Paper Menu >>
Journal Menu >>
![]() Wireless Sensor Network, 2010, 2, 924-935 doi:10.4236/wsn.2010.212111 Published Online December 2010 (http://www.scirp.org/journal/wsn) Copyright © 2010 SciRes. WSN Integer Programming Formulations for Maximum Lifetime Broadcasting Problems in Wireless Sensor Networks Roberto Montemanni Istituto Dalle Molle di Studi sull’Intelligenza Artificiale, Lugano, Switzerland E-mail: roberto@idsia.ch Received November 2, 2010; revised November 10, 2010; accepted November 17, 2010 Abstract Approaches based on integer linear programming have been recently proposed for topology optimization in wireless sensor networks. They are, however, based on over-theoretical, unrealistic models. Our aim is to show that it is possible to accommodate realistic models for energy consumption and communication proto- cols into integer linear programming. We analyze the maximum lifetime broadcasting topology problem and we present realistic models that are also shown to provide efficient and practical solving tools. We present a strategy to substantially speed up the convergence of the solving process of our algorithm. This strategy in- troduces a practical drawback, however, in the characteristics of the optimal solutions retrieved. A method to overcome this drawback is discussed. Computational experiments are reported. Keywords: Sensor Networks, Mixed Integer Linear Programming, Energy Models, Topology Optimization 1. Introduction Since the very beginning of research in the area of wire- less sensor networks, one of the major issues has been saving power. This optimization is typically faced during the design, and prior the deployment of the nodes of a network. Such a high attention for this factor is easy to identify: the nodes of the network (devices) are typically equipped with low capacity, tiny batteries, and they have to stay alive in the longest possible time horizon. This in an environment usually characterized by reduced acces- sibility. A tight management of the power budget is im- posed by all these factors. Another peculiarity of sensor networks is that the largest share of power consumption is normally due to communication rather than to compu- tation, sensing and state-changing activities [1,2]. We will base our study on this assumption. Wireless sensor networks are typically used in com- manding actuators, monitoring events or measuring val- ues at locations where people cannot reach easily, or where a long term sensing task is required. Examples of applications are habitat monitoring [3], civil structural monitoring [4] and environmental monitoring [5]. Nodes can usually be characterized as low cost devices, and are to be deployed in a potentially inaccessible area. Re- charging the sensors after the deployment might there- fore not be an option, both for logistic and economical reasons. In this context, energy-efficiency becomes per- haps the most important design criteria for sensor net- works, since it directly impacts on the time the network itself is kept in operation. Many sensor network applica- tions are intrinsically about dissemination of information from a well-identified source node. It is therefore critical to identify energy efficient network topologies, opti- mized according to the type of communications that has to be supported. In this paper we will concentrate on broadcasting topologies, where a piece of information has to be sent from a source node to all of the other nodes of the network. We will assume to work on a static network, i.e. nodes do not move after the deployment. Researchers have proposed many different mechan- isms for achieving energy-efficiency in sensor networks. For example, transmission power control in radios, peri- odic cycling of nodes’ activity schedules [6], in-network processing of sensor data [7] and aggregation [8] for da- ta-gathering applications. In most of the communication models adopted in these studies, the total energy cost for a transmitted bit is computed as the cost of a transmis- sion over a wireless channel over a certain distance. In some cases, the cost due to reception by the destination ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 925 radio hardware [9] is also taken into account. Most of the communication models however ignore this, do to the multicast nature of the wireless channel, many nodes in the vicinity of a sender node overhear its packet trans- missions, even if they are not the intended recipients of these transmissions [10]. This redundant reception results in unnecessary expenditure of battery energy of all the recipients. It is finally worth to observe that temporarily turning off neighboring radios during a certain point- to-point wireless transmission can mitigate overhearing costs [1,2]. The research in the field of integer linear program- ming models for energy-efficiency in wireless sensor network has been focused until now on very theoretical representation of the interactions among nodes. In most of the works [11,12,13] the power consumed by a com- munication from a device to another one is simply eva- luated as the distance between the devices elevated to the power of 2 (or 4). This model is extremely simplistic, and many studies that show this have been proposed. For example, it has been shown that energy is consumed while receiving [1,10], and that also the overhearing phenomenon (mentioned above) has an important impact on consumption [14]. In order to limit the effects of overhearing, some authors suggest the use of nodes able to turn themselves into a temporary sleeping mode when a communication is not for them [6,10]. It is worth to observe that the idea of going into a temporarily sleep mode can be extended to situations in which nodes know that no communication is going to happen in a subse- quent time window of a given length. Finally, an inter- esting extension of the models presented so far might consider heterogeneous networks, where devices with different characteristics (in terms of battery capacity and/or maximum transmission power) are part of the same network. The topology design of wireless sensor networks is usually split into two phases: selection and placement of the nodes [15] and power optimization of the transmis- sion powers of the nodes. In this paper we will concen- trate on the second phase. The aim of the present paper is to plug the realistic is- sues and ideas mentioned before into integer linear pro- gramming models. The objective of the problem we model is maximizing the lifetime of wireless sensor net- works [16]. The realistic issues we will embed into our models cover the following aspects: Hardware/Network models. Characteristics of the de- vices are considered. In particular, each device can be characterized by a maximum transmission power and a residual battery capacity at deployment time. Heteroge- neous networks, formed by devices with different cha- racteristics are considered. Energy consumption models. The energy consumed in the following situations is taken into account: transmit- ting, receiving, overhearing, sensing, computing and state-changing. Communication models. We take into account proto- cols that, in addition to straight communication, are able to switch into a long-time sleep mode when no message is going to be transmitted for a given time, and to switch into a temporarily (short-time) sleep mode when they understand they are overhearing a message. As far as we are aware, the one we present is the first integer linear programming framework able to optimally solve problems of realistic size with the characteristics listed above. Notice that a preliminary (and partial) ver- sion of the work presented in this paper appeared in [17]. Sections 2, 3 and 4 are devoted to the formal descrip- tion of the models adopted to describe hardware, energy consumption and communication, respectively. Integer linear programming models of increasing realism, are described in Section 5, where a solution approach is also introduced and experimental results are presented and discussed. Section 6 presents a speed-up strategy based on an observation about the characteristics of the solving procedure previously discussed. Experimental results confirm that the strategy is able to remarkably improve the convergence speed of the algorithm in many cases. Section 7 discusses a practical drawback introduced by the speed-up strategy. A very fast post-processing pro- cedure that overcomes this drawback is also discussed. Conclusions are drawn in Section 8. 2. Hardware/Network Models We assume that a static network formed by heterogene- ous nodes is provided, with a given node s designed as the source for the broadcasting process. Messages have to be periodically sent from the source node to all the other nodes in the network. Any node can be used as a relay node to reach other nodes in the net- work, realizing a so-called multi-hop communication. We assume all nodes to be equipped with omnidirection- al antennae, so that if node i transmits to node j, all nodes closer to i than j will also receive the transmission. This phenomenon has been defined in [13] as the wireless multicast advantage, meaning that transmitting at high powers can be convenient, since many nodes are poten- tially reached by a single transmission. An example of the wireless multicast advantage is provided in Figure 1, where, for the sake of simplicity, we assume that the power required for a transmission is proportional to the diameters of the circle representing transmission ranges. We will keep this assumption for all the examples dis- cussed in this paper. In Figure 1, node r transmits at such a power to reach node j. Because of the wireless multi- cast advantage, also nodes l and k will receive the ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 926 message, since they are closer to r than j. We assume the power necessary to transmit from each node of the network to each other node to be known in advance. It usually depends on the characteristics of the terrain in which nodes are deployed. We will refer to the power necessary to transmit a bit of information from node i to node j as pij. We also assume to know, for each node i, its maximum transmission power MPi and its residual battery capacity at deployment time, referred to as capi. To represent the problem in mathematical terms, we can therefore define a complete directed graph G = ,VA, where V is the set of nodes of the network, and A is a set of arcs corresponding to all the possible one-hop communications between the nodes of the net- work: ,ij ∈ A ∀ i, j ∈ V. Power pij can be then seen as a label associated with arc ,ij. It is important to stress that the models and methods we will discuss in Section 5 are independent on the mod- el used to estimate power requirements. Notice that placement and characteristics of the nodes are regarded as the output of a previous optimization phase. 3. Energy Consumption Models In most of the power-optimization studies proposed so far [2,11,13,16], very simplistic, basic energy models were considered: typically anything different from transmitting power pij (see Section 2) was classified as negligible, and therefore ignored. On the other hand, many works exist to precisely quantify the energy con- sumption involved in the different operations carried out by the nodes [10]. In wireless sensor networks nodes consume energy while sensing, changing state, computing and communi- cating. Sensing, state-changing and computing activities are strictly application dependent, and we therefore as- sume to have an estimate for the energy consumption involved in them. Different is the situation for the power consumed in communication activities. We assume that energy is consumed when a packet is sent, received, and overheard, i.e. when a node receives a message that was not destined to it. The model we adopt is that proposed in [14]. In the network of Figure 1, node k (which has al- ready received the transmission from r) overhears the communication from node j to node m, being closer to j than m. Considering the overhearing phenomenon makes the energy model particularly realistic. Let us formally define what we will refer to as the ad- vanced energy model. Energy consumption in one bit data transmission, tx , is proportional to the transmitting power p of the transmitting node: p tx txelec (1) where txelec is the energy consumption by transmitter electronics, is an amplifier characteristic constant (that depends on the media) . Energy consumption in reception is independent of the transmitting power, and refers to the energy consumed by receiver electronics. We will refer to the energy dis- sipated for receiving a bit of information as rc . The logic for the calculation of the energy dissipated in overhearing activities oh ) is the same as for the cal- culation of the energy required while receiving. In this paper, following the approach already adopted in [14], we will assume that the energy consumed while over- hearing is exactly the same as the energy consumed when receiving: oh = rc . This assumption leads to a simplified notation (without oh ), which is adopted in the reminder of the paper. The energy dissipated in computing, state-changing and sensing has finally to be considered. As previously observed, this quantity is extremely application- dependent, and has to be estimated case by case. We therefore assume to know in advance the cumulative energy dissipated by each node i in these tasks during each broadcasting cycle. We will refer to it as s ci . Notice that this quantity is not necessarily the same for all the nodes, and that the energy dissipated between two consecutive broadcasting cycles is also counted here: if the devices are able to switch themselves into a tempo- rary sleeping mode between two consecutive broadcast- ing cycles, the energy consumed will be low, otherwise the energy dissipated while in idle state will be higher. 4. Communication Models Two different communication models are considered in this paper, based on two different communication proto- cols implemented in the reality. The standard communication protocol considered is that working on devices without the capability of switching into a temporary sleep mode when they under Figure 1. The wireless multicast advantage [13]. Example of overhearing phenomenon. ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 927 stand that a message that is being transmitted is not of their interest. The smart communication protocol is that associated with advanced devices able to switch into a temporary sleep state. Notice that this protocol implies the presence of header messages, used to identify the subsequent data messages. Header messages will intui- tively contain the information of the data message that will follow, together with the length of the message itself. Consider again the example in Figure 1. If the smart protocol is in use, node k can temporarily turn itself off when it understands that the transmission generated from node j is not of its interest (it is about a message already received at k while transmitted from r). It is easy to foresee that a smart communication pro- tocol can be very useful for mitigating power consump- tion due to overhearing at the nodes. This justifies the increase in the complexity of both the hardware of the devices and the communication protocol. In the reminder of the paper we will refer to the di- mension of the data packet that has to be broadcasted from the source node to all the other nodes of the net- work as D . We will also indicate with the Hdimension of the header of the data packet, which will contain a message-id and the dimension of the following data packet. The header will be sent immediately before the data packet and (if a smart communication protocol is used) nodes hearing it will know if they have received the message already, and undertake the appropriate ac- tions. 5. Integer Linear Programming Formulations 5.1. Maximum Transmission Powers According to Section 2, a maximum transmission power i M P is given for each node . This parameter is, in fact, transparent to the integer linear programming models we will propose. Consider the case where the transmission power re- quired to transmit from a node i to another node j (pij) is greater than i M P. It means that node i is not able to transmit to j in a single hop. We can therefore modify pij and assign an infinite value to it. This will rule out the single-hop communication i−j from every feasible solu- tion of our models. Formally, we will modify the power requirements for the one hop communication for some pairs of nodes ,ij, as follows: : iji ij pMP p (2) 5.2. Skeleton Structure The integer linear programming models we propose are all based on the common idea of skeleton structure. Such an approach is common in the literature of topology op- timization (see, for example [11,18]). Each feasible solu- tion is characterized by at least a skeleton, which ensures that all the nodes of the network receive, in a multi-hop fashion, the message broadcasted from the source node s. For example, in Figure 1 a skeleton of the broadcasting structure is the depicted directed tree (arborescence) rooted in s. Notice that all the transmission powers of the nodes are such that the arcs of the arborescence are cov- ered. The vice-versa is not true: not all the arcs covered by the power assignment are part of the arborescence. In our approach, we will adopt a structure that contains (is a superset of) an arborescence. We define the skeleton in terms of mixed integer pro- gramming formulation. The transmission power ri assigned to a generic node i will assume either a value of zero or of pij, for some j V . A set of variables x is then introduced to describe the transmission power of each node. For each pair of nodes i,j ∈ V we have: 1 if r 0 otherwiise ij ij ip x (3) It is easy to verify that if xij = 1, then all the nodes closer to i than j will also receive (or overhear) the transmission from i. We have the following definition: Definition 1 Given two nodes i and j such that pij < +∞, we define N as follows: : i NjkV pikpij (4) The set i Nj contains the nodes of V which are not closer to i than j. Notice that j ∈ i Nj . The set Skl of all possible skeleton structures defined on graph G, is described by the following constraints: \ , 1 CV,sC kVC ij iC jU Nik x (5) 1 ij jV x iV (6) 0 is iV x (7) 0,1 , ij xij (8) In constraints (5), C is used to model each non-empty subset of V containing the source node s. For each one of these sets, there is a constraint in the model specifying that at least one of the nodes of C must transmit at such a power to reach at least one node out of C. Constraints (6) state that at most one arc among the outgoing ones from each node must be active. Constraint (7) states that none of the incoming arcs of the source node can be active. Constraints (8) define variables domain. ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 928 5.3. Objective Function In our optimization we seek for a broadcasting structure that maximizes the number of broadcasting cycles sup- ported before the first device runs out of battery. The power consumption at each node of the network and its initial battery capacity are taken into account. This translates into counting the number of broadcasting cycles supported by each node, and choosing the smallest value. Given an skeleton x ∈ Skl, we will refer to the power consumed in a single broadcasting cycle by node i as ,pci x. The problem studied in the paper can be formally defined through the following equation: max min, i iV xSkl cap npci x (9) where n is the number of broadcasting cycles supported by the optimal broadcasting structure. Constraints (9) cannot be directly expressed in terms of mixed integer linear programming, because the variables of the model are at the denominator. It is however possible to mani- pulate (9) in order to obtain an equivalent description that can be expressed as a mathematical program. If we invert the fraction in (9), we end up with an expression for the inverse of the number of cycles supported by each node. The min and max operators have also to be com- plemented as a consequence of the inversion. We obtain the following equation: , 1min max xSkl iV i pci x ncap (10) from which it is trivial to obtain the original value of n, once (10) has been solved. Starting from (10), and as- suming that we are able to find a linear expression for ,pci x, a mixed integer linear program is easy to ob- tain. First we have to get rid of the nested max operator. This can be done by introducing a free variable z, and by transforming (10) into the following system, which is linear if we can find a linear expression for ,pcix: 1min z n (11) , .. z i pci x s tiV cap (12) x Skl (13) z IR (14) Notice that constraints (13) can be substituted by their linear expression, which is provided by inequalities (5), (6) and (7). What remains to be disclosed is the expression in li- near terms of ,pci x. In Subsections 5.4, 5.5 and 5.6 we will see how this can be done for different combinations of the energy and communication models described in Sections 3 and 4. 5.4. Model M1: Basic Energy Model, Basic Communication Protocol The energy and communication models adopted for this formulation are those commonly used in the theoretical studies for minimum power broadcasting structures [11,13] and maximum lifetime broadcasting structures [16]. A very high level of abstraction is implied, and therefore these models are often regarded as too theoreti- cal. The energy model does not take into account the energy consumed while receiving and overhearing (rc = oh = 0), flattering down also the role of the commu- nication protocol (a smart protocol is not of any help if overhearing is not taken into account). It is important to notice that this model, although not of particular practical interest, has been considered in this study because it provides a sort of a bridge between the very theoretical mathematical programming models provided so far [11,13,18], and the more realistic models M2 and M3 we will describe in Sections 5.5 and 5.6. The model is composed of constraints (11), (5), (6), (7) and (14), plus the following inequalities (15), that make constraints (12) explicit. \ z tr ij sc ij jV i ii HD p i x iV cap cap (15) The first term in the right hand side of constraints (15) models the fraction of the available energy consumed by nodes during each broadcasting cycle for sensing, com- puting and state-changing. The second term models the fraction of battery consumed for transmitting during each cycle. Notice that for each node i, at most one of the xijs will take value 1 in each feasible solution, because of constraints (5), (6) and (7). Consequently, in each one of constraints (15), no more than one x variable will take value 1. 5.4. Model M2: Advanced Energy Model, Basic Communication Protocol Model M2 is for problems described through the ad- vanced communication models presented in Section 3, but where no smart communication protocol is imple- mented (see Section 4). Beside constraints (11), (5), (6), (7) and (14), model M2 includes the following inequalities (16), that make constraints (12) explicit. ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 929 \ \ z j tr ij sc ij jV i ii rc jk jV ii kN i HDp i x cap cap HD xiV cap (16) The first term in the right-hand-side of constraints (16) has the same meaning as in constraints (15). The first sum represents the fraction of the available energy dissi- pated by node i for data transmission. Notice that if xij= 0 ∀ j ∈ V, it means that node i does not transmit in the current skeleton, and consequently this term will give a contribution of 0. The second sum represents the fraction of the available energy dissipated while receiving and overhearing. Notice that this contribution is paid for each communication reaching node i. 5.6. Model M3: Advanced Energy Model, Smart Communication Protocol The integer linear programming model presented in this section builds up on that proposed in Subsection 5.5. The difference is that now the advantages derived from the use of a smart communication protocol (which is useful when nodes can go in a sleep mode when they are not interested in a transmission) have been taken into ac- count. This model can be regarded as the most realistic model we present in this paper, and is based on the following constrains: (11), (5), (6), (7), (14), plus (17) and (18): \ \ z + \8 j tr ij sc ij jV i ii rc rc jk jV iii kN i HD p ix cap cap HD HxiV cap cap (17) \ \ z j tr sj sc ij jV s si rc jk jV ss kN s HDp s x cap cap Hx cap (18) The first term in the right-hand-side of inequalities (17) and (18) is the usual fractional power consumption due to sensing, computing and state-changing during each broadcasting cycle. The first sum of constraints (17) is the same as in constraint (16). The second sum models overhearing at node i, following the same reasoning al- ready seen for the second sum of (16): the sum contains all the communications potentially overheard by i, that will give a contribution or not to the sum according to the value of the x variables associated. The last term fi- nally models the fractional energy consumption due to data reception (not overhearing). This contribution is based on the consideration that each node (apart from the source s) will receive the data packet exactly once. No- tice that each node will be able to classify a packet as already received by analyzing the corresponding header. The only difference between constraints (17) and (18), is that in the right-hand-side of the former, the last term of (17) is not present, since the root will not receive any message, being the node from which the broadcasting is actually originated. 5.7. Solution Method The bottleneck of the three mixed integer linear pro- gramming formulations described in Subsections 5.4, 5.5 and 5.6 is represented by the common constraints (5). Specifically, constraints (5) are present in huge number (exponential in the number of devices in the network), and create difficulties to the solvers used to handle the models. To overcome these problems, we adopted a strategy commonly used in similar cases (see, for exam- ple, [19]), and that can be summarized as follows. It is an iterative approach, which in the beginning does not con- sider any of the constraints (5), and adds them only when violated by the current (infeasible) solution. In the reminder of this section we will refer to a ge- neric mixed integer linear program IP. Formulations M1, M2 and M3 (initially without constraints (5)) can all substitute the generic formulation IP. At each iteration, the integer linear program IP is solved to optimality and the values of the x variables in the optimal solution are examined. If the arcs corres- ponding to variables with value 1 (we will refer to them as active variables) form a directed structure that reaches all the devices of the network (skeleton), then the prob- lem has been solved to optimality, and we can stop. Oth- erwise, a set of violated constraint of type (5) is identi- fied (by solving maximum flow problem, see [20]) and added to the mixed integer linear program IP, and the process is repeated. In case the optimal solution has not been found, let us consider the arcs corresponding to the active x variables of the last available solution. We de- fine the set C of the constraint (5) as the set of nodes that can be reached from the source s using arcs associated with active x variables only. The new constraint added makes the current solution infeasible for the newly aug- mented problem IP, forcing the solver to move to a dif- ferent solution in the next iteration. Iteration after itera- tion, the incumbent solution x should get closer and closer to feasibility with respect to the original problem, being it of type M1, M2 or M3. The algorithm is summa- rized in Figure 2, where a pseudo-code is presented. A well-known technique (see, for example, [20]) to ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 930 Figure 2. A pseudo-code for the algorithm used to solve integer linear formulations M1, M2 and M3. speed up the algorithm described above first considers LR, the linear relaxation of the mixed integer linear pro- gramming formulation IP. It is obtained by substituting constraints (8) with the following one: 01 , ij xij (19) The algorithm described in Figure 2 is run on LR. When there are no more violated cuts, which means LR has been solved to optimality, the original problem IP is con- sidered, and the algorithm presented in Figure 2 is run again, starting from the set of cuts identified for the li- near relaxation LR (instead of an empty set). The aim of such a technique is to reduce the number of mixed integ- er programs that have to be solved to identify violated cuts, in the hope that many of the cuts were already iden- tified on the linear relaxation LR, which is off course much easier to solve, not having binary variables. We will adopt this strategy in our implementation. 5.8. Experimental Results Computational experiments have been carried out on random networks with up to 80 nodes. The signal propa- gation model adopted for the experiments is the one commonly used in the literature (see, for example, [13, 21]). For a node i of the network, the power required to reach another node j is given by: 2 ij ij pd (20) The data and energy parameter settings adopted for the simulations are the following ones: D = 500 bites,H= 10 bites, = 0.1 nJ/bit/m2, txelec = 50 nJ/bit, rc =oh = 50 nJ/bit, rc i = 50 nJ/cycle. For every problem considered, the capacity capi associated with the battery of node i (expressed in Joule for the sake of simplicity) is chosen at random from the interval [1000; 5000]. Problems with |V| (number of nodes) ∈ {20, 30, 40, 50, 60, 70, 80} have been considered. Ten instances have been generated at random on a 100×100 grid for each value of |V|. Tests have been carried out on a computer equipped with an Intel Pentium M 1.73GHz processor and 512 MB of memory. IBM ILOG CPLEX 12.1 (http://www.cplex.com) has been used to solve mixed integer linear programs. A maximum computation time of 3 hours has been allowed for each combination (model, instance). Results are summarized in Table 1, where for each combination (model, |V|) we report average and standard deviation for the number of cuts (5) added (both on the linear relaxation phase and in total), and for the compu- tational time in seconds. Statistics are computed on the instances solved to optimality (reported in the second column of the table) over the ten considered for each line of the table. The computational results suggest that two of the three methods we developed are able to handle networks with up to 80 nodes in 3 hours. This result is encouraging be- cause it proves that the approach we propose is suitable to be used on networks with sizes of practical interests. A deeper analysis of Table 1 suggests that model M1 re- quires much more iterations (cuts (5)) than M2 and M3 to converge to the optimal solution. Analogous consider- ations can be done for the computation times required to solve the different models. Another important indication emerging from Table 1 is about the performance degra- dation as the number of nodes increases. Models M2 and M3 clearly scale up much better than M1. The most important outcome of Table 1 is however probably the indication that handling more complex models (M2 and M3) leads to easier problems (from a computational point of view) than the simpler models considers so far in the literature (M1). Basically, M2 and M3 provide better models both from a theoretical (level of realism) and practical (solution times) point of view. It is finally important to observe that the standard deviation of all the indicators reported in Table 1 is high. This indicate that the performance of the exact methods we propose tend to be instance-dependent. 6. A Speed-up Strategy Classic valid inequalities for integer linear models of broadcasting problems on wireless networks can be eas- ily adapted to our problem (we refer the interested reader to [8,20,21]). However, we discovered that a strategy different from (and usually not compatible with) classic valid inequalities is more effective and efficient for the maximum lifetime problems on wireless networks, in a framework like the one we propose. Notice that in the reminder of the paper we will concen- trate, for short, on formulation M2, but all the results can be trivially adapted to both the other models M1 and M3. The idea exploits a characteristic of the problem: the objective function cost is only determined by the node i with the shortest lifetime of the current topology. In this context, it is easy to observe that if all the other nodes of the network transmit at the maximum possible power such that their lifetime is not shorter than that of node i, ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 931 Table 1. Computational results. V Solved LR cuts (5) addedTotal cuts(5) addedSeconds (over 10) avg stdev avg stdev avg stdev Model M1 20 10 69.90 16.78 73.60 17.27 0.30 0.28 30 10 146.40 41043 153.20 36.71 12.79 23.54 40 4 247.50 49.84 278.25 53.56 485.23658.91 50 3 288.67 27.97 363.33 90.29 1441.73913.65 60 1 415.00 0.00 415.00 0.00 558.000.00 70 0 - - - - - - 80 0 - - - - - - Model M2 20 10 68.90 16.13 73.50 17.15 0.37 0.45 30 10 154.60 52.56 162.10 49.03 115.35320.05 40 4 242.17 32.88 270.67 39.50 654.64997.76 50 3 307.50 31.10 365.75 53.54 1287.99795.31 60 1 408.00 0.00 428.00 0.00 2016.140.00 70 0 - - - - - - 80 0 - - - - - - Model M3 20 10 142.90 47.12 142.90 47.12 0.14 0.05 30 10 436.80 143.48 439.80 143.08 2.31 2.06 40 4 949.50 347.31 957.90 338.54 15.78 11.85 50 3 1677.90 457.48 1687.30 463.09 86.02 136.97 60 1 2083.90 994.99 2095.00 988.00 313.39603.28 70 0 2938.60 930.12 2954.80 933.34 454.97410.18 80 0 2940.00 652.01 2968.88 645.43 934.44958.92 the objective function cost does not change, and at the same time the probability of having a violated constraint (5) is dramatically reduced. In this context we have therefore interest in forcing nodes to transmit to their maximum possible power. In order to achieve our goal, we propose a two level, hierarchical objective function, where the main objective is to maximize the lifetime of the network, and the sec- ondary one is to have nodes to transmit to the highest possible power. The original objective function (11) (that is common to all the models considered in Section 5) is changed to the following one: \ min ij ij iV jV i z px (21) Where is an arbitrarily small constant. In such a way, for a given value of z, each node i will be assigned the highest possible transmission power (with respect to z). An example is given in Figure 3(a), where the nodes of a network are depicted. We assume that all nodes have the same initial battery capacity and that the simple equ- ation (20) is used to measure power requirements. Model M2 is considered for the example. In Figures 3(b) and 3(c) two feasible topologies are depicted. The first one is the optimized solution obtained according to the original objective function (11), while the second one is the optimal topology obtained by considering the hierar- chical objective function (21). Notice that the lifetime of both the solutions is the same, and is determined by node 9, which is the first node to run out of battery. The arc representing the transmission power of the first node to fail is in bold (arc (9,1) in our case), while arcs that are obtained by the wireless multicast advantage (i.e. they do not correspond to the maximum transmission power of the originating node) are dashed. It is important to ob- serve that the topology of Figure 3(b) is contained in that of Figure 3(c). This is a side-effect of the strategy we have applied. The same experiments summarized in Table 1 have been replicated with the speed-up strategy in operation, and the results are reported in Table 2. The meaning of the columns of Table 2 is the same as in Table 1. In ad- dition the percentage variation, with respect to Table 1, is reported in brackets for each indicator. Table 2 shows the benefit guaranteed by the speed-up ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 932 Table 2. Computational results of the models discussed in Section 5 with the objective function (21). Percentage variations with respect to Table 1 are reported in brackets. V Solved LR cuts (5) added Total cuts (5) added Seconds (over 10) avg stdev avg stdev avg stdev Model M1 20 10 (+0) 29.80 (-61.5%) 13.78 (-86.9%) 30.00 (-59.2%) 13.58 (-21.4%) 0.12 (-57.4%) 0.04 (-17.8%) 30 10 (+0) 53.70 (-95.9%) 12.22 (-98.7%) 54.10 (-64.7%) 12.38 (-66.3%) 0.53 (-63.6%) 0.17 (-70.5%) 40 10 (+6) 83.90 (-10.1%) 24.37 (+57.3%)84.20 (-69.7%) 24.61 (-54.1%) 436.49 (-66.1%) 1036.45 (-51.1%) 50 8 (+5) 100.25 (-90%) 23.44 (-64.1%) 100.25 (-72.4%)23.44 (-74.0%) 144.92 (-65.3%) 327.97 (-16.2%) 60 8 (+7) 166.36 (-49.6%) 34.31 (n.a.) 166.00 (-60.0%)34.13 (n.a.) 3281.7 (n.a.) 236.80 (n.a.) 70 1 (+1) 188.00 (n.a.) 0.00 (n.a.) 188.00 (n.a.) 0.00 (n.a.) 100.91 (n.a.) 0.00 (n.a.) 80 1 (+1) 167.00 (n.a.) 0.00 (n.a.) 167.00 (n.a.) 0.00 (n.a.) 208.41 (n.a.) 0.00 (n.a.) Model M2 20 10 (+0) 29.60 (-71.21%) 13.66 (-94.5%) 29.70 (-59.6%) 13.43 (-21.7%) 0.11 (-57.0%) 0.02 (-15.3%) 30 10 (+0) 57.50 (-99.5%) 14.2 (-99.9%) 58.2 (-64.1%) 14.30 (-70.8%) 0.55 (-62.8%) 0.22 (-73.3%) 40 10 (+4) 81.10 (-0.4%) 16.89 (+28.8%)81.40 (-69.9%) 17.20 (-56.5%) 652.13 (-66.5%) 1285.33 (-48.6%) 50 9 (+5) 115.22 (-90.9%) 29.52 (-80.2%) 115.89 (-86.3%)29.34 (-45.2%) 116.81 (-62.5%) 157.53 (-5.1%) 60 5 (+4) 191.80 (-93.6%) 88.13 (n.a.) 191.80 (-55.2%)88.13 (n.a.) 129.70(-53.0%) 116.89 (n.a.) 70 2 (+2) 91.50 (n.a.) 122.33 (n.a.) 91.5 (n.a.) 122.33 (n.a.) 1085.32 (n.a.) 1473.22 (n.a.) 80 2 (+2) 232.00 (n.a.) 2.83 (n.a.) 232.50 (n.a.) 2.12 (n.a.) 564.02 (n.a.) 459.97 (n.a.) Model M3 20 10 (+0) 142.90 (-18.1%) 47.12 (-27.8%) 142.90 (-0.0%) 47.12 (-0.0%) 0.12 (-0.0%) 0.04(-0.0%) 30 10 (+0) 436.80 (-0.2%) 143.48 (+4.1%)439.80 (-0.0%) 143.08 (-0.0%) 2.31 (-0.0%) 2.14 (-0.0%) 40 10 (+0) 951.00 (-0.4%) 345.95 (-1.0%) 959.40 (+0.2%) 337.10 (-0.4%) 15.73 (+0.2%) 11.73 (-0.4%) 50 10(+0) 1677.90 (-21.9%) 457.48 (-35.4%)1687.30 (-0.0%)463.09 (-0.0%) 67.18 (-0.0%) 88.54 (-0.0%) 60 10 (+0) 2245.90 (-2.9%) 805.68 (-4.3%) 2278.10 (+8.7%)795.68 (-19.5%) 304.33 (+7.8%) 577.26 (-19.0%) 70 10 (+0) 2557.20 (-16.6%) 1232.07 (-8.3%)2570.80 (-13.0%)1234.66 (+32.3%)379.48 (-13.0%) 376.17 (+33.5%) 80 8 (+0) 2980.25 (-1.6%) 670.38 (+14.6%)3001.13 (+1.1%)659.96 (+2.3%) 919.26 (+1.4%) 1099.32 (+2.8%) technique we propose. The advantage taken by models M1 and M2 when the suggested strategy is used is sig- nificant with respect to every factor considered, with improvements in the solution times in the order of 60%, and the number of problems solved to proven optimality in the given time is dramatically increased. Different is the situation for model M3: the results in this case do not show any significant difference with respect to those reported in Table 1. The conclusion is therefore that the speed-up strategy should be adopted when models M1 and M2 are consi- dered, while it its use is not recommended for model M3 (see also Section 7). 7. A practical Drawback and Its Solution The speed-up strategy we have proposed in Section 6 has a practical drawback, which is clear from the example reported in Figures 3: in the optimal solution reported in Figure 3(c), there are many nodes transmitting to a power which is higher than necessary. This is not desira- ble, since noise and overhearing phenomena on the net- work increase. Moreover, the network lifetime is more sensitive to erroneous estimations of battery con- sumptions. In conclusion, all the arcs in Figure 3(c) that are not also in Figure 3(b) are potentially damaging (and certainly unnecessary). There is therefore a contrast be- tween the desirable solution from a practical, realistic point of view, and that retrieved when the speed-up rule is implemented (notwithstanding they are both optimal from a theoretical point of view). We will see in this sec- tion how to overcome this problem. Notice that a similar problem had already been identi- fied in a very related context in [16]. They proposed an integer linear model for a maximum lifetime problem, and observed that if powers are not constrained to be minimal for each node, it might happen what our strategy forces to happen as a side effect. To overcome what they correctly identifies as a problem, [16] proposed a hierar- chic objective function, where the secondary objective is practically the opposite of the one we suggest in Section 6: the authors somehow concentrate on the reality, and not on optimization like we do. Their approach can be adapted to our case by substituting the objective function (11) with the following one: ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 933 Figure 3. (a) Example of a network ;(b) Topology obtained by solving the original model M2, with the objective function (11), on the network of (a);(c) Topology obtained by solving the modified model M2, with the objective function (21),on the net- work of (a). min iV zyi (22) where y variables are free variables connected to the rest of the problem through the following constraints: \ \ + j tr ij sc ij jV i ii rc jk jV ii kN i HD p i y ix cap cap HD xiV cap (23) Variable yi models the lifetime (expressed in terms of number of transmitting cycles, see Section 5.3) of node i. Notice once more that we refer to model M2, but it is straightforward to translate it for M1 and M3. If the adaptation of the method suggested in [16] is applied to the example of Figure 3(a), the same topology depicted in Figure 3(b) is obtained. Such an approach clearly goes in the opposite direction of the speed-up strategy discussed in Section 6. It is interesting to notice in [16] the authors did not have any need for a speed-up strategy because they proposed a model, and not an algo- rithm for efficiently solving it. In order to overcome the practical problem discussed before, we developed a post-optimization technique, where we shrink an optimal solution obtained by apply- ing the speed-up rule discussed in Section 6. The objec- tive is to increase as much as possible the lifetime of all the nodes of the network. The strategy we propose does not lead to an optimal solution (like the method suggested in [16] does), but it provides suboptimal solutions in a very short time. The rationale behind a heuristic approach is that the main target of the whole optimization is to maximize the net- work lifetime, and we achieve this in the first phase (see Section 6). The second phase discussed here is therefore less crucial, and is suitable for a very fast heuristic me- thod like the one we suggest. The second phase optimization method has a poly- nomial execution time, and is based on the solution of a minimum cost arborescence problem on the connected structure obtained during phase one. Costs of arcs are represented by power requirements. Tohe algorithm de- scribed in [22] is adopted. Once the arborescence has been identified, the transmission powers of the nodes are regulated based on the arborescence, saving as much power as possible. The lifetime of single nodes is there- fore increased with respect to the solution obtained in phase one. Notice that the application of the post-opti- mization procedure to the example of Figure 3(c) leads to the topology of Figure 3(b). The post-optimization phase is run in polynomial time, and has a negligible computation time. Therefore the total execution times of phase one plus phase two remain similar to those presented in Table 2. On the contrary, the adaptation of the approach proposed in [6] leads to solving times greater than or equal to those of Tab le 1, which are longer than those of the method we suggest. 8. Conclusions The aim of this paper was to show that tools like integer linear programming, often regarded as over-theoretical and unrealistic, are indeed suitable frameworks to in- clude the latest advances in energy consumption and communication models in wireless sensor networks. Three models of increasing realism have been presented. Experimental results suggest that integer linear pro- gramming can be used not only as an effective modeling tool, but also as an efficient solving method for problems of realistic size. A surprising result also indicates that the ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 934 easiest models to solve (in terms of computation times) are the most realistic ones, suggesting that they should be preferred in general. A speed-up technique, based on the characteristics of the problem, has been discussed and experimentally shown to be effective on many of the problems consi- dered. A practical drawback introduced by the speed-up technique has been finally identified and a method to overcome it has been introduced. 9. References [1] L. Negri, D. Zanetti, R. Montemanni and S. Giordano, “Power-optimized Topology Formation and Configura- tion in Bluetooth Sensor Networks: An Experimental App- roach,” Ad-Hoc and Sensor Wireless Networks, Vol. 6, No. 1-2, 2008, pp. 145-175. [2] W. Ye, J. Heidemann and D. Estrin, “An Energy- Efficient MAC Protocol for Wireless Sensor Networks,” IEEE Infocom Proceedings, New York, 23-27 June 2002, pp. 1567-1576. [3] A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk and J. Anderson, “Wireless Sensor Networks for Habitat Moni- toring,” Proceedings of the 1st ACM international Work- shop on Wireless Sensor Networks And Applications Con- Ference, Atlanta, 28 Sepmeber 2002, pp. 88-97 [4] S. Kim, S. Pakzad, D. E. Culler, J. Demmel, G. Fenves, S. Glaser and M. Turon, “Health monitoring of civil infras- tructures using wireless sensor networks,” Proceedings of the IEEE Information Processing in Sensor Networks Conference, Cambridge, 25-27 April 2007, pp. 254-263. [5] D. M. Doolin and N. Sitar, “Wireless Sensors for Wild- fire Monitoring,” Proceedings of the Sensors and Smart Structures Technologies For Civil, Mechanical, and Aerospace Systems Conference, San Diego, 7-10 March 2005, pp. 477-484. [6] I. Chlamtac, C. Petrioli and J. Redi, “Energy-Conserving Access Protocols for Identification Networks,” IEEE Transactions on Networking, Vol. 7, No. 1, 1999, pp. 51- 59. [7] D. Estrin, R. Govindan, J. Heidemann and S. Kumar, “Next Century Challanges: Scalable Coordination in Sen- sor Networks,” Mobicom Proceedings, Seattle, 15-19 Au- gust 1999, pp. 263-270. [8] S. Madden, M. J. Franklin, J. M. Hellerstein and W. Hong, “TAG: A Tiny Aggregation Service for Ad-hoc Sensor Networks,” Proceedings of the 5th Annual Sym- posium on Operating Systems Design and Implementa- tion conference, Boston, 9-11 December 2002, pp. 131- 146. [9] W. Heinzelman, A. Chandrakasan and H. Balakrish- nan, “Energy-Efficient Communication Protocols for Wireless Microsensor Networks,” Proceedings of the 33th Hawaii International International Conference on Systems Sci- ence, Hawaii, 4-7 January 2000, p. 8020. [10] S. Singh and C. S. Raghavendra, “Power Aware Multi- access Protocol with Signalling for Ad Hoc Networks,” Computer Communication Review, Vol. 25, No. 3, 1998, pp. 5-26. [11] R. Montemanni, L. M. Gambardella and A. K. Das, “The Minimum Power Broadcast Problem in Wireless Net- works: A Simulated Annealing Approach,” Proceedings of the IEEE Wireless and Communications and Networking Con- ference, New Orleans, 13-17 March 2005, pp. 2057- 2062. [12] I. Stojmenovic, M. Seddigh and J. Zunic, “Internal Nodes Based Broadcasting in Wireless Networks,” Proceedings of the 34th Hawaii International International Con- ference on Systems Science, Maui, 3-6 January 2001, p. 9005. [13] J. Wieselthier, G. Nguyen and A. Ephremides, “On the Construction of Energy-efficient Broadcast and Multicast Trees in Wireless Networks,” Proceedings of the IEEE Infocom conference, Tel-Aviv, 26-30 March 2000, pp. 585-594. [14] P. Basu and J. Redi, “Effect of Overhearing Trans- missions on Energy Efficiency in Dense Sensor Net- works,” Proceedings of the IEEE Information Processing in Sensor Networks Conference, California, 26-27 April 2004, pp. 196-204. [15] E. S. Biagioni and G. Sasaki, “Wireless Sensor Placement for Reliable and Efficient Data Collection,” Proceedings of the 36th Hawaii International International Con- ference on Systems Science, Hawaii, 6-9 January 2003, p. 127.2. [16] A. K. Das, M. El-Sharkawi, et al., “Maximization of Time-to-first-failure for Multicasting in Wireless Net- works: Optimal Solution,” IEEE Milcom Proceedings, Vol 3, 2004, pp. 1358-1363. [17] R. Montemanni, “Maximum Lifetime Broadcasting Topologies in Wireless Sensor Networks: Advanced Mathematical Programming Models,” Proceedings of the 42nd Hawaii International International Conference on Systems Science, Hawaii, 5-8 January 2009. [18] V. Leggieri, P. Nobili and C. Triki, “Minimum Power Multicasting Problem in Wireless Networks,” Mathemati- cal Methods of Operations Research, Vol. 68, No. 2, 2008, pp. 295-311. [19] G. B. Dantzig, D. R. Funkerson and S. Johnson. “Solu- tion of a Large-scale Traveling Salesman Problem,” Jour- nal of the Operations Research Society of America, Vol. 2, No. 4, 1954, pp. 393-410. [20] J. Bauer, D. Haugland and D. Yuan, “Analysis and Com- putational Study of Several Integer Programming Formu- lations for Minimum-Energy Multicasting in Wireless Ad Hoc Networks,” Networks, Vol. 52, No. 2, 2008, pp. 57-68. [21] R. Montemanni and L. M. Gambardella, “Minimum Po- wer Symmetric Connectivity Problem in Wireless Net- works: A New Approach,” Proceedings of the Mobile and Wireless Communication Networks Conference, Paris, 25-27 October, 2004, pp. 496-508. ![]() R. MONTEMANNI Copyright © 2010 SciRes. WSN 935 [22] H. N. Gabow, Z. Galil, T. Spencer and R. E. Tarjan, “Efficient Algorithms for Finding Minimum Spanning Trees in Undirected and Directed Graphs,” Combin- atorica, Vol. 6, No. 2, 1986, pp. 109-122. |