocation obtained byAlgo-rithm 1.
6.3. The impact of routing algorithm
In our formulation of the problem and in the pre-vious examples, we assumed that a sensor node
determines all its routes to the sink prior to starting
0 2 4 6 8 10 12 14 16 18 200.5
0.6
0.7
0.8
0.9
0.99
ApproximationRatio
Fig. 8. The impact of lifetime approximation exponentb on theperformance ofAlgorithm 2.
Table 1Comparison of the individual lifetime and rate of sensor nodes obtained by Algorithms 1 and 2with fixed aggregate rate utility
Sensor ID Algorithm 1(c= 1.0 108) Algorithm 2(b= 1) Algorithm 2(b= 10)
Lifetime 1.0 107 (s) Rate (kbps) Lifetime 1.0 107 (s) Rate (kbps) Lifetime 1.0 107 (s) Rate (kbps)
1 0.6340 0.7705 0.8026 0.7313 0.6433 0.76852 0.5021 0.9523 0.5592 1.4035 0.5059 1.01893 4.3908 1.3115 3.7722 1.6937 4.6587 1.38614 1.9810 1.6586 4.8375 1.1710 2.1207 1.54955 0.5034 3.1013 0.5308 5.8671 0.4994 3.19746 2.7067 0.7663 7.6066 0.5578 2.7449 0.75527 0.6387 1.6599 1.1499 2.5703 0.7280 1.69348 0.9393 0.7670 1.8214 0.6409 0.9652 0.75559 1.0925 1.6599 1.5025 1.2970 1.1696 1.5496
10 1.1645 0.7705 1.5345 1.0936 0.7893 0.817511 1.1893 0.7670 2.1460 0.6636 1.2083 0.755512 0.5033 2.0108 0.4032 2.7400 0.5033 2.125213 2.0641 0.7652 3.6006 0.5742 2.0932 0.755114 0.9595 0.7735 1.4780 0.6038 0.9779 0.755315 2.4748 1.6586 6.1513 1.1927 2.6492 1.549516 0.5047 2.5049 0.4516 3.1827 0.5113 2.581717 0.5463 0.7705 0.6808 0.9184 0.6561 0.801718 0.5386 1.6599 0.8301 1.6227 0.6545 1.594619 1.7395 0.7652 3.7552 0.5675 1.7641 0.7551
20 2.7520 0.7663 7.6826 0.5580 2.7908 0.7551
J. Zhu et al. / Computer Networks 52 (2008) 2543 37
-
7/27/2019 Lifetime Communication
14/19
data exchange. This in turn leads to the optimalmulti-path routing (OMPR) since we can prove thatour solutions are optimal. However, in real sensornetworks, it may be impossible to explore all possi-ble routes, and only a fairly small set of routes will
be used by the sensor nodes. Thus, the impact ofroute choices on the performance of our algorithmsis considered here. Obviously, convergence of ouralgorithms is still guaranteed since they do notdepend on the route choices. Nevertheless, differentroute choices other than those assumed in the modelmay lead to sub-optimal results. To investigate this,we compare the results of the optimal algorithmwith multi-path routing (including all possibleroutes) to the results obtained by two other routingalgorithms, namely, single path minimum energyrouting (MER) and 2-shortest path (link disjoint)
routing (2SPR).Table 2 compares the performance of the three
route choices with equal aggregate rate utility. Fromthe table, we observe that although the three routechoices obtain the same rate utility, the rate alloca-tion of sensor nodes with minimum energy routingis quite different from that of the optimal multi-pathrouting and is unfair. In contrast, the rate alloca-tions of sensor nodes with link-disjoint 2-shortestpath routing and optimal multi-path routing arevery close to each other. We observe that although
the network lifetime with minimum energy routing
is already close to the optimal network lifetime,i.e., around 80%, the lifetime of sensor nodes isnot well balanced. The network lifetime with thelink-disjoint 2-shortest path routing is even closerto the optimal network lifetime, and the power dis-
sipations of sensor nodes are close to the optimalpower dissipation with all the routes. From Table2, we find that the performance of minimum energyrouting is not satisfactory as it can result in a muchless fair rate allocation compared with the optimalrate allocation, and wastes more scarce energy ofsensor nodes. The performance of the link-disjoint2-shortest path routing is comparable with the opti-mal multi-path routing as it can achieve a rate allo-cation close to the optimal rate allocation, and atthe same time, a network lifetime close to the opti-mal network lifetime. This suggests that for real
implementation of our algorithms, it is sufficientto only enumerate and explore a small number ofdisjoint routes from each sensor to the sink toobtain results that are nearly optimal.
6.4. Non-uniform link error probability scenario
In the above, we assume the link error probabil-ities of all links are equal. This is not true in real net-works. Usually, the link error probability of aparticular link is related to the received power at
the receiver, the level of interference in the sur-
Table 2Impact of different route choices with equal aggregate rate utility
Sensor ID MER 2-SPR OMPR
Lifetime 1.0 107 (s) Rate (kbps) Lifetime 1.0 107 (s) Rate (kbps) Lifetime 1.0 107 (s) Rate (kbps)
1 0.7169 0.6787 0.6444 0.7551 0.6340 0.77052 0.6624 0.6787 0.4769 1.0841 0.5021 0.95233 9.8441 0.6787 5.8640 1.0648 4.3908 1.31154 3.2726 1.7933 5.4133 1.0841 1.9810 1.65865 0.4009 10.7050 0.4608 5.8547 0.5034 3.10136 11.5525 0.6787 10.3838 0.7551 2.7067 0.76637 1.6624 5.7349 1.0253 3.1381 0.6387 1.65998 0.8493 0.6787 0.7634 0.7551 0.9393 0.76709 1.0106 1.7933 1.6717 1.0841 1.0925 1.6599
10 12.1122 0.6787 3.2968 0.8091 1.1645 0.770511 13.1314 0.6787 11.8029 0.7551 1.1893 0.767012 0.3902 1.0405 0.4585 1.5564 0.5033 2.010813 2.7680 0.6787 2.4879 0.7551 2.0641 0.765214 1.5667 0.6787 1.4082 0.7551 0.9595 0.773515 5.0843 1.7933 8.4101 1.0841 2.4748 1.658616 0.3931 2.7843 0.4632 1.6269 0.5047 2.504917 0.5539 0.6787 0.4596 0.9570 0.5463 0.770518 0.6523 1.7933 0.7644 3.1381 0.5386 1.659919 8.2918 0.6787 7.4529 0.7551 1.7395 0.7652
20 12.2309 0.6787 10.9935 0.7551 2.7520 0.7663
38 J. Zhu et al. / Computer Networks 52 (2008) 2543
-
7/27/2019 Lifetime Communication
15/19
rounding environment, and so on. As these factorscannot be the same for all links, the error probabil-ities of links are different. Thus, we investigate herethe tradeoff between network lifetime and rate allo-cation of sensor nodes under the non-uniform link
error probabilities scenario.First we consider an extreme case, where theerror probabilities of all links except link (13, 1)are same, and set to 0.01. The error probability oflink (13,1) is set to 0.8.
Table 3shows the comparison of the lifetime andsource rates of sensor nodes under different errordistributions with tradeoff factor c= 1.0 108.We can observe that the rate allocation obtainedwith non-uniform link error probabilities differsgreatly from the one with no link errors. From thetable, we observe that traffic through the less reli-
able links is reduced by either redirection to otherlinks, or by decrease in the source rates. Hence thelifetime of sensor node 12 does not change toomuch, although the aggregate rate utility decreases.From this table, we also observe that the rate allo-cated to sensor node 12 in the extreme case isreduced significantly compared to the rate allocatedto it in the case where no link errors occur. Thisimplies that when we provide energy efficient andreliable communication in sensor networks by linklayer retransmission schemes, we should consider
the link error probability in the energy consumptionmodel. Otherwise, the obtained solution may bevery far from representing the optimal solution.
In real networks, the link error probabilities usu-ally relate indirectly to the number of neighboringnodes. Hence we study the case where the errorprobability of a link is determined by 0.01 + 0.1 n where n is the number of neighboring nodes ofthe receiver. The tradeoff curve is shown in Fig. 9.The tradeoff curve with the assumption of the error
probabilities of all links are 0.01 is also shown in thefigure. Comparing these two curves, we see thatalthough the network lifetime is still inversely pro-portional to the tradeoff factorc, they achieve differ-ent tradeoff between network lifetime and rateallocation of sensor nodes with the same value ofc. This is another reason why we need to considerthe impact of link error probabilities on the energyconsumption model of sensor nodes.
