throbber
Energy conservation in wireless sensor networks: A survey
`Giuseppe Anastasia, Marco Contib,*, Mario Di Francescoa,*, Andrea Passarellab
`a Department of Information Engineering, University of Pisa, via Diotisalvi 1, 56122 Pisa, Italy
`b Institute for Informatics and Telematics (IIT), National Research Council (CNR), via G. Moruzzi 1, 56124 Pisa, Italy
`article info
`Article history:
`Received 26 February 2008
`Accepted 30 June 2008
`Available online 29 July 2008
`Keywords:
`Wireless sensor networks
`Survey
`Energy efficiency
`Power management
`abstract
`In the last years, wireless sensor networks (WSNs) have gained increasing attention from
`both the research community and actual users. As sensor nodes are generally battery-pow-
`ered devices, the critical aspects to face concern how to reduce the energy consumption of
`nodes, so that the network lifetime can be extended to reasonable times. In this paper we
`first break down the energy consumption for the components of a typical sensor node, and
`discuss the main directions to energy conservation in WSNs. Then, we present a systematic
`and comprehensive taxonomy of the energy conservation schemes, which are subse-
`quently discussed in depth. Special attention has been devoted to promising solutions
`which have not yet obtained a wide attention in the literature, such as techniques for
`energy efficient data acquisition. Finally we conclude the paper with insights for research
`directions about energy conservation in WSNs.
`/C2112008 Elsevier B.V. All rights reserved.
`1. Introduction
`A wireless sensor network consists of sensor nodes de-
`ployed over a geographical area for monitoring physical
`phenomena like temperature, humidity, vibrations, seismic
`events, and so on [5]. Typically, a sensor node is a tiny
`device that includes three basic components: a sensing
`subsystem for data acquisition from the physical surround-
`ing environment, a processing subsystem for local data
`processing and storage, and a wireless communication
`subsystem for data transmission. In addition, a power
`source supplies the energy needed by the device to
`perform the programmed task. This power source often
`consists of a battery with a limited energy budget. In addi-
`tion, it could be impossible or inconvenient to recharge the
`battery, because nodes may be deployed in a hostile or
`unpractical environment. On the other hand, the sensor
`network should have a lifetime long enough to fulfill the
`application requirements. In many cases a lifetime in the
`order of several months, or even years, may be required.
`Therefore, the crucial question is: ‘‘how to prolong the net-
`work lifetime to such a long time?”
`In some cases it is possible to scavenge energy from the
`external environment [59] (e.g., by using solar cells as
`power source). However, external power supply sources
`often exhibit a non-continuous behavior so that an energy
`buffer (a battery) is needed as well. In any case, energy is a
`very critical resource and must be used very sparingly.
`Therefore, energy conservation is a key issue in the design
`of systems based on wireless sensor networks.
`In this paper we will refer mainly to the sensor network
`model depicted inFig. 1and consisting of onesink node(or
`base station) and a (large) number of sensor nodes de-
`ployed over a large geographic area (sensing field).Data
`are transferred from sensor nodes to the sink through a
`multi-hop communication paradigm[5]. We will consider
`first the case in which both the sink and the sensor nodes
`are static (static sensor network). Then, we will also dis-
`cuss energy conservation schemes for sensor networks
`with mobile elements in Section6, in which a sparse sen-
`sor network architecture – where continuous end-to-end
`paths between sensor nodes and the sink might not be
`available – will be accounted as well.
`1570-8705/$ - see front matter/C2112008 Elsevier B.V. All rights reserved.
`doi:10.1016/j.adhoc.2008.06.003
`* Corresponding authors. Tel.: +39 050 315 3062; fax: +39 050 315
`2593 (M. Conti).
`E-mail addresses: giuseppe.anastasi@iet.unipi.it (G. Anastasi),
`marco.conti@iit.cnr.it (M. Conti), mario.difrancesco@iet.unipi.it
`(M. Di Francesco),andrea.passarella@iit.cnr.it (A. Passarella).
