Next Article in Journal
Short-Circuit Analysis of DER-Based Microgrids in Connected and Islanded Modes of Operation
Previous Article in Journal
Analysis of AC/DC/DC Converter Modules for Direct Current Fast-Charging Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Link Scheduling Based on Estimated Number of Packets in Queue on Industrial Wireless Sensor Networks

Department of Electrical, Electronic and Computer Engineering, University of Ulsan, Daehak-ro 93, Nam-gu, Ulsan 44610, Korea
Energies 2021, 14(19), 6370; https://doi.org/10.3390/en14196370
Submission received: 25 August 2021 / Revised: 24 September 2021 / Accepted: 28 September 2021 / Published: 5 October 2021

Abstract

:
The links of low power wireless sensor networks are error prone and the transmission on a wireless link is determined probabilistically by the packet reception rate (PRR) of the link. On the other hand, there is a very strict requirement in the end-to-end reliability and delay of sensor data in industrial wireless sensor networks (IWSNs). The existing approaches to provide the end-to-end reliability in IWSNs is retransmitting the packet when failure occurs. These approaches transmit a packet multiple times in successive time slots to provide the required reliability. These approaches, however, can increase the average delay of packets and the number of packets buffered in a queue. This paper proposes a new scheme to estimate the probabilistic amount of packets, called queue level (QL), in the buffer of each node based on the PRRs of the wireless links. This paper also proposes a QL-based centralized scheduling algorithm to assign time slots efficiently in TDMA-based IWSNs. The proposed scheduling algorithm gives higher priority to the nodes with higher QL. By assigning time slots first to the node with the highest QL, we can reduce the average end-to-end delay of packets and reduce the amount of buffered packets in the queue while satisfying the required end-to-end reliability. The performance of the proposed scheduling algorithm have been evaluated through a simulation using the Cooja simulator and compared with the existing approach. In the simulation on an sample network with the target end-to-end reliability of 99%, all of the flows were shown to guarantee the target reliability in both algorithms: on average, 99.76% in the proposed algorithm and 99.85% in the existing approach. On the other hand, the proposed algorithm showed much better performance than the existing approach in terms of the average end-to-end delay of packets (about 47% less) and the number of maximally buffered packets in the queue of each node (maximally, more than 90% less).