7. Conclusions
In this paper, we studied the tradeoff between thenetwork lifetime maximization and fair rate alloca-tion problem with a reliability requirement in wire-less sensor networks. We addressed the wholeproblem from the transport layer perspective, withmulti-path routing. To guarantee reliable end-to-end communication, because of its intrinsic energyefficiency, a hop-by-hop retransmission scheme isadopted instead of the traditional end-to-endretransmission scheme used in reliable transport.We formulated the network lifetime maximization
problem and the fair rate allocation problem as con-
Table 3Impact of error rate distribution on optimal result c = 1.0 108
Sensor ID No error With error
Lifetime1.0 107 (s)
Rate(kbps)
Lifetime1.0 107 (s)
Rate(kbps)
1 0.6379 0.7554 0.6890 0.70442 0.5054 0.9787 0.5033 0.80423 5.0520 1.2834 6.2568 0.87364 1.9788 1.6773 2.9587 1.11065 0.5068 3.1265 0.5000 2.08616 2.7201 0.7674 2.9206 0.71207 0.6518 1.6779 0.7006 1.11018 0.9436 0.7795 1.0200 0.70259 1.0913 1.6778 1.6320 1.1101
10 1.1784 0.7554 1.2676 0.704411 1.1946 0.7795 1.2917 0.702512 0.5071 1.9677 0.5242 0.934413 2.0743 0.7725 2.2272 0.707114 0.9646 0.7639 1.0396 0.701015 2.4719 1.6773 3.6961 1.110616 0.5047 2.5332 0.5028 1.647317 0.5519 0.7554 0.5944 0.704418 0.5210 1.6781 0.5621 1.110119 1.7481 0.7725 1.8770 0.7071
20 2.7655 0.7674 2.9695 0.7120
0 1 2 3 4 5
x 107
80
100
120
140
160
180
200
Network Lifetime (s)
AggregateRa
teUtility
= 1.0109
= 1.0107
Uniform Link Error Probability
Nonuniform Link Error Probability
Fig. 9. The impact of tradeoff factor c on the tradeoff betweennetwork lifetime and rate allocation of sensor nodes.
J. Zhu et al. / Computer Networks 52 (2008) 2543 39
-
7/27/2019 Lifetime Communication
16/19
-
7/27/2019 Lifetime Communication
17/19
Denote the network lifetime in problem (11) and(19) by Tnet and T
bnet, respectively. We observe
that Tnet= 1/k(A1 +A2)y*k1, and T
bnet 1=kA
1A2ybk1. Thus,T
bnet 6 Tnet. From the above inequal-
ities, we have
1
jSj1=b1
Tnet 6 Tbnet 6 Tnet:
Thus, limb!1Tbnet Tnet, and the lemma holds.
Appendix C. Proof ofProposition 5
Since the data rates y on the routes are bounded,the source rates x are also bounded. Therefore, /and w are finite as the gradient U
0
(xs) is boundedfor each sensor node s. We observe that function
P(y) is differentiable, hence the following inequali-ties regarding the gradient ryrPy hold:
ryrPy cwsU0
sxs 1 cX
i2r\S
zbi ryrzi
6 cwsU0
sxs 6 c/:
As function U() is strictly concave, and functionV() is strictly convex, function P(y) is strictly con-cave. By definition of concave functions, for anypoints y1 and y2, we have P(y1) P(y2) 6
$yP(y)T(y1 y2). Thus
kPy1 Py2k 6 kryPyT
y1 y2k
6 kryPy k ky1 y2k
6 R1=2c/ky1 y2k:
From the above inequalities, we see that functionP(y) is Lipschitz. Therefore, the limiting point ofthe sequences of points {y(t)} generated by the gra-dient algorithm with constant step size jis optimal[28, Proposition 1.2.3].
Next we derive the stepsize rule. Given theupdate direction d(t) at iteration t, we have
jdrtj yrt
cU0sxstryrPyt
6 wcjryrPytj:
Thus, we have
jryPytT
dtj
kdtk2
6 w=ckryPytk
2
w=c2kryPytk
2
c
w:
According to[28, Proposition 1.2.3], we find that if0< j < 2=R1=2/w, the gradient algorithm con-
verges to an optimal solution.
References
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci,Wireless sensor networks: a survey, Computer Networks 38(4) (2002) 393422.
[2] Y. Xue, Y. Cui, K. Nahrstedt, A utility-based distributed
maximum lifetime routing algorithm for wireless networks,in: Proceedings of the Second International Conference onQuality of Service in Heterogeneous Wired/Wireless Net-works (QSHINE05), 2005, p. 18.
[3] S. Tilak, N.B. Abu-Ghazaleh, W. Heinzelman, A taxonomyof wireless micro-sensor network models, ACM SIGMO-BILE Mobile Computing and Communication Review 6 (2)(2002) 2836.
[4] Z.H. He, S.K. Mitra, From rate-distortion analysis to resou-rce-distortion analysis, IEEE Circuits and Systems Magazine5 (3) (2005) 618.