`Ad Hoc Networks 7 (2009) 537–568
`Contents lists available atScienceDirect
`Ad Hoc Networks
`journal homepage: www.else vier.com/locate/adhoc
`SCT Exhibit 2025
`IPR2025-01183
`
`
`
`
`
`
`
`Experimental measurements have shown that generally
`data transmission is very expensive in terms of energy con-
`sumption, while data processing consumes significantly
`less [108]. The energy cost of transmitting a single bit of
`information is approximately the same as that needed for
`processing a thousand operations in a typical sensor node
`[103]. The energy consumption of the sensing subsystem
`depends on the specific sensor type. In many cases it is
`negligible with respect to the energy consumed by the pro-
`cessing and, above all, the communication subsystems. In
`other cases, the energy expenditure for data sensing may
`be comparable to, or even greater than, the energy needed
`for data transmission. In general, energy-saving techniques
`focus on two subsystems: the networking subsystem (i.e.,
`energy management is taken into account in the opera-
`tions of each single node, as well as in the design of net-
`working protocols), and the sensing subsystem (i.e.,
`techniques are used to reduce the amount or frequency
`of energy-expensive samples).
`The lifetime of a sensor network can be extended by
`jointly applying different techniques[10]. For example, en-
`ergy efficient protocols are aimed at minimizing the energy
`consumption during network activities. However, a large
`amount of energy is consumed by node components
`(CPU, radio, etc.) even if they are idle. Power management
`schemes are thus used for switching off node components
`that are not temporarily needed.
`In this paper we will survey the main enabling tech-
`niques used for energy conservation in wireless sensor net-
`works. Specifically, we focus primarily on the networking
`subsystem by considering duty cycling. Furthermore, we
`will also survey the main techniques suitable to reduce the
`energy consumption of sensors when the energy cost for
`data acquisition (i.e. sampling) cannot be neglected. Finally,
`we will introduce mobility as a new energy conservation
`paradigm with the purpose of prolonging the network life-
`time. These techniques are the basis for any networking pro-
`tocol and solution optimized from an energy-saving point of
`view. Due to the fundamental role of these enabling tech-
`niques, we will stress the design principles behind them
`and their features instead of presenting a complete set of
`networking protocols for wireless sensor networks. For a
`survey on these aspects, the reader is referred to[39 and 99].
`The rest of the paper is organized as follows. Section2
`discusses the general approaches to energy conservation
`in sensor nodes, and introduces the three main approaches
`(duty-cycling, data-driven, and mobility). In Section3 we
`break down this high-level classification, and highlight
`the schemes that will be then described in detail in the fol-
`lowing sections. Specifically, Section4 deals with schemes
`related to the data-driven approach. Section5 presents ap-
`proaches related to the data-driven approach. Section6
`discusses schemes related to the mobility-based approach.
`Finally, conclusions and open issues are discussed in Sec-
`tion 7.
`2. General approaches to energy conservation
`Before discussing the high-level classification of energy
`conservation proposals, it is worth presenting the net-
`work- and node-level architecture we will refer to.
`From a sensor network standpoint, we mainly consider
`the model depicted in Fig. 1, which is the most widely
`Sink
`Internet
`Remote
`Controller
`Sensor
`Field Sensor
`NodeUser
`Fig. 1. Sensor network architecture.
`ADCSensors Radio
`Memory
`MCU
`DC-DCBattery
`Mobilizer Location Finding SystemPower Generator
`Power Supply Subsystem Sensing Subsystem
`Processing
`Subsystem
`Communication
`Subsystem
`Fig. 2. Architecture of a typical wireless sensor node.
`538 G. Anastasi et al. / Ad Hoc Networks 7 (2009) 537–568
`SCT Exhibit 2025
`IPR2025-01183
`
`
`
`
`
`
`
`adopted model in the literature. On the other side,Fig. 2
`shows the architecture of a typical wireless sensor node,
`as usually assumed in the literature. It consists of four
`main components: (i) a sensing subsystem including one
`or more sensors (with associated analog-to-digital con-
`verters) for data acquisition; (ii) a processing subsystem
`including a micro-controller and memory for local data
`processing; (iii) aradio subsystem for wireless data com-
`munication; and (iv) a power supply unit. Depending on
`the specific application, sensor nodes may also include
`additional components such as a location finding system
`to determine their position, a mobilizer to change their
`location or configuration (e.g., antenna’s orientation), and
`so on. However, as the latter components are optional,
`and only occasionally used, we will not take them into ac-
`count in the following discussion.
`Obviously, the power breakdown heavily depends on
`the specific node. In[108] it is shown that the power char-
`acteristics of a Mote-class node are completely different
`from those of a Stargate node. However, the following re-
`marks generally hold[108].