1. Introduction

The wireless sensor networks (WSNs) are receiving more and more attention for deployment in the industrial environment for monitoring and control applications [1]. Compared with wired networks, the challenge of wireless networks is that wireless signals are broadcasted through the air, which are vulnerable to interference with other signals and can be affected due to multipath fading [1]. Recently, to promote the development of IWSN applications, several industrial wireless sensor network standards such as WirelessHART [2], ISA 100.11a [3], and IEEE 802.15.4e TSCH [4] have been proposed. To satisfy the reliable and real-time requirement of industrial applications, these networks use the time-division multiple access (TDMA) MAC protocol to avoid collisions effectively among multiple simultaneous transmissions and channel hopping techniques to reduce packet loss due to multipath fading. Those IWSN standards define the TDMA-based transmission structure called slot frame, frequency hopping method, and protocols to provide IPv6 connectivity to IWSNs. However, the scheduling algorithm to assign time-slots to the wireless links is not defined.
There have been many studies in the scheduling algorithms on IWSNs, which are classified into centralized and decentralized scheduling schemes [5]. Decentralized schemes rely on nodes with partial knowledge of their neighborhood and traffic information. Such knowledge is utilized for distributed decision making processes. Decentralized schemes can better react to the dynamics of the network due to link status changes or the nodes’ mobility [6]. However, centralized schemes are more suitable for IWSNs that have strict reliability and real-time requirements and utilize a centralized architecture and network management [7,8].
In industrial environments, sensor nodes are located in a harsh condition with many obstacles, high humidity levels, vibrations, dirt and dust, or other conditions that challenge performance. These harsh environmental conditions lower the performance of the wireless links and makes reliable message delivery even more difficult. Mostly, sensor nodes have a scarce resource in terms of processing power, memory, and energy. Constrained by the limited physical size, sensor nodes have limited battery energy supply and their memories are limited and have restricted computational capabilities [7].
To transmit sensor data reliably in wireless sensor networks with error prone links, retransmission after packet loss is the most widely used method [9]. Yan M, et al. [10] proposed two scheduling methods using a hypergraph-based approach to maximize the end-to-end reliability of sensor data with a delay constraint in IWSN: dedicated and shared scheduling methods. Their algorithm consists of two phases: the schedule construction phase and schedule improvement phase. In the construction phase, one time slot is allocated to a link group that consists of links that can transmit simultaneously on the path from the source to destination. Then, in the improvement phase, the retransmission time slots are added to link groups as long as they satisfy the delay constraint. In the shared time slot scheduling method, retransmission time slots are shared among multiple packets to reduce the number of slots while satisfying the required reliability. Dobslaw F. et al. [11] proposed a method called SchdEx to extend a scheduling algorithm to guarantee the end-to-end reliability, which determines the number of time slots to each link based on packet loss rates of the entire network. The SchedEx method decomposes the end-to-end reliability into node-to-node reliability to make the calculation easy. Hashimoto M. et al. [12] proposed a flow-based assignment method to reduce the required number of time-slots by prioritizing the flows sharing links and assigning shared time-slots efficiently among the flows. The above methods in [10,11,12] focused on the reliability of the sensor data transmission of flows and reducing the number of time-slots to be assigned to guarantee the required end-to-end reliability. These approaches transmit a packet multiple times in successive time slots to provide the required reliability. These approaches, however, can increase the average end-to-end delay of packets and the number of packets buffered in the queue of the node where multiple flows are multiplexed.
This paper proposes a new scheme to estimate the probabilistic amount of packets, called queue level (QL), in the buffer of each node based on the packet reception rates (PRRs) of the wireless links. A node with higher QL means that it can have more packets probabilistically in the queue than the node with lower QL. This paper also proposes a QL-based centralized scheduling algorithm to assign time slots efficiently in TDMA-based IWSNs. The proposed algorithm first calculates the number of time slots that need to be assigned to each node based on the target end-to-end reliability and PRR values of the wireless links. To determine (time-slot, channel) for the time slots assigned to the nodes, the proposed scheduling algorithm uses a prioritization scheme, which gives higher priority to the node with higher QL. By assigning time slots first to the node with the highest QL, we can reduce the average end-to-end delay of packets and reduce the number of packets buffered in the queue while satisfying the required end-to-end reliability.
We evaluated the performance of the proposed scheduling algorithm through a simulation using a Cooja simulator in Contiki [13] and compared it with the flow-based prioritization approach in [12]. In the simulation on an example network in [12] with the target end-to-end reliability of 99%, each node transmitted one packet for each slot frame during 5000 slot frames following the schedules of the proposed algorithm and the flow-based approach, respectively. The simulation results showed that all of the flows guaranteed the target reliability in both of the algorithms: on average, 99.76% in the proposed algorithm and 99.85% in the existing approach. On the other hand, the proposed algorithm showed much better performance than the existing approach in terms of the average end-to-end delay and the number of buffered packets in the queue. The average end-to-end delay of packets of the flow-based approach was 184.4 ms and that of the proposed algorithm was 87.8 ms, which was more than 50 less than the flow-based approach. In the case of packet buffering, the average of maximally buffered packets of the proposed algorithm was lower than or equal to that of the flow-based approach in all nodes. In the case of the flow-based approach, the buffering requirement increases linearly, depending on the number of flows sharing a link. On the other hand, the number of buffered packets in all nodes were maintained at a fixed value (about 2 in the simulation).
The rest of this paper is organized as follows. In Section 2, we describe the network model and the notation used in the paper. In Section 3, we describe the method to estimate the probabilistic amount of packets in each node and the QL-based scheduling algorithm proposed in this paper. Section 4 describes the performance evaluation of the proposed algorithm based on the simulation using Cooja and Section 5 concludes the paper.