[5] V. Srinivasan, C.-F. Chiasserini, P.S. Nuggehalli, R.R. Rao,Optimal rate allocation for energy-efficient multipath routingin wireless ad hoc networks, IEEE Transactions on Wireless
Communications 3 (3) (2004) 891899.[6] O.B. Akan, I.F. Akyildiz, Event-to-sink reliable transport in
wireless sensor networks, IEEE/ACM Transactions onNetworking 13 (5) (2005) 10031016.
[7] F.P. Kelly,A.K. Maulloo, D.K.H.Tan, Rate control forcom-munication networks: shadow prices, proportional fairnessand stability, Journal of the Operational Research Society 49(3) (1998) 237252.
[8] J. Mo, J. Walrand, Fair end-to-end window-based congestioncontrol, IEEE/ACM Transactions on Networking 8 (5)(2000) 556567.
[9] M. Bhardwaj, A.P. Chandrakasan, Bounding the lifetime ofsensor networks via optimal role assignments, in: Proceed-ings of IEEE Infocom, 2002, pp. 15871596.
[10] Z. Hu, B. Li, On the fundamental capacity and lifetime limitsof energy-constrained wireless sensor networks, in: The 10thIEEE Real-Time and Embedded Technology and Applica-tions Symposium (RTAS 2004), 2004, pp. 29.
[11] J.H. Chang, L. Tassiulas, Maximum lifetime routing in wire-less sensor networks, IEEE/ACM Transactions on Network-ing 12 (4) (2004) 609619.
[12] K.D.K. Kalpakis, P. Namjoshi, Efficient algorithms for maxi-mum lifetime data gathering and aggregation in wirelesssensor networks, Computer Networks 42 (6) (2003) 697716.
[13] A. Sankar, Z. Liu, Maximum lifetime routing in wireless adhoc networks, in: Proceedings of the IEEE Infocom, 2004,pp. 10891097.
[14] V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, R. Rao, Co-operation in wireless ad hoc networks, in: Proceedings of theIEEE Infocom, 2003, pp. 808817.
[15] K. Kar, M. Kodialam, T.V. Lakshman, L. Tassiulas, Routingfor network capacity maximization in energy-constrainedad-hoc networks, in: Proceedings of the IEEE Infocom, 2003,pp. 673681.
[16] Y.T. Hou, Y. Shi, H.D. Sherali, Rate allocation in wirelesssensor networks with network lifetime requirement, in:Proceedings of the ACM MobiHoc, 2004, pp. 6777.
[17] F. Stann, J. Heidemann, RMST: Reliable data transport insensor networks, in: Proceedings of the IEEE SNPA, 2003.
[18] D. Tian, N.D. Georganas, Energy efficient routing with guar-anteed delivery in wireless sensor networks, in: Proceedings of
the IEEE WCNC, 2003.
J. Zhu et al. / Computer Networks 52 (2008) 2543 41
-
7/27/2019 Lifetime Communication
18/19
[19] B. Deb, S. Bhatnagar, B. Nath, Information assurance insensor networks, in: Proceedings of the ACM WSNA, 2003.
[20] B. Deb, S. Bhatnagar, B. Nath, ReInForM: Reliable infor-mation forwarding using multiple paths in sensor networks,in: Proceedings of the IEEE LCN, 2003.
[21] A. Willig, H. Karl, Data transportreliability in wireless sensornetworks a survey of issues and solutions, Praxis derInformationsverarbeitung und Kommunikation 28 (2) (2005)8692.
[22] H. Nama, M. Chiang, N. Mandayam, Utility-lifetime trade-off in self-regulating wireless sensor networks: a cross-layerdesign approach, in: Proceedings of the IEEE ICC, 2006.
[23] J. Zhu, S. Chen, B. Bensaou, K.-L. Hung, Tradeoff betweenlifetime and rate allocation in wireless sensor networks: across layer approach, in: Proceedings of the IEEE INFO-COM, 2007.
[24] V. Raghunathan, C. Schurgers, S. Park, M.B. Srivastava,Energy-aware wireless microsensor networks, IEEE SignalProcessing Magazine 19 (2) (2002) 4050.
[25] W. Heinzelman, A. Chandrakasan, H. Balakrishnan, An
application-specific protocol architecture for wireless micro-sensor networks, IEEE Transactions on Wireless Commu-nications 1 (4) (2002) 660670.
[26] K. Miettinen, NonLinear Multiobjective Optimization, Klu-wer Academic Publishers, 1999.
[27] S. Boyd, L. Vandenberghe, Convex Optimization, CambridgeUniversity Press, 2004.
[28] D.P. Bertsekas, Nonlinear Programming, Athena Scientific,1999.
[29] N.Z. Shor, Minimization Methods for Non-differentiableFunctions, Springer-Verlag, 1985.
[30] R. Madan, Z.Q. Luo, S. Lall, A distributed algorithm withlinear convergence for maximum lifetime routing in wirelesssensor networks, in: Proceedings of the Allerton Conference
on Communication, Control and Computing, 2005.[31] F. Kelly, T. Voice, Stability of end-to-end algorithms for joint
routing and rate control, ACM SIGCOMM ComputerCommunication Review 35 (2) (2005) 512.
Junhua Zhuis now a Ph.D. student in theDepartment of Computer Science andEngineering, the Hong Kong Universityof Science and Technology. He receivedhis B.Sc. degree in Computer Scienceand Technology from Fudan University,PR China, in 2004. His current researchinterests are in the areas of communica-tion quality and reliability in wirelesssensor networks, and cooperation issuesin wireless mesh and sensor networks.
John Ka-Lok Hung received his B.Eng.degree and M.Phil. degree in ComputerScience and Engineering in 2004 and2006, respectively, from the Hong KongUniversity of Science and Technology(HKUST). He is currently pursuing aPh.D. degreeat theHKUST. Hisresearchinterests include modeling and perfor-mance evaluation of multi-hop wirelessnetworks, cross-layer optimization, andprotocol design for wireless networks.
Brahim Bensaoureceived an EngineeringDegree in Computer Science (with dis-tinction) from the University of Scienceand Technology Houari Boumediene ofAlgiers Algeria in 1982, and a DEAdegree from University Paris XI inComputer Science in 1988. He earned hisDoctorate degree in Computer Sciencefrom the University Paris VI in 1993.From 1990 to 1994, he was a researchassistant at France Telecom Research
labs near Paris, where he was involved in the early designs andstudy of ATM technology. In mid 1995 he joined the Hong KongUniversity of Science and Technology as a Research Associatewhere he spent nearly 2 years working on various problems incongestion and traffic control. In 1997 he joined the Centre forWireless Communications, a national R& D center in Singapore(now known as the Institute of Infocomm Research, I2R A-Star)as a Member of Technical Staff, where he worked as a System
Architect on the design of Quality of Service (QoS) enabled MACprotocols and scheduling algorithms in a wireless ATM networkprototype. In 1998 he was promoted to a Senior Member ofTechnical Staff, and was instrumental in forming a small R&Dgroup in the area of wireless networking at the CWC. He led thegroup, for a year and a half, and then moved to Academia atHKUST in fall 2000 where he is now a faculty member in theDepartment of Computer Science and Engineering. His generalareas of research are in QoS-enabled wired/wireless networks,including ad hoc networks, sensor networks and wireless LAN,where he has published more than 80 research papers in promi-nent conferences and journals, received numerous researchgrants, graduated nearly 20 postgraduate students out of whichfour Ph.D.s and invented three US patents of which one is
licensed. He is an Associate Editor of The IEEE CommunicationsLetters and is a senior member of the IEEE, and a member of theACM.
42 J. Zhu et al. / Computer Networks 52 (2008) 2543
-
7/27/2019 Lifetime Communication
19/19
Farid Nat-Abdesselam obtained hisengineer degree in computer sciencesfrom University of Sciences and Tech-nologies of Algiers (USTHB) Algeria,in 1993 and a master degree in computersciences from University ReneDescartes(Paris 5) France, in 1994. After 2 yearsspent in the industry working as a soft-ware engineer, he joined the Universityof Versailles (UVSQ) France, and gothis Ph.D. degree in computer sciences in
2000. In 1998, he worked as an associate researcher at Universityof Western Ontario, London Ontario Canada. From 09/1999 to08/2000 he was an assistant professor at University of Sciences
and Technologies of Lille France. From 09/2000 to 08/2003 hewas an associate professor at INSA of Lyon and a researchmember of the INRIA Rhones Alpes. Since 09/2003 he is anassociate professor at University of Sciences and Technologies ofLille and research member of the INRIA Futurs. His researchinterests lie in the field of quality of service and security in IP-based networks, mobile ad hoc, sensor, and mesh networks, andpeer to peer networks. He has been on the technical programcommittee of different IEEE conferences, including Globecom,LCN, and ICC, and chaired some of their sessions. He has alsoserved as a technical program chair of the IEEE Workshop onWireless Local Networks 2007 (WLN07) and the InternationalWorkshop on Peer to Peer Networking 2007 (PPN07).
J. Zhu et al. / Computer Networks 52 (2008) 2543 43