Balancing memory utilization in network-coding-based-multicast routing in wireless sensor networks

Document Type : Persian Original Article

Authors

1 Young Researchers and Elite Club, Khomein Branch, Islamic Azad University, Khomein, Iran.

2 Faculty of Science, Mahallat Institute of Higher Education, Mahallat, Iran.

Abstract

Recently, a new technique called network coding has been introduced where it has numerous advantages on the computer networks. Network coding changes the traditional view of data transfer in store and forward paradigm and allows the nodes to store packets in their memory to combine with other packets, then, send to next nodes. In this paper, an optimization problem is proposed which balance memory utilization in network-coding-based-multicast routing of Wireless Sensor Networks (WSNs). In the large WSNs, solving this optimization problem in a centralized manner is impractical and almost impossible, therefore, by using sub-gradient and decomposition techniques, a distributed algorithm is presented in which the nodes make a decision based on local information. The performance evaluation of proposed mechanisms are carried by OMNETT++ simulator and the results show that the proposed model averagely decreases the end to end delay and buffer overflow by 17% and 95%, respectively. However, it increases the energy consumption and consequently decreases lifetime by 14%. The decentralized algorithm decreases buffer overflow 69% and has more delay by 11% than the optimization model, however, it can be utilized in large WSNs due to its distributed computations.

Keywords

Main Subjects


[1] J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey,” Computer networks, Vol. 52, no, 12, pp. 2292-2330, 2008.
 [2] C. Fragouli, E. Soljanin, “Network Coding Applications,” Now Publishers, 2008.
[3] T. Ho and D. S. Lun, “Network coding: an introduction,” Cambridge University Press, 2008.
[4] A. Mukherjee, S. A. A. Fakoorian, J. Huang, A. L. Swindlehurst, “Principles of physical layer security” in multiuser wireless networks: A survey. IEEE Communications Surveys & Tutorials, Vo. 16, no, 3, pp. 1550-1573, 2014.
[5] F. Chen, T. Xiang, Y. Yang, S. S. Chow, “Secure cloud storage meets with secure network coding,” IEEE Transactions on Computers, Vol. 65, no. 6, pp. 1936-1948, 2016.
[6] I. H. Hou, “Broadcasting delay-constrained traffic over unreliable wireless links with network coding,” IEEE/ACM Transactions on Networking (TON), Vol. 23, no. 3, pp. 728-740, 2015.
[7] M. Xiao, T. Aulin, "Optimal decoding and performance analysis of a noisy channel network with network coding," IEEE Transactions on Communications, Vol. 57, No. 5, pp. 1402-1412, 2009.
 [8] P. Li, S. Guo, S. Yu, A. V. Vasilakos, “Reliable multicast with pipelined network coding using opportunistic feeding and routing,” IEEE Transactions on Parallel and Distributed Systems, Vol. 25, no. 12, pp. 3264-3273, 2014.
 [9] S. Jaggi, P. A. Chou, K. Jain, "Low complexity algebraic multicast network codes," In IEEE International Symposium on Information Theory, pp. 368-368, 2003.
 [10] S. Kafaie, Y. Chen, O. A. Dobre, M. H. Ahmed, “Joint Inter-flow Network Coding and Opportunistic Routing in Multi-hop Wireless Mesh Networks: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, 2018.
[11] M. Khalily-Dermany, M. Sabaei, and M. Shamsi. "Topology control in network–coding–based–multicast wireless sensor networks," International Journal of Sensor Networks, Vol. 17, No. 2, pp. 93-104, 2015.
 [12] M. Khalily-Dermany, “A convex programming for range assignment to optimize lifetime in network-coding-based-wireless-sensor networks,” International Journal of Wireless Information Networks, pp. 1-6, 2017.
[13] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft, "XORs in the air: practical wireless network coding," IEEE/ACM Transaction on Networking, Vol. 16, No. 3, pp. 497-510, 2008.
[14] S. Y. R. Li, R. W. Yeung, C. Ning, "Linear network coding," IEEE Transactions on Information Theory, Vol. 49, No. 2, pp. 371-381, 2003.
[15] R. Mohammadi, A. Ghaffari, “Optimizing reliability through network coding in wireless multimedia sensor networks,” Indian Journal of Science and Technology, Vol. 8, no. 9, pp. 834-839, 2015.
 [16] K. Fan, L. X. Li, D. Y. Long, "Study of on-demand COPE-aware routing protocol in wireless mesh networks," Tongxin Xuebao/Journal on Communications, Vol. 30, No. 1, pp. 128-134, 2009.
[17] K. Chi, X. Jiang, S. Horiguchi, "A more efficient COPE architecture for network coding in multihop wireless networks," IEICE Transactions on Communications, Vol. E92-B, No. 3, pp. 766-775, 2009.
[18] M. Khalily-Dermany, M. J. Nadjafi-Arani, “Itinerary planning for mobile sinks in network-coding-based wireless sensor networks,” Computer Communications, Vol. 111, pp. 1-13, 2017.
[19] D. S. Lun, "Minimum-cost multicast over coded packet networks," IEEE Transactions on Information Theory, Vol. 52, No. 6, pp. 2608-2623, 2006.
[20] H. Xing, Z. Wang, T. Li, H. Li, R. Qu, “An improved MOEA/D algorithm for multi-objective multicast routing with network coding, “ Applied Soft Computing, Vol. 59, pp. 88-103, 2017.
[21] S. Boyd, L. Vandenberghe, “Convex Optimization,” Cambridge University Press, 2004.
[22] D. P. Bertsekas, A. Nedić, A. E. Ozdaglar, “Convex Analysis and Optimization,” Athena Scientific, 2003.
[23] D. P. Bertsekas, “Constrained optimization and Lagrange multiplier methods,” Athena Scientific, 1996.
[24] D. P. Bertsekas, “Network optimization: continuous and discrete models,” Athena Scientific Belmont, Massachusetts, 1998.
[25] R. Fourer, D. M. Gay, B. Kernighan, “AMPL,” Vol. 117, Danvers, MA: Boyd & Fraser, 1993.