2. Network Model

In this paper, we considered a WSN consisting of a sink node (or a gateway) and sensor nodes with a half-duplex radio interface. A WSN is denoted by a directed graph G = (V, E) where V is a set of sensor nodes including the sink, and E is a set of the links between nodes in the network, respectively. Wireless links between two nodes i and j consist of two directed edges: edge from node i to j denoted by <i,j> and edge from j to i, <j,i>. Link quality estimation in WSNs is a fundamental building block in several mechanisms such as routing and topology control, but is a challenging problem due to the lossy and dynamic behavior of the wireless links. So far, a large number of link quality estimators have been proposed [13]. We used the PRR (Packet Reception Rate) estimator in this paper, which is a receiver side estimator that is simple to measure and has been widely used in WSNs. The PRR of link <i,j> is denoted by R i   in this paper. In WSNs, each sensor node generates a packet periodically and needs to transmit through a path from the node to the sink. The packet transmitted by source node k is denoted by p k , and the hop count from the node k to the sink by h k . We assumed that the routing paths are given by a directed convergecast tree constructed by using routing protocols such as RPL [14] or other reliable routing protocols [7]. A single path tree is assumed in this paper, thus, each node k has a parent node P k to transmit its data toward the sink.
In industrial WSNs, there is a strict requirement in the end-to-end reliability of the sensor data transmitted by the nodes depending on the application. In order to ensure the reliability requirement, we assumed a TDMA-based MAC with channel hopping such as IEEE 802.15.4e TSCH [4] as a MAC protocol. In a TSCH network, there are multiple channels up to 16 and a slot frame with a fixed number of time slots. The number of available channels is denoted by N c h and the number of time slots in a slot frame by N s f . Thus, the scheduling problem is to decide which node transmits its packet, on which channel offset, and which time slot in a slot frame [8]. In TSCH networks, a frame transmission and an acknowledgment (ACK) of indicating successful reception of the frame is finished within a time slot. Two different types of time slots are defined in TSCH: dedicated and shared time slots. We assumed that the time slots are dedicated to guarantee the reliability of frame transmission in a time slot. As in TASA [7], we defined a set of duplex-conflict nodes of node k, D C k , as a set of nodes that cannot transmit in the same slot due to conflict. The nodes in D C k consists of the parent node P k , the children of node k, and the children of P k . If a node is not in D C k , it can transmit its frame in the same time slot with node k using different channels to each other. In the example graph in Figure 1, D C 1 is {2, 4} and D C 4 is {1, 2}, thus, node 1 and node 3 (also node 3 and 4) can transmit in the same time slot using different channels.

3. Proposed Scheduling Algorithm

We assumed in this paper that the convergecast tree for each node to transmit its sensor date to the sink is given and each node has a fixed number of packets to transmit in each slot frame. The proposed scheduling algorithm is a centralized algorithm and after the convergecast tree is constructed, the scheduling server receives the following information for scheduling from each node k.
  • T k : the number of packets to be transmitted by the node in each slot frame;
  • P k : parent node of node k; and
  • R k : PRR value of link <k,   P k >.

3.1. End-to-End Reliability in WSNs

The most widely used method to provide the end-to-end reliability in IWSNs is retransmitting packets when packet loss happens. There have been many studies to determine the required number of time slots to satisfy a given end-to-end reliability requirement and schedule the time slots [10,11,12]. Two types of time slots are used to provide the reliability: dedicated time slot and shared time slot. In a dedicated time slot scheme, a fixed number of time slots are dedicated to transmit a packet, which needs a larger number of time slots compared with the shared time slot scheme. In the shared time slot scheme, we can reduce the number of time slots by taking the advantage of statistical multiplexing of independently transmitted packets when multiple packets share a link. We considered the shared time slot scheme in this paper.
When the target end-to-end PRR (e2ePRR) is given to a IWSN, the number of time slots that needs to be assigned to a packet transmitted by a node depends on e2ePRR, the number of links in the routing path, and the PRRs of the links in the path [10,11,12]. To determine the number of time slots for a packet transmitted by a node with k hops away from the sink, we first determine the required per-hop link PRR ( P H k ) to satisfy the given e2ePRR as follows:
P H k = e 2 e P R R   1 / k
When multiple packets are sharing a link, we took the average of the per-hop link PRRs of the packets as the required per-hop link PRR ( P A k ). Let S k be a set of ( p i , h i ) sharing the transmission link of node k, <k,   P k >. Then, P A k of the link <k,   P k > is calculated as:
P A k = ( p i ,   h i ϵ S k P H h i ) / S k
The number of time slots to be assigned to node k transmitting its packet through link <k,   P k >, T S k , is calculated as:
T S k = min n P A k 1 j = 0 S k 1 n S k + j j R k j 1 R k n S k + 1
In the example network of Figure 1, let us assume that all nodes have one packet to transmit in each slot frame and e2ePRR = 0.99 for all packets. Then,
  • P H 1 = 0.99, P H 2 = 0.99499, P H 3 = 0.99666;
  • S 1 = {(p1, 1), (p2, 2), (p4, 2), (p3, 3)}; and
  • P A 1 = ( PH 1 + 2 PH 2 + PH 3 ) / 4 ) = 0.99416.
Thus, T S 1 = 7 by Equation (3), and the number of time slots that needs to be assigned to node 1 is 7 to satisfy the target end-to-end PRR. The PA and TS value for all nodes in Figure 1 is shown in Figure 2a.

