19
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2008; 8:385–403 Published online 17 December 2007 in Wiley InterScience (www.interscience.wiley.com) DOI: 10.1002/wcm.584 Should I send now or send later? A decision-theoretic approach to transmission scheduling in sensor networks with mobile sinks Ladislau B¨ ol¨ oni and Damla Turgut ,School of Electrical Engineering and Computer Science, University of Central Florida, FL, U.S.A. Summary Mobile sinks can significantly extend the lifetime of a sensor network by eliminating the need for expensive hop- by-hop routing. However, a sensor node might not always have a mobile sink in transmission range, or the mobile sink might be so far that the data transmission would be very expensive. In the latter case, the sensor node needs to make a decision whether it should send the data now, or take the risk to wait for a more favorable occasion. Making the right decisions in this transmission scheduling problem has significant impact on the performance and lifetime of the node. In this paper, we investigate the fundamentals of the transmission scheduling problem for sensor networks with mobile sinks. We first develop a dynamic programming-based optimal algorithm for the case when the mobility of the sinks is known in advance. Then, we describe two decision theoretic algorithms which use only probabilistic models learned from the history of interaction with the mobile sinks, and do not require knowledge about their future mobility patterns. The first algorithm uses Markov Decision Processes with states without history information, while the second algorithm encodes some elements of the history into the state. Through a series of experiments, we show that the decision theoretic approaches significantly outperform naive heuristics, and can have a performance close to that of the optimal approach, without requiring an advance knowledge of the mobility. Copyright © 2007 John Wiley & Sons, Ltd. KEY WORDS: sensor networks; mobile sink; transmission scheduling 1. Introduction Traditional sensor networks are composed of a set of low power sensor nodes which collect information and forward them through hop-by-hop routing to one or more sinks. Sinks are assumed to have much more computational power and energy resources than the sensor nodes. The traditional vision of a sensor network assumed both the sinks and the sensor nodes to be static. Because of the low power resources of the sensor *Correspondence to: Damla Turgut, School of Electrical Engineering and Computer Science, University of Central Florida, FL, U.S.A. E-mail: [email protected] nodes, energy conservation is an important factor. Most of the energy of the node is spent for the wireless transmissions. In this architecture, the node needs to transmit both its own observations and forward the transmissions of the other nodes. An alternative approach, more economical in terms of consumed power would be for the data to be collected by a set of mobile sinks, which are periodically visiting the vicinity of each node. The sensor nodes are collecting and buffering their observations, Copyright © 2007 John Wiley & Sons, Ltd.

Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

WIRELESS COMMUNICATIONS AND MOBILE COMPUTINGWirel. Commun. Mob. Comput. 2008; 8:385–403Published online 17 December 2007 in Wiley InterScience(www.interscience.wiley.com) DOI: 10.1002/wcm.584

Should I send now or send later? A decision-theoreticapproach to transmission scheduling in sensor networkswith mobile sinks

Ladislau Boloni and Damla Turgut∗,†

School of Electrical Engineering and Computer Science, University of Central Florida, FL, U.S.A.

Summary

Mobile sinks can significantly extend the lifetime of a sensor network by eliminating the need for expensive hop-by-hop routing. However, a sensor node might not always have a mobile sink in transmission range, or the mobilesink might be so far that the data transmission would be very expensive. In the latter case, the sensor node needsto make a decision whether it should send the data now, or take the risk to wait for a more favorable occasion.Making the right decisions in this transmission scheduling problem has significant impact on the performance andlifetime of the node. In this paper, we investigate the fundamentals of the transmission scheduling problem for sensornetworks with mobile sinks. We first develop a dynamic programming-based optimal algorithm for the case whenthe mobility of the sinks is known in advance. Then, we describe two decision theoretic algorithms which use onlyprobabilistic models learned from the history of interaction with the mobile sinks, and do not require knowledgeabout their future mobility patterns. The first algorithm uses Markov Decision Processes with states without historyinformation, while the second algorithm encodes some elements of the history into the state. Through a seriesof experiments, we show that the decision theoretic approaches significantly outperform naive heuristics, and canhave a performance close to that of the optimal approach, without requiring an advance knowledge of the mobility.Copyright © 2007 John Wiley & Sons, Ltd.

KEY WORDS: sensor networks; mobile sink; transmission scheduling

1. Introduction

Traditional sensor networks are composed of a set oflow power sensor nodes which collect information andforward them through hop-by-hop routing to one ormore sinks. Sinks are assumed to have much morecomputational power and energy resources than thesensor nodes. The traditional vision of a sensor networkassumed both the sinks and the sensor nodes to bestatic. Because of the low power resources of the sensor

*Correspondence to: Damla Turgut, School of Electrical Engineering and Computer Science, University of Central Florida, FL,U.S.A.†E-mail: [email protected]

nodes, energy conservation is an important factor. Mostof the energy of the node is spent for the wirelesstransmissions. In this architecture, the node needs totransmit both its own observations and forward thetransmissions of the other nodes.

An alternative approach, more economical in termsof consumed power would be for the data to be collectedby a set of mobile sinks, which are periodicallyvisiting the vicinity of each node. The sensornodes are collecting and buffering their observations,

Copyright © 2007 John Wiley & Sons, Ltd.

Page 2: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

386 L. BOLONI AND D. TURGUT

and occasionally transmitting them to the closestactuator node. This approach leads to a better energyeconomy in the sensor nodes, because it eliminates thecostly forwarding of packets done by nodes withoutrenewable energy resources.

Naturally, there will be moments when there is nomobile sink in the transmission range of the node.Even when a sink is in the transmission range, itmight be so far that the transmission can happenonly with a large energy consumption. This createsa new problem for the sensor node: should it sendthe data now, or wait for a more favorable moment,when a sink will be closer, thus the data can besent with a lower power consumption? Given that thenecessary transmission power increases very quicklywith the distance (in certain cases, for nodes close tothe ground, it can be as much as the 4th power ofdistance), the right choice of the transmission momentcan be of major importance. Of course, if a sensornode waits too long, it might be forced to transmitat the moment when its memory buffer is full, whilebypassing previous, better opportunities. Even worse,if there is no mobile sink in the transmission range whenthe buffer is full, some amount of observations willbe lost.

In this paper, we study the transmission schedulingproblem for sensor networks with mobile sinks. Theremainder of this paper is organized as follows. Thetransmission scheduling problem, its applications andpossible strategies are described in Section 2. Relatedwork in the domain of sensor networks with mobilesinks is presented in Section 3. In Section 4, wepresent the Oracle Optimal algorithm, an algorithmwhich calculates the optimal schedule of transmissionsproviding that the movement schedule of the sinks isknown ahead of time. While this requirement, togetherwith the high memory and computational cost makesit less suitable for deployment on a sensor node,the algorithm will serve as a reference for the morerealistic algorithms we present in the next sections.Section 5 describes a decision theoretic approach tothe transmission scheduling problem. The approach isbased on the building of probabilistic models of theenvironment and positions the problem as a MarkovDecision Process (MDP). We propose two versionsof the MDP encoding: one without explicit encodingof the history of mobile sink and another one witha simplified encoding of the history. In Section 6,we present the results of an experimental study. Asexpected, the Oracle Optimal algorithm outperformsthe other algorithms. We show that the decisiontheoretic algorithms show a performance close to the

optimal and significantly outperform simple heuristics.We conclude in Section 7.

2. The Transmission SchedulingProblem

The transmission scheduling problem for sensornetworks with mobile sinks is centered on the decisionsof the node whether to transmit or not its currentlycollected set of observations to a mobile sink at aparticular moment in time.

Sensor networks with mobile sinks have applicationsin areas ranging from environmental data collection tobattlefield surveillance. The transmission schedulingproblem appears in most of these deployments,although in slightly different formulations. Forinstance, our assumption is that data transmission isinitiated by the sensor node, thus the transmissionscheduling problem needs to be solved by the node.If a certain architecture requires the data transmissionto be initiated by the sink, the transmission schedulingproblem must be solved by the sink. The only scenariowhen the transmission scheduling problem is irrelevantis when the mobile sink visits the sensor nodes regularlyand positions itself at a predetermined position forreceiving data.

In the following, we describe our assumptions aboutthe deployment scenario. Naturally, the algorithmsproposed in this paper need to be appropriatelymodified if deployed under different assumptions.

