SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Adaptive Wireless Sensor Networks:
 A System Design Approach to Adaptive Reliability
                            Rachit Agarwal∗† , Emanuel M. Popovici∗ and Brendan O’Flynn†
                     ∗ Department of Microelectronic Engineering, University College Cork, Cork, Ireland
                   † MicroelectronicsApplication Integration Group, Tyndall National Institute, Cork, Ireland
                        Email: rachit.agarwal@ue.ucc.ie, e.popovici@ucc.ie, brendan.oflynn@tyndall.ie


   Abstract— Reliable Data Transport is an important facet of           Finally, from a software engineering standpoint, diverse
dependability and quality of service in Wireless Sensor Networks     routing layers add more challenges. Since motes are resource
(WSN). In such networks, erroneous packets can be recovered          constrained, applications tend to make heavy use of customi-
by two basic methods, Automatic Repeat Request (ARQ) and For-
ward Error Correction (FEC). Retransmission being an expensive       sation and cross-layer optimisations.
operation in terms of energy, FECs are generally looked for             While the fourth type of problems can be eradicated by hav-
correcting erroneous packets. Diversified features of WSN nodes       ing a software interface between transceiver and information
and applications require flexible loss recovery in order to further   processing unit (hardware/software)1 , an application driven
optimize energy efficiency. This paper proposes a dynamically         design and implementation methodology provides a solution
adaptable FEC scheme based on Universal Reed Solomon de-
coder for reliability in sensor networks having diversified sensing   for third type of problems. It is the first and second type of
and transmitting nodes. A system design approach is discussed        problems which are majorly concentrated on in this paper.
to explore the design space with efficiency/flexibility trade-off         To extend our discussion, let us broadly divide WSN
and a Dynamic Partitioning Module has been presented for             systems in three categories based on system and application
optimum performance of the system. The developed system infers       constraints: [Type I]: Resource Constrained, [Type II]: Energy
the best error correcting scheme and partitioning scheme for
optimal performance based on the the channel conditions and          Constrained and [Type III]: Throughput Constrained Systems
system/network constraints. The results of implementation of the        ARQ: The advantages of ARQ are relative simplicity,
proposed system on wireless motes show that up to 56% of the         optimal throughput and no overhead in a non-error situation.
power savings can be achieved with less than 4% overhead of          The main disadvantages of ARQ are the retransmitting costs
the running system costs.                                            in terms of huge delays and energy when an error does occur.
                                                                     In wireless networks, transmitting a packet is one of the most
                      I. I NTRODUCTION
                                                                     costly operations to perform by a node. Therefore, sending
   Wireless Sensor Networks (WSN) have a wide range of               packets or retransmitting has to be done as few times as
potential applications, including security and surveillance,         possible.
control, actuation and maintenance of complex systems, and              FEC: The advantage of FEC is that there are no time delays
fine-grain monitoring of indoor and outdoor environments.             in the message flows (or a bounded small delay, considering
Many of these applications (medical, surveillance, monitoring)       the encoding and decoding operations), because there are no
require all the data to be transmitted with high reliability.        retransmissions. A disadvantage is that packets can get lost
   Challenges to achieving reliability on WSN can be divided         when the error correcting code is not strong enough to correct
into four main categories. The first problems are related to          the error.
the wireless communication. Channels in WSN are often                   Adaptive Universal FEC (AuFEC): An open problem has
unreliable with high probability of introducing bursts of errors.    been discussed in [1], which is reproduced here,
Weak correlation between quality and distance, hidden termi-         ”... most reliability protocols use a single and identical loss-
nal problems, and dynamic change of connectivity complicate          recovery algorithm for all nodes and applications, ..... How-
the situation further.                                               ever, the nodes and the applications may consist of diversified
   Problems due to diverse applications and sensory data type        features and priorities, which require flexible loss recovery in
constitute to the second category of problems. Sink node is re-      order to optimise energy efficiency. ...”.
quired to interact with several transmitting nodes, each or some     This is similar to first and second type of problems discussed
of them having different kind of sensory data. In addition,          earlier. Such a scenario is shown in Figure 1. A solution to this
migration of the system over various applications impose more        is to have an adaptive and universal codec (encoder/decoder)
stringent conditions on flexible QoS requirements of WSN.             which can process the information on various kinds of sensory
   The third sort of problems come from the constrained              data. Also, Adaptive Coding Schemes which involve different
resources of WSN motes. A mote is battery powered, so has a          codes are utilised to take advantage of the variations in channel
limited power source. Also, computational power and memory           conditions in wireless communications.
space are limited in motes, and thus the algorithm to achieve           1 Microprocessors allow very easy and efficient embedding of error control
reliability should not be computationally or storage intensive.      in various layers of communication protocols where data is buffered
III. C ONTRIBUTION OF THE PAPER
                                                                               This paper proposes an Adaptive Universal FEC (AuFEC)
                                                                            scheme based on RS codec for reliability in WSN. Most of
                                                                            the RS codec implementations use Berlekamp-Massey (BM)
                                                                            algorithm [16] for locating the errors in the received data [10]
                                                                            [12]. We show that Fitzpatrick (F) algorithm, along with an
                                                                            universal Galois Field (GF) Arithmetic Processor proposed
          Fig. 1.   Diversified WSN features in N-to-1 Networking            recently, is more suitable for WSN specially Type I and Type
                                                                            II systems.
                                                                               We employ a hardware/software codesign methodology for
   The above discussion is summarised in Table I for three                  efficient implementation of the codec. The system is dy-
discussed error control mechanisms for three type of systems                namically partitioned based on the scheme being employed.
in varying channel conditions.                                              We present the two schemes and a Module for dynamic
                                    TABLE I                                 partitioning in the system. Finally, we present the overheads
S CHEME S ELECTION      FOR   VARIOUS C HANNEL C ONDITIONS & S YSTEMS       related with the uRS codec and implementation results on
                                                                            wireless motes.
 Scheme       Zero Errors       Low Error/Consistent   High Error/Varying
             I
             √    II    III     I    II      III       I    II      III          IV. U NIVERSAL R EED S OLOMON A RCHITECTURE
  ARQ                           √     √       √
  FEC               √    √                             √    √       √          Reed Solomon Decoder consists of four main blocks, GF
 AuFEC
                                                                            Arithmetic Processor, Syndrome Computation, Error Locator
                                                                            Computation and Error Location and Value Computation. All
   There are quite a few error correcting codes (ECC) that
                                                                            these blocks have to be studied with the notion of adaptability
are useful in communication channels. Most prominent are
                                                                            and universality for designing an universal decoder. Universal
the BCH codes, linear block codes and Reed-Solomon (RS)
                                                                            Reed-Solomon (uRS) decoders allow flexibility in some or
codes [2]. RS codes are the most widely used codes because
                                                                            all of the code parameters: Information Length (k), Codeword
of their simplicity and high performance [3] [4].
                                                                            Length (n), Error Correcting Capability (t), size of the Galois
   The rest of the paper is organised as follows. In Section
                                                                            Field (m) and Generator Polynomial (g). A single uRS decoder
II, we briefly review the work done related to this problem
                                                                            capable of decoding many different codes can be a more
and discuss the contributions of our paper in Section III.
                                                                            hardware-efficient solution than separate decoders for each RS
Section IV covers the Universal RS architectures suitable for
                                                                            code although it may be less hardware-efficient than a RS
WSN. We present a channel adaptation algorithm and related
                                                                            decoder that is optimised with respect to any individual code
constraints in Section V and a System Design Perspective for
                                                                            or when the coding scheme is fixed. Following subsections
optimum performance in Section VI. Performance Analysis
                                                                            discuss the architectures employed for design of uRS Codec.
for the system is performed in Section VII and we conclude
the paper with some final remarks in Section VIII.                           A. Universal GF Arithmetic Processor
                     II. R ELATED W ORK                                         Research works on universal GF Arithmetic have mostly
   Energy-efficiency of FECs over various retransmission                     concentrated on GF multipliers neglecting inversion and divi-
schemes for wireless communications has been studied in [5].                sion. Most of the architectures presented to date use look-up
Following the idea, [6] [4] compare a few FEC schemes in                    tables for GF inversion. Due to memory constraints in WSN,
WSN showing that fixed & small ECC are not effective in                      it is not possible to store the inversion results for all the Galois
reducing packet losses when the errors are bursty. In a recent              Fields (due to universality) which define the RS code. Some
work [7], it has been shown that FEC schemes that are able to               implementations also use External Memory/Arithmetic Unit
correct short errors per codeword are not very useful and it is             for the same purpose [13]. However, this is also not suitable
necessary to implement efficient RS codes in WSN depending                   for WSN due to higher access time and even higher power
on the applications. In [1], an open problem has been posed                 consumption due to data access and transfer.
regarding achieving reliability in presence of different kinds of               A GF Arithmetic processor was proposed in [14]. This
sensory systems and varying channel conditions. In the field                 processor can perform all the GF computations using the same
of FECs, Blahut [8] proposed the mathematical concept of                    architecture. This architecture suits best for Type I and Type
universal decoders. Building on these algorithms, Shayan et                 II systems for a simple reason that all GF computations can
al. proposed [9] universal decoders that use a fixed primitive               be performed using a single block. A GF Multiplier will have
polynomial of a fixed degree m, but can decode RS codes                      a better performance than multiplication using the processor.
of different rates. An universal decoder based on Berlekamp                 Inversion and multiplication take the same number of cycles
Massey Algorithm is proposed in [10]. Trade-offs related                    using the processor and hence, processor will have comparable
to GF arithmetic on resource-sonstrained systems have been                  performance to any GF inverter because of high complexity
studied in great detail in [11].                                            of GF inversion compared to multiplication.
B. Syndrome Computation                                                             V. C HANNEL A DAPTATION
   Syndrome computation depends on degree of Galois Field,
generator polynomial and primitive polynomial. Calculation            In many sensor network applications, the requirements are
of generator polynomial requires intensive multiplication and      not known precisely enough at deployment time to make
squaring of field elements which is not suitable for our            trade-offs required for maximum network utility. Even during
resource constrained systems. A low complexity architecture        operation, requirements will change in response to varying
for syndrome computation was proposed in [15] which erad-          conditions. The challenge, then, lies in designing sensor
icates the dependency of syndrome computation on generator         network applications that can dynamically adapt to changing
polynomial. Our RS codec uses this architecture for comput-        requirements by selecting different points in the design space
ing the syndromes. The primitive polynomial coefficients are        for trade-off resource consumption. In this section, we present
hardwired to the circuit.                                          a platform independent adaptation algorithm for Adaptive
   Syndrome Computation block is the smallest in RS decoder        RS Codecs, which which can be easily modelled for any
(Figure 3, Hardware Size) and is the only block which does         application communication scenarios.
not depend on error rates. However, most of the power con-
sumption comes from Syndrome Computation block (Figure 3,          ————————————-
Power Dissipation) because of large number of multiplications      V ariables : i, j, noe, n;
and high switching activity for every symbol it receives.          Initialize : i = j = n = 0;

C. Error Locator                                                   (1) :  mm := Mn ;
   There are several algorithms developed for solving the          (2) :  tt := TMn , min;
key equation. The most widely used algorithm for solving           (3) :  noe := [some integer];
the key equation is BM algorithm [16]. We compared the             ∗        ∗number of errors f rom key solving ∗
results of BM Algorithm with another algorithm developed           (4) :  if (noe < tt)
by Fitzpatrick [17] known as F-algorithm.                          (5) :       ACK & exit;
                                                                   (6) :  elseif (j = 0)
                                                                   (7) :       tt := tt + 1;
                                                                   (8) :       if (tt = TM , max)
                                                                   (9) :             j := 1;
                                                                   (10) :             N ACK(tt, mm);
                                                                   (11) :       endif ;
                                                                   (12) :  elseif (i = 0)
                                                                   (13) :       mm := Mn+1 ;
                                                                   (14) :       tt := TMn+1 , min;
                                                                   (15) :       n := n + 1;
                                                                   (16) :       t := 0;
     Fig. 2.   Software Timing Comparison of BM and F Algorithm    (17) :       if (Mn+1 = MM ax )
                                                                   (18) :             i = 1;
   Algorithm F for solving the key equation has the same com-      (19) :             N ACK(tt, mm);
putational complexity as the BM algorithm. Both algorithms         (20) :       endif ;
construct a sequence of pairs of polynomials with coefficients      (21) :  else
in GF(2m ). F is controlled by two tests for zero, while BM        (22) :       N ACK(correction not possible);
requires two tests for zero and an integer comparison test.        (23) :       exit;
When µi = 0, one polynomial in F is multiplied by µi / µi .        (24) :  endif ;
In this case, F-algorithm has half as many multiplications as in   (25) :  end;
BM where one polynomial is multiplied by the discrepancy µ         ————————————-
and the other by 1/µ. This results in huge software instruction
saving and hence, time and software power which is shown           The algorithm has two variables, mm and tt, which are
in Figure 2. In terms of hardware, both the algorithms have        degree of GF and error correcting capabilities of the system,
similar sizes and power consumption, which are presented in        respectively. The variables are assigned the values from a
Figure 3.                                                          table provided by the user. There are two flags i and j used
   Another reason for using F-algorithm in the universal de-       in the algorithm which indicate the maximum degree of GF
coder for WSN is due to its construction which is very similar     and maximum error correcting capability the system can
to uGF Arithmetic Processor discussed earlier. The coefficients     operate on for corresponding degree of GF. Based on the
of error locator polynomial are multiplied by µi / µi . This       value of these flags, values are chosen from the table. In case
makes the GF-processor and F-Algorithm more suitable for           when the system is not able to correct the errors (noe > tt),
resource-constrained WSN running on embedded processors.           a N ACK is sent to the transmitter with changes in mm
Fig. 3.       Hardware Comparison of BM and F Algorithm (a) Power Dissipation for zero error and 8 errors case and (b) Hardware size



and tt decided by the algorithm. Once both the flags have                       hardware-software co-design methodology with dynamic task-
a value 1 indicating maximum error correction capability                       allocation (partitioning) for real time systems. To guide the
of the system, a N ACK with correction not possible is                         partitioning process, design metrics are defined to compare
sent to the transmitter. The values in the table must obey the                 alternative partitioning and to evaluate their conformance with
following equation for avoiding redundant operations:                          respect to the system constraints. This section covers in detail
                                                                               a dynamic partitioning module for optimum performance of
            Mn ∗ TMn ,max < Mn+1 ∗ TMn+1 ,min                           (1)    uRS Codec under some defined Performance Metrics. The
It is also important to ensure that the resources are not being                flow of our Dynamic Partitioning Module follows the one in
wasted in processing while the errors can be corrected using                   [18], with major changes suitable for WSN. The overall system
a smaller code. The following equation put another restriction                 architecture for our motes is presented in Figure 4.
on values in the table:

         Mn ∗ (TMn ,max + 1) ≥ Mn+1 ∗ TMn+1 ,min                        (2)

This is based on the fact that TMn ,max number of errors
corrected in GF(2Mn ) are less than TMn+1 ,min error correction
in GF(2Mn+1 ). Table II shows an example:

                           TABLE II
   TABLE FOR VARIABLE A SSIGNMENT IN A DAPTATION A LGORITHM

                   n     Mn     [TMn ,min , ...., TMn ,max ]                                  Fig. 4.   Wireless Mote System Architecture
                   0      4           [0, 1, ..., 4, 5]
                   1      8              [3, 4, 5]                             A. Performance Metrics
                   2     16              [3, 4, 5]
                   3     32                [3, 4]                                 Partitioning plays an important role in final system perfor-
                                                                               mance. Performance Metrics are defined to guide the parti-
                                                                               tioning process based on the application of the system. The
                       VI. S YSTEM L EVEL D ESIGN                              goal is to define a specific metrics to be applied at the system-
                                                                               level to measure and to compare the performance of several
   Most wireless sensor networks are composed of nodes                         design alternatives. These performance metrics are defined
implemented with embedded processors that execute software                     in terms of Hardware Execution time, Hardware Resource
based instructions. These nodes are capable of functional                      requirements, Software Execution time, Memory Requirements,
adaptation simply by loading and executing various software                    Power Specification, etc. and can be any possible combination
programs. However, this virtually unlimited flexibility comes                   of these specifications. The idea of performance metrics for
at a price, as software algorithms executed on processors                      power aware systems is discussed in [19].
typically consume more energy and have lower performance
than Application Specific Integrated Circuit (ASIC) or FPGA                     B. Dynamic Partitioning Module
based implementations. However, fixed-logic implementation                         Our dynamic partitioning was employed using two schemes.
do not have the flexibility to reap the benefits provided by dy-                 We discuss the various blocks in the dynamic partitioning
namic adaptability. Because of this efficiency/flexibility trade-                module for better understanding of the two schemes before
off inherent in node design, a wide range of implementation                    discussing the schemes. The block diagram for dynamic parti-
options are worth consideration. Flexibility being expensive,                  tioning module is shown in Figure 5. The module is composed
finding the implementation that satisfies the flexibility needs                   of three main blocks, CoRe Block, ParES Block and AAS
of an application will ensure highest efficiency. This requires a               Block.
Fig. 5.   Dynamic Partitioning Module and ParES Block for (a)Scheme A (b)Scheme B



   CoRe Block: This is the Constraints and Recommendation                 Scheme B: This scheme is a simpler version of Scheme
Block. It receives the parameters from the Set Parameter Block         A and is more suitable for resource constraint systems. The
and recommends the ParES block an initial configuration for             scheme incorporates a look-up table with related system costs
dynamic partitioning. This recommendation may be based                 for all the possible task assignments. The system, when
on the initial constraints provided by the user or system              provided with the constraints, simply uses the look-up table to
constraints. These constraints can also include classification of       find the solution for the given cost functions. Implementation
tasks which are more suitable to be implemented on Hardware.           of Scheme B gives a much faster dynamic partitioning solution
   ParES Block: This is the Partitioning, Evaluation and               but is platform dependent as the partitioning results of Scheme
Strategy Block. It receives the initial recommendation from the        A are precomputed and stored as look-up tables.
CoRe block and calculates the cost function for this partition-           Scheme Selection: Scheme B is basically a simplified and
ing scheme in Evaluation Subblock. Now the problem amounts             precomputed version of Scheme A. While Scheme A is prefer-
to a Decision Problem which has a lower time complexity than           able if the implementation is expected to migrate over various
Optimization Problem. If initial recommendation doesn’t have           systems, Scheme B is more suitable for further reducing the
a possible solution, a new strategy is chosen in the Strategy          processing. With the increase in design space options, size of
subblock and evaluation is done for the cost value. Finally, the       Scheme A increases exponentially and so does the processing.
partitioning scheme with the lowest cost function is declared          For designs with large number of implementation options and
and notified to the AAS Block.                                          fixed platform, Scheme B is more preferable.
   AAS Block: This is the Allocation, Assignment and Schedul-
ing Block. It associates the tasks with Hardware and Software                          VII. P ERFORMANCE A NALYSIS
and maintains the scheduling of the tasks during the execution            In this section, we discuss the platform for our implemen-
of the program. This block also controls the interface between         tation and present some results for universal Reed Solomon
the hardware and microprocessor by maintaining control sig-            decoder.
nals during execution of the program.
                                                                       A. Platform Description
C. Dynamic Partitioning Schemes                                          We use as the underlying platform wireless motes [20],
   Two Dynamic Partitioning schemes can be used in ParES               which has an FPGA submodule, a wireless transceiver sub-
Block. Scheme A is based on computational model and                    module, a sensor submodule and a coin cell battery submodule.
provides a general partitioning scheme for any Hardware-               The hardware part of the system is mapped on the FPGA
Software Partitioning System. It relies on an execution flow            submodule which uses a Xilinx Spartan IIE device. The micro-
graph and computes the partitioning cost. The complexity of            controller is the Atmel Atmega 128L 8-bit RISC architecture
this scheme increases exponentially with the number of tasks           with 128 kb in-system programmable flash memory. The
in the system. Scheme B relies on a look-up table which                software part of our system is mapped on this submodule.
contains the cost value for any specified partitioning scheme.          The transceiver submodule consists of a Nordic nRF2401 2.4
This cost value is calculated in Scheme A by traversing                GHz ISM band RF transceiver.
through the execution flow graph.
   Scheme A: The system specifications are provided to the              B. Implementation Results
partitioning module in the form of an execution flow graph.                All the experiments were performed on the wireless motes
This is a directed flow graph representing the trace and                developed by Tyndall National Institute [20] and the software
execution order of various blocks in the uRS architecture. The         timing analysis was done on 2.6 GHz Pentium 4 processor.
nodes of this graph represent the tasks to be performed and the        Table III presents the results for a GF(28 ) 4-error correcting
edges represent the value of the performance metrics for that          universal decoder. The running system in best case takes
task. The task is then, to find the minimum distance between            approximately 136000 clock cycles. Measured power for the
the source and sink node while satisfying the total hardware           universal decoder for GF(216 ) amounted to 957 mW and that
area and memory requirements.                                          for GF(24 ) amounted to 213 mW.
TABLE III
                                          R ESULTS FOR U NIVERSAL R EED S OLOMON I MPLEMENTATION

                                                                   Hardware                         Software
                               RS Decoder Blocks         Slices     Gate       Speed      Flash     SRAM      Speed
                                                                  Equivalent   (MHz)     (Bytes)    (Bytes) (#Cycles)
                            Syndrome Computation           23        440        359.7     1060        76      8000
                             Galois Field Processor       350       5979        74.2      1368        21       223
                        F-algorithm & Error Evaluation    352       6128        43.5      2790        276    125000



C. System Overhead                                                                                    R EFERENCES
   While the savings obtained by adapting to the channel                 [1] C. Wang, K. Sohraby, B. Li, M. Daneshmand and Y. Hu: A Survey of
conditions are significant, we must ensure that the cost of                   Transport Protocols for Wireless Sensor Networks, Network, IEEE, 2006,
                                                                             20(3): pp. 34-40
run-time adaptation does not overweigh the benefits of recon-             [2] R. Blahut: Theory and Practice of Error-Control Codes, Addison-Wesley,
figuration. To measure the cost of run-time adaptation and                    Readings, MA, 1983
reconfiguration costs, we first present the costs of selecting             [3] R. Agarwal, E. M. Popovici, C. O’Keeffe, B. O’Flynn and S. J. Bellis:
                                                                             Low Power Computing for Secure and Reliable Sensor Networks, Proc.,
the correct parameters in Table IV.                                          IEEE Intl. Conf. on Microelectronics, 2006, pp. 630–633
                                                                         [4] S. Kim, R. Fonseca and D. Culler: Reliable Transfer on Wireless Sensor
                           TABLE IV                                          Networks, Proc., IEEE SECON, 2004, pp. 449–459
          A DAPTATION AND R ECONFIGURATION OVERHEAD                      [5] P. J. M. Havinga: Energy Efficiency of Error Correcting Mechanisms for
                                                                             Wireless Communications, Proc., IEEE Wireless Communications and
                                Time(# cycles)   Power(mW)                   Networking Conf., 1999, pp. 616–620
            Adaptation               687            44.0                 [6] J. Jeong and C. T. Ee: Forward Error Correction in Sensor Networks,
        Dynamic Partitioning         223            60.5                     Technical Reports, University of California Berkeley, 2003
                                                                         [7] M. Busse, T. Haenselmann, T. King and W. Effelsberg: The Impact
          Reconfiguration            1219            99.2
                                                                             of Forward Error Correction on Wireless Sensor Network Performance,
                                                                             Proc. of ACM Workshop on Real-World Wireless Sensor Networks, 2006
  If the system can correct all errors while operating on                [8] R. Blahut: A Universal Reed-Solomon Decoder, IBM Journal of Research
GF(24 ), adaptation will amount to a power savings given                     and Development, 1984, 28(2): pp. 150–158
                                                                         [9] Y. R. Shrayan, T. Le-Ngoc and V. K. Bhargava: A versatile time-
by Power Savings = Running System Cost - Ideal System                        domain Reed-Solomon decoder, IEEE Journal on Selected Areas in
Cost - Overhead Costs, i.e., (957 − 213 − 44.0 − 60.5 −                      Communications, 1990, Vol. 8, No. 8, pp. 1535–1542
99.2) = 540.3 mW which is almost 56% of running system                   [10] Z. Yan and D. V. Sarwate: Universal Reed-Solomon Decoders Based on
                                                                             Berlekamp-Massey Algorithm, Proc., IEEE GLSVLSI, 2004, pp. 51–56
cost (957mW ). In most of the experiments conducted, the                 [11] C. O’Keeffe, R. Agarwal, E. M. popovici and B. O’flynn, Low Power
overhead due to system adaptation and system reconfiguration                  Hardware and Software Implementation of IDEA NXT Algorithm, Proc.,
amounted to less than 4% of the running system costs. As                     Irish Signals and Systems Conf., 2005 pp. 419-424
                                                                         [12] Y. Xu and T. Zhang: A VLSI Design for Universal Reed-Solomon
shown, the costs of run-time adaptation, both in terms of power              Erasure Decoder, Proc., IEEE Intl. Conf. on Signal Processing, 2002,
consumed and time required, is insignificant compared to the                  pp. 398–401
possible energy savings of adapting to channel conditions.               [13] C. Paar and O. Hooijen: Implementation of a Reprogrammable Reed-
                                                                             Solomon Decoder over GF(216 ) on a Digital Signal Processor with
       VIII. C ONCLUSION AND F UTURE D IRECTIONS                             External Arithmetic Unit, Fourth Intl. European Agency (ESA) Workshop
                                                                             on DSP Techniques Applied to Space Communications, 1994
   In this paper, we have presented an adaptable and Universal           [14] E. M. Popovici and P. Fitzpatrick: Algorithm and architecture for a
FEC Scheme based on Reed-Solomon Codec for reliability                       Galois field multiplicative arithmetic processor, IEEE Trans. Information
                                                                             Theory, 2003, Vol. 49, No. 12, pp. 3303–3307
in WSN. The proposed work is of particular interest to                   [15] G. Fettewis and M. Hassner: A Combined Encoder and Syndrome
WSN applications which require high packet-reliability and                   Generator, Proc., IEEE Intl. Symp. on Circuits and Systems ISCAS, 1984,
in which transmitting nodes consist of diversified features in                pp. 1871–1874
                                                                         [16] H. Chang and C. B. Shung, New Serial Architecture for the Berlekamp-
terms of sensory data and/or coding schemes. Exploiting the                  Massey Algorithm, IEEE Trans. Communications, Vol. 47, No. 4. April
advantages offered by embedded WSN systems, an efficient                      1999.
implementation of the system over hardware and software with             [17] P. Fitzpatrick: On Key Equation, IEEE Trans. Information Theory, 1995,
                                                                             Vol. 41, No. 5, pp. 1290–1302
respect to flexibility/efficiency trade-off has been ensured with          [18] M. L. Lopez, C. A. Iglesias and J. C. Lopez: A Knowledge-based System
a proper system design methodology.                                          for Hardware-Software Partitioning, Proc., Design, Automation and Test
   A drawback of such adaptive universal FEC is non-zero                     in Europe, 1998, pp. 914–915
overheads in no error and low error situations compared to               [19] W. Fornaciari, P. Gubian, D. Sciuto and C. Silvano: Power Estimation
                                                                             of Embedded Systems: A Hardware/Software Codesign Approach, IEEE
ARQ protocol. The overhead also comes from variation in                      Trans. Very Large Scale Integration Systems, 1998, Vol. 6, No. 2, pp.
data types, where same processing is done for block codes                    219–301
with symbols framed up of different data sizes. Our research             [20] J. Barton, B. O’Flynn, S. J. Bellis, A. Lynch, M. Morris and
                                                                             S. O’Mathuna: A Miniaturized Modular Platform for Wireless Sensor
work is presently focused on designing efficient protocols for                Networks, Proc., European Conf. on Circuit Theory and Design, 2005,
WSN, which take the specific features (low data size and data                 pp. 35–38
rate, constrained resources) and diverse applications of WSN
into account.

Weitere ähnliche Inhalte

Was ist angesagt?

Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanambitlick
 
14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmi14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmiIAESIJEECS
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relayjuliusbangaw
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyDeepak John
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessambitlick
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...IJECEIAES
 

Was ist angesagt? (20)

R,aouami wccs
R,aouami wccsR,aouami wccs
R,aouami wccs
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lan
 
Bz25454457
Bz25454457Bz25454457
Bz25454457
 
14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmi14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmi
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Ew31992997
Ew31992997Ew31992997
Ew31992997
 
456 460
456 460456 460
456 460
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Mac
MacMac
Mac
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
Networks
NetworksNetworks
Networks
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
DVBS2-MSc-Eng
DVBS2-MSc-EngDVBS2-MSc-Eng
DVBS2-MSc-Eng
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
An Accurate Performance Analysis of Hybrid Efficient and Reliable MAC Protoco...
 

Ähnlich wie Adaptive Wireless Sensor Networks: An Approach to Optimize Reliability

Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
 
White paper coord_la_and_ec
White paper coord_la_and_ecWhite paper coord_la_and_ec
White paper coord_la_and_ecEiko Seidel
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET Journal
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Journals
 
Iaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd Iaetsd
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMACombination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMAEditor IJMTER
 
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...IJMER
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...IJMER
 

Ähnlich wie Adaptive Wireless Sensor Networks: An Approach to Optimize Reliability (20)

Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
 
White paper coord_la_and_ec
White paper coord_la_and_ecWhite paper coord_la_and_ec
White paper coord_la_and_ec
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
MMedia-Lau
MMedia-LauMMedia-Lau
MMedia-Lau
 
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
IRJET - Improving Energy Efficiency for EMRP Routing Protocol for Virtualizat...
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 
Iaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety message
 
4 5 marks importnt question dcn
4 5 marks importnt question dcn4 5 marks importnt question dcn
4 5 marks importnt question dcn
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMACombination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
 
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...Distributed Utility-Based Energy Efficient Cooperative Medium  Access Control...
Distributed Utility-Based Energy Efficient Cooperative Medium Access Control...
 
40120140504014 2
40120140504014 240120140504014 2
40120140504014 2
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...    | IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 4 | Iss. 4 | April 2014 ...
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Adaptive Wireless Sensor Networks: An Approach to Optimize Reliability

  • 1. Adaptive Wireless Sensor Networks: A System Design Approach to Adaptive Reliability Rachit Agarwal∗† , Emanuel M. Popovici∗ and Brendan O’Flynn† ∗ Department of Microelectronic Engineering, University College Cork, Cork, Ireland † MicroelectronicsApplication Integration Group, Tyndall National Institute, Cork, Ireland Email: rachit.agarwal@ue.ucc.ie, e.popovici@ucc.ie, brendan.oflynn@tyndall.ie Abstract— Reliable Data Transport is an important facet of Finally, from a software engineering standpoint, diverse dependability and quality of service in Wireless Sensor Networks routing layers add more challenges. Since motes are resource (WSN). In such networks, erroneous packets can be recovered constrained, applications tend to make heavy use of customi- by two basic methods, Automatic Repeat Request (ARQ) and For- ward Error Correction (FEC). Retransmission being an expensive sation and cross-layer optimisations. operation in terms of energy, FECs are generally looked for While the fourth type of problems can be eradicated by hav- correcting erroneous packets. Diversified features of WSN nodes ing a software interface between transceiver and information and applications require flexible loss recovery in order to further processing unit (hardware/software)1 , an application driven optimize energy efficiency. This paper proposes a dynamically design and implementation methodology provides a solution adaptable FEC scheme based on Universal Reed Solomon de- coder for reliability in sensor networks having diversified sensing for third type of problems. It is the first and second type of and transmitting nodes. A system design approach is discussed problems which are majorly concentrated on in this paper. to explore the design space with efficiency/flexibility trade-off To extend our discussion, let us broadly divide WSN and a Dynamic Partitioning Module has been presented for systems in three categories based on system and application optimum performance of the system. The developed system infers constraints: [Type I]: Resource Constrained, [Type II]: Energy the best error correcting scheme and partitioning scheme for optimal performance based on the the channel conditions and Constrained and [Type III]: Throughput Constrained Systems system/network constraints. The results of implementation of the ARQ: The advantages of ARQ are relative simplicity, proposed system on wireless motes show that up to 56% of the optimal throughput and no overhead in a non-error situation. power savings can be achieved with less than 4% overhead of The main disadvantages of ARQ are the retransmitting costs the running system costs. in terms of huge delays and energy when an error does occur. In wireless networks, transmitting a packet is one of the most I. I NTRODUCTION costly operations to perform by a node. Therefore, sending Wireless Sensor Networks (WSN) have a wide range of packets or retransmitting has to be done as few times as potential applications, including security and surveillance, possible. control, actuation and maintenance of complex systems, and FEC: The advantage of FEC is that there are no time delays fine-grain monitoring of indoor and outdoor environments. in the message flows (or a bounded small delay, considering Many of these applications (medical, surveillance, monitoring) the encoding and decoding operations), because there are no require all the data to be transmitted with high reliability. retransmissions. A disadvantage is that packets can get lost Challenges to achieving reliability on WSN can be divided when the error correcting code is not strong enough to correct into four main categories. The first problems are related to the error. the wireless communication. Channels in WSN are often Adaptive Universal FEC (AuFEC): An open problem has unreliable with high probability of introducing bursts of errors. been discussed in [1], which is reproduced here, Weak correlation between quality and distance, hidden termi- ”... most reliability protocols use a single and identical loss- nal problems, and dynamic change of connectivity complicate recovery algorithm for all nodes and applications, ..... How- the situation further. ever, the nodes and the applications may consist of diversified Problems due to diverse applications and sensory data type features and priorities, which require flexible loss recovery in constitute to the second category of problems. Sink node is re- order to optimise energy efficiency. ...”. quired to interact with several transmitting nodes, each or some This is similar to first and second type of problems discussed of them having different kind of sensory data. In addition, earlier. Such a scenario is shown in Figure 1. A solution to this migration of the system over various applications impose more is to have an adaptive and universal codec (encoder/decoder) stringent conditions on flexible QoS requirements of WSN. which can process the information on various kinds of sensory The third sort of problems come from the constrained data. Also, Adaptive Coding Schemes which involve different resources of WSN motes. A mote is battery powered, so has a codes are utilised to take advantage of the variations in channel limited power source. Also, computational power and memory conditions in wireless communications. space are limited in motes, and thus the algorithm to achieve 1 Microprocessors allow very easy and efficient embedding of error control reliability should not be computationally or storage intensive. in various layers of communication protocols where data is buffered
  • 2. III. C ONTRIBUTION OF THE PAPER This paper proposes an Adaptive Universal FEC (AuFEC) scheme based on RS codec for reliability in WSN. Most of the RS codec implementations use Berlekamp-Massey (BM) algorithm [16] for locating the errors in the received data [10] [12]. We show that Fitzpatrick (F) algorithm, along with an universal Galois Field (GF) Arithmetic Processor proposed Fig. 1. Diversified WSN features in N-to-1 Networking recently, is more suitable for WSN specially Type I and Type II systems. We employ a hardware/software codesign methodology for The above discussion is summarised in Table I for three efficient implementation of the codec. The system is dy- discussed error control mechanisms for three type of systems namically partitioned based on the scheme being employed. in varying channel conditions. We present the two schemes and a Module for dynamic TABLE I partitioning in the system. Finally, we present the overheads S CHEME S ELECTION FOR VARIOUS C HANNEL C ONDITIONS & S YSTEMS related with the uRS codec and implementation results on wireless motes. Scheme Zero Errors Low Error/Consistent High Error/Varying I √ II III I II III I II III IV. U NIVERSAL R EED S OLOMON A RCHITECTURE ARQ √ √ √ FEC √ √ √ √ √ Reed Solomon Decoder consists of four main blocks, GF AuFEC Arithmetic Processor, Syndrome Computation, Error Locator Computation and Error Location and Value Computation. All There are quite a few error correcting codes (ECC) that these blocks have to be studied with the notion of adaptability are useful in communication channels. Most prominent are and universality for designing an universal decoder. Universal the BCH codes, linear block codes and Reed-Solomon (RS) Reed-Solomon (uRS) decoders allow flexibility in some or codes [2]. RS codes are the most widely used codes because all of the code parameters: Information Length (k), Codeword of their simplicity and high performance [3] [4]. Length (n), Error Correcting Capability (t), size of the Galois The rest of the paper is organised as follows. In Section Field (m) and Generator Polynomial (g). A single uRS decoder II, we briefly review the work done related to this problem capable of decoding many different codes can be a more and discuss the contributions of our paper in Section III. hardware-efficient solution than separate decoders for each RS Section IV covers the Universal RS architectures suitable for code although it may be less hardware-efficient than a RS WSN. We present a channel adaptation algorithm and related decoder that is optimised with respect to any individual code constraints in Section V and a System Design Perspective for or when the coding scheme is fixed. Following subsections optimum performance in Section VI. Performance Analysis discuss the architectures employed for design of uRS Codec. for the system is performed in Section VII and we conclude the paper with some final remarks in Section VIII. A. Universal GF Arithmetic Processor II. R ELATED W ORK Research works on universal GF Arithmetic have mostly Energy-efficiency of FECs over various retransmission concentrated on GF multipliers neglecting inversion and divi- schemes for wireless communications has been studied in [5]. sion. Most of the architectures presented to date use look-up Following the idea, [6] [4] compare a few FEC schemes in tables for GF inversion. Due to memory constraints in WSN, WSN showing that fixed & small ECC are not effective in it is not possible to store the inversion results for all the Galois reducing packet losses when the errors are bursty. In a recent Fields (due to universality) which define the RS code. Some work [7], it has been shown that FEC schemes that are able to implementations also use External Memory/Arithmetic Unit correct short errors per codeword are not very useful and it is for the same purpose [13]. However, this is also not suitable necessary to implement efficient RS codes in WSN depending for WSN due to higher access time and even higher power on the applications. In [1], an open problem has been posed consumption due to data access and transfer. regarding achieving reliability in presence of different kinds of A GF Arithmetic processor was proposed in [14]. This sensory systems and varying channel conditions. In the field processor can perform all the GF computations using the same of FECs, Blahut [8] proposed the mathematical concept of architecture. This architecture suits best for Type I and Type universal decoders. Building on these algorithms, Shayan et II systems for a simple reason that all GF computations can al. proposed [9] universal decoders that use a fixed primitive be performed using a single block. A GF Multiplier will have polynomial of a fixed degree m, but can decode RS codes a better performance than multiplication using the processor. of different rates. An universal decoder based on Berlekamp Inversion and multiplication take the same number of cycles Massey Algorithm is proposed in [10]. Trade-offs related using the processor and hence, processor will have comparable to GF arithmetic on resource-sonstrained systems have been performance to any GF inverter because of high complexity studied in great detail in [11]. of GF inversion compared to multiplication.
  • 3. B. Syndrome Computation V. C HANNEL A DAPTATION Syndrome computation depends on degree of Galois Field, generator polynomial and primitive polynomial. Calculation In many sensor network applications, the requirements are of generator polynomial requires intensive multiplication and not known precisely enough at deployment time to make squaring of field elements which is not suitable for our trade-offs required for maximum network utility. Even during resource constrained systems. A low complexity architecture operation, requirements will change in response to varying for syndrome computation was proposed in [15] which erad- conditions. The challenge, then, lies in designing sensor icates the dependency of syndrome computation on generator network applications that can dynamically adapt to changing polynomial. Our RS codec uses this architecture for comput- requirements by selecting different points in the design space ing the syndromes. The primitive polynomial coefficients are for trade-off resource consumption. In this section, we present hardwired to the circuit. a platform independent adaptation algorithm for Adaptive Syndrome Computation block is the smallest in RS decoder RS Codecs, which which can be easily modelled for any (Figure 3, Hardware Size) and is the only block which does application communication scenarios. not depend on error rates. However, most of the power con- sumption comes from Syndrome Computation block (Figure 3, ————————————- Power Dissipation) because of large number of multiplications V ariables : i, j, noe, n; and high switching activity for every symbol it receives. Initialize : i = j = n = 0; C. Error Locator (1) : mm := Mn ; There are several algorithms developed for solving the (2) : tt := TMn , min; key equation. The most widely used algorithm for solving (3) : noe := [some integer]; the key equation is BM algorithm [16]. We compared the ∗ ∗number of errors f rom key solving ∗ results of BM Algorithm with another algorithm developed (4) : if (noe < tt) by Fitzpatrick [17] known as F-algorithm. (5) : ACK & exit; (6) : elseif (j = 0) (7) : tt := tt + 1; (8) : if (tt = TM , max) (9) : j := 1; (10) : N ACK(tt, mm); (11) : endif ; (12) : elseif (i = 0) (13) : mm := Mn+1 ; (14) : tt := TMn+1 , min; (15) : n := n + 1; (16) : t := 0; Fig. 2. Software Timing Comparison of BM and F Algorithm (17) : if (Mn+1 = MM ax ) (18) : i = 1; Algorithm F for solving the key equation has the same com- (19) : N ACK(tt, mm); putational complexity as the BM algorithm. Both algorithms (20) : endif ; construct a sequence of pairs of polynomials with coefficients (21) : else in GF(2m ). F is controlled by two tests for zero, while BM (22) : N ACK(correction not possible); requires two tests for zero and an integer comparison test. (23) : exit; When µi = 0, one polynomial in F is multiplied by µi / µi . (24) : endif ; In this case, F-algorithm has half as many multiplications as in (25) : end; BM where one polynomial is multiplied by the discrepancy µ ————————————- and the other by 1/µ. This results in huge software instruction saving and hence, time and software power which is shown The algorithm has two variables, mm and tt, which are in Figure 2. In terms of hardware, both the algorithms have degree of GF and error correcting capabilities of the system, similar sizes and power consumption, which are presented in respectively. The variables are assigned the values from a Figure 3. table provided by the user. There are two flags i and j used Another reason for using F-algorithm in the universal de- in the algorithm which indicate the maximum degree of GF coder for WSN is due to its construction which is very similar and maximum error correcting capability the system can to uGF Arithmetic Processor discussed earlier. The coefficients operate on for corresponding degree of GF. Based on the of error locator polynomial are multiplied by µi / µi . This value of these flags, values are chosen from the table. In case makes the GF-processor and F-Algorithm more suitable for when the system is not able to correct the errors (noe > tt), resource-constrained WSN running on embedded processors. a N ACK is sent to the transmitter with changes in mm
  • 4. Fig. 3. Hardware Comparison of BM and F Algorithm (a) Power Dissipation for zero error and 8 errors case and (b) Hardware size and tt decided by the algorithm. Once both the flags have hardware-software co-design methodology with dynamic task- a value 1 indicating maximum error correction capability allocation (partitioning) for real time systems. To guide the of the system, a N ACK with correction not possible is partitioning process, design metrics are defined to compare sent to the transmitter. The values in the table must obey the alternative partitioning and to evaluate their conformance with following equation for avoiding redundant operations: respect to the system constraints. This section covers in detail a dynamic partitioning module for optimum performance of Mn ∗ TMn ,max < Mn+1 ∗ TMn+1 ,min (1) uRS Codec under some defined Performance Metrics. The It is also important to ensure that the resources are not being flow of our Dynamic Partitioning Module follows the one in wasted in processing while the errors can be corrected using [18], with major changes suitable for WSN. The overall system a smaller code. The following equation put another restriction architecture for our motes is presented in Figure 4. on values in the table: Mn ∗ (TMn ,max + 1) ≥ Mn+1 ∗ TMn+1 ,min (2) This is based on the fact that TMn ,max number of errors corrected in GF(2Mn ) are less than TMn+1 ,min error correction in GF(2Mn+1 ). Table II shows an example: TABLE II TABLE FOR VARIABLE A SSIGNMENT IN A DAPTATION A LGORITHM n Mn [TMn ,min , ...., TMn ,max ] Fig. 4. Wireless Mote System Architecture 0 4 [0, 1, ..., 4, 5] 1 8 [3, 4, 5] A. Performance Metrics 2 16 [3, 4, 5] 3 32 [3, 4] Partitioning plays an important role in final system perfor- mance. Performance Metrics are defined to guide the parti- tioning process based on the application of the system. The VI. S YSTEM L EVEL D ESIGN goal is to define a specific metrics to be applied at the system- level to measure and to compare the performance of several Most wireless sensor networks are composed of nodes design alternatives. These performance metrics are defined implemented with embedded processors that execute software in terms of Hardware Execution time, Hardware Resource based instructions. These nodes are capable of functional requirements, Software Execution time, Memory Requirements, adaptation simply by loading and executing various software Power Specification, etc. and can be any possible combination programs. However, this virtually unlimited flexibility comes of these specifications. The idea of performance metrics for at a price, as software algorithms executed on processors power aware systems is discussed in [19]. typically consume more energy and have lower performance than Application Specific Integrated Circuit (ASIC) or FPGA B. Dynamic Partitioning Module based implementations. However, fixed-logic implementation Our dynamic partitioning was employed using two schemes. do not have the flexibility to reap the benefits provided by dy- We discuss the various blocks in the dynamic partitioning namic adaptability. Because of this efficiency/flexibility trade- module for better understanding of the two schemes before off inherent in node design, a wide range of implementation discussing the schemes. The block diagram for dynamic parti- options are worth consideration. Flexibility being expensive, tioning module is shown in Figure 5. The module is composed finding the implementation that satisfies the flexibility needs of three main blocks, CoRe Block, ParES Block and AAS of an application will ensure highest efficiency. This requires a Block.
  • 5. Fig. 5. Dynamic Partitioning Module and ParES Block for (a)Scheme A (b)Scheme B CoRe Block: This is the Constraints and Recommendation Scheme B: This scheme is a simpler version of Scheme Block. It receives the parameters from the Set Parameter Block A and is more suitable for resource constraint systems. The and recommends the ParES block an initial configuration for scheme incorporates a look-up table with related system costs dynamic partitioning. This recommendation may be based for all the possible task assignments. The system, when on the initial constraints provided by the user or system provided with the constraints, simply uses the look-up table to constraints. These constraints can also include classification of find the solution for the given cost functions. Implementation tasks which are more suitable to be implemented on Hardware. of Scheme B gives a much faster dynamic partitioning solution ParES Block: This is the Partitioning, Evaluation and but is platform dependent as the partitioning results of Scheme Strategy Block. It receives the initial recommendation from the A are precomputed and stored as look-up tables. CoRe block and calculates the cost function for this partition- Scheme Selection: Scheme B is basically a simplified and ing scheme in Evaluation Subblock. Now the problem amounts precomputed version of Scheme A. While Scheme A is prefer- to a Decision Problem which has a lower time complexity than able if the implementation is expected to migrate over various Optimization Problem. If initial recommendation doesn’t have systems, Scheme B is more suitable for further reducing the a possible solution, a new strategy is chosen in the Strategy processing. With the increase in design space options, size of subblock and evaluation is done for the cost value. Finally, the Scheme A increases exponentially and so does the processing. partitioning scheme with the lowest cost function is declared For designs with large number of implementation options and and notified to the AAS Block. fixed platform, Scheme B is more preferable. AAS Block: This is the Allocation, Assignment and Schedul- ing Block. It associates the tasks with Hardware and Software VII. P ERFORMANCE A NALYSIS and maintains the scheduling of the tasks during the execution In this section, we discuss the platform for our implemen- of the program. This block also controls the interface between tation and present some results for universal Reed Solomon the hardware and microprocessor by maintaining control sig- decoder. nals during execution of the program. A. Platform Description C. Dynamic Partitioning Schemes We use as the underlying platform wireless motes [20], Two Dynamic Partitioning schemes can be used in ParES which has an FPGA submodule, a wireless transceiver sub- Block. Scheme A is based on computational model and module, a sensor submodule and a coin cell battery submodule. provides a general partitioning scheme for any Hardware- The hardware part of the system is mapped on the FPGA Software Partitioning System. It relies on an execution flow submodule which uses a Xilinx Spartan IIE device. The micro- graph and computes the partitioning cost. The complexity of controller is the Atmel Atmega 128L 8-bit RISC architecture this scheme increases exponentially with the number of tasks with 128 kb in-system programmable flash memory. The in the system. Scheme B relies on a look-up table which software part of our system is mapped on this submodule. contains the cost value for any specified partitioning scheme. The transceiver submodule consists of a Nordic nRF2401 2.4 This cost value is calculated in Scheme A by traversing GHz ISM band RF transceiver. through the execution flow graph. Scheme A: The system specifications are provided to the B. Implementation Results partitioning module in the form of an execution flow graph. All the experiments were performed on the wireless motes This is a directed flow graph representing the trace and developed by Tyndall National Institute [20] and the software execution order of various blocks in the uRS architecture. The timing analysis was done on 2.6 GHz Pentium 4 processor. nodes of this graph represent the tasks to be performed and the Table III presents the results for a GF(28 ) 4-error correcting edges represent the value of the performance metrics for that universal decoder. The running system in best case takes task. The task is then, to find the minimum distance between approximately 136000 clock cycles. Measured power for the the source and sink node while satisfying the total hardware universal decoder for GF(216 ) amounted to 957 mW and that area and memory requirements. for GF(24 ) amounted to 213 mW.
  • 6. TABLE III R ESULTS FOR U NIVERSAL R EED S OLOMON I MPLEMENTATION Hardware Software RS Decoder Blocks Slices Gate Speed Flash SRAM Speed Equivalent (MHz) (Bytes) (Bytes) (#Cycles) Syndrome Computation 23 440 359.7 1060 76 8000 Galois Field Processor 350 5979 74.2 1368 21 223 F-algorithm & Error Evaluation 352 6128 43.5 2790 276 125000 C. System Overhead R EFERENCES While the savings obtained by adapting to the channel [1] C. Wang, K. Sohraby, B. Li, M. Daneshmand and Y. Hu: A Survey of conditions are significant, we must ensure that the cost of Transport Protocols for Wireless Sensor Networks, Network, IEEE, 2006, 20(3): pp. 34-40 run-time adaptation does not overweigh the benefits of recon- [2] R. Blahut: Theory and Practice of Error-Control Codes, Addison-Wesley, figuration. To measure the cost of run-time adaptation and Readings, MA, 1983 reconfiguration costs, we first present the costs of selecting [3] R. Agarwal, E. M. Popovici, C. O’Keeffe, B. O’Flynn and S. J. Bellis: Low Power Computing for Secure and Reliable Sensor Networks, Proc., the correct parameters in Table IV. IEEE Intl. Conf. on Microelectronics, 2006, pp. 630–633 [4] S. Kim, R. Fonseca and D. Culler: Reliable Transfer on Wireless Sensor TABLE IV Networks, Proc., IEEE SECON, 2004, pp. 449–459 A DAPTATION AND R ECONFIGURATION OVERHEAD [5] P. J. M. Havinga: Energy Efficiency of Error Correcting Mechanisms for Wireless Communications, Proc., IEEE Wireless Communications and Time(# cycles) Power(mW) Networking Conf., 1999, pp. 616–620 Adaptation 687 44.0 [6] J. Jeong and C. T. Ee: Forward Error Correction in Sensor Networks, Dynamic Partitioning 223 60.5 Technical Reports, University of California Berkeley, 2003 [7] M. Busse, T. Haenselmann, T. King and W. Effelsberg: The Impact Reconfiguration 1219 99.2 of Forward Error Correction on Wireless Sensor Network Performance, Proc. of ACM Workshop on Real-World Wireless Sensor Networks, 2006 If the system can correct all errors while operating on [8] R. Blahut: A Universal Reed-Solomon Decoder, IBM Journal of Research GF(24 ), adaptation will amount to a power savings given and Development, 1984, 28(2): pp. 150–158 [9] Y. R. Shrayan, T. Le-Ngoc and V. K. Bhargava: A versatile time- by Power Savings = Running System Cost - Ideal System domain Reed-Solomon decoder, IEEE Journal on Selected Areas in Cost - Overhead Costs, i.e., (957 − 213 − 44.0 − 60.5 − Communications, 1990, Vol. 8, No. 8, pp. 1535–1542 99.2) = 540.3 mW which is almost 56% of running system [10] Z. Yan and D. V. Sarwate: Universal Reed-Solomon Decoders Based on Berlekamp-Massey Algorithm, Proc., IEEE GLSVLSI, 2004, pp. 51–56 cost (957mW ). In most of the experiments conducted, the [11] C. O’Keeffe, R. Agarwal, E. M. popovici and B. O’flynn, Low Power overhead due to system adaptation and system reconfiguration Hardware and Software Implementation of IDEA NXT Algorithm, Proc., amounted to less than 4% of the running system costs. As Irish Signals and Systems Conf., 2005 pp. 419-424 [12] Y. Xu and T. Zhang: A VLSI Design for Universal Reed-Solomon shown, the costs of run-time adaptation, both in terms of power Erasure Decoder, Proc., IEEE Intl. Conf. on Signal Processing, 2002, consumed and time required, is insignificant compared to the pp. 398–401 possible energy savings of adapting to channel conditions. [13] C. Paar and O. Hooijen: Implementation of a Reprogrammable Reed- Solomon Decoder over GF(216 ) on a Digital Signal Processor with VIII. C ONCLUSION AND F UTURE D IRECTIONS External Arithmetic Unit, Fourth Intl. European Agency (ESA) Workshop on DSP Techniques Applied to Space Communications, 1994 In this paper, we have presented an adaptable and Universal [14] E. M. Popovici and P. Fitzpatrick: Algorithm and architecture for a FEC Scheme based on Reed-Solomon Codec for reliability Galois field multiplicative arithmetic processor, IEEE Trans. Information Theory, 2003, Vol. 49, No. 12, pp. 3303–3307 in WSN. The proposed work is of particular interest to [15] G. Fettewis and M. Hassner: A Combined Encoder and Syndrome WSN applications which require high packet-reliability and Generator, Proc., IEEE Intl. Symp. on Circuits and Systems ISCAS, 1984, in which transmitting nodes consist of diversified features in pp. 1871–1874 [16] H. Chang and C. B. Shung, New Serial Architecture for the Berlekamp- terms of sensory data and/or coding schemes. Exploiting the Massey Algorithm, IEEE Trans. Communications, Vol. 47, No. 4. April advantages offered by embedded WSN systems, an efficient 1999. implementation of the system over hardware and software with [17] P. Fitzpatrick: On Key Equation, IEEE Trans. Information Theory, 1995, Vol. 41, No. 5, pp. 1290–1302 respect to flexibility/efficiency trade-off has been ensured with [18] M. L. Lopez, C. A. Iglesias and J. C. Lopez: A Knowledge-based System a proper system design methodology. for Hardware-Software Partitioning, Proc., Design, Automation and Test A drawback of such adaptive universal FEC is non-zero in Europe, 1998, pp. 914–915 overheads in no error and low error situations compared to [19] W. Fornaciari, P. Gubian, D. Sciuto and C. Silvano: Power Estimation of Embedded Systems: A Hardware/Software Codesign Approach, IEEE ARQ protocol. The overhead also comes from variation in Trans. Very Large Scale Integration Systems, 1998, Vol. 6, No. 2, pp. data types, where same processing is done for block codes 219–301 with symbols framed up of different data sizes. Our research [20] J. Barton, B. O’Flynn, S. J. Bellis, A. Lynch, M. Morris and S. O’Mathuna: A Miniaturized Modular Platform for Wireless Sensor work is presently focused on designing efficient protocols for Networks, Proc., European Conf. on Circuit Theory and Design, 2005, WSN, which take the specific features (low data size and data pp. 35–38 rate, constrained resources) and diverse applications of WSN into account.