3.2. Estimating Amount of Packets in Queue

The transmission on a wireless link is determined probabilistically based on the PRR of the link. When a packet is transmitted on link <k,   P k > with PRR R k , it will be transmitted to node P k with probability R k and stay in node k with probability (1 R k ). We expressed the amount of packets in the queue of a node in percentage, called QL (queue level), by considering the probabilistic transmission of the wireless link. For example, when node 3 has one packet to transmit in the queue and there is no packet in node 2, as shown in Figure 2b, Q L 2 = 0 and Q L 3 = 100. If node 3 transmits a packet to node 2 in a time slot, the QLs of nodes 2 and 3 change so that Q L 2 = 70 and Q L 3 = 30 after the time slot because the PRR of link <3,2> is 70%. We can estimate the amount of packets in the queue of a node by its QL. Higher QL means a higher number of packets in the queue.
The proposed scheduling algorithm utilizes the QL information to determine a node to transmit in a time slot. We assumed that all nodes had a fixed number of packets at the beginning of each slot frame. After the convergecast tree is constructed, the scheduling server receives [ T k , P k , R k ] from each sensor node k. After that, the scheduling server calculates P A k and T S k for each node k based on Equations (1)–(3). The proposed scheduling algorithm utilizes multiple channels and assigns multiple nodes to a time slot if they are not in duplex-conflicting relationship [8]. For scheduling, the server sets the following information to each node:
  • Q L k (QL of node k) is initialized to (100 × T k );
  • M Q L k (Minimum QL of node k) is set to 100 × (1 P A k ), which specifies the minimum QL of node k for a time slot to be assigned; and
  • D C k is a set of nodes that are in duplex-conflicting relationship with node k [7].
The proposed scheduling algorithm starts from the first time slot to decide the nodes to transmit among the nodes that have remaining time slots and their queue level is above their minimum level. The proposed algorithm uses a QL-based prioritization scheme to assign the current time slot to the nodes, which gives higher priority to the nodes with higher QL. The scheduling algorithm performs the following steps to determine the nodes that can transmit their packets in the current time slot.
1.
Determine a set of nodes that need to be scheduled, N, in the current time slot t (initially 0);
2.
Prioritize the nodes in N based on Q L k , T S k , and tree level of node k;
3.
Choose the node with the highest priority, n, and assigns channel 0 of time slot t to node n;
4.
Delete n and the nodes in D C n from N;
5.
Choose the next highest priority node, n, in N and assigns the next available channel to node n;
6.
Repeat steps 4 and 5 until N becomes empty or there is no available channel; and
7.
Adjust the QLs of nodes that are transmitting or receiving in time slot t considering the PRR values of the links and go to 1 for the next time slot (t + 1).
Algorithm 1 shows the details of the proposed scheduling algorithm. After initializing the QL and MQL values of each node, we obtain a set of nodes, N, to which time slots can be assigned in step 3. All the nodes in N have to satisfy that T S k   1 and Q L k   M Q L k for each node k in N. In the main loop of (4)~(18), the nodes in N are prioritized in the PRIORITIZE(N) function. We prioritized the nodes based on the order of the highest QL, the highest TS, and the highest tree level. In the loop of (7)~(14), we selected the nodes that can transmit in the current time slot ts at the same time and assign to the available channels. At first, we assigned (ts,0) (channel 0 of time slot ts) to N(0), which is the highest priority node in N. After that, we deleted N(0) and the nodes that are duplex-conflicting with N(0) from N. Then, we assigned the next available channel of the current time slot to node N(0), and deleted N(0) and the nodes that are duplex-conflicting with the selected node again. We repeated this step while the channels were available and N was not empty. After selecting all the nodes that can transmit in ts at the same time, we updated the TS and QL values of the nodes in M (the selected links in ts) in the ADJUST_TS_QL(M) function. We increased the time slot ts and set the channel number ch to 0, and updated N to a set of nodes to which channels can be assigned in the next time slot (ts + 1). We repeated the main loop of steps (4)~(18) while N was not empty. After the main loop, we checked the QL of each node and assigned additional time slots to the nodes if their QLs were greater than or equal to MQL in the ASSIGN_ADDITIONAL_TS() function.
After the inner loop (step (7)~step (14)) is finished, M contains the links to which channels are assigned to transmit in the current time slot ts at the same time. The ADJUST_TS_QL(M) function updates the TS and QL values of the sender and receiver nodes of the links in M to determine the channel assignment in the next time slot. The remaining number of time slots (TS values) are decreased by 1. The QL values are updated based on the number of packets to transmit in time slot ts and the PRR value of the link. The number of packets (tx_amount) to transmit is 100 (one packet) if Q L k is greater than 100, otherwise, tx_amount is Q L k . Thus, for each link <k,   P k > in M, we updated the QLs of node k and node P k based on the PRR value, R k of the link in steps (7) and (8) of the ADJUST_TS_QL(M) function.
Algorithm 1: QL-Based Scheduling Algorithm
// NCH: the number of available channels
// T k : the number of packets that node k transmits in each slot frame
// T S k : the number of time slots that needs to be assigned to node k
// P A k : the per-hop link PRR of link <k,   P k >
// D C k : a set of nodes that are duplex-conflicting with node k
(1) Initialization: Q L k = 100 ×   T k ; M Q L k = 100 × (1– P A k );
(2) ts = 0; ch = 0;
(3)Na set of nodes which satisfies T S k   1 and Q L k     M Q L k ;
(4) while (N is not empty) {
(5)  PRIORITIZE(N); // prioritize the nodes in N
(6)  M ← φ;
(7)  while (ch < N c h ) {
(8)    n ← N(0);
(9)    assign (ts, ch) to link <n,   P n >;
(10)    MM {<n,   P n >};
(11)    DLETE_DC(N, n); // delete n and nodes in D C n from N
(12)     if (N is empty) break;
(13)    ch ← ch + 1;
(14)  }
(15) ADJUST_TS_QL(M); // adjust TS, QL of nodes in M
(16) ts ← ts + 1; ch = 0;
(17) Na set of nodes which satisfies T S k   1 and Q L k     M Q L k ;
(18) }
(19) ASSIGN_ADDITIONAL_TS(); // check the QL of nodes and assign additional time slots when Q L k     M Q L k

Function:PRIORITIZE(N)
// N: a set of nodes to which a slot can be assigned
(1) Sort the nodes in N in descending order of QL values;
(2) In the case of a tie, sort the nodes in N in descending order of TS values;
(3) In the case of a tie, sort the nodes in N in descending order of tree level;

Function:DLETE_DC(N, n)
// N: a set of nodes to which a slot can be assigned
// n: selected node
// D C n : a set of duplex-conflicting nodes with node n
(1) Delete n and all nodes in D C n ;

Function: ADJUST_TS_QL(M)
// M: a set of links with channels assigned
// R k : PRR of link <k,   P k >
(1) for (each link <k,   P k > in M) {
(2)   T S k = T S k –1;
(3)  if ( Q L k > 100) then
(4)    tx_amount = 100;
(5)  else
(6)    tx_amount = Q L k ;
(7)   Q L k = Q L k  − (tx_amount ×   R k );
(8)   Q L P k = Q L P k + (tx_amount ×   R k );
(9) }
To illustrate the operation of the proposed scheduling algorithm with an example, we performed the algorithm in a 2-channel network based on the example network in Figure 1. We assumed all nodes had one packet to transmit in each slot frame. Based on the PA value of each node in Figure 2, the MQL (minimum QL) of each node was set as M Q L k = 100 × (1 −   P A k ) for node k. We assigned time slots only to the nodes that satisfied Q L k   M Q L k and T S k   1 .   Figure 3 shows the TS, QL, and MQL values of the nodes at each time slot and the (time-slot, channel) assignment result. In each step, the red color denotes the node with the highest priority and the blue color the non-duplex conflicting node. The highest node is assigned to channel 0 and the non-duplex conflicting node to channel 1 in the current time slot. During the assignment step, the QL of a node can become less than its MQL even though its TS is greater than 0. In this case, the remaining time slots are not assigned, which can reduce the number of assigned time slots, but can affect the end-to-end delivery ratio slightly. In Figure 3, node 3 at time slot 8 and node 2 at time slot 15 showed these cases. At time slot 16, there was no node that satisfied Q L k   M Q L k and T S k   1 , thus, the main loop of the scheduling algorithm was completed. After the main loop was completed at time slot 16, the ASSIGN_ADDITIONAL_TS() function checks the QL of each node and assigns one additional time slot to node 1 because Q L 1 > M Q L 1 .

4. Performance Evaluation

We evaluated the performance of the proposed scheduling algorithm and compared it with the approach in [12] using the Cooja simulator on the Contiki platform [15]. The existing approaches in [10,11,12] for guaranteeing the end-to-end reliability used two types of time slots: dedicated and shared time slots. The shared time slot scheme can reduce the number of time slots by utilizing the advantage of statistical multiplexing of independently transmitted packets. We also used the shared time slot approach in this paper. After determining the number of time slots for each node, the scheduling algorithm decides the time-slot number and channel number for each time slot assigned to the nodes. The scheduling of the existing approaches are similar, so we only compared it with the approach in [12] (we call this a flow-based approach).
For fair comparison, we used the same example in [12], which is shown in Figure 4a. The scheduling result of the flow-based approach for the example on a 3-channel network is shown in Figure 4b. We assumed that all sensor nodes had one packet to transmit at the beginning of each slot frame and the target end-to-end reliability of packets was 99%. Figure 4c shows the MQL and TS values for scheduling in the proposed scheduling algorithm and the scheduling result of the proposed algorithm is shown in Figure 4d. The number of assigned time slots of the proposed algorithm is 23, which is one time slot less than that of the flow-based approach.
Based on the scheduling results in Figure 4, we ran the simulation using the Cooja simulator and analyzed the performance of the proposed algorithm in terms of the end-to-end reliability, the average end-to-end delay of packets, and the number of packets queued in each node. The slot frame length was 50 and each time slot was 10 ms. We set the target end-to-end reliability to 99%. During the simulation, each sensor node transmitted its data 5000 times, one for each slot frame using the time-slot and channel assigned to the node. The flow-based approach uses prioritized transmission. Thus, if there are multiple packets in the queue at its assigned time slot, it transmits the highest priority packet based on the defined priority of flows, as shown in Figure 4b [12]. In the case of the proposed algorithm, each node transmits packets in the queue in FIFO order.
Figure 5 shows the end-to-end reliability of each node in the proposed algorithm and the flow-based approach. In both of the algorithms, every node satisfies the target end-to-end reliability of 99%. The average end-to-end reliability of the nodes in the proposed algorithm was 99.76%, which was a little less than that of the flow-based approach (99.85%).
Figure 6 shows the average end-to-end delay of packets transmitted by each node in both of the approaches. We assumed that all packets to be transmitted in each slot frame were ready at the beginning of the slot frame. We measured the end-to-end delay of a packet as the time between the slot frame starting time and the packet reception time at the sink node. As shown in Figure 6, the average end-to-end delay of packets of the proposed algorithm was lower than that of the flow-based approach in all nodes, except node 6. In the flow-based approach, node 6 had the shortest end-to-end delay because it had the highest priority. After the packets of all flows were buffered in node 1, the packet of node 6 was transmitted from the first time slot assigned to node 1 (time-slot 14). The average end-to-end delay of packets transmitted by all nodes in the flow-based approach was 184.4 ms, and that of the proposed algorithm was 98.1 ms, which was about 47% less than the flow-based approach. In the case of node 1, the average end-to-end delay of packets of the proposed algorithm was 13.36 ms, which was only about 7% of that of the flow-based approach (206.58 ms).
Figure 7 shows the average of maximally buffered packets in the queue of each node in both of the approaches. As we can see in the figure, in the case of the flow-based approach, as the number of multiplexed packets increased, the number of buffered packets also increased. The average values of maximally buffered packets in nodes 1, 2, and 3 were 6.994, 1.998, and 2.998 in the flow-based approach. In the case of the proposed algorithm, the average of the maximally buffered packets in nodes 1, 2, and 3 were 2, 1.992, and 2.027, respectively. From this simulation, we can see that the proposed algorithm keeps the queue level (the number of buffered packets) of the nodes to about a fixed value, which was 2 in this example.

5. Conclusions

In this paper, we proposed a novel method to estimate the number of packets, called the queue level (QL), in the queue of the nodes in TDMA-based IWSNs. We can estimate the QL of each node based on the probabilistic transmission of wireless links. We also proposed a centralized scheduling algorithm on IWSNs by utilizing the QL information of the nodes. After determining the number of time slots for each node to satisfy the target end-to-end reliability, the proposed scheduling algorithm decides the time-slot and channel to each of the assigned time slot. The proposed scheduling algorithm assigns time slots based on the priority, which gives the highest priority to the node with the highest QL. By assigning time slots based on the QL-based priority scheme, we can transmit packets to the sink node fast and reduce the number of packets buffered in each node while satisfying the end-to-end reliability requirement of IWSNs. Based on the simulation using Cooja, we have shown that the proposed algorithm guarantees the target end-to-end reliability required in IWSNs. The simulation results also showed that the proposed algorithm provides a much lower end-to-end delay of packets and lower queue level (number of buffered packets in the queue) compared with the flow-based approach [12].

Funding

This work was supported by the 2020 Research Fund of University of Ulsan.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gungor, V.C.; Hancke, G. Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches. IEEE Trans. Ind. Electron. 2009, 56, 4258–4265. [Google Scholar] [CrossRef] [Green Version]
  2. Song, J.; Han, S.; Mok, A.; Chen, D.; Lucas, M.; Nixon, M.; Pratt, W. WirelessHART: Applying Wireless Technology in Real-Time Industrial Process Control. In Proceedings of the Real-Time and Embedded Technology and Applications Symposium (RTAS’08), St. Louis, MO, USA, 22–24 April 2008; pp. 377–386. [Google Scholar] [CrossRef] [Green Version]
  3. ISA. Wireless Systems for Industrial Automation: Process Control and Related Applications. Int. Soc. Autom. 2011, 1–792, ANSI/ISA-100.11a-2011. [Google Scholar]
  4. Gutierrez, J.A.; Callaway, E.H.; Barrett, R.L. IEEE Standard for Low-Rate Wireless Personal Area Networks (LR-WPANs). IEEE Standard 802.15.4–2015 (Revision of IEEE Std 802.15.4–2011); IEEE Standards Association: Piscataway, NJ, USA, 2016. [Google Scholar] [CrossRef]
  5. Sgora, A.; Vergados, D.D. A Survey of TDMA Scheduling Schemes in Wireless Multihop Networks. ACM Comput. Surv. 2015, 47, 1–39. [Google Scholar] [CrossRef]
  6. Saifullah, A.; Xu, Y.; Lu, C.; Chen, Y. Distributed Channel Allocation Protocols for Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 2264–2274. [Google Scholar] [CrossRef] [Green Version]
  7. Nobre, M.; Silva, I.; Guedes, L.A. Routing and Scheduling Algorithms for WirelessHARTNetworks: A Survey. Sensors 2015, 15, 9703–9740. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Palattella, M.R.; Accettura, N.; Dohler, M.; Grieco, L.A.; Boggia, G. Traffic aware scheduling algorithm for reliable low-power multi-hop IEEE 802.15.4e networks. In 15.4e networks. In Proceedings of the IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications. (PIMRC’12), Sydney, Australia, 9–12 September 2012; pp. 327–332. [Google Scholar] [CrossRef]
  9. Mahmood, M.A.; Seah, W.K.; Welch, I. Reliability in wireless sensor networks: A survey and challenges ahead. Comput. Netw. 2015, 79, 166–187. [Google Scholar] [CrossRef]
  10. Yan, M.; Lam, K.-Y.; Han, S.; Chan, E.; Chen, Q.; Fan, P.; Chen, D.; Nixon, M. Hypergraph-based data link layer scheduling for reliable packet delivery in wireless sensing and control networks with end-to-end delay constraints. Inf. Sci. 2014, 278, 34–55. [Google Scholar] [CrossRef]
  11. Dobslaw, F.; Zhang, T.; Gidlund, M. End-to-End Reliability-Aware Scheduling for Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2014, 12, 758–767. [Google Scholar] [CrossRef] [Green Version]
  12. Hashimoto, M.; Wakamiya, N.; Murata, M.; Kawamoto, Y.; Fukui, K. End-to-end reliability- and delay-aware scheduling with slot sharing for wireless sensor networks. In Proceedings of the 8th International Conference on Communication Systems and Networks (COMSNETS’16), Bangalore, India, 12–16 September 2016; pp. 1–8. [Google Scholar] [CrossRef]
  13. Baccour, N.; Koubaa, A.; Mottola, L.; Zúñiga, M.A.; Youssef, H.; Boano, C.A.; Alves, M. Radio link quality estimation in wireless sensor networks. ACM Trans. Sens. Netw. 2012, 8, 1–33. [Google Scholar] [CrossRef]
  14. Winter, T.; Thubert, P.; Brandt, A.; Hui, J.; Kelsey, R.; Levis, P.; Pister, K.; Struik, R.; Vasseur, J.; Alexander, R. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. IETF RFC 6550. 2012. Available online: https://tools.ietf.org/html/rfc6550 (accessed on 15 September 2020).
  15. Contiki-NG: The OS for Next Generation IoT Devices. Available online: http://www.contiki-ng.org/ (accessed on 15 March 2020).
Figure 1. An example network graph.
Figure 1. An example network graph.
Energies 14 06370 g001
Figure 2. PA and TS values for each node in the example network of Figure 1 (a), and QL change after transmission on link <3,2> (b).
Figure 2. PA and TS values for each node in the example network of Figure 1 (a), and QL change after transmission on link <3,2> (b).
Energies 14 06370 g002
Figure 3. Scheduling steps (a) and the assignment result (b) for the sample graph in Figure 1 with 2-channels.
Figure 3. Scheduling steps (a) and the assignment result (b) for the sample graph in Figure 1 with 2-channels.
Energies 14 06370 g003
Figure 4. Scheduling results of the proposed algorithm and flow-based algorithm on the example network with 3-channels.
Figure 4. Scheduling results of the proposed algorithm and flow-based algorithm on the example network with 3-channels.
Energies 14 06370 g004
Figure 5. End-to-end reliability of the proposed algorithm and the flow-based approach.
Figure 5. End-to-end reliability of the proposed algorithm and the flow-based approach.
Energies 14 06370 g005
Figure 6. Average end-to-end delay of packets in the proposed algorithm and the flow-based approach.
Figure 6. Average end-to-end delay of packets in the proposed algorithm and the flow-based approach.
Energies 14 06370 g006
Figure 7. Average number of maximally buffered packets of each node in the proposed algorithm and the flow-based approach.
Figure 7. Average number of maximally buffered packets of each node in the proposed algorithm and the flow-based approach.
Energies 14 06370 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, M.-K. Efficient Link Scheduling Based on Estimated Number of Packets in Queue on Industrial Wireless Sensor Networks. Energies 2021, 14, 6370. https://doi.org/10.3390/en14196370

AMA Style

Kim M-K. Efficient Link Scheduling Based on Estimated Number of Packets in Queue on Industrial Wireless Sensor Networks. Energies. 2021; 14(19):6370. https://doi.org/10.3390/en14196370

Chicago/Turabian Style

Kim, Myung-Kyun. 2021. "Efficient Link Scheduling Based on Estimated Number of Packets in Queue on Industrial Wireless Sensor Networks" Energies 14, no. 19: 6370. https://doi.org/10.3390/en14196370

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop