You are on page 1of 4

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856

A Learning automata- Based Protocol for solving congestion problem in Wireless Sensor Network
Raheleh Hashemzehi
Department of Computer, Sirjan Branch, Islamic Azad University, Sirjan, Iran.

Abstract
The phenomenon of congestion arises in a network when the senders rate of injecting the packets into the network is greater than the retrieving rate of the receiver. Congestion in a network can be determined by monitoring the node buffer occupancy and the wireless link load. Congestion leads to wastage of energy and minimizes the lifetime of sensor nodes. This paper suggests an approach for solving congestion problem. In the proposed model an algorithm based on learning automata each node has an automata that selects an action and adjusts its rate based on the responses receives from environment. One of the important features of this approach is learning from the past that is the reason it improves itself as time progresses.

importance of each sensor node. Nodes are assigned a priority based on the function they perform and its location. Nodes near the sink have a higher priority. The congestion is detected based on the ratio of sending rate to the packet arrival rate. If the sending rate is lower, it implies that congestion has occurred. The congestion information is piggybacked in data packet header along with the priority index. Nodes adjust their sending rate depending on the congestion at the node itself. PCCP tries to reduce packet loss in congestion state while achieving the weighted fairness transmission for singlepath and multipath routing.

Congestion Avoidance and Detection (CODA) CODA [5] is energy efficient congestion control mechanism designed for WSNs. CODA, detects the congestion by observing the buffer size of sensor nodes and the load of the wireless channel. If these two characteristic exceed from a pre-defined threshold, a sensor node informs its neighbour to decrease the transmission rate. Before transmitting a packet, a sensor node divides the channel to fixed periods. If it found the channel busier than pre-defined times, it adjusts a control bit to inform the base station of the congestion. CCF CCF [6]detects congestion based on packet service time at MAC layer and control congestion based on hop-by-hop manner with simple fairness. CCF uses packets service time to deduce the available service rate and detect the congestion in each intermediate node. When the congestion is experienced, it informs the downstream nodes to reduce their data transmission rate and vice versa. SenTCP SenTCP [7] is an open-loop hop-by-hop congestion control protocol with It uses average local packet service time and average local packet inter-arrival time to calculate local congestion degree .In SenTCP, each intermediate sensor node will send feedback to previous hop. This feedback contain local congestion degree and the buffer length and inform neighbor nodes to adjust rate .

Keywords congestion control, Wireless sensor network, learning automata.

1. Introduction
Wireless sensor network (WSN) plays an important role in many application areas like in military surveillance, health care etc. A wireless sensor network (WSN) [1] is a network made of hundreds or thousands of sensor nodes to cooperatively monitor different condition, such as temperature, sound, vibration, pressure and motion at different locations which is the common task of sensor node is to collect the information from the scene of event and send the data to a sink node. Many wireless sensor network [2] applications require that the readings or observations collected by sensors be stored at some central location. Congestion can occur while collecting the data and sending it towards the central location over the wireless sensor network. The phenomenon of congestion arises in a network when the senders rate of injecting the packets into the network is greater than the retrieving rate of the receiver. Congestion in a network can be determined by monitoring the node buffer occupancy and the wireless link load. 2. Review of the related works We review various congestion control approaches in the section below. Priority Based Congestion Control Protocol (PCCP) PCCP[3] [4] is a congestion control mechanism based on node priority index that is introduced to reflect the Volume 2, Issue 4 July August 2013

Page 396

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856
Fusion [8] addresses congestion mitigation problem as well as fairness guarantees among sources. In Fusion hop by hop flow control mechanism is used for congestion detection as well as congestion mitigation. Congestion is detected through queue occupancy and channel sampling technique at each intermediate node. Siphon [9] aims at controlling congestion as well as handling funneling effect. Funneling effect is where events generated under various work load moves quickly towards one or more sink nodes, which increases traffic at sink which leads to packet loss. FACC [10] is a congestion control mechanism, which controls the congestion and achieves fair bandwidth allocation for each flow of data. FACC detects the congestion based on packet drop rate at the sink node. 3. Learning automata In learning automata, a finite number of actions can be performed in environment. When an action is selected, the random environment responses with either a favorable or an unfavorable feedback signal. The environment has shown in figure 1 and can be described by triple E= {a,b,c} Where a = {a1,a2,...,ar } is a set of inputs b ={b1,b2 ,...,br } is a set of outputs and c = {c1, c2 ,..., cr } is penalty probabilities. Environment can be shown by three E = {a , b , c} and set of inputs a ={a1,a2,...,ar} is a set of outputs b={b1,b2 ,...,br } and c = {c1, c2 ,..., cr } set of penalty probabilities. Whenever b set has two members, environment is type P. In such an environment b1 =1 is the penalty and b2 = 0 is considered as reward. In an environment type Q, set has infinite members. And in an environment type S, set has infinite members as well. Ci is the penalty probability of ai . Learning automats are divided into two fixed and varying categories . When a positive feedback is obtained for action i, Equation (1) Fig 1. The relation between learning automata and the envirnoment The terms a , b and r in these equations correspond to the reward parameter , penalty parameter and number of actions, respectively[11]. 4. Proposed model Perhaps the most fundamental step that should be taken in avoiding congestion is limiting the flow of packets at the intermediate nodes to an apt value so that smooth, fair and reliable packet flow takes place in the network .That is noticed in this approach. In our method each node equipped with a learning automata. Every intermediate node is always interacting with environment and based on buffer occupancy performs appropriate action corresponding to increasing or decreasing rate. It is shown by simulation that this method decreases the amount of packet loss and reduces the congestion degree which is a function of percentage of occupied buffer size. There are three important components any congestion control protocol should have: congestion detection, congestion notification and rate adjustment. Furthermore, the proposed mechanism is described for each stage. 4.1 Congestion detection of the proposed method In the proposed method, Congestion degree of d (i), Ratio of the average service time depending on the average packet arrival at a predetermined time interval each sensor node i is obtained as follows. Equation (3) d(i)= tis/tia If the packet arrival time is smaller than the service time, Congestion degree is greater than one, And node congestion is encountered, In other words, the number of incoming packets is more than capable of servicing node. 4.2 congestion notification of the proposed method In the proposed method, an implicit method and the broadcast nature of wireless channels used, Congestion information sent embarked on a packet header and send them along together, So, using the broadcast nature of wireless channels, all neighbors of the sensors, received the packet . And with analysis of the package, be aware of condensation on the sensor. 5. Defining Priorities InWireless Sensor Network each sensor is required to transmit two types of traffic: 1- Source 2- Transit. Source traffic is a traffic that sensor provides and sends them to the sink node. Transit traffic , are those information that come from other sensors and it is required to pass. Both sensors that work together Known as intermediate sensor. Sensors 4 , 5 in Figure 2.

When a negative feedback is obtained for action i. Equation (2)

Volume 2, Issue 4 July August 2013

Page 397

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856
Where GP (pi, o) is Global priorities parent, and GP (i) is child node priorities. And the ratio of these two priorities than the priority of the child node to Global Priorities of the parent, In fact, its share of the bandwidth. This way, we give priority actions. d(pi,0) Degree of congestion is parent. Since the degree of congestion parent is less, the contrary, it has increased. 6. Simulation of the proposed protocol We evaluated the performance of our method using OPNET [12]. Simulation parameters are presented in Table 1 and obtained results are shown below .The results are compared with the protocol pccp. Table 1. Simulation Parameters Number of node Queue length Scheduler Start time End time Rate of Service The initial energy of each node Automata Penalty,Reward rate Packet error rate Simulation time 6.1 Probability of packet loss In packet loss, the increase is delayed and has a direct effect on performance. As shown in Figure 3, the probability of loss due to a more accurate rate regulation is better. probability of packet loss can be calculated by equation (7). equation (7) 7 100 WRR 0 Energy end of the first node 200 200000 0.001 0.01 60s

Figure 2. Network topology 5.1 Source traffic priority( SP (i)) Source traffic priority node i, expressed preference for the local traffic source node i. 5.2 Transit traffic priority (TP (i)) Transit priority traffic in sensor node i, for expression, the amount of traffic passing through node i is used. TP (i) is the sum of the first child nodes of origin. And all the children of node i depends on the source traffic priority. 5.3 Global Priority (GP (i)) Global priorities concerning the total traffic per node, equal to the sum of the priority source traffic and transit traffic . Equation( 4) GP(i)= SP(i)+ TP(i) 5.4 Rate adjustment of the proposed method Learning automata in each node acts as a decision maker, And trying to make the best of a set of activities that may be imposed on each node to the changing environment. In other words, a learning automata-based approach to learning , to identify an action / operation optimization, the set of actions is allowed. It is applied in a random environment, And the environment by producing an output action is applied, will respond. Environment is a triple E = {a, b, c}, The a ={reduced rate, increased rate} Action learning automata, B={Unfavorable,favorable}Set of environmental responses, c={c1,c2,.,c3}total probabilities fine, and ci are likely to receive an unfavorable response from the environment when i attempt to apply the environment, The environment response is binary. So (0,1) P model is chosen environment. In the beginning, the probability of choosing each equal action is 1/2. According to the above procedure to reduce the rate of convergences come about as follows: Equation 5 r) = New rates(r Where GP (pi, o) is Global priorities parent, and GP (i) is child node priorities. And the ratio of these two priorities than the priority of the child node to Global Priorities of the parent, In fact, its share of the bandwidth. This way, we give priority actions. Since the absolute priority of the child, is smaller than total priority of parent, The result of more than a small fraction of r ' is also previous rate. Rate increases as the operation is as follows: Equation 6 r)= New rates(r Volume 2, Issue 4 July August 2013

Figure3.packet loss rate 6.2 Congestion degree Page 398

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 4, July August 2013 ISSN 2278-6856
Congestion causes packet loss and the subsequent higher energy consumption, network lifetime and reducing the delay, Timely and more accurate rate regulation algorithm of congestion control is a more successful Is shown in Figure 4. [4] Wang C, Li B, Sohraby K, Daneshmand M, Hu Y. Upstream congestion control in wireless sensor networks through cross-layer optimization. IEEE Journal On Selected Areas In Communications, 2007; 25(4): 786795. [5] Wan C -Y, Eisenman S B, Campbell A T, CODA: Congestion detection and avoidance in sensor networks. In the Proceedings of the First International Conference on Embedded Networked Sensor Systems (SenSys03), Los Angeles, CA, USA, 2003,pp. 266279 [6] C. T. Ee and R. Bajcsy, Congestion Control and Fairness for Many-to-One Routing in Sensor Networks, in Proceeding ACM Sensys04, 2004. [7] Wang C, Sohraby K, Li B (2005) SenTCP: A hop-byhop congestion control protocol for wireless sensor networks. In: Proc. IEEE INFOCOM, Miami, USA [8] Hull, B., Jamieson, K., Balakrishnan, H.: Mitigating congestion in wireless sensor networks. In: 2nd International Conference on Embedded Networked Sensor Systems. Maryland(2004) [9] Wan, C.Y., Eisenman, S.B., Campbell, A.T., Crowcroft, J.: Siphon: Overload Traffic Management Using Multi-radio Virtual Sinks in Sensor Networks. In: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, San Diego, pp. 116129(2005) [10] Xiaoyan, Y., Xingshe, Z., Zhigang, L., Shining, L.: A Novel Congestion Control Scheme in Wireless Sensor Networks. In: 5th International Conference on Mobile Ad-hoc and Sensor Networks, Fujian, pp. 381387 (2009) .[11] K. S. Narendra and M. A. L. Thathachar, Learning Automata-An Introduction. Prentice Hall, 1989. [12] OPNET Modeler, [online] Available: http://www.opnet.com

Figure4.congestion degree 7. Conclusion We are dealing with a host of challenging issues in wireless sensor networks like: limited energy supply of a sensor, which is a threat for network life time, QOS needs and energy efficient routing. If we equip the sensors with some intelligent automata, our network earns the ability of adapting itself with the environment when it changes. In other words, the WSN uses the power of learning and becomes intelligent as time passes. In this paper, we have proposed a new congestion control approach for sensor networks, Congestion severely affects the performance of a wireless sensor network in two aspects: increased data loss and reduced lifetime. The results show that our protocol performs better in terms of extending network lifetime. Our proposed algorithm does not require the source nodes to be fed back by the intermediate nodes to slow down. In our approach, we save this time, by making the intermediate nodes to take a proactive approach in controlling the current rate of flow of packets, thereby improving the overall performance of the network in the aspects of life time, energy consuming , congestion control and so on. References [1] XiangYangLi, Wireless Ad Hoc and Sensor Networks, Cambridge University Press, New York, 2008. [2] Akyildiz, I.F., Weilian, S., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Network. IEEE Communication Mag. 40(8), 102114 (2002) [3] Wang, C., Sohraby, K., Lawrence, V., Li, B.: Priority Based Congestion Control in Wireless Sensor Networks. In: IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, Taiwan, pp. 22 31 (2006) Volume 2, Issue 4 July August 2013

Page 399

You might also like