� The mobile sinks visit every sensor node; all thenodes will be eventually visited by a sink. This doesnot necessarily mean that all the data collected bythe node can be transmitted to the sink; it is possiblethat the time interval between two visits is so largethat even with an optimal strategy some data will belost.

� The data transmission always happens between thesensor node and the closest mobile sink.

� The sink does not move during the transmission.� The nodes have a finite buffer of constant size and

collect observations with a constant bit rate.� There is no deadline associated with the transmission

of the observations. That is, the node can bufferinformation for an arbitrary amount of time withoutpenalty.

Naturally, the relaxation of some of theseassumptions leads to more complex problems.

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 3: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 387

One of the most important assumptions is that weconsider all the transmissions to be from the sourcenode to the mobile sinks. If we assume that the nodescan choose between a single-hop transmission to thesink or a multi-hop transmission, a series of new,complex choices appear. The node needs to decidewhether to transmit to the sink, to the neighboringnodes (initiating a hop-by-hop transmission), or to wait.At the same time, the node needs to make decisionswhether and when to transmit, buffer or drop incominghop-by-hop messages. While the cost of the node-to-sink direct transmission is limited to the node, theenergy cost of the hop-by-hop transmission is spreadacross the nodes of the path. While an interestingchallenge, the detailed consideration of such systemsare outside the scope of this paper. We will show that animportant special case, when the nodes resort to hop-by-hop transmission only to avoid loosing data, can behandled with our model.

Let us now consider the objectives of the nodes.In the big picture, the nodes are striving to transmitall the observations (i.e., to minimize the number ofobservations lost) while simultaneously minimizingthe energy consumption. The scheduling strategy willtry to minimize an objective function which representsa balance of these two factors. Neither of these twoobjectives alone would yield the desired behavior.Considering only the energy minimization criterionwould create a sensor which does not transmit anyobservation. Considering only the goal to minimize lostdata would create a system which will transmit at everyavailable opportunity.

Thus, a suitable objective function would considerboth components, for instance, in the form of aweighted sum, which is calculated cummulatively overthe considered time interval. We call this objectivefunction the Cummulative Policy Penalty (CPP). The‘cummulative’ aspect of the definition is important; forinstance a sensor can make a bad decision (e.g., not totransmit at a favorable moment) without immediatelyoccurring a penalty.

The transmission energy is fully determined by thephysical factors. We use the following model for theenergy dissipation used for communication [1]:

ptx = (α11 + α2dn)b (1)

where ptx is the power dissipated when the node istransmitting to the mobile sink, d is the distance tothe sink, n is the path loss index, and b is the numberof bits transmitted. α11 and α2 are positive constants.The path loss index varies between 2..4 depending

on the environment and the position of the node. Ingeneral, for sensor networks deployed on the ground,the path loss index is higher. In our experimentalstudy, we will assume a path loss index of 4. Typicalvalues of the parameters are α11 = 45 nJ/bit and α2 =0.001 pJ/bit/m4 (for n = 4).

In most cases, the data loss penalty component can bedetermined by the user based on the requirements of theapplication. A special case are systems which considerhop-by-hop transmission only in the last resort. Thesesystems would transmit through a hop-by-hop modelonly the information which in other cases would belost through buffer overflow. One way to model this bysetting the buffer overflow penalty to the average costof the hop-by-hop transmission.

3. Related Work

The traditional view of wireless sensor networks wasbased on the assumption of fixed sinks and multihoprouting in which every sensor node participates.However, forwarding other nodes’ packets puts a verysignificant load on the limited energy resources of thesensor nodes. Significant research effort was spent onmethods to optimize the energy consumption of thesensor network.

Recently, several research groups proposedapproaches based on the assumption of mobile sinks.Whenever their deployment is possible, mobile sinkscan greatly extend the lifetime of the sensor network.In the best case, the mobile sinks periodically visitthe vicinity of every sensor; in these conditions,all the communication happens in a single hopbetween the node and the mobile sink.

Naturally, the use of mobile sinks opens a number ofnew research challenges. In the following, we reviewsome of these efforts grouped by the research problemsthey concentrate on.

3.1. Routing Toward Mobile Sinks

These types of networks assume that only a subset ofsensor nodes are visited by the sinks. The nodes whichdo not have direct access to the sink are using hop-by-hop routing either toward the mobile sink or towardsensor nodes which are periodically visited by a sink.

The Mobile Ubiquitous LAN Extension (MULE)[2] architecture has three tiers: (i) a top tier of WANconnected devices, (ii) a middle tier of mobile transportagents, and (iii) a bottom tier of fixed wireless sensornodes. The mobile transport agents, which are the

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 4: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

388 L. BOLONI AND D. TURGUT

equivalents of mobile sinks, are opportunistic agentscapable of short range wireless communication withthe sensors and wireless access points. The agents useMarkov chain theory to determine the average valuesof the entities of interest. The theoretical results wereverified with a custom discrete event simulator.

Scalable Energy-efficient Asynchronous Dissemi-nation (SEAD) [3] is a distributed self-organizingprotocol that reduces the energy consumption bythe construction of a dissemination tree (d-tree) anddissemination of the data to the mobile sinks. SEADextends the data placement heuristic [4], but differsfrom it by the use of mobile sinks and relaxing thehigh network density assumption. SEAD is evaluatedusing ns-2 and its performance is compared against theDirected Diffusion [5], Two-Tier Data Dissemination(TTDD) [6], and ADMR [7] protocols in terms ofenergy consumption per node and average end-to-end delay. The simulation results show that SEADoutperforms these approaches in terms of building andmaintaining dissemination trees to mobile sinks.

Hybrid Learning-Enforced Time Domain Routing(HLETDR) [8] aims to deliver sensor data toward amobile sink over multiple-hops. The mobile sink doesnot query for data but rather passively listens for data‘pushed’ by the source sensor. The sensor nodes areforwarding their observations toward the moles, sensornodes located within the sink’s path. The objective isto forward the data in a path toward a mole whichis located within the proximity of the sink. Oncethe data arrives at the mole, the mole evaluates the‘goodness’ value of the path based on the probabilisticlocal information of the current location of the sink andreinforces the route toward the sink. This reinforcementproliferates to the source and sets up gradients.

3.2. Mobility Models of the Sinks

The mobility of the sink can be categorized into threetypes: random, predictable, and controllable. In case ofrandom mobility, the sink travels through the networkin a random walk fashion. In the case of predictablemobility, the sensor nodes can learn the mobility patternof the sink and therefore can predict the location of thesink at any given point in time. In the case of controlledmobility, the sink mobility is adaptively controlledbased on specific parameters of the network and/or thedeployed applications.

A model for controlled mobility is presented inReference [9]. In their experiments, 256 homogeneoussensor nodes are arranged in a square grid, with a singlemobile sink moving in the area. A linear optimization

model is used to determine which nodes the singlemobile sink visits and for how long. The authors findthat the energy depletion was more balanced across thenetwork and the network lifetime was extended up tofive times compared with a network with a static sink.

The data collection process is modeled as a queueingsystem in Reference [10] to measure the impact ofpredictable observer mobility (where the observerscorrespond to mobile sinks). The network uses onlysingle-hop communication. The authors show thatpredictable mobility can save communication powerin the sensor network. Knowing the path of the sinkcan help the sensor and the sink find positions wherethey can exchange data with the lowest possible power.

Reference [11] examines how the various sinkmobility patterns affect the network lifetime. The goalis to adaptively control the sink mobility to reduceenergy consumption, in turn maximizing the lifetimeof the network. The paper assumes an event-drivenscenario with multi-hop communication between thesink and the sensors. The sink roams inside the networkas a result of the current events which are based on the‘intruder movement’ event model.

The SEnsor Networks with Mobile Agents(SENMA) [12] architecture was proposed for powerconstrained large scale dense sensor networks.SENMA consists of two types of nodes: (i) sensornodes which are resource constrained, lightweight,and low cost, and (ii) resource-rich mobile agents(the equivalents of mobile sinks). SENMA relies onone hop transmission between the sensor nodes andmobile agents. For communication, the system usesa slotted time division duplexing (TDD) system withopportunistic ALOHA. The opportunistic ALOHAturns off the sensor automatically when the mobileagent is no longer in the proximity of the sensor.

The goal of the TTDD [6] protocol is to providescalable and efficient data delivery to multiple mobilesinks. TTDD uses a grid structure in which only thesensors placed in the grid points are required to obtaininformation for forwarding. Nodes nearby the gridpoints (dissemination nodes) receive queries from themobile sink. The queries travel through the grid anddata is forwarded back to the sinks by tracing thereverse path. As TTDD forwards data only to a fractionof the sensor nodes, it allows a lower control overhead.

3.3. Mobility and Routing

This category combines projects which consider notonly the mobility of the sink, but also routing of thesensed data toward the sink.

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 5: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 389

The Mobile Enabled Wireless Sensor Networks(mWSN) architecture [13] uses multi-hop forwardingto form a cluster around the expected position of themobile sink. mWSN is similar to Data MULEs inthat it is a three-tier architecture, with the top tiercomposed of a base station, also called the final fusionpoint, the middle tier including mobile sinks such asmobile phones, laptops, and so on, while the bottomtier contains the static sensor nodes. mWSN has twooperational modes: local and remote sensing. In localsensing, once a mobile sink receives a response to aquery sent to the fixed sensors, the collected data istransferred to the base station for interpretation. Thequery result will then be returned to the mobile sink.In the remote sensing case, multiple mobile sinks helpgather the data of interest. In this protocol, the sinktrajectory is not controlled but rather it can be estimatedor learned. Theoretical results show that by learningthe mobility pattern of the mobile sinks, the multi-hopclustering scheme can forward packets to the estimatedpositions of the sink in more timely and energy-efficientmanner.

Kansal et al. [14] proposed the use of controlled andcoordinated motion of network elements to alleviateresource limitations and improve system performanceby adapting to the deployment demands. The authorsdeveloped an Autonomous Intelligent Mobile Micro-Server (AIMMS) prototype which travels across thenetwork to route data from the deeply embedded nodes.Nodes have to relay data only for the nodes which donot fall into the transmission range of the micro-server.

In Reference [15], multiple mobile stations aredeployed to extend the lifetime of the sensor networkwhich is divided into equal periods of time knownas rounds. Base stations are mounted on unmannedremote controlled vehicles to be moved from onelocation to another and they can be located only atspecific places called ‘feasible sites.’ At the beginningof every round, the location of the base stationsis determined using an integer linear programmingmodel. The initial locations of the base stations areselected by the modified Minimum Cost Forwarding(MCF) routing protocol [16].

Reference [17] investigates various combinationsof networks with mobile sinks and/or mobile relays.The paper describes a performance study comparingdifferent routing algorithms in three cases when (i) thenetwork consists of static nodes only; (ii) there existsa single mobile sink; and (iii) there exists a singlemobile relay. A joint mobility and routing algorithmis described which requires the entire network toknow the current location of the mobile node. The

algorithm was then enhanced such that only a smallportion of the nodes were needed to be aware ofthe location of the mobile node while still achievingthe same performance as the previous algorithm. Thecomparison of mobile relay and mobile sink revealedthat for a sensor network with a radius of R hops,O(R) mobile relays are required to be equivalent inperformance with the mobile sink scenario.

A combination of base station mobility and multi-hop routing strategy are proposed in Reference [18]to maximize network lifetime. The paper shows thatdata collection protocols can be optimized, for instancefor a better load balancing among the nodes in thenetwork, by considering the mobility of the base stationand multi-hop routing. The authors find that the mostdesirable mobility pattern for the base station is tofollow the periphery of the network. The simulationresults have demonstrated that highly loaded nodesreduced their load by a factor of five and the jointmobility and multi-hop strategy improved the networklifetime by 500 per cent.

The MobiRoute architecture [19], an extension ofMintRoute [20], is a sensor network with mobilesinks where the mobility is controlled and predictableand the sinks have long pauses in their movementcalled epochs. In a typical scenario, nodes send datavia multi-hop communication toward the mobile sinkwhich changes its location based on route traces. Arouting protocol forwarding data toward a sink mustcarry out the following processes: (i) inform the nodewhen its communication link to the sink is brokendue to mobility; (ii) alert the entire network of anytopological variations; and (iii) reduce the packet lossduring the time when the sink moves to a differentposition.

In Reference [21], the authors design ANSWER,an AutoNomouS netWorked sEnsoR system. Thearchitecture assumes static sensor nodes and (possiblymobile) aggregation and forwarding nodes (AFNs).An important role of the AFNs is to organize thesensors in their immediate vicinity into a dynamicvirtual infrastructure which depends on the currenttask. The AFN can perform a controlled mobility whichbalances the benefits of getting closer to the nodesrecording a certain action with the risks of getting tooclose to potentially dangerous environments or agents.The paper also proposes a specific communicationinfrastructure which puts emphasis on a dynamiccoordinate system, based on coronas and wedgeswhich also serves as a clustering architecture, dynamicpartitioning of the graph through coloring and asecurity architecture.

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 6: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

390 L. BOLONI AND D. TURGUT

3.4. Transmission Scheduling

This is the process of determining when to transmit thebuffered data.

Song et al. [22] propose several algorithms fortransmitting from sensor nodes to a sink whichmoves on a linear path. The optimal multiple nodestransmission scheduling algorithm (MTSA-MSSN)requires the sink to estimate its own current velocityand direction of the mobility from GPS. The estimatedstate, E(i), is modeled as a Markov chain in timedomain. The paper also proposes two suboptimalalgorithms MSPS-MSSN and MSUS-MSSN. A seriesof simulations are performed to study the tradeoffbetween the number of successfully transmittedpackets and energy consumption. It was found thatthe two suboptimal algorithms show very closeperformance to the optimal MTSA-MSSN algorithm.

A distributed opportunistic information retrievalalgorithm that uses channel state information (CSI)is proposed in Reference [23]. This protocol encodeschannel state into the backoff strategy of thecarrier sensing, which improves robustness againstpropagation delay. The information from the sensorsis gathered by the mobile access point. The sensorsare sending their data at the moment when theyare activated by a beacon signal from the mobileaccess point. This opportunistic transmission strategyis extension to SENMA [12] and CSI-based carriersensing with negligible propagation delay, the earlierworks of the authors. To minimize the effects ofperformance degradation due to propagation delay,the backoff function is constructed using asymptoticextreme order statistics. The simulation results indicatethat the CSI-based carrier sensing performance decaysgracefully with the propagation delay. It is also shownthat the performance of the opportunistic strategydepends on the number of activated sensors.

4. The Oracle Optimal Algorithm forComplete Knowledge TransmissionScheduling

In this section, we develop an algorithm whichfinds the optimal transmission schedule under theassumption that the mobility pattern of the sinks isknown. The definition of optimality in this case is thatthe algorithm finds a schedule which minimizes thecummulative policy penalty for the specified interval.The objective of this algorithm is to serve as a baselinefor the more realistic algorithms. We call this algorithm

Oracle Optimal to indicate the fact that it needs advanceknowledge of the future movement of the mobile sinks.

As one of our assumptions, we have stated that thetransmission always happens between the sensor nodeand the closest sink. Thus, we can characterize themobility pattern of the mobile sinks from the point ofview of a node through the vector D = (dtstart . . . dtstop ),where dt represents the distance of the closest sink attime t.

A transmission schedule is a set of k time points, suchthat A = {tstart < a1, a2, . . . ak = tstop}, ai < ai+1 anddai ≤ dtr ∀i where dtr is the transmission range of thesensor node.

We define the cummulative policy penalty as afunction CPP([t1, t2], A) ∈ R. CPP can have variousexpressions but it is additive over disjoint, consecutivetime intervals:

CPP([t1, t2], {ai|ai ∈ [t1, t2] ∧ an = t2})+ CPP([t2, t3], {bj|bj ∈ (t2, t3]})

= CPP([t1, t3], {ai} ∪ {bj}}) (2)

Let us now investigate the number of distinctpossible schedules. Let us assume that we have n

timepoints, out of which in m ≤ n points the distanceis smaller that the transmission range. At any of thesetimepoints, the sensor has the choice to send or notto send, thus the number of valid schedules is 2m. Asm can be as high as n, the naive search for the bestschedule is of exponential complexity. We will designa dynamic programming-based algorithm which, forthe average case, can significantly reduce the numberof choices which needs to be investigated.

Property 1. If A = {tstart < a1, a2, . . . ak = tstop} isthe optimal schedule for the time interval [tstart, tstop]than for all ai the schedules A1 = {tstart, . . . ai} andA2 = {ai+1, . . . , ak = tstop} are optimal schedules forthe intervals [tstart, ai] and [ai, tstop], respectively.

Proof. Let us assume that there is a differentschedule A′

1 for which Ptotal(A1) > Ptotal(A′1). Then

the schedule A′ obtained from the concatena-tion of A′

1 and A2 will have a total powerconsumption Ptotal(A′) = P(A′

1) + P(A2) < P(A1) +P(A2) = P(A), which means that A is not an optimalschedule, which is a contradiction. �

The pseudocode of the Oracle Optimal algorithmis presented in Algorithm 1. While still exponentialin the worst case, the Oracle Optimal algorithm cansignificantly cut the computation time by pruning off

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 7: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 391

branches of computation which yield worse solutionsthan the ones already found. In addition, the algorithmuses an additional heuristic to sort the solutionsstarting from the most promising ones. The betterthe heuristics, the more significant pruning can beobtained. In addition to this, the algorithms uses a cachefor the partial results. The exact performance analysisof the algorithm is outside the scope of this paper.In practice, the algorithm showed acceptable runningtimes of less than a minute on a desktop computerfor datasets with up to 1000 possible transmissiontimepoints. However, the computational complexityand the memory requirements (for the cache) clearlyexceed the possibilities of a sensor node.

Algorithm 1. The Oracle Optimal algorithm

Function OracleOptimal(D = {dtstart , dtend }, currentBest)If solution already exists in the cache

Return the solution from the cacheEndIfPTP = possible transmission points in D

STP = PTP sorted by heuristicsFor all points ai in STP

(A1, CPP1) = OracleOptimal({dtstart , ai}, currentBest)If CPP1 > currentBest

ContinueEndIf(A2, CPP2) = OracleOptimal({ai, dtend }, currentBest)If CPP1 + CPP2 < currentBest

A = A1 ∪ A2currentBest = CPP1 + CPP2

EndIfEndForadd solution to cacheReturn (A, currentBest)

EndFunction

5. A Markov Decision Process-BasedApproach for Transmission Scheduling

A MDP models decision making in situations wherethe outcome depends both on the actions of the agentas well as outside, stochastic factors. The operation ofan MDP can be briefly described as follows. The agentcan be in any of the states si, i = 1, . . . , n. The actionsthe agent can take are aj , j = 1, . . . , m, although someof the actions might not be available in all states. If anagent in state si takes an actiona it will transition to statesj with probability pa(i, j). An important componentof an MDP is the reward or punishment: this can beassociated with a given state R(si), with an action ina given state R(si, a) or with a certain transition takenas a result of an action R(si, a, sj). The formulations

are ultimately equivalent, for matters of conveniencewe had chosen the rewards to be associated with state-action pairs.

For agents with a finite time horizon, the goal of theagent is to maximize the sum of the rewards collectedover its time horizon. For agents with an infinite timehorizon, we define a discount factor γ ∈ [0, 1], and letthe agent maximize the discounted reward

∑∞t=0 γt ·

R(st, at). The discount factor shows that the agentprefers γ times less a reward at time t + 1 comparedwith the preference for the same reward at moment t.γ is usually chosen as a value close to 1.

Solving an MDP is equivalent to finding a policy P :S → A, that is, a rule which tells the agent that in statesi it should take action a = P(si). Following the policywill maximize the agents’ discounted reward. There areseveral ways of solving MDPs, the most popular onesbeing value iteration which seeks to establish the valueof each state and policy iteration which seeks to findthe policy directly, without establishing the state valuesas well. Various combinations of these approaches arealso frequently used.

The Markovian nature of the problem is reflected bythe fact that the action of the agent depends only onthe current state—it does not depend on the history.What this means in practice is that the MDP stateneeds to encode not only the state of the agent butthe state of the environment as well, together withwhatever historical information is deemed necessary.Finding an efficient representation of all the necessaryinformation in the form of a finite (and preferablysmall) set of states is critical to the success of the MDPapproach. The advantage is that once we determinedthis representation and have acquired the associatedprobabilities, the MDP approach will calculate theoptimal decision policy (in the limit of the expressivityof the state representation and the accuracy of thetransition probabilities).

The transmission scheduling problem can beconveniently and (with some representational effort)compactly represented in the terms of an MDP. Thegeneral outline of such a representation is as follows.The state of the sensor is determined by the levelof the data buffer as well as the distance of theclosest mobile sink. The actions of a sensor arewhether to send (SEND) or not (DO-NOT-SEND). Thereward associated with a state-action pair is the currentcomponent of the CPP, that is, a combination of thecost of sending the content of the buffer and the penaltyassociated with loosing data.

The transition probabilities between states reflect theprobabilistic evolution of the distance to the closest

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 8: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

392 L. BOLONI AND D. TURGUT

mobile sink. We assume that the data transfer alwayssucceeds if the mobile sink is within transmissionrange, thus this component of the state is fullydetermined by the action of the agent and the previousstate. If the data buffer content was c bytes at statesi, after a SEND action it will be 0 bytes, whileafter a DO-NOT-SEND action it will be c + r byteswhere r is the data rate of the sensor. The MDPmodel can also elegantly handle various complicatingassumptions. For instance, the fact that a transmissionmight not always succeed can be simply represented byadding two outcomes to the given action—one when itsucceeds and one when it does not.

Starting from this general model, there are severalalternatives for the building of the MDP model. We findthat relatively subtle decisions can significantly affectthe performance of the model. The main differentiatoramong these models is the representation of thestate. The other parameters of the MDP, such as thetransition probabilities are uniquely determined, oncethe representation is decided (which does not mean thatthey are necessarily easy to compute). In the following,we describe in detail the construction of two alternativemodels; in the first model, we build the most compactstate representation possible, while in the second modelwe include information about the distance history at thecost of the increase of the state space.

5.1. A Historyless MDP Model of theTransmission Scheduling Problem

In this model, we encode the state as a tuple (b, d) whereb ∈ {1, . . . , m} is a quantization of the buffer level,while d ∈ {1, . . . , n} is a quantization of the distanceof the nodes.

Let us now discuss the details of the quantizationprocess. The goal of the quantization of the distance isto reduce the continuous valued distance measurementto a (preferably small) number of discrete values. Thequantization is determined by a quantization scheduleQD = {d0, d1, . . . dn−1, dn} with d0 = 0 and dn = ∞.We say that a distance D is in quantum i according tothe schedule QD if di−1 ≤ d < di.

The choice of the quantization schedule caninfluence the quality of the decision making. The goal isto retain as much useful information as possible, whileat the same time reducing the number of quantums.While developing a theory for the optimal quantizationof distance is beyond the scope of this paper, we canapply our knowledge of the application domain todevelop an appropriate quantization schedule.

First, the sensor knows about the distance of themobile sink through the transmissions or beaconsignals of the sink. One way this can happen is throughthe sink broadcasting its own position. As the mobilesink is usually a large device such as an unmannedground or air vehicle, we can make the assumptionthat it has a GPS or other means of self-localization.Another approach is the node measuring the signalstrength of the sink and using this information toinfer distance. For both cases, the accuracy of distancemeasurement is limiting the number of quantumsworth considering. For instance, if the distance can bemeasured with an error of −50 /+100 per cent (which isreasonable for a measurement based on signal strength)then an appropriate choice of the quantums wouldbe 10, 20, 40, 80, 160 m. If, on the other hand, themeasurement is based on a mobile sink identifying itsown position with an accuracy of 10 m, for instance,through GPS, then the right choice of the quantumswould be 10, 20, 30, 40, . . . , and so on.

In all cases, the last quantum should be not largerthan the transmission range of the mobile sink MStr.Note that if the sink has a high accuracy localizationmethod, we can still end up with a large number ofquantums.

The second consideration is the transmission rangeof the sensor node Str, which is normally significantlylower than the one of the mobile sink. As thesensor cannot transmit beyond its transmission range,necessarily, the action in all states beyond that rangewill be DO-NOT-SEND. Therefore, there is no benefitin partitioning the distances between Str and MStr intomultiple quantums, as they will always map to the sameaction.

What remains to be determined is the way inwhich the distances between 0 and Str are partitionedin quantums. The simplest choice is to divide thedistance into k quantums of equal size. This wouldyield a quantization into k + 2 possible values with aschedule of:

QD ={

0,1

kStr, . . . ,

i

kStr, . . . , Str, MStr

}(3)

The problem remains whether the quantizationretains the most useful information necessary for thedecision process. Notice that the decision to send ornot send depends on the energy necessary to send thedata. If we assume that the node can use the minimumenergy necessary to send the data then this energy canbe calculated either from the laws of propagation [1]or experimentally for the specific type of environment

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 9: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 393

Fig. 1. Comparison of distance quantization schedules for therange of 0 to 80 m: (1) iso-distance schedule, (2) iso-powerschedule for path loss index 2, (3) iso-power schedule for

path loss index 4.

[24]. The most important component is the path lossfactor, which can range between 2 and 4.

Intuitively, the distance quantization scheduleretains the maximum information not when it partitionsthe distance equally, but when it partitions thecorresponding transmission power equally, the latterbeing the basis of the transmission decision. If thetransmission power has an expression of the type shownin Equation (1), with a path loss index n and we wantto divide the schedule evenly for the consumed power,we need to choose a quantization schedule:

QD ={

0,n

√1

kStr, . . . ,

n

√i

kStr, . . . , Str, MStr

}(4)

We will call this an iso-power quantization schedule.Figure 1 compares the iso-distance schedule and twoiso-power schedules for an example where Str =50, MStr = 75 and the path loss index is 2 and 4,respectively.

Let us now consider the problem of quantization forthe buffer level. The buffer is naturally discrete, sothe goal in this case is not to discretize a continuousvalue, but rather to reduce the number of quantums. Asa sensor can have several kilobytes of buffer space,having a separate quantum for each possible valuewould yield thousands of states (which then need tobe multiplied with the number of distance quantums toobtain the states of the MDP).

For the buffer level quantums, again, we needto consider the nature of the function we plan toquantize. If our goal is to optimize the transmissionpower, we need to consider the full expression of the

cost of the sending of the data. This might includethe cost for the packet overhead. For instance, theoverhead of an Ethernet packet is 26 bytes, to whichadditional overhead is added by the higher layers ofthe protocol stack (if they are present). In addition,if the transmission cannot be done in one packet, thetransmission power will increase stepwise, as at everyoccasion when an additional packet is necessary a newoverhead will be added.

Despite these complications, the transmission powerwill increase roughly linearly with the amount of data tobe transmitted, so a uniform quantization of the bufferlevel will be appropriate. We assume that a step of thequantization represents an increase equivalent to thesensor data rate for one time step.

With these quantization decisions, we build an MDPwith m × n states, where m is the number of buffercontent quantums and n is the distance quantums.A state is represented as {b, d}. Based on domainknowledge, the MDP needs to satisfy the followingrequirements:

Requirement 1. ∀d, ∀d′, ∀b ∈ {0 . . . m − 3}, ∀b′ >

b + 1, PDO-NOT -SEND({b, d}, {b′, d′}) = 0.

That is, the sensor cannot move directly into a statewhere the buffer content has increased with more thanthe sensor data rate.

Requirement 2. ∀d, ∀d′, ∀b, ∀b′ ≤ b,PDO-NOT -SEND({b,d},{b’,d’}) = 0.

That is, the buffer content cannot decrease if thesensor data is not transmitted.

Requirement 3. ∀d, ∀d′, ∀b, ∀b′ > 0,PSEND({b, d}, {b′, d′}) = 0.

This requirement encodes our assumption that thetransmission of the data is always successful.

Requirement 4. ∀d, ∀d′, ∀b < n − 1,PSEND({b, d}, {0, d′}) = PDO-NOT -SEND({b, d}, {b +1, d′}) = PDO-NOT -SEND({n − 1, d}, {n − 1, d′}).

This requirement expresses the independence of thedistance of the mobile sink from the actions and thebuffer content level.

An MDP which respects all the requirements abovefor the case with 2 distance and 3 buffer level quantumsis shown in Figure 2. Due to the structure of thestate encoding, it is convenient to visually arrange theMDP into an n × m rectangle, where the buffer contentlevels are arranged in the columns, while the distancequantums correspond to the rows. Thus, the state of

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 10: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

394 L. BOLONI AND D. TURGUT

Fig. 2. An example Markov Decision Process, for thehistoryless encoding. The continuous line arrows indicatethe DO-NOT-SEND actions, while the dotted line arrows

indicate SEND actions.

the system will progress from left to right for the DO-NOT-SEND actions, and jump back to the first columnfor the SEND actions.

Finally, we need to decide on the rewards attachedto various state-action pairs. Again, we can introducesome requirements based on domain knowledge.

Requirement 5. ∀d, ∀b < n − 1R({b, d}, DO-NOT -SEND) = 0

That is, not sending in a state where the buffer is notfull, carries no immediate reward or penalty.

Requirement 6. ∀d

R({n − 1, d}, DO-NOT -SEND) = RDataloss < 0

That is, if the sensor does not transmit when its bufferis full, it will loose an amount of data equal to its dataacquisition rate, and it will occur a policy dependentpenalty RDataloss.

Requirement 7. ∀b, ∀d

R({b, d}, SEND) = REnergy(b, d) < 0

That is, when sending the amount of data encoded bythe quantum b to the distance specified by the quantumd, the sensor will occur a penalty (cost) of REnergy(b, d).Naturally, this cost involves factors such as overhead,transmission data path loss, and so on. However, thispenalty is strictly determined by the hardware; it doesnot involve policy decision.

5.1.1. Acquiring the transition probabilities

Notice that the MDP defined in the previous sectionhas n × m states, and therefore, (n × m)2 transitionprobabilities, which is a very large number even fora moderate number of quantums. For instance, if n =10 and m = 10 we would need to compute 10 000

individual probabilities. However, requirements 1, 2,3 set most of those probabilities to zero. Furthermore,requirement 4 guarantees that the number of uniquetransition probabilities is even lower:

PSEND({b, d}, {0, d′})= PDO-NOT-SEND({b, d}, {b + 1, d′})= PDO-NOT-SEND({n − 1, d}, {n − 1, d′})= P(d′

t+1|dt) (5)

Thus, the only probabilities we need to measureare the ones of the form P(d′

t+1|dt), which is theconditional probability that the distance is d′ providedthat at the previous time point it was d. There are m2

distinct probabilities of this form, that is, in the caseof our running example, 100. Further simplificationsare possible. As the mobile sinks are performing acontinuous movement, the resulting transition matrixwill have most of its values zero except on the diagonaland the values immediately above and below thediagonal. This basically means that the distance ofthe mobile sink does not jump over quantums—if itdoes, it means that either the sampling rate is to low,or the number of quantums is not sufficient. With thissimplification, the number of unique probabilities to becalculated will be 3m, that is 30 unique values for ourrunning example.

These values can be easily acquired from historicalinformation about the movement of the mobile sink.Due to the relatively small number of transitionprobabilities which need to be acquired, relatively shorthistories can be used.

5.2. MDP With History Information

MDPs are ‘historyless,’ that is, the decision to takean action is based only on the current state. Thestate, therefore, needs to encompass all the historicalinformation necessary for decision making. The choiceof the right amount of information is critical inmaintaining the state space at a manageable size, andultimately, can determine the quality of the decisionmaking.

Let us now investigate potential ways of usinghistorical information in the states of the MDP. In thehistoryless version of the previous section, we havedefined the state as dependent of the buffer level andthe distance to the mobile sink.

Note that the history of the buffer level isuninformative. If the buffer level in a given state is b,

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 11: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 395

the level of the previous state was b − r, where r is thedata accumulation rate. The only case where multiplehistory alternatives are possible is when the buffer levelis zero—this can happen if the previous action was aSEND. The state itself does not contain informationabout how much data was in the buffer before the SENDaction—but anyhow, the future decision is not affectedby this information. In conclusion, we can ignore thehistory of the buffer level in the state representation.

Things are different with the distance of the mobilesink. Let us assume that the current distance is 40 m.In the historyless current model, the decision to sendor not send is made based on this information alone.However, if the sensor node knows the history ofdistances it might be able to make a more informeddecision. For instance if the distances were 60, 50,40, the node might conclude that a mobile sink isapproaching, it will come closer with high probabilityand therefore it is worth waiting with the sending.However, if the values were 20, 30, 40 the node willconclude that the mobile sink is moving away and itshould either send now or be prepared to wait for alonger time interval, until another mobile sink comescloser or the current mobile sink turns around.

In the first approximation, we might considerdirectly adding the history (for instance for the lastseveral time periods) into the state. The state encodingwould be {b, {dt, dt−1, . . . dt−k+1}} where k is thenumber of time intervals the history is considering.The problem with this encoding is the explosion ofthe number of states, which is m × nk. For our runningexample, if we choose n = 10, m = 10, and k = 4, wehave an MDP with 100 000 states and 1010 transitionprobabilities. Note that various considerations of ourprevious model reduced the number of probabilitieswe need to acquire to 30. Although some of the samesimplifying assumptions are applicable here as well,1010 is such a huge number, that even after all thesimplifying assumptions, we still have a state spaceso large that acquiring the transition probabilities fromobservations will be unpractical.

Therefore, we need to consider a different, morecompact encoding. We will therefore encode thehistory h in four discrete cases: STATIONARY, FAST-SLOPE-DECREASE, SLOW-SLOPE-DECREASE,and INCREASE. These classifications are determinedby considering the last three readings of the distance.With this encoding, and considering the number ofdistance quantums n = 10, there are 40 differentdistance states. This yields a theoretical number of1600 unique transition probabilities. However, someof the transitions are not possible, while others are

exceedingly rare. For instance, the transition from(5, INCREASE) to (4, INCREASE) is not possible,because if the distance is reduced, the history cannotindicate an increase of the distance. On the other hand,the transition (0, INCREASE) to (10, INCREASE)is technically possible, but it requires a mobile sinkmoving unrealistically fast. Overall, the number oftransitions which need to be considered are about 200–300, which number, although higher than in the caseof the historyless encoding, is still manageable and canbe acquired from historical information of a reasonablelength.

As the reward does not depend on the history, therewards associated with the transitions will be the sameto the state-action pairs without history.

6. Experimental Results

We performed a series of experiments with atransmission scheduling scenario involving a field inwhich a number of mobile nodes are moving andcollecting the data from the sensor nodes using a one-hop transmission. The mobility pattern of the mobilesinks was random waypoint [25]. We have assumedthat the speed of the mobile sink was 1 m/s or 3.6 km/h.This is a realistic speed for a vehicle moving on roughterrain. We considered an area of 400 × 200 m, with4 . . . 20 mobile sinks. The transmission range of thenode was considered to be between 10–80 m, a realisticrange for a sensor node (for instance [24] finds thetransmission range of second generation Mica-2 motesto be between 20 and 50 m in an outdoor habitat).Finally, we assumed a 32 kB buffer and a data rate of0.2 kB/s. The parameters of the simulation environmentare summarized in Table I.

Table I. The parameters of the simulation experiments.

General settingsMovement area 400 × 200 mSimulation time 2500 s

Mobile sinksNumber 4 . . . 20 (10 default)Velocity 1 m/sTransmission range 80 m

Sensor nodesBuffer size 32 kBData rate 0.2 kB/sTransmission range 10 . . . 80 m (50 default)

Transmission power modelPath loss index n 4α11 45 nJ/bitα2 0.001 pJ/bit/m4

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 12: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

396 L. BOLONI AND D. TURGUT

We have implemented this scenario in the YAESsimulator framework [26]. In our experiments, wecompare four different sensor implementations:

6.1. Oracle Optimal (OrOpt)

This implementation has advance knowledge ofthe movements of the mobile sinks and calculatesan optimal schedule which minimizes the givenCPP. The implementation follows the description inSection 4. The calculation of the optimal scheduletook approximately 10–30 s on a 2.8 GHz Pentium4 computer. Thus, we find that the Oracle Optimalalgorithm is not a feasible on-board implementationchoice for sensor nodes, even if the movement of thesinks is known. One the other hand, the schedule can becomputed off-line (for instance, on the mobile sink) andtransferred to the node. The schedule is essentially a listof the time moments when the node should transmit,and can be represented very compactly.

As expected, the OrOpt algorithm alwaysoutperforms the other approaches, and as such,serves as a baseline to the level of performance ispossible for a given scenario. Note that the fact thatthe algorithm is optimal does not mean that, it cannotlose data, as in certain scenarios the transmission ofall the data is not possible.

6.2. Simple Heuristics (Simple)

This algorithm implements a simple rule-of-thumbheuristics. The agent does not transmit when the bufferis below 90 per cent full. When the buffer is more than90 per cent full, it will transmit at the first availableopportunity. Note that this is not a random algorithm,but a relatively good choice for most possible scenarios.

6.3. Markov Decision Process WithoutHistory Information (MDP)

This algorithm implements the MDP as describedin Section 5.1. The distance was quantized into 10quantums using the Equation (4). The buffer level wasquantized into 30 equal size, 1 kB quantums.

The MDP was implemented using the jMarkov [27]library. The posterior probabilities were obtained byobserving a sequence of 10 000 s with the given numberof mobile sinks.

To maintain the cross-validation assumption, wewere careful to separate the training data from the testdata. For all the recorder experiments, the sensor hadseen the given movement sequence the first time.

The MDP was solved using the value iterationalgorithm. From the state values, we extracted thepolicy, which was represented, very compactly, bythe list of states where the sensor makes the SENDdecision. This choice is justified by the observationthat there are a much lower number of SEND statesthan DO-NOT-SEND states. The learning process isrelatively time consuming and probably needs to beexecuted off-line. However, the execution of a learnedpolicy involves a limited amount of computation andit can be easily performed by the sensor. Essentially,at any moment when it needs to make a decision, thesensor identifies the state, by quantizing the distance tothe closest mobile sink and the buffer level and checkswhether the state is in the send lists.

For this historyless MDP model, we find that theMDP has 403 reachable states, with 10–30 states beingSEND states (depending on the transmission range andthe number of mobile sinks).

6.4. Markov Decision Process With HistoryInformation (MDP+h)

This algorithm implements the MDP where thestate includes historical information as described inSection 5.2. The implementation and training detailsare similar to the case of MDP without historyinformation. The main difference is that due to theextra state information, we have more than three timesmore accessible states (1300–1500 depending on thetransmission range), and about 30–60 SEND states.This, however, is still within the possibilities of thejMarkov framework, and the ability of the sensor nodeto implement the policy.

An additional design choice for both MDP modelsis the discount rate (or its dual, the interest rate).Technically, the transmission scheduling problem doesnot have a ‘natural’ discount rate. There is no technicalreason for a sensor to prefer loosing data tomorrowversus loosing data today. However, the value iterationsolver of an MDP needs a discount rate lower than 1to converge. For this reason, we choose a very slowdiscount rate of 0.99.

For each sensor model, we run the simulation withthe same scenario and the same location of the sensor.The experiment was repeated 10 times, and averagemeasurements retained. We collected the followingmeasurements:

� Total transmission energy. The total energyconsumed by the sensor node for transmissions overthe timespan of the scenario. If all other parameters

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 13: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 397

Fig. 3. Scenario 1: measurement results averaged over 10 runs for the four considered transmission scheduling algorithmsfor various values of the transmission range. The policy requires a balance of minimizing data loss and minimizing energyconsumption. The graphs represent the total transmission energy (upper left), data loss ratio (upper right), and cummulative

policy penalty (bottom).

are equal, the lower the total transmission energy, themore efficient the algorithm.

� Data loss ratio. The ratio of the data loss caused bybuffer overflow to the total amount of data capturedby the sensor. If all other parameters are equal,the lower the data loss ratio, the more efficient thealgorithm.

� Cummulative policy penalty (CPP). This is acomposite measure calculated as a function of thetotal energy and the number of lost packets. The exactcalculation is dependent on the policy. For the OracleOptimal and the two MDP-based algorithms, thismeasure is the optimization criterion. The lower thevalue of the policy penalty, the more successful arethe algorithms in accomplishing their stated goals.

Finally, we repeated our measurements for threedifferent scenarios, differentiated by the expression ofthe cummulative policy penalty. Different policies canbe implemented by setting various values for the dataloss penalty. The energy part of the policy penalty isdetermined by physical constraints so it is not availablefor modification by the user.

� Scenario 1: Balanced objectives. We assume that thedata loss penalty is relatively high, but it can be offsetby energy savings only in exceptional situations.Thus, the sensors pursue a balanced strategy betweenmaximizing energy use and minimizing data loss.

� Scenario 2: Data loss reduction priority. In this case,we set the data loss penalty to a very high value (inour case, 10 000). With this value, the penalty for lostdata can never be offset by energy savings. Thus, theagent will have the primary objective to reduce thedata loss. Only in the cases of equal amount of dataloss will it make transmission decisions in functionof energy considerations.

� Scenario 3: Energy conservation priority. In thiscase, we set the data loss penalty to be equal tosending the data with the maximum transmissionrange. Note that we cannot set the data loss penaltyto zero; by doing so, the algorithms would optimizethe transmission energy by losing all the collecteddata.

In the following, we present and discuss the resultsfor these three scenarios.

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 14: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

398 L. BOLONI AND D. TURGUT

6.5. Scenario 1: Balanced Objectives

Figure 3 shows the measurements of consumed energy,data loss ratio and CPP for various settings of thetransmission range.

As a first observation, in general, the cummulativepolicy penalty is decreasing with the increase ofthe transmission range. Having a longer transmissionrange, the sensor can have more options, which itcan use to reduce the amount of data loss. Aninteresting anomaly can be seen for the two MDP-based sensors: the policy score actually shows avery slight but noticeable increase at the transmissionranges of 60–80 m. This anomaly can be explainedwith reference to the data loss chart: the MDP-based algorithms have learned a transmission policywhich attempts to transmit as soon as the mobile sinkgets in the transmission range. As the transmissionrange increases, this policy, although advantageousfrom the point of view of data loss, is moreexpensive from the point of view of energyconsumption.

In the comparison among the four algorithms,we find that the score of the OrOpt algorithmis the best, followed in order by MDP+h, MDPand, at some distance, by Simple. For rangesbetween 10 and 40 m, the OrOpt, MDP+h, andMDP obtain essentially the same CPP score. FromFigure 3 top right, we see that the two MDP-basedalgorithms can essentially match OrOpt for minimizingthe data loss; the simple heuristic performs muchworse.

The difference between the MDP and MDP+h isvisible on the consumed energy graph (Figure 3, topleft). Here, MDP+h clearly outperforms MDP. This isdue to the higher quality decisions, because the MDPwith history information can better predict the futuredistance of the mobile sink.

Figure 4 shows the evolution of the measurementsfor varying number of mobile sinks. The overall CPPscore shows a decreasing trend with the number ofmobile sinks, as the sensor node is visited more often bysinks. Again, we find that the two MDP models matchclosely the OrOpt for the data loss ratio. This result,

Fig. 4. Scenario 1: measurement results averaged over 10 runs for the four considered transmission scheduling algorithms forvarious values of the number of mobile sinks. The policy requires a balance of minimizing data loss and minimizing energyconsumption. The graphs represent the total transmission energy (upper left), data loss ratio (upper right), and cummulative

policy penalty (bottom).

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 15: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 399

Fig. 5. Scenario 2: measurement results averaged over 10 runs for the four considered transmission scheduling algorithms forvarious values of the transmission range. The policy requires the sensor to minimize data loss. The graphs represent the total

transmission energy (upper left), data loss ratio (upper right), and cummulative policy penalty (bottom).

however, is achieved with various levels of energyexpenditure

6.6. Scenario 2: Priority in Minimizing DataLoss

In this scenario, we are using a cost function whichassigns a weight of 10 000 to every lost kilobytes ofdata. With this setting, the OrOpt, MDP, and MDP+halgorithms will make decisions such that they willminimize the data loss. The energy consumption willbe considered only in cases when the decision does notaffect the probability of data loss.

The experimental results using these strategy areshown in Figures 5 and 6. The graphs show similartrends with the scenario with the balanced priority. Thedifferences can be summarized in the following points:

� The cummulative policy penalty of the MDP andMDP+h algorithms are much closer to the OrOptalgorithm for both variable transmission range andthe variable number of mobile sinks experiments.

� The consumed energy is virtually identical forMDP and MDP+h. We should compare this withthe balanced strategy, where the MDP+h wassignificantly better. The reason for this phenomenais that in the data loss minimization scenario,the MDP’s have little motivation to optimize theirdecisions for reducing the consumed energy.

6.7. Scenario 3: Priority for MinimizingEnergy Consumption

In this scenario, the data loss penalty is set up such thatthe penalty of loosing a kilobyte of data is the same astransmitting it at the distance of 80 m. Note that withthis setup the optimization algorithms will still attemptto send as much data as possible, but they have moreleverage, by the ability to occasionally trade some lostdata for lower values of the energy consumption.

The results of the experiments with this strategy areshown in Figures 7 and 8. The overall trends are similarto the previous two scenarios. The main observationsare as follows:

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 16: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

400 L. BOLONI AND D. TURGUT

Fig. 6. Scenario 2: measurement results averaged over 10 runs for the four considered transmission scheduling algorithms forvarious values of the number of mobile sinks. The policy requires the sensor to minimize data loss. The graphs represent the

total transmission energy (upper left), data loss ratio (upper right), and cummulative policy penalty (bottom).

Fig. 7. Scenario 3: measurement results averaged over 10 runs for the four considered transmission scheduling algorithms forvarious values of the transmission range. The policy requires the sensor to minimize total transmission energy, and considersthe penalty of data loss as data transmitted at the maximum transmission distance. The graphs represent the total transmission

energy (upper left), data loss ratio (upper right), and cummulative policy penalty (bottom).

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 17: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 401

Fig. 8. Scenario 3: measurement results averaged over 10 runs for the four considered transmission scheduling algorithms forvarious values of the number of mobile sinks. The policy requires the sensor to minimize total transmission energy, and considersthe penalty of data loss as data transmitted at the maximum transmission distance. The graphs represent the total transmission

energy (upper left), data loss ratio (upper right), and cummulative policy penalty (bottom).

� The MDP+h model is consistently better thanMDP from the point of view of the cummulativepolicy penalty. The difference is increasing withthe transmission range, reaching values of close to40 per cent.

� MDP and MDP+h still performs very well from thepoint of view of data loss ratio (only marginallyworse than the OrOpt algorithm).

6.8. Summary of Findings

Overall, we find that the choice of the transmissionscheduling algorithms makes a significant differencein the performance.

Both MDP and MDP+h can get very close to thedata loss ratio obtained by the optimal algorithm. Thisis a somewhat surprising, but positive conclusion, aswe expected the advantage of the optimal algorithm tobe much higher, as it has advance knowledge of themovement of the sinks. It turns out that the differenceis not significant, both MDP and MDP+h have learnedpolicies which allows them to achieve near-optimaldata loss values.

The cost of the successful data transmission,however, is a different matter. It was found that theoracle optimal algorithm can achieve a slightly lowerdata loss rate with up to 70 per cent less power than theother algorithms. Also, MDP+h can outperform MDPwith up to 40 per cent in certain scenarios.

These are significant differences and fully justify theeffort put into improving the transmission schedulingalgorithms. From the ones considered in our study,the best algorithm for practical deployment was foundto be MDP+h. However, if the mobility pattern ofthe mobile sinks is known in advance, the optimalalgorithm offers sufficient improvement to justify itscalculation on an off-line, high performance computerand the transmission of the pre-computed schedule tothe sensor nodes.

7. Conclusions

In this paper, we investigated the problem oftransmission scheduling in sensor networks withmobile sinks. We presented an optimal algorithm which

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 18: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

402 L. BOLONI AND D. TURGUT

requires advance knowledge of the mobility patternsof the mobile sinks. We also presented two variantsof decision theoretic algorithms based on MDP, onewith and one without history information encoded inthe state. Through an experimental study, we comparedthe proposed algorithms against a simple heuristics.We found that, as expected, the optimal algorithmperformed best, but in many scenarios the MDP-based algorithms showed a performance close to theoptimal from the point of view of minimizing data loss.The MDP approach with encoded history informationperformed better from the point of view of consumedtransmission power and appears to be the algorithmwith the best balance between implementation anddeployment difficulty and performance.

References

1. Rappaport T. Wireless Communications: Principles & Practice.Prentice-Hall: Upper Saddle River, NJ, 1996.

2. Shah R, Roy S, Jain S, Brunette W. Data mules: modeling a three-tier architecture for sparse sensor networks. In Proceedings of theFirst IEEE International Workshop on Sensor Network Protocolsand Applications (SNPA-03), May 2003; 30–41.

3. Kim HS, Abdelzaher T, Kwon W. Minimum-energy asyn-chronous dissemination to mobile sinks in wireless sensornetworks. In Proceedings of the 1st International Conference onEmbedded Networked Sensor Systems (SenSys-03), 2003; 193–204.

4. Bhattacharya S, Kim H, Prabh S, Abdelzaher T. Energyconserving data placement and asynchronous multicast inwireless sensor networks. In Proceedings of ACM MobileSystems, Applications, and Services (MobiSys-2003), May 2003;173–186.

5. Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion:a scalable and robust communication paradigm for sensornetworks. In Proceedings of the Sixth Annual InternationalConference on Mobile Computing and Networking (MobiCom-2000), August 2000; 56–67.

6. Luo H, Ye F, Cheng J, Lu S, Zhang L. TTDD: two-tier datadissemination in large-scale wireless sensor networks. WirelessNetworks 2005; 11(1): 161–175.

7. Jetcheva J, Johnson D. Adaptive demand-driven multicastrouting in multi-hop ad hoc networks. In Proceedings of ACMInternational Symposium on Mobile Ad Hoc Networking andComputing (MobiHoc-2001), October 2001; 33–44.

8. Baruah P, Urgaonkar R, Krishnamachari B. Learning-enforcedtime domain routing to mobile sinks in wireless sensor fields. InProceedings of 29th Annual IEEE International Conference onLocal Computer Networks (LCN-2004), November 2004; 525–532.

9. Wang Z, Basagni S, Melachrinoudis E, Petrioli C. Exploitingsink mobility for maximizing sensor networks lifetime.In Proceedings of the 38th Annual Hawaii InternationalConference on System Sciences (HICSS-05), January 2005.

10. Chakrabarti A, Sabharwal A, Aazhang B. Using predictableobserver mobility for power efficient design of sensor networks.In Proceedings of the Second International Workshop onInformation Processing in Sensor Networks (IPSN-03), April2003; 129–145.

11. Vincze Z, Vida R. Multi-hop wireless sensor networkswith mobile sink. In Proceedings of the ACM InternationalConference on Emerging Networking Experiments andTechnologies (CoNEXT-2005), 2005; 302–303.

12. Tong L, Zhao Q, Adireddy S. Sensor networks with mobileagents. In Proceedings of the IEEE Military CommunicationConference (MILCOM-2003), October 2003.

13. Chen C, Ma J, Yu K. Designing energy-efficient wireless sensornetworks with mobile sinks. In Proceedings of the Workshopon World-Sensor-Web (WSW-2006) at the 4th ACM Conferenceon Embedded Networked Sensor Systems (SenSys-06), October2006.

14. Kansal A, Rahimi M, Estrin D, Kaiser W, Pottie G, SrivastavaM. Controlled mobility for sustainable wireless sensor networks.In Proceedings of the First Annual IEEE CommunicationsSociety Conference on Sensor and Ad Hoc Communications andNetworks (SECON-04), October 2004; 1–6.

15. Gandham S, Dawande M, Prakash R, Venkatesan S. Energyefficient schemes for wireless sensor networks with multiplemobile base stations. In Proceedings of the IEEE GLOBECOM-03, Vol. 1, December 2003; 377–381.

16. Ye F, Chen A, Lu S, Zhang L. A scalable solution to minimumcost forwarding in large sensor networks. In Proceedings ofInternational Conference on Computer Communications andNetworks (ICCCN-01), 2001; 304–309.

17. Wang W, Srinivasan V, Chua K-C. Using mobile relays toprolong the lifetime of wireless sensor networks. In Proceedingsof the International Conference on Mobile Computing andNetworking (MobiCom-2005), September 2005; 270–283.

18. Luo J, Hubaux J-P. Joint mobility and routing for lifetimeelongation in wireless sensor networks. In Proceedings of IEEEINFOCOM, Vol. 3, March 2005; 1735–1746.

19. Luo J, Panchard J, Piorkowski M, Grossglauser M, HubauxJ-P. MobiRoute: routing towards a mobile sink for improvinglifetime in sensor networks. In Proceedings of 2nd IEEE/ACMIntl Conference on Distributed Computing in Sensor Systems(DCOSS-2006), June 2006; 480–497.

20. Woo A, Tong T, Culler D. Taming the underlying challengesof reliable multihop routing in sensor networks. In Proceedingsof the 1st International Conference on Embedded NetworkedSensor Systems (SenSys-03), November 2003; 14–27.

21. Olariu S, Eltoweissy M, Younis M. ANSWER: AutoNomouSnetWorked sEnsoR system. Journal of Parallel and DistributedComputing 2007; 67(1): 111–124.

22. Song L, Hatzinakos D. Dense wireless sensor networkswith mobile sinks. In Proceedings of the IEEE InternationalConference on Acoustics, Speech, and Signal Processing(ICASSP-05), Vol. 3, March 2005; 677–680.

23. Zhao Q, Tong L. Distributed opportunistic transmissionfor wireless sensor networks. In Proceedings of the IEEEInternational Conference on Acoustics, Speech, and SignalProcessing (ICASSP-04), Vol. 3, May 2004; 833–836.

24. Cerpa A, Busek N, Estrin D. Scale: a tool for simpleconnectivity assessment in lossy environments. Technical Report0021, Center for Embedded Network Sensing (CENS)—UCLA,September 2003.

25. Johnson DB, Maltz DA. Dynamic source routing in ad hocwireless networks. In Mobile Computing, Imielinski T, KorthH (eds). Academic Publishers: Kluwer, 1996; 153–182.

26. Boloni L, Turgut D. YAES—a modular simulator for mobilenetworks. In Proceedings of the 8-th ACM/IEEE InternationalSymposium on Modeling, Analysis and Simulation of Wirelessand Mobile Systems (MSWiM-05), October 2005; 169–173.

27. Riano G, Goez J. jMarkov: an object-oriented frameworkfor modeling and analyzing Markov chains and QBDs. InProceedings of the International Workshop on Tools for solvingStructured Markov Chains (SMCTools-06), October 2006.

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm

Page 19: Should I send now or send later? A decision-theoretic ...turgut/Research/Publications/...The Mobile Ubiquitous LAN Extension (MULE) [2] architecture has three tiers: (i) a top tier

SHOULD I SEND NOT OR SEND LATER? 403

Authors’ Biographies

Ladislau Boloni is an Assistant Pro-fessor with the School of ElectricalEngineering and Computer Scienceat University of Central Florida. Hereceived a Ph.D. from the ComputerSciences Department of Purdue Uni-versity in May 2000. He receiveda Master of Science degree fromthe Computer Sciences Department of

Purdue University in 1999 and Diploma Engineer degreein Computer Engineering with Honors from the TechnicalUniversity of Cluj-Napoca, Romania in 1993. He receiveda fellowship from the Computer and Automation ResearchInstitute of the Hungarian Academy of Sciences for the 1994–1995 academic year. He is a senior member of IEEE, memberof the ACM, AAAI, and the Upsilon Pi Epsilon honorarysociety. His research interests include autonomous agents,grid computing, and wireless networking.

Damla Turgut is an Assistant Professorwith the School of Electrical Engineer-ing and Computer Science at Universityof Central Florida. She received herB.S., M.S., and Ph.D. degrees fromthe Computer Science and EngineeringDepartment of University of Texas atArlington in 1994, 1996, and 2002,respectively. She has been included

in the WHO’s WHO among students in AmericanUniversities and Colleges in 2002. She has been awardedoutstanding research award and has been the recipientof the Texas Telecommunication Engineering Consortium(TxTEC) fellowship. She is a member of IEEE, memberof the ACM, and the Upsilon Pi Epsilon honorary society.Her research interests include wireless networking andmobile computing, distributed systems, and embodiedagents.

Copyright © 2007 John Wiley & Sons, Ltd. Wirel. Commun. Mob. Comput. 2008; 8:385–403

DOI: 10.1002/wcm