`/C15 The communication subsystem has an energy consump-
`tion much higher than the computation subsystem. It
`has been shown that transmitting one bit may consume
`as much as executing a few thousands instructions
`[103]. Therefore, communication should be traded for
`computation.
`/C15 The radio energy consumption is of the same order of
`magnitude in the reception, transmission, and idle
`states, while the power consumption drops of at least
`one order of magnitude in the sleep state. Therefore,
`the radio should be put to sleep (or turned off) whenever
`possible.
`/C15 Depending on the specific application, the sensing sub-
`system might be another significant source of energy
`consumption, so its power consumption has to be
`reduced as well.
`Based on the above architecture and power breakdown,
`several approaches have to be exploited, even simulta-
`neously, to reduce power consumption in wireless sensor
`networks. At a very general level, we identify three main
`enabling techniques, namely,duty cycling, data-driven ap-
`proaches, andmobility.
`Duty cyclingis mainly focused on the networking subsys-
`tem. The most effective energy-conserving operation is
`putting the radio transceiver in the (low-power) sleep mode
`whenever communication is not required. Ideally, the radio
`should be switched off as soon as there is no more data to
`send/receive, and should be resumed as soon as a new data
`packet becomes ready. In this way nodes alternate between
`active and sleep periods depending on network activity. This
`behavior is usually referred to asduty cycling, andduty cycle
`is defined as the fraction of time nodes are active during their
`lifetime. As sensor nodes perform a cooperative task, they
`need to coordinate their sleep/wakeup times. Asleep/wake-
`up scheduling algorithmthus accompanies any duty cycling
`scheme. It is typically a distributed algorithm based on
`which sensor nodes decide when to transition from active
`to sleep, and back. It allows neighboring nodes to be active
`at the same time, thus making packet exchange feasible even
`when nodes operate with a low duty cycle (i.e., they sleep for
`most of the time).
`Duty-cycling schemes are typically oblivious to data
`that are sampled by sensor nodes. Hence,data-driven ap-
`proaches can be used to improve the energy efficiency even
`more. In fact, data sensing impacts on sensor nodes’ energy
`consumption in two ways:
`/C15 Unneeded samples. Sampled data
` generally have strong
`spatial and/or temporal correlations [137], so there is
`no need to communicate the redundant information to
`the sink.
`/C15 Power consumption of the sensing subsystem. Reducing
`communication is not enough when the sensor itself is
`power hungry.
`In the first case unneeded samples result in useless en-
`ergy consumption, even if the cost of sampling is negligi-
`ble, because they result in unneeded communications.
`The second issue arises whenever the consumption of the
`sensing subsystem is not negligible. Data driven tech-
`niques presented in the following are designed to reduce
`the amount of sampled data by keeping the sensing accu-
`racy within an acceptable level for the application.
`In case some of the sensor nodes are mobile,mobility
`can finally be used as a tool for reducing energy consump-
`tion (beyond duty cycling and data-driven techniques). In a
`static sensor network packets coming from sensor nodes
`follow a multi-hop path towards the sink(s). Thus, a few
`paths can be more loaded than others, and nodes closer
`to the sink have to relay more packets so that they are
`more subject to premature energy depletion (funneling ef-
`fect) [83]. If some of the nodes (including, possibly, the
`sink) are mobile, the traffic flow can be altered if mobile
`devices are responsible for data collection directly from
`static nodes. Ordinary nodes wait for the passage of the
`mobile device and route messages towards it, so that
`communication takes place in proximity (directly or at most
`with a limited multi-hop traversal). As a consequence, or-
`dinary nodes can save energy because path length, conten-
`tion and forwarding overheads are reduced as well. In
`addition, the mobile device can visit the network in order
`to spread more uniformly the energy consumption due to
`communications. When the cost of mobilizing sensor
`nodes is prohibitive, the usual approach is to ‘‘attach” sen-
`sor nodes to entities that will be roaming in the sensing
`field anyway, such as buses or animals.
`All of the schemes we will describe in the following fall
`under one of the three general approaches we have pre-
`sented. Specifically, we provide the complete taxonomy
`of the schemes we will describe hereafter inFig. 3. As this
`taxonomy is fairly rich, the remainder of the survey ana-
`lyzes it using a top-down approach.
`3. High-level taxonomy
`In this section we discuss the breakdown at the first lev-
`els of the taxonomy inFig. 3. The rest of the taxonomy,
`along with concrete examples proposed in the literature,
`is presented in the next sections.
`G. Anastasi et al. / Ad Hoc Networks 7 (2009) 537–568 539
`SCT Exhibit 2025
`IPR2025-01183
`
`
`
`
`
`
`
`On-demand Scheduled
`rendezvous Asynchronous TDMA Contention-
`based Hybrid Stochastic
`Approaches
`Time Series
`forecasting
`Algorithmic
`Approaches
`Energy Conservation
`Schemes
`Topology
`Control
`Power
`Management Data reduction Energy-efficent
`Data Acquisition
`Sleep/Wakeup
`Protocols
`MAC Protocols
`with Low Duty-
`Cycle
`Connection-
`drivenLocation-driven Adaptive
`Sampling
`Hierarchical
`Sampling
`Model-driven
`Active
`Sampling
`In-network
`Processing
`Data
`Compression
`Data
`Prediction
`Data-driven Mobility-basedDuty Cycling
`Mobile-sink Mobile-relay
`Fig. 3. Taxonomy of approaches to energy saving in sensor networks.
`540 G. Anastasi et al. / Ad Hoc Networks 7 (2009) 537–568
`SCT Exhibit 2025
`IPR2025-01183
`
`
`
`
`
`
`
`3.1. Duty-cycling
`As shown inFig. 4, duty cyclingcan be achieved through
`two different and complementary approaches. From one
`side it is possible to exploit node redundancy, which is typ-
`ical in sensor networks, and adaptively select only a mini-
`mum subset of nodes to remain active for maintaining
`connectivity. Nodes that are not currently needed for
`ensuring connectivity can go to sleep and save energy.
`Finding the optimal subset of nodes that guarantee con-
`nectivity is referred to astopology control1. Therefore, the
`basic idea behind topology control is to exploit the network
`redundancy to prolong the network longevity, typically
`increasing the network lifetime by a factor of 2–3 with re-
`spect to a network with all nodes always on[41,92,140].
`On the other hand, active nodes (i.e., nodes selected by the
`topology control protocol) do not need to maintain their
`radio continuously on. They can switch off the radio (i.e.,
`put it in the low-power sleep mode) when there is no net-
`work activity, thus alternating between sleep and wakeup
`periods. Throughout we will refer to duty cycling operated
`on active nodes aspower management. Therefore, topology
`control and power management are complementary tech-
`niques that implement duty cycling with different granular-
`ity. Power management techniques can be further
`subdivided into two broad categories depending on the layer
`of the network architecture they are implemented at. As
`shown inFig. 4, power management protocols can be imple-
`mented either as independent sleep/wakeup protocols run-
`ning on top of a MAC protocol (typically at the network or
`application layer), or strictly integrated with the MAC proto-
`col itself. The latter approach permits to optimize medium
`access functions based on the specific sleep/wakeup pattern
`used for power management. On the other hand, indepen-
`dent sleep/wakeup protocols permit a greater flexibility as
`they can be tailored to the application needs, and, in princi-
`ple, can be used withany MAC protocol.
`The following breakdowns for topology-control
`schemes, independent sleep/wakeup schedules and MAC
`protocols with low duty cycle are presented in Sections
`4.1, 4.2 and 4.3, respectively.
`3.2. Data-driven approaches
`Data-driven approaches (see Fig. 5) can be divided
`according to the problem they address. Specifically, data-
`reduction schemes address the case of unneeded samples,
`while energy-efficient data acquisition schemes are mainly
`aimed at reducing the energy spent by the sensing subsys-
`tem. However, some of them can reduce the energy spent
`for communication as well. Also in this case, it is worth dis-
`cussing here one more classification level related to data-
`reduction schemes, as shown inFig. 5. All these techniques
`aim at reducing the amount of data to be delivered to the
`sink node. However the principles behind them are rather
`different. In-network processingconsists in performing data
`aggregation (e.g., computing average of some values) at
`intermediate nodes between the sources and the sink. In
`this way, the amount of data is reduced while traversing
`the network towards the sink. The most appropriate in-
`network processing technique depends on the specific
`application and must be tailored to it. As data aggregation
`is application-specific, in the following we will not discuss
`it. The interested reader can refer to[39] for a comprehen-
`sive and up-to-date survey about in-network processing
`techniques. Data compression can be applied to reduce
`the amount of information sent by source nodes. This
`scheme involves encoding information at nodes which
`generate data, and decoding it at the sink. There are
`different methods to compress data (see, e.g.,
`[105,129,143,144]). As compression techniques are general
`(i.e. not necessarily related to WSNs), we will omit a de-
`tailed discussion of them to focus on other approaches spe-
`cifically tailored to WSNs. Data prediction consists in
`building an abstraction of a sensed phenomenon, i.e. a
`model describing data evolution. The model can predict
`the values sensed by sensor nodes within certain error
`bounds, and resides both at the sensors and at the sink. If
`the needed accuracy is satisfied, queries issued by users
`Duty Cycling
`Sleep/Wakeup
`Protocols
`MAC Protocols with
`Low Duty-Cycle
`Topology Control Power Management
`Fig. 4. Taxonomy of duty cycling schemes.
`1 Before proceeding on, it may be worthwhile to point out that the term
`‘‘topology control” has been used with a larger scope than that defined
`above. Some authors include in topology control also techniques that are
`aimed at super-imposing a hierarchy on the network organization (e.g.,
`clustering techniques) to reduce energy consumption. In addition, the
`terms ‘‘topology control” and ‘‘power control” are often confused. However,
`power control refers to techniques that adapt the transmission power level
`to optimize a single wireless transmission. Even if the above techniques are
`related with topology control, in accordance with[115], we believe that
`they cannot be classified as topology control techniques. Therefore, in the
`following we will refer to topology control as one of the means to reduce
`energy consumption by exploiting node redundancy.
`Data-driven
`Approaches
`Data reduction Energy-efficent
`Data Acquisition
`In-network
`Processing
`Data
`Compression Data Prediction
`Fig. 5. Taxonomy of data-driven approaches to energy conservation.
`G. Anastasi et al. / Ad Hoc Networks 7 (2009) 537–568 541
`SCT Exhibit 2025
`IPR2025-01183
`
`
`
`
`
`
`
`can be evaluated at the sink through the model without the
`need to get the exact data from nodes. On the other side,
`explicit communication between sensor nodes and the
`sink is needed when the model is not accurate enough,
`i.e. the actual sample has to be retrieved and/or the model
`has to be updated. On the whole, data prediction reduces
`the number of information sent by source nodes and the
`energy needed for communication as well.
`The following levels in the classification for data-pre-
`diction and energy-efficient data acquisition techniques
`are presented in Sections5.1 and 5.2, respectively.
`3.3. Mobility-based schemes
`As shown inFig. 6, mobility-based schemes can be clas-
`sified as mobile-sink and mobile-relay schemes, depending
`on the type of the mobile entity. They will be directly dis-
`cussed in Section 6. It is worth pointing out here that,
`when considering mobile schemes, an important issue is
`the type of control the sensor-network designer has on
`the mobility of nodes. A detailed discussion on this point
`is presented in[12 and 68]. Mobile nodes can be divided
`into two broad categories: they can be specifically de-
`signed aspart of the network infrastructure, or they can be
`part of the environment. When they are part of the infra-
`structure, their mobility can be fully controlled as they
`are, in general, robotized. When mobile nodes are part of
`the environment they might be not controllable. If they fol-
`low a strict schedule, then they have a completely predict-
`able mobility (e.g., a shuttle for public transportation[23]).
`Otherwise they may have a random behavior so that no
`reliable assumption can be made on their mobility. Finally,
`they may follow a mobility pattern that is neither predict-
`able nor completely random. For example, this is the case
`of a bus moving in a city, whose speed is subject to large
`variation due to traffic conditions. In such a case, mobility
`patterns can be learned based on successive observations
`and estimated with some accuracy.
`4. Duty-cycling
`In this section we will discuss the duty-cycling ap-
`proaches as defined in the previous section. For conve-
`nience, we report in Fig. 7 an excerpt of the taxonomy
`referred to duty-cycling.
`4.1. Topology control protocols
`The concept of topology control is strictly associated
`with that of network redundancy. Dense sensor networks
`typically have some degree of redundancy. In many cases
`network deployment is done at random, e.g., by dropping
`a large number of sensor nodes from an airplane. There-
`fore, it may be convenient to deploy a number of nodes
`greater than necessary to cope with possible node failures
`occurring during or after the deployment. In many con-
`texts it is much easier to deploy initially a greater number
`of nodes than re-deploying additional nodes when needed.
`For the same reason, a redundant deployment may be con-
`venient even when nodes are placed by hand[41]. Topol-
`ogy control protocols are thus aimed at dynamically
`adapting the network topology, based on the application
`needs, so as to allow network operations while minimizing
`the number of active nodes (and, hence, prolonging the
`network lifetime).
`Several criterions can be used to decide which nodes to
`activate/deactivate, and when. In this regard, topology con-
`trol protocols can be broadly classified in the following two
`categories (Fig. 7). Location driven protocols define which
`node to turn on and when, based on the location of sensor
`nodes which is assumed to be known.Connectivity driven
`protocols, dynamically activate/deactivate sensor nodes
`so that network connectivity, or complete sensing cover-
`age [78], are fulfilled.
`A detailed survey on topology control in wireless ad hoc
`and sensor networks is available in[72 and 115]. In the fol-
`lowing subsections we only review the main proposals for
`topology control in wireless sensor networks according to
`the above classification.
`4.1.1. Location-driven
`Geographical
`Adaptive Fidelity (GAF) [145] is a loca-
`tion-driven protocol that reduces energy consumption
`while keeping a constant level of routing fidelity. The sens-
`ing area where nodes are distributed is divided into small
`virtual grids. Each virtual grid is defined such that, for any
`two adjacent grids A and B, all nodes in A are able to com-
`municate with nodes in B, and vice-versa (seeFig. 8). All
`nodes within the same virtual grid are equivalent for rout-
`ing, and just one node at time need to be active. Therefore,
`nodes have to coordinate with each other to decide which
`one can sleep and how long.
`Initially a node starts in the discovery state where it ex-
`changes discovery messages with other nodes. After broad-
`casting the message, the node enters the active state.
`While active, it periodically re-broadcasts its discovery
`message. A node in the discovery or active state can change
`its state to sleeping when it detects that some other equiv-
`alent node will handle routing. Nodes in the sleeping state
`wake up after a sleeping time and go back to the discovery
`state. In GAF load balancing is achieved through a periodic
`re-election of the leader, i.e., the node that will remain ac-
`tive to manage routing in the virtual grid. The leader is
`chosen through a rank-based election algorithm which
`considers the nodes’ residual energy, thus allowing the
`network lifetime to increase in proportion to node density
`[145]. GAF is independent of the routing protocol, so that it
`can be used along with any existing solution of that kind.
`In addition, GAF does not significantly affect the perfor-
`mance of the routing protocol in terms of packet loss and
`message latency. However, the structure imposed over
`Mobility-based
`Schemes
`Mobile-sink Mobile-relay
`Fig. 6. Taxonomy of mobility-based energy conservation schemes.
`542 G. Anastasi et al. / Ad Hoc Networks 7 (2009) 537–568
`SCT Exhibit 2025
`IPR2025-01183
`
`
`
`
`
`
`
`the network may lead to an underutilization of the radio
`coverage areas. In fact, as all nodes within a virtual grid
`must be able to reach any node in an adjacent virtual grid,
`actually nodes are forced to cover less than half the dis-
`tance allowed by the radio range.
`Although being defined as a geographic routing proto-
`col, Geographic Random Forwarding (GeRaF)[21,153,154]
`actually presents features which are in the direction of
`location-driven duty-cycled operations, which make use
`of both node position and redundancy. Nodes follow a gi-
`ven duty cycle to switch between awake (active) and sleep
`(inactive) states. Nodes periodically switch to the active
`state, starting with a listening time, so that they can partic-
`ipate to routing if needed. Data forwarding starts as soon
`as a node has a packet to send. In this case, the node be-
`comes active and broadcasts a packet containing its own
`location and the location of the intended receiver. Then a
`receiver-initiated forwarding phase takes place. As a result,
`one of the active neighbors of the sender will be selected to
`relay the packet towards the destination. To this end, the
`main idea is that each active node has a priority which de-
`pends on its closeness to the intended destination of the
`packet. In addition to priority, a distributed randomization
`scheme is also used, in order to reduce the probability that
`many neighboring nodes are simultaneously sleeping. Spe-
`cifically, the portion of the coverage area of the sender
`which is closer to the intended destination is split into a
`number of regions. Each region has its associated priority,
`and regions are chosen so that all nodes within a region
`are closer to the destination than any other node in a re-
`gion with a lower priority (Fig. 9).
`After the broadcast, nodes in the region with the higher
`priority contend for forwarding. If only one node gets the
`channel, it simply forwards the packet and the process
`ends. Otherwise, multiple nodes may transmit simulta-
`neously, resulting in a collision. In this case, a resolution
`technique (i.e. a backoff) is applied in order to select a sin-
`gle forwarder. There may also be the case in which no node
`can forward the packet, because all nodes in the region are
`On-demand Scheduled
`rendezvous Asynchronous TDMA Contention-
`based Hybrid
`Energy Conservation
`Schemes
`Topology
`Control
`Power
`Management
`Sleep/Wakeup
`Protocols
`MAC Protocols
`with Low Duty-
`Cycle
`Connection-
`drivenLocation-driven
`Data-driven Mobility-basedDuty-cycling
`Fig. 7. Detailed taxonomy of duty cycling schemes.
`1
`2
`3
`4
`5
`r
`ABC
`r
`Fig. 8. Virtual grids in GAF.
`G. Anastasi et al. / Ad Hoc Networks 7 (2009) 537–568 543
`SCT Exhibit 2025
`IPR2025-01183
`
`
`
`
`
`
`
`sleeping. To this end, in the next transmission attempt, the
`forwarder will be chosen among nodes in the second high-
`est-priority region and so on. Every time the relay selection
`phase will be repeated until a maximum number of retries
`will be reached. Eventually, after a hop-by-hop forwarding,
`the packet will reach the intended destination. Note that,
`as the relay selection is done a posteriori, GeRaF merely re-
`quires position information, thus it does not need topolog-
`ical knowledge nor routing tables.
`4.1.2. Connectivity-driven
`Span [26] is a connectivity-driven protocol that adap-
`tively elects ‘‘coordinators” of all nodes in the network.
`Coordinators stay awake continuously and perform mul-
`ti-hop routing, while the other nodes stay in sleeping mode
`and periodically check if it is needed to wake up and be-
`come a coordinator. To guarantee a sufficient number of
`coordinators Span uses the followingcoordinator eligibility
`rule: if two neighbors of a non-coordinator node cannot
`reach each other, either directly or via one or more coordi-
`nators, that node should become a coordinator. However, it
`may happen that several nodes discover the lack of a coor-
`dinator at the same time and, thus, they all decide to be-
`come a coordinator. To avoid such cases nodes that
`decide to become a coordinator defer their announcement
`by a randombackoff delay. Each node uses a function that
`generates a random time by taking into account both the
`number of neighbors that can be connected by a potential
`coordinator node, and its residual energy. The fundamental
`ideas are that (i). nodes with a higher expected lifetime
`should be more likely to volunteer to become a coordina-
`tor; and (ii). coordinators should be selected in such a
`way to minimize their number. Each coordinator periodi-
`cally checks if it can stop being a coordinator. In detail, a
`node should withdraw as a coordinator if every pair of its
`neighbors can communicate directly, or through some
`other coordinator. To avoid loss of connectivity, during
`the transient phase the old coordinator continues its ser-
`vice until the new one is available. The Span election algo-
`rithm requires to know neighbor and connectivity
`information to decide whether a node should become a
`coordinator or not. Such information is provided by the
`routing protocol, hence SPAN depends on it and may re-
`quire modification in the routing lookup process.
`Adaptive Self-Configuring sEnsor Networks Topologies
`(ASCENT [22]) is a connectivity-driven protocol that, un-
`like Span, does not depend on the routing protocol. In AS-
`CENT a node decides whether to join the network or
`continue to sleep based on information about connectivity
`and packet loss that aremeasured locallyby the node itself.
`The basic idea of ASCENT is that initially only some nodes
`are active, while all other ones arepassive, i.e., they listen
`to packets but do not transmit. If the number of active
`nodes is not large enough, the sink node may experience
`a high message loss from sources. The sink then starts
`sending help messages to solicit neighboring nodes that
`are in the passive state (passive neighbors) to join the net-
`work by changing their state from passive to active (active
`neighbors). Passive neighbors have their radio on and lis-
`ten to all packets transmitted by their active neighbors.
`However, they do not cooperate to forward data packets
`or exchange routing control information – they only
`collect information about the network status without
`interfering with other nodes. On the contrary, active
`neighbors forward data and routing (control) messages
`until they run out of energy. Act

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket