SlideShare a Scribd company logo
1 of 10
Download to read offline
SPECIAL SECTION ON INDUSTRIAL SENSOR NETWORKS WITH
ADVANCED DATA MANAGEMENT: DESIGN AND SECURITY
Received April 3, 2015, accepted April 21, 2015, date of publication June 15, 2015, date of current version July 17, 2015.
Digital Object Identifier 10.1109/ACCESS.2015.2443171
An Energy-Efficient and Delay-Aware Wireless
Computing System for Industrial Wireless
Sensor Networks
KATSUYA SUTO1, (Student Member, IEEE), HIROKI NISHIYAMA1, (Senior Member, IEEE),
NEI KATO1, (Fellow, IEEE), AND CHIH-WEI HUANG2
1Graduate School of Information Sciences, Tohoku University, Sendai 980-8577, Japan
2Department of Communication Engineering, National Central University, Taoyuan 320, Taiwan
Corresponding author: K. Suto (suto@it.ecei.tohoku.ac.jp)
This work was supported by the Strategic International Research Cooperative Program through the Japan Science and Technology Agency.
ABSTRACT Industrial wireless sensor networks have attracted much attention as a cornerstone to making
the smart factories real. Utilizing industrial wireless sensor networks as a base for smart factories makes
it possible to optimize the production line without human resources, since it provides industrial Internet of
Things service, where various types of data are collected from sensors and mined to control the machines
based on the analysis result. On the other hand, a fog computing node, which executes such real-time
feedback control, should be capable of real-time data collection, management, and processing. To achieve
these requirements, in this paper, we introduce wireless computing system (WCS) as a fog computing node.
Since there are a lot of servers and each server has 60 GHz antennas to connect to other servers and sensors,
WCS has high collecting and processing capabilities. However, in order to fulfill a demand for real-time
feedback control, WCS needs to satisfy an acceptable delay for data collection. In addition, lower power
consumption is required in order to reduce the cost for the factory operation. Therefore, we propose an
energy-efficient and delay-aware WCS. Since there is a tradeoff relationship between the power consumption
and the delay for data collection, our proposed system controls the sleep schedule and the number of
links to minimize the power consumption while satisfying an acceptable delay constraint. Furthermore, the
effectiveness of our proposed system is evaluated through extensive computer simulations.
INDEX TERMS Industrial wireless sensor network, wireless computing system, low power consumption,
delay-aware data collection.
I. INTRODUCTION
Recent advances in wireless sensor network technologies
including machine-to-machine and device-to-device commu-
nications indicate the realization of smart factories, which
opens up a new dimension for factory management [1]–[4].
A smart factory based on a wireless sensor network provides
industrial Internet of Things (IoT) service [5], [6]. In this
service, a computing system collects various kinds of data
from machines and sensors and mines a large amount of
collected data (i.e., industrial big data) to obtain valuable
information for factory operation. Machines are automati-
cally controlled by using the obtained information to make
an efficient production line (i.e., adequate production speed,
low power consumption, failure prediction, and so forth).
Therefore, the smart factory makes it possible to optimize the
factory operation without human resources [7], [8].
In this paper, we focus on fog-based industrial wireless
sensor networks [9], in which a fog computing node is
physically placed close to the sensors in order to directly
communicate with the gateway nodes. Since the cloud servers
provide the industrial IoT application through Internet in
cloud-based industrial wireless sensor networks [10], the
fog-based network can drastically reduce feedback latency.
Moreover, in order to achieve enough capability for providing
such service, a fog computing node should satisfy the
following requirements: (i) high processing performance in
order to support real-time big data mining, (ii) concurrent data
collection from a lot of sensors, (iii) high service availability,
(iv) low system power consumption for a low cost factory
operation.
In order to satisfy the aforementioned requirements, we
focus on a Wireless Computing System (WCS) [11]–[13],
1026
2169-3536 
 2015 IEEE. Translations and content mining are permitted for academic research only.
Personal use is also permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 1. Our envisioned industrial wireless sensor network using
wireless computing system.
as shown in Fig. 1. While this system is originally used for
rack architecture in data center networks [13], we introduce
this system as a fog computing node in industrial wireless
sensor networks. Since WCS effectively accommodates a
lot of servers, it can achieve high processing capability
even if the space is limited. Additionally, each server has
two 60 GHz antennas, where one of the antennas, referred
to as outside antenna, is used to communicate with the
sensors and the other antenna, referred to as inside antenna,
is used to communicate with the other servers. Since the
60 GHz antenna has high directivity with high data rate
(4 − 15 Gbps) [14], [15] and there exist multiple outside
antennas, WCS can collect data from a lot of sensors
concurrently. Although conventional computing systems
based on wired cables have a drastic decrease in service
availability if switches cease to function, WCS achieves
high service availability since it keeps the network
connectivity even if some servers cease to function.
Moreover, WCS achieves lower system power consumption
in comparison with wired computing systems. For instance,
the collective power consumption of antennas in a WCS
consisting of 100 servers is 6 W [12], [15] while the collective
power consumption of the routers in a wired computing
system based on a two-tier fat tree is 264 W [16], [17].
In this paper, we aim to investigate a system operation
scheme for industrial IoT service. Since IoT service is
sensitive to the delay, we need to satisfy an acceptable delay
for data collection. Additionally, we need to reduce the power
consumption of our envisioned system in order to achieve
an energy-efficient factory. Consequently, both delay for
data collection and system power consumption should be
considered. To tackle this research issue, we first construct a
mathematical model to evaluate the system power consump-
tion and delay for data collection, and thus show a trade-off
relationship between these values. Furthermore, based on the
trade-off relationship, we propose an Energy-Efficient and
Delay-Aware Wireless Computing System (E2DA-WCS).
Our proposed system minimizes the system power consump-
tion while satisfying the acceptable delay of each datum,
by controlling the number of servers in a sleep state and the
number of links (i.e., the degree of servers).
The remainder of this paper is organized as follows.
In section II, we describe the architecture, multiple access
scheme, and sleep mode in our envisioned computing system.
Additionally, in this section, we show a trade-off relationship
between power consumption and delay required for data
collection. Our proposed energy-efficient and delay-aware
system operation scheme is explained in Section III.
We present the performance evaluation in Section IV. Finally,
concluding remarks are provided in Section V.
II. ENVISIONED COMPUTING SYSTEM
In this section, we introduce our envisioned computing
system for industrial wireless sensor networks. First, we
explain the architecture of our envisioned computing
system and its network topology. Then, the time slot
allocation scheme for our envisioned system is presented.
Furthermore, we describe the sleep mode, which is used to
reduce the system power consumption. Finally, we show the
trade-off relationship between the system power consumption
and delay for data collection in our envisioned system.
A. ARCHITECTURE
In this paper, we use a spherical WCS whose form is a
spherical shape as shown in Fig. 2. In our envisioned WCS,
servers are circularly arranged in both the vertical and hori-
zontal direction, which makes it possible to ensure a low path
loss (i.e., high data rate) between any servers even when the
degree of servers increases [13].
Our envisioned spherical WCS consists of multiple
stories, which are shaped like a partial hemisphere to make
the envisioned system sphere-shaped. Additionally, each
story has multiple containers, which have dimensions of
γ meters wide, δ meters deep, and ζ meters high, and a blade
server is put in each container. We assume that a set of all
servers is defined as N = {n1, n2, . . . , n|N|}, where |N| is
the total number of servers, and a set of stories is defined as
V = {v−S, . . . , v−1, v0, v1 . . . , vS}, where S = (|V| − 1)/2
and |V| denotes the total number of stories. Additionally,
the set of servers in story vs, Nvs , is given by
{nvs,1, nvs,2, . . . , nvs,|Nvs |}. The numbers of servers in differ-
ent stories v0 and vS (or v−S), |Nv0 | and |NvS | (or |Nv−S |)
are set to 2(|V| − 1) and 1, respectively. Additionally, since
the number of servers in story vs, |Nvs |, is decided based
on the inner-radius of the smaller surface of story vs, Rvs , and
the width of the container, γ , the value of |Nvs | is expressed as
|Nvs | =



2(|V| − 1), if s = 0,
1, if s = S or −S,
(2πRvs )/γ, otherwise.
(1)
Fig. 3 shows the intra-system network topology of our
envisioned WCS. In this system, each server transmits data to
servers diagonally opposite to it and the number of links from
transmitter nvs,i in story vs to receivers, knvs,i , can be changed
by controlling the radiation angle of the antenna. The set of
VOLUME 3, 2015 1027
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 2. Architecture of our envisioned spherical wireless computing system.
FIGURE 3. Intra-system network topologies of our envisioned system.
(a) Network topology in story v0 from top view. (b) Network topology
from side view.
stories that contain neighbor servers of server nvs,i, V
nvs,i
con ,
is expressed as V
nvs,i
con = {v(−s−Q), . . . , v−s, . . . , v(−s+Q)},
where Q = (|V
nvs,i
con | − 1)/2. Assuming that k
nvs,i
vq is the
number of links from server nvs,i to its neighbor servers in
story vq ∈ V
nvs,i
con , the value of knvs,i is expressed as the sum
of k
nvs,i
vq .
knvs,i =
vq∈V
nvs,i
con
k
nvs,i
vq . (2)
Moreover, in this paper, we assume that, for all servers,
|V
nvs,i
con | and knvs,i are set to the same values, |Vcon| and k ,
respectively. Therefore, intra-system network topologies
from the top and side views become a Cayley graph as
shown in Fig. 3. This network topology facilitates the design
of communication and networking protocols (e.g., multiple
access and routing protocols).
B. SPACE AND TIME DIVISION MULTIPLE
ACCESS SCHEME
Here, we introduce an efficient time slot allocation
procedure for our envisioned system. In order to use time
slots efficiently, we consider both space- and time-division
multiplexing. Our scheme uses time slot cycles in order to
fairly allocate time slots to servers and each time slot cycle is
divided into multiple time slots. Each time slot is allocated to
servers that do not mutually interfere with each other.
Since the network topology of our envisioned system is
constructed in a regular pattern (i.e., diagonally opposite
servers are connected with the same degree), we can simplify
the time slot allocation procedure by dividing it into a story
selection phase and a server selection phase. The story selec-
tion phase selects the stories whose servers do not interfere
with servers in other simultaneously selected stories. On the
other hand, the server selection phase chooses multiple
servers that do not interfere with each other in each story in
order to allocate an independent time slot to servers without
interference.
Procedure 1 demonstrates the time slot allocation
procedure. A centralized server executes this procedure by
using topology information.
First, the centralized server executes the story selection
phase in order to choose non-interference story groups, ¯vi, in
which the inter-story servers do not interfere with each other,
from the set of stories, V. Thus, this phase creates a set of ¯v,
¯V = {¯v1, ¯v2, . . . , ¯v| ¯V|}. As shown in Fig. 3(b), the servers
|Vcon| distant stories apart do not interfere with each other.
Assuming that |Vcon| ≤ |V|, the value of | ¯V| can be given as
| ¯V| = |Vcon|. (3)
1028 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
Procedure 1 Time Slot Allocation Procedure
1: Create a set of non-interference story groups,
¯V ← {¯v1, ¯v2, . . . , ¯v| ¯V|}
2: for i = 1 to | ¯V| do
3: Create a set of non-interference server groups,
¯N¯vi ← {¯n¯vi,1, ¯n¯vi,2, . . . , ¯n¯vi,| ¯N¯vi |},
from servers in all stories vs, vs ∈ ¯vi,
4: Allocate independent time slots to servers in group
¯n¯vi,j, for all j, 1 ≤ j ≤ | ¯N¯vi |
5: i ← i + 1
6: end for
7: Calculate the amount of time slots, |T|, based on (7)
8: return the value of |T|
Following the story selection phase, the centralized server
executes the server selection phase for each group ¯vi in
order to allocate the time slots to servers without mutual
interference. Servers in each story vs ∈ ¯vi are divided into
multiple non-interference server groups, ¯n¯vi,j, in which the
intra-story servers do not interfere with each other. In other
words, since each group ¯n¯vi,j consists of non-interference
server groups in each story vs ∈ ¯vi, ¯nvs,j, ¯n¯vi,j is expressed as
¯n¯vi,j =
vs∈ ¯vi
¯nvs,j. (4)
Therefore, the centralized server creates sets of non-
interference server groups in each story vs ∈ ¯vi, ¯Nvs = {¯nvs,1,
¯nvs,2, . . . , ¯nvs,| ¯Nvs |}. Then, based on the created ¯Nvs , it creates
a set of non-interference server groups in group ¯vi,
¯N¯vi = {¯n¯vi,1, ¯n¯vi,2, . . . , ¯n¯vi,| ¯N¯vi |}. By using the set ¯N¯vi , the
centralized server allocates independent time slots to the
servers. Since the value of | ¯N¯vi | is the maximum value of | ¯Nvs |
for all vs ∈ ¯vi, we have
| ¯N¯vi | = max
vs∈¯vi
| ¯Nvs |. (5)
Furthermore, since the number of intra-story servers that do
not interfere with other intra-story servers in story vs is given
by |Nvs |/k
v−s
vs , where k
v−s
vs is the number of links from
any server in story vs to servers in the diagonally opposite
story v−s, the value of | ¯Nvs | can be expressed as
| ¯Nvs | =
|Nvs |
|Nvs |/k
v−s
vs
. (6)
Finally, the centralized server calculates the amount of time
slots, |T|, which is expressed with the sum of | ¯N¯vi |, as follows.
|T| =
| ¯V|
i=1
| ¯N¯vi |. (7)
Additionally, since each time slot has constant length [s], λ,
the time slot cycle, , is given as
= |T|λ. (8)
Since a channel with bandwidth W is divided into |T| time
slots, the data transmission rate between servers ni and nj,
θni,j , is expressed as
θni,j =
W
|T|
log2 1 +
Pni gni,j
σ2
. (9)
Here, Pni is the transmission power of server ni,
σ2 represents the noise power level and gni,j denotes the
channel gain between servers ni and nj.
C. SLEEP MODE
Since low system power consumption is required, we use
a sleep mode for the servers in our envisioned system.
Therefore, we introduce a summary of sleep mode and
demonstrate mathematical expressions to evaluate the system
power consumption and data collection delay in multi-hop
communication.
The sleep mode aims to reduce system power consumption
by letting some servers enter the sleep state. During the sleep
state, the power consumption of the server is low. Assuming
that the ratio of servers in sleep state is ρ, the system power
consumption [W], Esystem, is expressed as
Esystem = ρEserver
sleep + (1 − ρ)Eserver
active , (10)
where Eserver
sleep and Eserver
active are the power consumption of the
server in sleep state and that in active state, respectively.
However, servers cannot act as router while in sleep state in
this system. In other words, servers in sleep state are removed
from the intra-system network and the original degree distri-
bution of the network, pk, is changed. Here, we assume that
the servers in sleep state are randomly selected regardless of
their degree and location. The degree distribution when some
servers enter sleep state, pk, can be expressed based on (9)
in [18], as follows.
pk =
K
i=k
i
k
(fi)i−k
(1 − fi)k
pactive,i, (11)
where K is the maximum degree of the original degree
distribution pk, fi denotes the probability that a server with
degree i will enter sleep state, and pactive,i is the degree
distribution of servers in active state. Additionally, pactive,i is
given as
pactive,i =
(1 − fi)pi
1 − j fjpj
. (12)
Since all servers have the same degree k in our envi-
sioned system, the degree distribution of the intra-system
network, pk, can be defined as
pk =
1, if k = k ,
0, otherwise.
(13)
Additionally, since the ratio of servers with degree k that
enter sleep state is ρ, fk is given as
fk =
ρ, if k = k ,
0, otherwise.
(14)
VOLUME 3, 2015 1029
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
Therefore, pk can be rewritten as
pk =
k
k
f
k −k
k (1 − f k )k
p k . (15)
Moreover, the average degree when the ratio of servers in
sleep state is ρ, kρ , can be described based on (15).
kρ =
k
k=1
kpk. (16)
Based on (16), we can derive the average hop count
between any servers when the ratio of servers in sleep
state is ρ, hρ . Let |nhl | be the number of l-hop distant
servers from a server. Since the 0-hop distant server is the
source server and the source server has kρ neighbors,
|nh0 | and |nh1 | are 1 and kρ , respectively. Although 1-hop
distant servers also have kρ neighbors, some of their neigh-
bors are the same server. Therefore, the number of 2-hop
distant servers, |nh2 | is given by µ kρ
2, where µ is the ratio
of common servers. We suppose that µ is a constant value
regardless of hop count. Therefore, |nhl | is represented as
|nhl | = µl−1 kρ
l. Additionally, since the total number of
active servers, |Nactive|, is given as the sum of the number
of l-hop distant servers as l goes from 0 to maximum hop
count, Hρ, we have
|Nactive| =
Hρ
l=0
|nhl |
= 1 + kρ + µ kρ
2
+ · · · + µHρ−1
kρ
Hρ
= 1 +
kρ − µHρ kρ
Hρ+1
1 − µ kρ
. (17)
Therefore, the value of Hρ can be formulated as
Hρ =
1
ln(µ kρ )
×
ln |Nactive| +
kρ
µ kρ − 1
− 1
µ kρ − 1
kρ
.
(18)
Hence, the average hop count between any servers when the
ratio of servers in sleep state is ρ, hρ , can be given as
hρ =
1
ρ|N|
Hρ
l=0
l|nhl |. (19)
In the multi-hop communication, since each server waits
to transmit its data until its own time slot, the average wait
time for each hop is given by /2. Ignoring queuing delay,
the delay from a server which has received data from a sensor
to the destination server (referred to as internal delay) when
the ratio of servers in sleep state is ρ, Dint
ρ , can be expressed
as
Dint
ρ = hρ
2
. (20)
D. TRADE-OFF RELATIONSHIP BETWEEN POWER
CONSUMPTION AND DELAY
The rest of this section describes the trade-off relation-
ship between system power consumption and internal delay,
which is derived from the aforementioned mathematical
expressions.
Fig. 4 shows the effects of the number of servers in sleep
state on the system power consumption and average internal
delay. This result is calculated based on (10) and (20) and the
parameters are set as follows: Eserver
sleep = 10.008 W [19], [20],
Eserver
active = 32.3 W [12], [21], |N| = 100, µ = 0.4, λ = 0.02 s.
As shown in Fig. 4(a), the system power consumption can
be reduced in inverse proportion to the number of servers
in sleep state. On the other hand, as shown in Fig. 4(b), the
average internal delay increases with the increase of the num-
ber of servers in sleep state because the average hop count
between servers becomes higher in such case. From these
results, we can show a trade-off relationship between the
system power consumption and internal delay. Consequently,
we need to investigate an optimization scheme that considers
both system power consumption and internal delay to find an
optimal number of servers in sleep state.
Moreover, as shown in Fig. 4(b), the average internal delay
changes depending on the degree of servers (i.e., k = 5 and
k = 7). Since a network with lower degree has a shorter
time slot cycle, the delay is lower when the number of servers
in sleep state is low. However, since the hop-count increases
in an exponential fashion and growth rate is higher in case
of lower degree, the internal delay in the network with lower
degree becomes higher when the number of servers in sleep
state is large. Consequently, we need to jointly control the
number of servers in sleep state and the degree of servers.
III. PROPOSED ENERGY-EFFICIENT AND DELAY-AWARE
WIRELESS COMPUTING SYSTEM
In this section, we describe the proposed operation scheme for
our envisioned computing system. First, we introduce an opti-
mization problem to minimize the system power consumption
while satisfying an acceptable delay constraint. Then, based
on the optimization problem, we propose a system operation
procedure that jointly controls the sleep mode and the degree
of servers in a dynamic scenario.
A. ASSUMED ACCEPTABLE DELAY AND
OPTIMIZATION PROBLEM
In order to execute the real-time feedback control, the com-
puting system collects various kinds of data (e.g., ambient
information, image, video, log, and so forth) from sensors
that are deployed in the whole factory, where we define
G = {g1, g2, . . . , g|G|}, which denotes the set of data types.
Additionally, since the computing system has knowledge
about data dynamics (i.e., data arrival time) [22], [23] and the
acceptable internal delay of each data is previously defined,
it knows the acceptable internal delay of data type gi at time
slot t, Dint
gi
(t). Additionally, a minimum acceptable internal
delay at time t, Dint(t), is given by Dint(t) = mingi∈G Dint
gi
(t).
1030 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 4. Trade-off relationship between the system power consumption
and internal delay. (a) Effect of the number of servers in sleep state on
the system power consumption. (b) Effect of the number of servers in
sleep state on the internal delay.
Our optimization problem aims to minimize the system
power consumption while satisfying an acceptable internal
delay at each time slot. Note that the delay from sensors to
servers (referred to as external delay) is not considered since
large number of existing works (see [24], [25]) have already
proposed a method to satisfy the external delay constraint.
As shown in Fig. 4, the ratio of servers in sleep state affects
the system power consumption and the internal delay, and the
degree of server also affects the internal delay. Therefore, we
can find an optimal ratio of servers in sleep state, ρ∗, and an
optimal degree for the servers in active state, k∗ , at time
slot t by solving the following integer programing.
minimize
ρ, k
Esystem
subject to Dint
ρ < Dint(t). (21)
B. SYSTEM OPERATION PROCEDURE
IN DYNAMIC SCENARIO
Here, we propose a system operation procedure for our
computing system. In our proposed procedure, the ratio of
servers in sleep state and the degree of the servers in active
state at each time slot t, ρ(t) and k(t) , are dynamically con-
trolled in order to minimize the system power consumption
while satisfying an acceptable internal delay. In this regard,
ρ(t) and k(t) are decided based on the acceptable internal
delay at time slot t + Tsu, Dint(t + Tsu), since each server in
sleep state needs time to start-up, Tsu [26].
Procedure 2 System Operation Procedure at Time Slot t
1: Calculate Dint(t ) and t by using (22) and (23)
2: Calculate ρ∗(t ) and k∗(t ) by using (21)
3: Calculate ρ∗(t + Tsu) and k∗(t + Tsu) by using (21)
4: if ρ(t − 1) > ρ∗(t + Tsu) then
5: let {ρ(t − 1) − ρ∗(t + Tsu)}|N| servers in sleep state
enter active state
6: ρ(t) ← ρ∗(t + Tsu) and k(t) ← k∗(t + Tsu)
7: else if ρ(t − 1) < ρ∗(t ) then
8: let {ρ∗(t ) − ρ(t − 1)}|N| servers in active state enter
sleep state
9: ρ(t) ← ρ∗(t ) and k(t) ← k∗(t )
10: else if ρ∗(t ) ≤ ρ(t − 1) ≤ ρ∗(t + Tsu) then
11: ρ(t) ← ρ(t − 1) and k(t) ← k(t − 1)
12: end if
Procedure 2 describes our proposed system operation
procedure. The centralized server executes this procedure at
time slot t.
First, the centralized server calculates the minimum
acceptable delay for the interval from t to t + Tsu, Dint(t ),
which is given by
Dint(t ) = min
t≤a≤t+Tsu
Dint(a), (22)
where t denotes instant with the minimum acceptable delay
for the interval from t to t + Tsu, which is given by
t = arg min
t≤a≤t+Tsu
Dint(a). (23)
Furthermore, by solving (21), the centralized server finds the
optimal ratios of servers in sleep state and the optimal degrees
of servers in active state at time slot t and t+Tsu, respectively.
Then, it tries to compare the ratios of servers in sleep state
at (t − 1), t , and t + Tsu, ρ(t − 1), ρ∗(t ), and ρ∗(t + Tsu),
in order to decide the next action. There exist three cases:
(i) when ρ(t −1) > ρ∗(t +Tsu), the centralized server should
let {ρ(t − 1) − ρ∗(t + Tsu)}|N| servers in sleep state enter the
active state in order to satisfy the acceptable delay at (t +Tsu).
In this case, the current ratio and degree, ρ(t) and k(t) , are
set to ρ∗(t + Tsu) and k∗(t + Tsu) , respectively. (ii) when
ρ(t−1) < ρ∗(t ), {ρ∗(t )−ρ(t−1)}|N| servers in active state
can enter the sleep state while satisfying the acceptable delay.
In this case, the current ratio and degree, ρ(t) and k(t) , are
set to ρ∗(t ) and k∗(t ) , respectively. (iii) otherwise, the
centralized server sets the values of ρ(t) and k(t) as the
previous values, ρ(t − 1) and k(t − 1) .
VOLUME 3, 2015 1031
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
IV. PERFORMANCE EVALUATION
In this section, we evaluate the performance of our proposed
energy-efficient and delay-aware operation scheme in our
envisioned system by using extensive computer simulations.
Furthermore, we confirm the effectiveness of our proposal in
comparison with conventional schemes.
TABLE 1. Evaluation settings.
A. PARAMETER SETTINGS
Table 1 describes the settings of our simulations. The
simulations are executed for 100 seconds. In these simula-
tions, a wireless computing system consisting of 100 servers
is considered as a system configuration. The antenna uses
a single channel from 59.5 to 62.5 GHz, which is divided
into multiple time slots based on our multiple access
scheme, where the length of each time slot is 0.02 s. As a
channel model, the transmission power, antenna gain, and
noise power level are set to 10 dBm, 10 dB, and −70 dBm.
Additionally, the path loss is calculated by using
[13, eqs. (8), (10), and (11)]. Due to the limitation of radi-
ation angle [27], the degree of servers varies from 5 to 13.
The power consumption of the servers in active state
and that in sleep state are set to 32.3 W [12], [21] and
10.008 W [19], [20], respectively. Additionally, the servers
in sleep state need 20 s to start-up [26].
The computing system receives 1000 packets/s, with
1500 bytes per packets, from the sensors. In order to
periodically vary the minimum acceptable internal delay of
these packets, Dint(t) is given by
Dint(t) =
sin(t/A)
B
+ C, (24)
where A denotes the weight factor for length of cycle, B is
the weight factor for range of acceptable internal delay, and
C denotes the average acceptable internal delay. Additionally,
we consider two functions of Dint(t) in order to evaluate
the performance with different ranges of acceptable internal
delay. In scenario 1, A, B and C are set to 8, 8, and 0.75. In this
case, the range of acceptable internal delay is small. On the
other hand, in scenario 2, A, B and C are set to 8, 5, and 0.75.
These settings can model a wider range of acceptable internal
delay. Fig. 5 demonstrates the change of minimum acceptable
delay in each scenario.
FIGURE 5. Change in minimum value of acceptable internal delay.
In order to verify the effectiveness of our proposal, we
compare it with the conventional schemes. As one of the
conventional schemes, we use a scheme that dynamically
controls the sleep scheduling but uses a constant degree,
referred to as dynamic sleep with constant degree (DSCD),
where the degree is set to 7. The other scheme, referred to
as constant sleep with constant degree (CSCD), consistently
uses a constant number of servers in sleep state and the
degree of servers in active state, where these values are
set to 10 and 7.
B. EVALUATING THE IMPROVEMENT
IN POWER CONSUMPTION
Fig. 6 demonstrates the changes in the power consumption
of the system for 100 seconds for different scenarios. First,
we discuss this result by using our proposal in scenario 1
as an example. Until 7 seconds, the system satisfies the
acceptable internal delay with the maximum number of
servers in sleep state (i.e., 40). It starts to increase the number
of servers in active state after 8 seconds, because it cannot
satisfy the acceptable internal delay after 28 seconds. The
number of servers in active state is set to the maximum
value at 17 seconds and this setting is kept until 37 seconds
to satisfy the minimum acceptable internal delay. Since
the acceptable internal delay constraint is relaxed after
37 seconds, the system starts to increase the number of servers
in sleep state to reduce system power consumption. As similar
to our proposal, DSCD dynamically controls the number of
servers in sleep state. Therefore, the power consumption of
our proposal and DSCD is altered depending on the value
of acceptable internal delay while the power consumption of
CSCD is constant.
In addition to the sleep control, our proposal decides the
adequate degree of the servers. Therefore, it can satisfy the
acceptable internal delay with the lower power consumption,
compared with DSCD, as shown in Fig. 6(a). On the other
hand, in the case of scenario 2, which indicates stricter envi-
ronment, our proposal consumes much more power compared
with scenario 1 while DSCD and CSCD achieve similar
1032 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
FIGURE 6. Change in system power consumption in different scenarios.
(a) Change in system power consumption in scenario 1. (b) Change in
system power consumption in scenario 2.
power consumption compared with scenario 1. However,
DSCD and CSCD are not capable of satisfying the acceptable
internal delay while our proposal succeeds to satisfy the
acceptable internal delay.
Fig. 7 shows the amount of system power consumption
for 100 seconds period. The amount of system power
consumption is calculated as the sum of the power
consumed at instant t from 0 to 100 seconds. As shown
in Fig. 7, our proposal can achieve the lowest system power
consumption in comparison with other approaches. Indeed, in
case of scenario 1, our proposal achieves approximately
13% and 10% reduction in system power consumption
compared to DSCD and CSCD, respectively. Although the
reduction ratio decreases in scenario 2, our proposal still
achieves lower system power consumption. Consequently, we
can confirm the effectiveness of our proposal in terms of
system power consumption.
C. EVALUATING THE IMPROVEMENT IN
DELAY SATISFACTION RATIO
The rest of this section demonstrates the delay satisfaction
ratio in the different scenarios. The delay satisfaction ratio
FIGURE 7. Performance comparison in terms of the amount of system
power consumption in the different scenarios.
FIGURE 8. Performance comparison in terms of the delay satisfaction
ratio in the different scenarios.
is expressed as Psatisfaction/Ptotal, where Psatisfaction is the
number of packets that are received within the acceptable
delay and Ptotal denotes the total number of packets. Since
the packet rate is set to 1000 packets/s, the value of Ptotal
is 105 packets. Fig. 8 shows the delay satisfaction ratio in
the different scenarios. From this result, it is clear that our
proposal can achieve the maximum ratio (i.e., 100%) in our
simulation environment. On the other hand, DSCD achieves
around 60% of satisfaction ratio in scenario 1 and the ratio
further decreases in scenario 2. From this phenomenon, we
can notice that the constant degree cannot satisfy the accept-
able delay and joint control of the sleep scheduling and the
degree of servers has great impact on the satisfaction ratio.
Therefore, we can conclude that our proposal is effective in
reducing the system power consumption while satisfying the
acceptable delay.
V. CONCLUSION
Towards the realization of smart factories based on wireless
sensor networks, in this paper, we investigated a novel
computing system and its operation scheme. Since
conventional computing systems lack the capabilities
VOLUME 3, 2015 1033
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
required for providing industrial IoT applications (i.e., high
processing and communication capability, high durability,
and low power consumption), we first introduced a
computing system based on wireless technology.
Additionally, we derived a mathematical model to evaluate
the performance of our envisioned system based on complex
network theory. This model showed the existence of a
trade-off relationship between power consumption and delay
required for data collection. Consequently, we proposed an
energy-efficient and delay-aware system operation scheme.
Our proposed scheme controls the sleep scheduling and
network connectivity to reduce the system power consump-
tion while satisfying an acceptable delay, which is decided
based on the requirement of industrial IoT applications.
Simulation results showed that by appropriately selecting the
number of servers in sleep state and the degree of servers in
active state, the proposal can improve both the system power
consumption and satisfaction ratio of delay compared to other
approaches.
REFERENCES
[1] S. Savazzi, V. Rampa, and U. Spagnolini, ‘‘Wireless cloud networks for the
factory of things: Connectivity modeling and layout design,’’ IEEE Internet
Things J., vol. 1, no. 2, pp. 180–195, Apr. 2014.
[2] E. Shellshear, R. Berlin, and J. S. Carlson, ‘‘Maximizing smart factory
systems by incrementally updating point clouds,’’ IEEE Comput. Graph.
Appl., vol. 35, no. 2, pp. 62–69, Mar./Apr. 2015.
[3] J. Pan, L. Cai, Y. T. Hou, Y. Shi, and S. X. Shen, ‘‘Optimal base-station
locations in two-tiered wireless sensor networks,’’ IEEE Trans. Mobile
Comput., vol. 4, no. 5, pp. 458–473, Sep./Oct. 2005.
[4] F. Wang, C. Xu, L. Song, and Z. Han, ‘‘Energy-efficient resource alloca-
tion for device-to-device underlay communication,’’ IEEE Trans. Wireless
Commun., vol. 14, no. 4, pp. 2082–2092, Apr. 2015.
[5] M. R. Palattella, N. Accettura, L. A. Grieco, G. Boggia, M. Dohler, and
T. Engel, ‘‘On optimal scheduling in duty-cycled industrial IoT appli-
cations using IEEE802.15.4e TSCH,’’ IEEE Sensors J., vol. 13, no. 10,
pp. 3655–3666, Oct. 2013.
[6] Accenture. (2014). Driving Unconventional Growth Through the
Industrial Internet of Things. [Online]. Available: http://www.accenture.
com/SiteCollectionDocuments/PDF/Accenture-Driving-Unconventional-
Growth-through-IIoT.pdf
[7] F. Salvadori et al., ‘‘Monitoring in industrial systems using wireless sensor
network with dynamic power management,’’ IEEE Trans. Instrum. Meas.,
vol. 58, no. 9, pp. 3104–3111, Sep. 2009.
[8] A. A. Kumar S., K. Øvsthus, and L. M. Kristensen, ‘‘An industrial per-
spective on wireless sensor networks—A survey of requirements, pro-
tocols, and challenges,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 3,
pp. 1391–1412, Aug. 2014.
[9] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and its role
in the Internet of Things,’’ in Proc. SIGCOMM, Helsinki, Finland, 2012,
pp. 13–16.
[10] K. Ahmed and M. Gregory, ‘‘Integrating wireless sensor networks
with cloud computing,’’ in Proc. 7th MSN, Beijing, China, 2011,
pp. 364–366.
[11] J.-Y. Shin, E. G. Sirer, H. Weatherspoon, and D. Kirovski, ‘‘On the feasi-
bility of completely wireless datacenters,’’ in Proc. 8th ACM/IEEE Symp.
Archit. Netw. Commun. Syst., New York, NY, USA, Oct. 2012, pp. 3–14.
[12] J.-Y. Shin, E. G. Sirer, H. Weatherspoon, and D. Kirovski, ‘‘On the feasibil-
ity of completely wirelesss datacenters,’’ IEEE/ACM Trans. Netw., vol. 21,
no. 5, pp. 1666–1679, Oct. 2013.
[13] K. Suto, H. Nishiyama, N. Kato, T. Nakachi, T. Sakano, and A. Takahara,
‘‘A failure-tolerant and spectrum-efficient wireless data center network
design for improving performance of big date mining,’’ in Proc. 81th VTC,
Glasgow, Scotland, May 2015, pp. 1–5.
[14] A. M. Niknejad, ‘‘Siliconization of 60 GHz,’’ IEEE Microw. Mag., vol. 11,
no. 1, pp. 78–85, Feb. 2010.
[15] S. Pinel et al., ‘‘60 GHz single-chip CMOS digital radios and phased
array solutions for gaming and connectivity,’’ IEEE J. Sel. Areas Commun.,
vol. 27, no. 8, pp. 1347–1357, Oct. 2009.
[16] Z. Guo and Y. Yang, ‘‘On nonblocking multicast fat-tree data center
networks with server redundancy,’’ IEEE Trans. Comput., vol. 64, no. 4,
pp. 1058–1073, Apr. 2014.
[17] Cisco. (2009). Cisco Catalyst 3750 Series Switches. [Online]. Available:
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750-
series-switches/prod_qas09186a00801b0971.pdf
[18] K. Suto, H. Nishiyama, N. Kato, K. Mizutani, O. Akashi, and A. Takahara,
‘‘An overlay-based data mining architecture tolerant to physical net-
work disruptions,’’ IEEE Trans. Emerg. Topics Comput., vol. 2, no. 3,
pp. 292–301, Sep. 2014.
[19] V. K. M. Raj and R. Shriram, ‘‘A study on server sleep state transition to
reduce power consumption in a virtualized server cluster environment,’’
in Proc. 4th COMSNETS, Bengaluru, India, Jan. 2012, pp. 1–6.
[20] R. Matsuo, T. Tandai, T. Tomizawa, T. Adachi, and H. Kasami, ‘‘Energy-
efficient standby mode algorithm in short-range one-to-one millime-
ter wave communications,’’ in Proc. IEEE ICC, Ottawa, ON, Canada,
Jun. 2012, pp. 4033–4038.
[21] Y. Nakagawa et al., ‘‘A single-chip, 10-gigabit Ethernet switch LSI for
energy-efficient blade servers,’’ in Proc. GreenCom, Hangzhou, China,
Dec. 2010, pp. 401–411.
[22] N. Bisnik, A. Abouzeid, and V. Isler, ‘‘Stochastic event capture using
mobile sensors subject to a quality metric,’’ in Proc. ACM MobiCom,
Los Angeles, CA, USA, Sep. 2006, pp. 98–109.
[23] S. He, J. Chen, D. K. Y. Yau, H. Shao, and Y. Sun, ‘‘Energy-efficient cap-
ture of stochastic events under periodic network coverage and coordinated
sleep,’’ IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1090–1102,
Jun. 2012.
[24] M. Dong, K. Ota, A. Liu, and M. Guo, ‘‘Joint optimization of lifetime
and transport delay under reliability constraint wireless sensor networks,’’
IEEE Trans. Parallel Distrib. Syst., vol. PP, no. 99, pp. 1–11, Jan. 2015.
[25] M. Dong, K. Ota, X. Li, X. Shen, S. Guo, and M. Guo, ‘‘HARVEST:
A task-objective efficient data collection scheme in wireless sensor
and actor networks,’’ in Proc. 3rd CMC, Qingdao, China, Apr. 2011,
pp. 485–488.
[26] A. Gandhi, M. Harchol-Balter, and M. A. Kozuch, ‘‘Are sleep states
effective in data centers?’’ in Proc. IGCC, San Jose, CA, USA, Jun. 2012,
pp. 1–10.
[27] M. Ohira, A. Miura, and M. Ueba, ‘‘60-GHz wideband substrate-
integrated-waveguide slot array using closely spaced elements for pla-
nar multisector antenna,’’ IEEE Trans. Antennas Propag., vol. 58, no. 3,
pp. 993–998, Mar. 2010.
KATSUYA SUTO (S’12) received the M.S. degree
in information science from the Graduate School
of Information Sciences, Tohoku University,
Japan, in 2013, where he is currently pursu-
ing the Ph.D. degree. His research interests are
in the areas of big data mining architecture,
resilient network design, and wireless networking.
He is a Student Member of the Institute of
Electronics, Information and Communication
Engineers (IEICE). He was a recipient of the
prestigious Deans Award from Tohoku University in 2013. He received
the best paper award at the IEEE 79th Vehicular Technology Conference
(2013-Spring), the IEEE VTS Japan 2015 Young Researcher’s Encourage-
ment Award, and the IEICE Academic Encouragement Award (2014).
1034 VOLUME 3, 2015
www.redpel.com+917620593389
www.redpel.com+917620593389
K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks
HIROKI NISHIYAMA (SM’13) received the
M.S. and Ph.D. degrees in information science
from Tohoku University, Japan, in 2007 and 2008,
respectively. He is currently an Associate
Professor with the Graduate School of Infor-
mation Sciences, Tohoku University. One of his
outstanding achievements is Relay-by-Smartphone,
which makes it possible to share information
among many people using only WiFi func-
tionality of smartphones. He has authored over
140 peer-reviewed papers, including many high quality publications in
prestigious IEEE journals and conferences. His research interests cover a
wide range of areas, including satellite communications, unmanned aircraft
system networks, wireless and mobile networks, ad hoc and sensor
networks, green networking, and network security. He is a member of the
Institute of Electronics, Information and Communication Engineers (IEICE).
He received best paper awards from many international conferences, includ-
ing the IEEE’s flagship events, such as the IEEE Global Communications
Conference in 2010, 2013, and 2014, and the IEEE Wireless Communica-
tions and Networking Conference in 2012 and 2014. He was a recipient of
the Special Award of the 29th Advanced Technology Award for Creativity
in 2015, the IEEE Communications Society Asia-Pacific Board Outstanding
Young Researcher Award in 2013, the IEICE Communications Society
Academic Encouragement Award in 2011, and the FUNAI Foundation’s
Research Incentive Award for Information Technology in 2009. He serves as
the Co-Chair of the Cognitive Radio and Networks Symposium of the IEEE
International Conference on Communications (ICC) in 2015. He served
as the Co-Chair of the Selected Areas in Communications Symposium
of the IEEE ICC’14, an Associate Editor of the IEEE TRANSACTIONS ON
VEHICULAR TECHNOLOGY and the Springer Journal of Peer-to-Peer Networking
and Applications, and the Secretary of the IEEE ComSoc Sendai Chapter.
NEI KATO (F’13) received the bachelor’s degree
from Polytechnic University, Japan, in 1986,
and the M.S. and Ph.D. degrees in information
engineering from Tohoku University, in
1988 and 1991, respectively. He joined the
Computer Center, Tohoku University, as an
Assistant Professor, in 1991, where he was pro-
moted to Full Professor with the Graduate School
of Information Sciences in 2003. He became a
Strategic Adviser to the President of Tohoku Uni-
versity in 2013. He has been involved in research on computer networking,
wireless mobile communications, satellite communications, ad hoc & sensor
& mesh networks, smart grid, and pattern recognition. He has authored over
300 papers in peer-reviewed journals and conference proceedings. He is
a fellow of the Institute of Electronics, Information and Communication
Engineers (IEICE). He received several awards, including the Minoru
Ishida Foundation Research Encouragement Prize (2003), the Distinguished
Contributions to Satellite Communications Award from the IEEE ComSoc
of the Satellite and Space Communications Technical Committee (2005),
the FUNAI Information Science Award (2007), the TELCOM System
Technology Award from the Foundation for Electrical Communications
Diffusion (2008), the IEICE Network System Research Award (2009),
the IEICE Satellite Communications Research Award (2011), the KDDI
Foundation Excellent Research Award (2012), the IEICE Communications
Society Distinguished Service Award (2012), the Distinguished Contribu-
tions to Disaster-Resilient Networks Research and Development Award from
the Ministry of Internal Affairs and Communications, Japan, six best paper
awards from the IEEE GLOBECOM/WCNC/VTC, and the IEICE
Communications Society Best Paper Award (2012). He serves as the
Member-at-Large on the Board of Governors of the IEEE Communications
Society, the Chair of the IEEE Ad Hoc & Sensor Networks Technical
Committee, the Chair of the IEEE ComSoc Sendai Chapter, the Associate
Editor-in-Chief of the IEEE INTERNET OF THINGS JOURNAL, an Area Editor
of the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, and an Editor of
the IEEE Wireless Communications Magazine and the IEEE Network
Magazine. He served as the Chair of the IEEE ComSoc Satellite and
Space Communications Technical Committee (2010–2012), the Chair of
the IEICE Satellite Communications Technical Committee (2011–2012), a
Guest-Editor of many IEEE transactions/journals/magazines, the Sympo-
sium Co-Chair of GLOBECOM’07, GLOBECOM’12, ICC’10, ICC’11, and
ICC’12, the Vice Chair of the IEEE WCNC’10, WCNC’11, ChinaCom’08,
and ChinaCom’09, the TPC Vice Chair of ICC’14, and the Workshop
Co-Chair of VTC’10. Besides his academic activities, he also serves on
the Expert Committee of the Telecommunications Council and the Ministry
of Internal Affairs and Communications, and serves as the Chairperson of
ITU-R SG4 and SG7, Japan. He is a Distinguished Lecturer of the IEEE
Communications Society and the IEEE Vehicular Technology Society, and
a Co-PI of the A3 Foresight Program supported by the Japan Society for the
Promotion of Sciences, the NSFC of China, and the NRF of Korea.
CHIH-WEI HUANG received the B.S. degree
from National Taiwan University, Taipei, in 2001,
the M.S. degree from Columbia University,
New York, in 2004, and the Ph.D. degree from the
University of Washington, Seattle, in 2009, all in
electrical engineering. He joined the Department
of Communication Engineering, National Central
University, Taoyuan, Taiwan, in 2010, where he is
currently an Assistant Professor with the Informa-
tion Processing and Communications Laboratory.
From 2006 to 2009, he was an Intern Researcher with Siemens Corporate
Research and Microsoft Research. He has authored papers in a broad range
of areas, including wireless networking, multimedia communications, digital
signal processing, and information retrieval.
VOLUME 3, 2015 1035
www.redpel.com+917620593389
www.redpel.com+917620593389

More Related Content

What's hot

Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Lightning Acquisition and Processing On Sensor Node Using NI cRIO
Lightning Acquisition and Processing On Sensor Node Using NI cRIOLightning Acquisition and Processing On Sensor Node Using NI cRIO
Lightning Acquisition and Processing On Sensor Node Using NI cRIOijceronline
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.Sanjay Shelar
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...eSAT Publishing House
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014ijcsbi
 
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)अनिकेत चौधरी
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewIOSR Journals
 
Integrating wireless sensor network into cloud services for real time data co...
Integrating wireless sensor network into cloud services for real time data co...Integrating wireless sensor network into cloud services for real time data co...
Integrating wireless sensor network into cloud services for real time data co...Rajeev Piyare
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbeeeSAT Journals
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Onyebuchi nosiri
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Swapnil Jagtap
 

What's hot (20)

Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Lightning Acquisition and Processing On Sensor Node Using NI cRIO
Lightning Acquisition and Processing On Sensor Node Using NI cRIOLightning Acquisition and Processing On Sensor Node Using NI cRIO
Lightning Acquisition and Processing On Sensor Node Using NI cRIO
 
E010412433
E010412433E010412433
E010412433
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
Efficient Cluster Head Selection in Wireless Sensor Networks.
Efficient Cluster Head Selection in Wireless  Sensor Networks.Efficient Cluster Head Selection in Wireless  Sensor Networks.
Efficient Cluster Head Selection in Wireless Sensor Networks.
 
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...An implementation of recovery algorithm for fault nodes in a wireless sensor ...
An implementation of recovery algorithm for fault nodes in a wireless sensor ...
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014Vol 14 No 3 - November 2014
Vol 14 No 3 - November 2014
 
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
Energy efficiency in wireless sensor network(ce 16 aniket choudhury)
 
Energy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A ReviewEnergy Conservation in Wireless Sensor Networks: A Review
Energy Conservation in Wireless Sensor Networks: A Review
 
Integrating wireless sensor network into cloud services for real time data co...
Integrating wireless sensor network into cloud services for real time data co...Integrating wireless sensor network into cloud services for real time data co...
Integrating wireless sensor network into cloud services for real time data co...
 
E010424043
E010424043E010424043
E010424043
 
S2-R2
S2-R2S2-R2
S2-R2
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
Wireless sensor network using zigbee
Wireless sensor network using zigbeeWireless sensor network using zigbee
Wireless sensor network using zigbee
 
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
Adaptive Monitoring and Localization of Faulty Node in a Wireless Sensor Netw...
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
Cluster-based Wireless Sensor Network (WSN) Methods for Secure and Efficient ...
 

Viewers also liked

Vector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysisVector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysisredpel dot com
 
Automatic analysis of facial affect a survey of registration, representation...
Automatic analysis of facial affect  a survey of registration, representation...Automatic analysis of facial affect  a survey of registration, representation...
Automatic analysis of facial affect a survey of registration, representation...redpel dot com
 
Co extracting opinion targets and opinion words from online reviews based on ...
Co extracting opinion targets and opinion words from online reviews based on ...Co extracting opinion targets and opinion words from online reviews based on ...
Co extracting opinion targets and opinion words from online reviews based on ...redpel dot com
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...redpel dot com
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacyredpel dot com
 
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsSoftware defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsredpel dot com
 
java / dot net mini projects list
java / dot net mini projects list java / dot net mini projects list
java / dot net mini projects list redpel dot com
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computingredpel dot com
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingredpel dot com
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computingredpel dot com
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnetredpel dot com
 
Joker a novel opportunistic routing protocol
Joker  a novel opportunistic routing protocolJoker  a novel opportunistic routing protocol
Joker a novel opportunistic routing protocolredpel dot com
 
Learn The Basics of Paid Search
Learn The Basics of Paid SearchLearn The Basics of Paid Search
Learn The Basics of Paid SearchBoost Media
 
Зачем нужен поисковый маркетинг
Зачем нужен поисковый маркетингЗачем нужен поисковый маркетинг
Зачем нужен поисковый маркетингBigTimeSeo
 

Viewers also liked (20)

Vector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysisVector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysis
 
Automatic analysis of facial affect a survey of registration, representation...
Automatic analysis of facial affect  a survey of registration, representation...Automatic analysis of facial affect  a survey of registration, representation...
Automatic analysis of facial affect a survey of registration, representation...
 
Co extracting opinion targets and opinion words from online reviews based on ...
Co extracting opinion targets and opinion words from online reviews based on ...Co extracting opinion targets and opinion words from online reviews based on ...
Co extracting opinion targets and opinion words from online reviews based on ...
 
Big data for health
Big data for healthBig data for health
Big data for health
 
Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...Frequency and similarity aware partitioning for cloud storage based on space ...
Frequency and similarity aware partitioning for cloud storage based on space ...
 
Protection of big data privacy
Protection of big data privacyProtection of big data privacy
Protection of big data privacy
 
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsSoftware defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular clouds
 
DEEPAK_KAPILA-2 (1)
DEEPAK_KAPILA-2 (1)DEEPAK_KAPILA-2 (1)
DEEPAK_KAPILA-2 (1)
 
java / dot net mini projects list
java / dot net mini projects list java / dot net mini projects list
java / dot net mini projects list
 
APRENDIZAJE AUTÓNOMO
APRENDIZAJE AUTÓNOMOAPRENDIZAJE AUTÓNOMO
APRENDIZAJE AUTÓNOMO
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computing
 
An anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computingAn anomalous behavior detection model in cloud computing
An anomalous behavior detection model in cloud computing
 
ANSHUL BASWAL CV
ANSHUL BASWAL CVANSHUL BASWAL CV
ANSHUL BASWAL CV
 
Just in-time code offloading for wearable computing
Just in-time code offloading for wearable computingJust in-time code offloading for wearable computing
Just in-time code offloading for wearable computing
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
Joker a novel opportunistic routing protocol
Joker  a novel opportunistic routing protocolJoker  a novel opportunistic routing protocol
Joker a novel opportunistic routing protocol
 
Learn The Basics of Paid Search
Learn The Basics of Paid SearchLearn The Basics of Paid Search
Learn The Basics of Paid Search
 
Aeternus Brass VSTi v1.1 - User Guide And Information
Aeternus Brass VSTi v1.1 - User Guide And InformationAeternus Brass VSTi v1.1 - User Guide And Information
Aeternus Brass VSTi v1.1 - User Guide And Information
 
Зачем нужен поисковый маркетинг
Зачем нужен поисковый маркетингЗачем нужен поисковый маркетинг
Зачем нужен поисковый маркетинг
 
Mind mapping
Mind mappingMind mapping
Mind mapping
 

Similar to An energy efficient and delay-aware wireless computing system for industrial wireless sensor networks

An efficient reconfigurable workload balancing scheme for fog computing netwo...
An efficient reconfigurable workload balancing scheme for fog computing netwo...An efficient reconfigurable workload balancing scheme for fog computing netwo...
An efficient reconfigurable workload balancing scheme for fog computing netwo...IJECEIAES
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksAIRCC Publishing Corporation
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
Towards Adaptive Sensor-cloud for Internet of Things
Towards Adaptive Sensor-cloud for Internet of ThingsTowards Adaptive Sensor-cloud for Internet of Things
Towards Adaptive Sensor-cloud for Internet of ThingsTELKOMNIKA JOURNAL
 
Energy aware routing for real time
Energy aware routing for real timeEnergy aware routing for real time
Energy aware routing for real timeambitlick
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT WorldsEricsson
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKAashish Pande
 
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...IJECEIAES
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...eSAT Journals
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improvedeSAT Publishing House
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentConference Papers
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentConference Papers
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 

Similar to An energy efficient and delay-aware wireless computing system for industrial wireless sensor networks (20)

An efficient reconfigurable workload balancing scheme for fog computing netwo...
An efficient reconfigurable workload balancing scheme for fog computing netwo...An efficient reconfigurable workload balancing scheme for fog computing netwo...
An efficient reconfigurable workload balancing scheme for fog computing netwo...
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
 
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSEDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKS
 
Edge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor NetworksEdge Controller Placement for Next Generation Wireless Sensor Networks
Edge Controller Placement for Next Generation Wireless Sensor Networks
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Towards Adaptive Sensor-cloud for Internet of Things
Towards Adaptive Sensor-cloud for Internet of ThingsTowards Adaptive Sensor-cloud for Internet of Things
Towards Adaptive Sensor-cloud for Internet of Things
 
Journal
JournalJournal
Journal
 
Energy aware routing for real time
Energy aware routing for real timeEnergy aware routing for real time
Energy aware routing for real time
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Capillary Networks – Bridging the Cellular and IoT Worlds
Capillary Networks –  Bridging the Cellular and IoT WorldsCapillary Networks –  Bridging the Cellular and IoT Worlds
Capillary Networks – Bridging the Cellular and IoT Worlds
 
50120130406009 2
50120130406009 250120130406009 2
50120130406009 2
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 

More from redpel dot com

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netredpel dot com
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...redpel dot com
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceredpel dot com
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureredpel dot com
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsredpel dot com
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...redpel dot com
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...redpel dot com
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageredpel dot com
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersredpel dot com
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkredpel dot com
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingredpel dot com
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataredpel dot com
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...redpel dot com
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacksredpel dot com
 
A distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoopA distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoopredpel dot com
 
A deep awareness framework for pervasiv video cloud
A deep awareness framework for pervasiv video cloudA deep awareness framework for pervasiv video cloud
A deep awareness framework for pervasiv video cloudredpel dot com
 
A cloud service architecture for analyzing big monitoring data
A cloud service architecture for analyzing big monitoring dataA cloud service architecture for analyzing big monitoring data
A cloud service architecture for analyzing big monitoring dataredpel dot com
 

More from redpel dot com (20)

An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of things
 
Validation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri netValidation of pervasive cloud task migration with colored petri net
Validation of pervasive cloud task migration with colored petri net
 
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
Web Service QoS Prediction Based on Adaptive Dynamic Programming Using Fuzzy ...
 
Towards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduceTowards a virtual domain based authentication on mapreduce
Towards a virtual domain based authentication on mapreduce
 
Toward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architectureToward a real time framework in cloudlet-based architecture
Toward a real time framework in cloudlet-based architecture
 
Privacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applicationsPrivacy preserving and delegated access control for cloud applications
Privacy preserving and delegated access control for cloud applications
 
Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...Performance evaluation and estimation model using regression method for hadoo...
Performance evaluation and estimation model using regression method for hadoo...
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...
 
Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...Efficient multicast delivery for data redundancy minimization over wireless d...
Efficient multicast delivery for data redundancy minimization over wireless d...
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...
 
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storageI-Sieve: An inline High Performance Deduplication System Used in cloud storage
I-Sieve: An inline High Performance Deduplication System Used in cloud storage
 
Bayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centersBayes based arp attack detection algorithm for cloud centers
Bayes based arp attack detection algorithm for cloud centers
 
Architecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog networkArchitecture harmonization between cloud radio access network and fog network
Architecture harmonization between cloud radio access network and fog network
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
A tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big dataA tutorial on secure outsourcing of large scalecomputation for big data
A tutorial on secure outsourcing of large scalecomputation for big data
 
A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...A parallel patient treatment time prediction algorithm and its applications i...
A parallel patient treatment time prediction algorithm and its applications i...
 
A mobile offloading game against smart attacks
A mobile offloading game against smart attacksA mobile offloading game against smart attacks
A mobile offloading game against smart attacks
 
A distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoopA distributed video management cloud platform using hadoop
A distributed video management cloud platform using hadoop
 
A deep awareness framework for pervasiv video cloud
A deep awareness framework for pervasiv video cloudA deep awareness framework for pervasiv video cloud
A deep awareness framework for pervasiv video cloud
 
A cloud service architecture for analyzing big monitoring data
A cloud service architecture for analyzing big monitoring dataA cloud service architecture for analyzing big monitoring data
A cloud service architecture for analyzing big monitoring data
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

An energy efficient and delay-aware wireless computing system for industrial wireless sensor networks

  • 1. SPECIAL SECTION ON INDUSTRIAL SENSOR NETWORKS WITH ADVANCED DATA MANAGEMENT: DESIGN AND SECURITY Received April 3, 2015, accepted April 21, 2015, date of publication June 15, 2015, date of current version July 17, 2015. Digital Object Identifier 10.1109/ACCESS.2015.2443171 An Energy-Efficient and Delay-Aware Wireless Computing System for Industrial Wireless Sensor Networks KATSUYA SUTO1, (Student Member, IEEE), HIROKI NISHIYAMA1, (Senior Member, IEEE), NEI KATO1, (Fellow, IEEE), AND CHIH-WEI HUANG2 1Graduate School of Information Sciences, Tohoku University, Sendai 980-8577, Japan 2Department of Communication Engineering, National Central University, Taoyuan 320, Taiwan Corresponding author: K. Suto (suto@it.ecei.tohoku.ac.jp) This work was supported by the Strategic International Research Cooperative Program through the Japan Science and Technology Agency. ABSTRACT Industrial wireless sensor networks have attracted much attention as a cornerstone to making the smart factories real. Utilizing industrial wireless sensor networks as a base for smart factories makes it possible to optimize the production line without human resources, since it provides industrial Internet of Things service, where various types of data are collected from sensors and mined to control the machines based on the analysis result. On the other hand, a fog computing node, which executes such real-time feedback control, should be capable of real-time data collection, management, and processing. To achieve these requirements, in this paper, we introduce wireless computing system (WCS) as a fog computing node. Since there are a lot of servers and each server has 60 GHz antennas to connect to other servers and sensors, WCS has high collecting and processing capabilities. However, in order to fulfill a demand for real-time feedback control, WCS needs to satisfy an acceptable delay for data collection. In addition, lower power consumption is required in order to reduce the cost for the factory operation. Therefore, we propose an energy-efficient and delay-aware WCS. Since there is a tradeoff relationship between the power consumption and the delay for data collection, our proposed system controls the sleep schedule and the number of links to minimize the power consumption while satisfying an acceptable delay constraint. Furthermore, the effectiveness of our proposed system is evaluated through extensive computer simulations. INDEX TERMS Industrial wireless sensor network, wireless computing system, low power consumption, delay-aware data collection. I. INTRODUCTION Recent advances in wireless sensor network technologies including machine-to-machine and device-to-device commu- nications indicate the realization of smart factories, which opens up a new dimension for factory management [1]–[4]. A smart factory based on a wireless sensor network provides industrial Internet of Things (IoT) service [5], [6]. In this service, a computing system collects various kinds of data from machines and sensors and mines a large amount of collected data (i.e., industrial big data) to obtain valuable information for factory operation. Machines are automati- cally controlled by using the obtained information to make an efficient production line (i.e., adequate production speed, low power consumption, failure prediction, and so forth). Therefore, the smart factory makes it possible to optimize the factory operation without human resources [7], [8]. In this paper, we focus on fog-based industrial wireless sensor networks [9], in which a fog computing node is physically placed close to the sensors in order to directly communicate with the gateway nodes. Since the cloud servers provide the industrial IoT application through Internet in cloud-based industrial wireless sensor networks [10], the fog-based network can drastically reduce feedback latency. Moreover, in order to achieve enough capability for providing such service, a fog computing node should satisfy the following requirements: (i) high processing performance in order to support real-time big data mining, (ii) concurrent data collection from a lot of sensors, (iii) high service availability, (iv) low system power consumption for a low cost factory operation. In order to satisfy the aforementioned requirements, we focus on a Wireless Computing System (WCS) [11]–[13], 1026 2169-3536 2015 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. VOLUME 3, 2015 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 2. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks FIGURE 1. Our envisioned industrial wireless sensor network using wireless computing system. as shown in Fig. 1. While this system is originally used for rack architecture in data center networks [13], we introduce this system as a fog computing node in industrial wireless sensor networks. Since WCS effectively accommodates a lot of servers, it can achieve high processing capability even if the space is limited. Additionally, each server has two 60 GHz antennas, where one of the antennas, referred to as outside antenna, is used to communicate with the sensors and the other antenna, referred to as inside antenna, is used to communicate with the other servers. Since the 60 GHz antenna has high directivity with high data rate (4 − 15 Gbps) [14], [15] and there exist multiple outside antennas, WCS can collect data from a lot of sensors concurrently. Although conventional computing systems based on wired cables have a drastic decrease in service availability if switches cease to function, WCS achieves high service availability since it keeps the network connectivity even if some servers cease to function. Moreover, WCS achieves lower system power consumption in comparison with wired computing systems. For instance, the collective power consumption of antennas in a WCS consisting of 100 servers is 6 W [12], [15] while the collective power consumption of the routers in a wired computing system based on a two-tier fat tree is 264 W [16], [17]. In this paper, we aim to investigate a system operation scheme for industrial IoT service. Since IoT service is sensitive to the delay, we need to satisfy an acceptable delay for data collection. Additionally, we need to reduce the power consumption of our envisioned system in order to achieve an energy-efficient factory. Consequently, both delay for data collection and system power consumption should be considered. To tackle this research issue, we first construct a mathematical model to evaluate the system power consump- tion and delay for data collection, and thus show a trade-off relationship between these values. Furthermore, based on the trade-off relationship, we propose an Energy-Efficient and Delay-Aware Wireless Computing System (E2DA-WCS). Our proposed system minimizes the system power consump- tion while satisfying the acceptable delay of each datum, by controlling the number of servers in a sleep state and the number of links (i.e., the degree of servers). The remainder of this paper is organized as follows. In section II, we describe the architecture, multiple access scheme, and sleep mode in our envisioned computing system. Additionally, in this section, we show a trade-off relationship between power consumption and delay required for data collection. Our proposed energy-efficient and delay-aware system operation scheme is explained in Section III. We present the performance evaluation in Section IV. Finally, concluding remarks are provided in Section V. II. ENVISIONED COMPUTING SYSTEM In this section, we introduce our envisioned computing system for industrial wireless sensor networks. First, we explain the architecture of our envisioned computing system and its network topology. Then, the time slot allocation scheme for our envisioned system is presented. Furthermore, we describe the sleep mode, which is used to reduce the system power consumption. Finally, we show the trade-off relationship between the system power consumption and delay for data collection in our envisioned system. A. ARCHITECTURE In this paper, we use a spherical WCS whose form is a spherical shape as shown in Fig. 2. In our envisioned WCS, servers are circularly arranged in both the vertical and hori- zontal direction, which makes it possible to ensure a low path loss (i.e., high data rate) between any servers even when the degree of servers increases [13]. Our envisioned spherical WCS consists of multiple stories, which are shaped like a partial hemisphere to make the envisioned system sphere-shaped. Additionally, each story has multiple containers, which have dimensions of γ meters wide, δ meters deep, and ζ meters high, and a blade server is put in each container. We assume that a set of all servers is defined as N = {n1, n2, . . . , n|N|}, where |N| is the total number of servers, and a set of stories is defined as V = {v−S, . . . , v−1, v0, v1 . . . , vS}, where S = (|V| − 1)/2 and |V| denotes the total number of stories. Additionally, the set of servers in story vs, Nvs , is given by {nvs,1, nvs,2, . . . , nvs,|Nvs |}. The numbers of servers in differ- ent stories v0 and vS (or v−S), |Nv0 | and |NvS | (or |Nv−S |) are set to 2(|V| − 1) and 1, respectively. Additionally, since the number of servers in story vs, |Nvs |, is decided based on the inner-radius of the smaller surface of story vs, Rvs , and the width of the container, γ , the value of |Nvs | is expressed as |Nvs | =    2(|V| − 1), if s = 0, 1, if s = S or −S, (2πRvs )/γ, otherwise. (1) Fig. 3 shows the intra-system network topology of our envisioned WCS. In this system, each server transmits data to servers diagonally opposite to it and the number of links from transmitter nvs,i in story vs to receivers, knvs,i , can be changed by controlling the radiation angle of the antenna. The set of VOLUME 3, 2015 1027 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 3. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks FIGURE 2. Architecture of our envisioned spherical wireless computing system. FIGURE 3. Intra-system network topologies of our envisioned system. (a) Network topology in story v0 from top view. (b) Network topology from side view. stories that contain neighbor servers of server nvs,i, V nvs,i con , is expressed as V nvs,i con = {v(−s−Q), . . . , v−s, . . . , v(−s+Q)}, where Q = (|V nvs,i con | − 1)/2. Assuming that k nvs,i vq is the number of links from server nvs,i to its neighbor servers in story vq ∈ V nvs,i con , the value of knvs,i is expressed as the sum of k nvs,i vq . knvs,i = vq∈V nvs,i con k nvs,i vq . (2) Moreover, in this paper, we assume that, for all servers, |V nvs,i con | and knvs,i are set to the same values, |Vcon| and k , respectively. Therefore, intra-system network topologies from the top and side views become a Cayley graph as shown in Fig. 3. This network topology facilitates the design of communication and networking protocols (e.g., multiple access and routing protocols). B. SPACE AND TIME DIVISION MULTIPLE ACCESS SCHEME Here, we introduce an efficient time slot allocation procedure for our envisioned system. In order to use time slots efficiently, we consider both space- and time-division multiplexing. Our scheme uses time slot cycles in order to fairly allocate time slots to servers and each time slot cycle is divided into multiple time slots. Each time slot is allocated to servers that do not mutually interfere with each other. Since the network topology of our envisioned system is constructed in a regular pattern (i.e., diagonally opposite servers are connected with the same degree), we can simplify the time slot allocation procedure by dividing it into a story selection phase and a server selection phase. The story selec- tion phase selects the stories whose servers do not interfere with servers in other simultaneously selected stories. On the other hand, the server selection phase chooses multiple servers that do not interfere with each other in each story in order to allocate an independent time slot to servers without interference. Procedure 1 demonstrates the time slot allocation procedure. A centralized server executes this procedure by using topology information. First, the centralized server executes the story selection phase in order to choose non-interference story groups, ¯vi, in which the inter-story servers do not interfere with each other, from the set of stories, V. Thus, this phase creates a set of ¯v, ¯V = {¯v1, ¯v2, . . . , ¯v| ¯V|}. As shown in Fig. 3(b), the servers |Vcon| distant stories apart do not interfere with each other. Assuming that |Vcon| ≤ |V|, the value of | ¯V| can be given as | ¯V| = |Vcon|. (3) 1028 VOLUME 3, 2015 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 4. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks Procedure 1 Time Slot Allocation Procedure 1: Create a set of non-interference story groups, ¯V ← {¯v1, ¯v2, . . . , ¯v| ¯V|} 2: for i = 1 to | ¯V| do 3: Create a set of non-interference server groups, ¯N¯vi ← {¯n¯vi,1, ¯n¯vi,2, . . . , ¯n¯vi,| ¯N¯vi |}, from servers in all stories vs, vs ∈ ¯vi, 4: Allocate independent time slots to servers in group ¯n¯vi,j, for all j, 1 ≤ j ≤ | ¯N¯vi | 5: i ← i + 1 6: end for 7: Calculate the amount of time slots, |T|, based on (7) 8: return the value of |T| Following the story selection phase, the centralized server executes the server selection phase for each group ¯vi in order to allocate the time slots to servers without mutual interference. Servers in each story vs ∈ ¯vi are divided into multiple non-interference server groups, ¯n¯vi,j, in which the intra-story servers do not interfere with each other. In other words, since each group ¯n¯vi,j consists of non-interference server groups in each story vs ∈ ¯vi, ¯nvs,j, ¯n¯vi,j is expressed as ¯n¯vi,j = vs∈ ¯vi ¯nvs,j. (4) Therefore, the centralized server creates sets of non- interference server groups in each story vs ∈ ¯vi, ¯Nvs = {¯nvs,1, ¯nvs,2, . . . , ¯nvs,| ¯Nvs |}. Then, based on the created ¯Nvs , it creates a set of non-interference server groups in group ¯vi, ¯N¯vi = {¯n¯vi,1, ¯n¯vi,2, . . . , ¯n¯vi,| ¯N¯vi |}. By using the set ¯N¯vi , the centralized server allocates independent time slots to the servers. Since the value of | ¯N¯vi | is the maximum value of | ¯Nvs | for all vs ∈ ¯vi, we have | ¯N¯vi | = max vs∈¯vi | ¯Nvs |. (5) Furthermore, since the number of intra-story servers that do not interfere with other intra-story servers in story vs is given by |Nvs |/k v−s vs , where k v−s vs is the number of links from any server in story vs to servers in the diagonally opposite story v−s, the value of | ¯Nvs | can be expressed as | ¯Nvs | = |Nvs | |Nvs |/k v−s vs . (6) Finally, the centralized server calculates the amount of time slots, |T|, which is expressed with the sum of | ¯N¯vi |, as follows. |T| = | ¯V| i=1 | ¯N¯vi |. (7) Additionally, since each time slot has constant length [s], λ, the time slot cycle, , is given as = |T|λ. (8) Since a channel with bandwidth W is divided into |T| time slots, the data transmission rate between servers ni and nj, θni,j , is expressed as θni,j = W |T| log2 1 + Pni gni,j σ2 . (9) Here, Pni is the transmission power of server ni, σ2 represents the noise power level and gni,j denotes the channel gain between servers ni and nj. C. SLEEP MODE Since low system power consumption is required, we use a sleep mode for the servers in our envisioned system. Therefore, we introduce a summary of sleep mode and demonstrate mathematical expressions to evaluate the system power consumption and data collection delay in multi-hop communication. The sleep mode aims to reduce system power consumption by letting some servers enter the sleep state. During the sleep state, the power consumption of the server is low. Assuming that the ratio of servers in sleep state is ρ, the system power consumption [W], Esystem, is expressed as Esystem = ρEserver sleep + (1 − ρ)Eserver active , (10) where Eserver sleep and Eserver active are the power consumption of the server in sleep state and that in active state, respectively. However, servers cannot act as router while in sleep state in this system. In other words, servers in sleep state are removed from the intra-system network and the original degree distri- bution of the network, pk, is changed. Here, we assume that the servers in sleep state are randomly selected regardless of their degree and location. The degree distribution when some servers enter sleep state, pk, can be expressed based on (9) in [18], as follows. pk = K i=k i k (fi)i−k (1 − fi)k pactive,i, (11) where K is the maximum degree of the original degree distribution pk, fi denotes the probability that a server with degree i will enter sleep state, and pactive,i is the degree distribution of servers in active state. Additionally, pactive,i is given as pactive,i = (1 − fi)pi 1 − j fjpj . (12) Since all servers have the same degree k in our envi- sioned system, the degree distribution of the intra-system network, pk, can be defined as pk = 1, if k = k , 0, otherwise. (13) Additionally, since the ratio of servers with degree k that enter sleep state is ρ, fk is given as fk = ρ, if k = k , 0, otherwise. (14) VOLUME 3, 2015 1029 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 5. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks Therefore, pk can be rewritten as pk = k k f k −k k (1 − f k )k p k . (15) Moreover, the average degree when the ratio of servers in sleep state is ρ, kρ , can be described based on (15). kρ = k k=1 kpk. (16) Based on (16), we can derive the average hop count between any servers when the ratio of servers in sleep state is ρ, hρ . Let |nhl | be the number of l-hop distant servers from a server. Since the 0-hop distant server is the source server and the source server has kρ neighbors, |nh0 | and |nh1 | are 1 and kρ , respectively. Although 1-hop distant servers also have kρ neighbors, some of their neigh- bors are the same server. Therefore, the number of 2-hop distant servers, |nh2 | is given by µ kρ 2, where µ is the ratio of common servers. We suppose that µ is a constant value regardless of hop count. Therefore, |nhl | is represented as |nhl | = µl−1 kρ l. Additionally, since the total number of active servers, |Nactive|, is given as the sum of the number of l-hop distant servers as l goes from 0 to maximum hop count, Hρ, we have |Nactive| = Hρ l=0 |nhl | = 1 + kρ + µ kρ 2 + · · · + µHρ−1 kρ Hρ = 1 + kρ − µHρ kρ Hρ+1 1 − µ kρ . (17) Therefore, the value of Hρ can be formulated as Hρ = 1 ln(µ kρ ) × ln |Nactive| + kρ µ kρ − 1 − 1 µ kρ − 1 kρ . (18) Hence, the average hop count between any servers when the ratio of servers in sleep state is ρ, hρ , can be given as hρ = 1 ρ|N| Hρ l=0 l|nhl |. (19) In the multi-hop communication, since each server waits to transmit its data until its own time slot, the average wait time for each hop is given by /2. Ignoring queuing delay, the delay from a server which has received data from a sensor to the destination server (referred to as internal delay) when the ratio of servers in sleep state is ρ, Dint ρ , can be expressed as Dint ρ = hρ 2 . (20) D. TRADE-OFF RELATIONSHIP BETWEEN POWER CONSUMPTION AND DELAY The rest of this section describes the trade-off relation- ship between system power consumption and internal delay, which is derived from the aforementioned mathematical expressions. Fig. 4 shows the effects of the number of servers in sleep state on the system power consumption and average internal delay. This result is calculated based on (10) and (20) and the parameters are set as follows: Eserver sleep = 10.008 W [19], [20], Eserver active = 32.3 W [12], [21], |N| = 100, µ = 0.4, λ = 0.02 s. As shown in Fig. 4(a), the system power consumption can be reduced in inverse proportion to the number of servers in sleep state. On the other hand, as shown in Fig. 4(b), the average internal delay increases with the increase of the num- ber of servers in sleep state because the average hop count between servers becomes higher in such case. From these results, we can show a trade-off relationship between the system power consumption and internal delay. Consequently, we need to investigate an optimization scheme that considers both system power consumption and internal delay to find an optimal number of servers in sleep state. Moreover, as shown in Fig. 4(b), the average internal delay changes depending on the degree of servers (i.e., k = 5 and k = 7). Since a network with lower degree has a shorter time slot cycle, the delay is lower when the number of servers in sleep state is low. However, since the hop-count increases in an exponential fashion and growth rate is higher in case of lower degree, the internal delay in the network with lower degree becomes higher when the number of servers in sleep state is large. Consequently, we need to jointly control the number of servers in sleep state and the degree of servers. III. PROPOSED ENERGY-EFFICIENT AND DELAY-AWARE WIRELESS COMPUTING SYSTEM In this section, we describe the proposed operation scheme for our envisioned computing system. First, we introduce an opti- mization problem to minimize the system power consumption while satisfying an acceptable delay constraint. Then, based on the optimization problem, we propose a system operation procedure that jointly controls the sleep mode and the degree of servers in a dynamic scenario. A. ASSUMED ACCEPTABLE DELAY AND OPTIMIZATION PROBLEM In order to execute the real-time feedback control, the com- puting system collects various kinds of data (e.g., ambient information, image, video, log, and so forth) from sensors that are deployed in the whole factory, where we define G = {g1, g2, . . . , g|G|}, which denotes the set of data types. Additionally, since the computing system has knowledge about data dynamics (i.e., data arrival time) [22], [23] and the acceptable internal delay of each data is previously defined, it knows the acceptable internal delay of data type gi at time slot t, Dint gi (t). Additionally, a minimum acceptable internal delay at time t, Dint(t), is given by Dint(t) = mingi∈G Dint gi (t). 1030 VOLUME 3, 2015 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 6. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks FIGURE 4. Trade-off relationship between the system power consumption and internal delay. (a) Effect of the number of servers in sleep state on the system power consumption. (b) Effect of the number of servers in sleep state on the internal delay. Our optimization problem aims to minimize the system power consumption while satisfying an acceptable internal delay at each time slot. Note that the delay from sensors to servers (referred to as external delay) is not considered since large number of existing works (see [24], [25]) have already proposed a method to satisfy the external delay constraint. As shown in Fig. 4, the ratio of servers in sleep state affects the system power consumption and the internal delay, and the degree of server also affects the internal delay. Therefore, we can find an optimal ratio of servers in sleep state, ρ∗, and an optimal degree for the servers in active state, k∗ , at time slot t by solving the following integer programing. minimize ρ, k Esystem subject to Dint ρ < Dint(t). (21) B. SYSTEM OPERATION PROCEDURE IN DYNAMIC SCENARIO Here, we propose a system operation procedure for our computing system. In our proposed procedure, the ratio of servers in sleep state and the degree of the servers in active state at each time slot t, ρ(t) and k(t) , are dynamically con- trolled in order to minimize the system power consumption while satisfying an acceptable internal delay. In this regard, ρ(t) and k(t) are decided based on the acceptable internal delay at time slot t + Tsu, Dint(t + Tsu), since each server in sleep state needs time to start-up, Tsu [26]. Procedure 2 System Operation Procedure at Time Slot t 1: Calculate Dint(t ) and t by using (22) and (23) 2: Calculate ρ∗(t ) and k∗(t ) by using (21) 3: Calculate ρ∗(t + Tsu) and k∗(t + Tsu) by using (21) 4: if ρ(t − 1) > ρ∗(t + Tsu) then 5: let {ρ(t − 1) − ρ∗(t + Tsu)}|N| servers in sleep state enter active state 6: ρ(t) ← ρ∗(t + Tsu) and k(t) ← k∗(t + Tsu) 7: else if ρ(t − 1) < ρ∗(t ) then 8: let {ρ∗(t ) − ρ(t − 1)}|N| servers in active state enter sleep state 9: ρ(t) ← ρ∗(t ) and k(t) ← k∗(t ) 10: else if ρ∗(t ) ≤ ρ(t − 1) ≤ ρ∗(t + Tsu) then 11: ρ(t) ← ρ(t − 1) and k(t) ← k(t − 1) 12: end if Procedure 2 describes our proposed system operation procedure. The centralized server executes this procedure at time slot t. First, the centralized server calculates the minimum acceptable delay for the interval from t to t + Tsu, Dint(t ), which is given by Dint(t ) = min t≤a≤t+Tsu Dint(a), (22) where t denotes instant with the minimum acceptable delay for the interval from t to t + Tsu, which is given by t = arg min t≤a≤t+Tsu Dint(a). (23) Furthermore, by solving (21), the centralized server finds the optimal ratios of servers in sleep state and the optimal degrees of servers in active state at time slot t and t+Tsu, respectively. Then, it tries to compare the ratios of servers in sleep state at (t − 1), t , and t + Tsu, ρ(t − 1), ρ∗(t ), and ρ∗(t + Tsu), in order to decide the next action. There exist three cases: (i) when ρ(t −1) > ρ∗(t +Tsu), the centralized server should let {ρ(t − 1) − ρ∗(t + Tsu)}|N| servers in sleep state enter the active state in order to satisfy the acceptable delay at (t +Tsu). In this case, the current ratio and degree, ρ(t) and k(t) , are set to ρ∗(t + Tsu) and k∗(t + Tsu) , respectively. (ii) when ρ(t−1) < ρ∗(t ), {ρ∗(t )−ρ(t−1)}|N| servers in active state can enter the sleep state while satisfying the acceptable delay. In this case, the current ratio and degree, ρ(t) and k(t) , are set to ρ∗(t ) and k∗(t ) , respectively. (iii) otherwise, the centralized server sets the values of ρ(t) and k(t) as the previous values, ρ(t − 1) and k(t − 1) . VOLUME 3, 2015 1031 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 7. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks IV. PERFORMANCE EVALUATION In this section, we evaluate the performance of our proposed energy-efficient and delay-aware operation scheme in our envisioned system by using extensive computer simulations. Furthermore, we confirm the effectiveness of our proposal in comparison with conventional schemes. TABLE 1. Evaluation settings. A. PARAMETER SETTINGS Table 1 describes the settings of our simulations. The simulations are executed for 100 seconds. In these simula- tions, a wireless computing system consisting of 100 servers is considered as a system configuration. The antenna uses a single channel from 59.5 to 62.5 GHz, which is divided into multiple time slots based on our multiple access scheme, where the length of each time slot is 0.02 s. As a channel model, the transmission power, antenna gain, and noise power level are set to 10 dBm, 10 dB, and −70 dBm. Additionally, the path loss is calculated by using [13, eqs. (8), (10), and (11)]. Due to the limitation of radi- ation angle [27], the degree of servers varies from 5 to 13. The power consumption of the servers in active state and that in sleep state are set to 32.3 W [12], [21] and 10.008 W [19], [20], respectively. Additionally, the servers in sleep state need 20 s to start-up [26]. The computing system receives 1000 packets/s, with 1500 bytes per packets, from the sensors. In order to periodically vary the minimum acceptable internal delay of these packets, Dint(t) is given by Dint(t) = sin(t/A) B + C, (24) where A denotes the weight factor for length of cycle, B is the weight factor for range of acceptable internal delay, and C denotes the average acceptable internal delay. Additionally, we consider two functions of Dint(t) in order to evaluate the performance with different ranges of acceptable internal delay. In scenario 1, A, B and C are set to 8, 8, and 0.75. In this case, the range of acceptable internal delay is small. On the other hand, in scenario 2, A, B and C are set to 8, 5, and 0.75. These settings can model a wider range of acceptable internal delay. Fig. 5 demonstrates the change of minimum acceptable delay in each scenario. FIGURE 5. Change in minimum value of acceptable internal delay. In order to verify the effectiveness of our proposal, we compare it with the conventional schemes. As one of the conventional schemes, we use a scheme that dynamically controls the sleep scheduling but uses a constant degree, referred to as dynamic sleep with constant degree (DSCD), where the degree is set to 7. The other scheme, referred to as constant sleep with constant degree (CSCD), consistently uses a constant number of servers in sleep state and the degree of servers in active state, where these values are set to 10 and 7. B. EVALUATING THE IMPROVEMENT IN POWER CONSUMPTION Fig. 6 demonstrates the changes in the power consumption of the system for 100 seconds for different scenarios. First, we discuss this result by using our proposal in scenario 1 as an example. Until 7 seconds, the system satisfies the acceptable internal delay with the maximum number of servers in sleep state (i.e., 40). It starts to increase the number of servers in active state after 8 seconds, because it cannot satisfy the acceptable internal delay after 28 seconds. The number of servers in active state is set to the maximum value at 17 seconds and this setting is kept until 37 seconds to satisfy the minimum acceptable internal delay. Since the acceptable internal delay constraint is relaxed after 37 seconds, the system starts to increase the number of servers in sleep state to reduce system power consumption. As similar to our proposal, DSCD dynamically controls the number of servers in sleep state. Therefore, the power consumption of our proposal and DSCD is altered depending on the value of acceptable internal delay while the power consumption of CSCD is constant. In addition to the sleep control, our proposal decides the adequate degree of the servers. Therefore, it can satisfy the acceptable internal delay with the lower power consumption, compared with DSCD, as shown in Fig. 6(a). On the other hand, in the case of scenario 2, which indicates stricter envi- ronment, our proposal consumes much more power compared with scenario 1 while DSCD and CSCD achieve similar 1032 VOLUME 3, 2015 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 8. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks FIGURE 6. Change in system power consumption in different scenarios. (a) Change in system power consumption in scenario 1. (b) Change in system power consumption in scenario 2. power consumption compared with scenario 1. However, DSCD and CSCD are not capable of satisfying the acceptable internal delay while our proposal succeeds to satisfy the acceptable internal delay. Fig. 7 shows the amount of system power consumption for 100 seconds period. The amount of system power consumption is calculated as the sum of the power consumed at instant t from 0 to 100 seconds. As shown in Fig. 7, our proposal can achieve the lowest system power consumption in comparison with other approaches. Indeed, in case of scenario 1, our proposal achieves approximately 13% and 10% reduction in system power consumption compared to DSCD and CSCD, respectively. Although the reduction ratio decreases in scenario 2, our proposal still achieves lower system power consumption. Consequently, we can confirm the effectiveness of our proposal in terms of system power consumption. C. EVALUATING THE IMPROVEMENT IN DELAY SATISFACTION RATIO The rest of this section demonstrates the delay satisfaction ratio in the different scenarios. The delay satisfaction ratio FIGURE 7. Performance comparison in terms of the amount of system power consumption in the different scenarios. FIGURE 8. Performance comparison in terms of the delay satisfaction ratio in the different scenarios. is expressed as Psatisfaction/Ptotal, where Psatisfaction is the number of packets that are received within the acceptable delay and Ptotal denotes the total number of packets. Since the packet rate is set to 1000 packets/s, the value of Ptotal is 105 packets. Fig. 8 shows the delay satisfaction ratio in the different scenarios. From this result, it is clear that our proposal can achieve the maximum ratio (i.e., 100%) in our simulation environment. On the other hand, DSCD achieves around 60% of satisfaction ratio in scenario 1 and the ratio further decreases in scenario 2. From this phenomenon, we can notice that the constant degree cannot satisfy the accept- able delay and joint control of the sleep scheduling and the degree of servers has great impact on the satisfaction ratio. Therefore, we can conclude that our proposal is effective in reducing the system power consumption while satisfying the acceptable delay. V. CONCLUSION Towards the realization of smart factories based on wireless sensor networks, in this paper, we investigated a novel computing system and its operation scheme. Since conventional computing systems lack the capabilities VOLUME 3, 2015 1033 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 9. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks required for providing industrial IoT applications (i.e., high processing and communication capability, high durability, and low power consumption), we first introduced a computing system based on wireless technology. Additionally, we derived a mathematical model to evaluate the performance of our envisioned system based on complex network theory. This model showed the existence of a trade-off relationship between power consumption and delay required for data collection. Consequently, we proposed an energy-efficient and delay-aware system operation scheme. Our proposed scheme controls the sleep scheduling and network connectivity to reduce the system power consump- tion while satisfying an acceptable delay, which is decided based on the requirement of industrial IoT applications. Simulation results showed that by appropriately selecting the number of servers in sleep state and the degree of servers in active state, the proposal can improve both the system power consumption and satisfaction ratio of delay compared to other approaches. REFERENCES [1] S. Savazzi, V. Rampa, and U. Spagnolini, ‘‘Wireless cloud networks for the factory of things: Connectivity modeling and layout design,’’ IEEE Internet Things J., vol. 1, no. 2, pp. 180–195, Apr. 2014. [2] E. Shellshear, R. Berlin, and J. S. Carlson, ‘‘Maximizing smart factory systems by incrementally updating point clouds,’’ IEEE Comput. Graph. Appl., vol. 35, no. 2, pp. 62–69, Mar./Apr. 2015. [3] J. Pan, L. Cai, Y. T. Hou, Y. Shi, and S. X. Shen, ‘‘Optimal base-station locations in two-tiered wireless sensor networks,’’ IEEE Trans. Mobile Comput., vol. 4, no. 5, pp. 458–473, Sep./Oct. 2005. [4] F. Wang, C. Xu, L. Song, and Z. Han, ‘‘Energy-efficient resource alloca- tion for device-to-device underlay communication,’’ IEEE Trans. Wireless Commun., vol. 14, no. 4, pp. 2082–2092, Apr. 2015. [5] M. R. Palattella, N. Accettura, L. A. Grieco, G. Boggia, M. Dohler, and T. Engel, ‘‘On optimal scheduling in duty-cycled industrial IoT appli- cations using IEEE802.15.4e TSCH,’’ IEEE Sensors J., vol. 13, no. 10, pp. 3655–3666, Oct. 2013. [6] Accenture. (2014). Driving Unconventional Growth Through the Industrial Internet of Things. [Online]. Available: http://www.accenture. com/SiteCollectionDocuments/PDF/Accenture-Driving-Unconventional- Growth-through-IIoT.pdf [7] F. Salvadori et al., ‘‘Monitoring in industrial systems using wireless sensor network with dynamic power management,’’ IEEE Trans. Instrum. Meas., vol. 58, no. 9, pp. 3104–3111, Sep. 2009. [8] A. A. Kumar S., K. Øvsthus, and L. M. Kristensen, ‘‘An industrial per- spective on wireless sensor networks—A survey of requirements, pro- tocols, and challenges,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1391–1412, Aug. 2014. [9] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, ‘‘Fog computing and its role in the Internet of Things,’’ in Proc. SIGCOMM, Helsinki, Finland, 2012, pp. 13–16. [10] K. Ahmed and M. Gregory, ‘‘Integrating wireless sensor networks with cloud computing,’’ in Proc. 7th MSN, Beijing, China, 2011, pp. 364–366. [11] J.-Y. Shin, E. G. Sirer, H. Weatherspoon, and D. Kirovski, ‘‘On the feasi- bility of completely wireless datacenters,’’ in Proc. 8th ACM/IEEE Symp. Archit. Netw. Commun. Syst., New York, NY, USA, Oct. 2012, pp. 3–14. [12] J.-Y. Shin, E. G. Sirer, H. Weatherspoon, and D. Kirovski, ‘‘On the feasibil- ity of completely wirelesss datacenters,’’ IEEE/ACM Trans. Netw., vol. 21, no. 5, pp. 1666–1679, Oct. 2013. [13] K. Suto, H. Nishiyama, N. Kato, T. Nakachi, T. Sakano, and A. Takahara, ‘‘A failure-tolerant and spectrum-efficient wireless data center network design for improving performance of big date mining,’’ in Proc. 81th VTC, Glasgow, Scotland, May 2015, pp. 1–5. [14] A. M. Niknejad, ‘‘Siliconization of 60 GHz,’’ IEEE Microw. Mag., vol. 11, no. 1, pp. 78–85, Feb. 2010. [15] S. Pinel et al., ‘‘60 GHz single-chip CMOS digital radios and phased array solutions for gaming and connectivity,’’ IEEE J. Sel. Areas Commun., vol. 27, no. 8, pp. 1347–1357, Oct. 2009. [16] Z. Guo and Y. Yang, ‘‘On nonblocking multicast fat-tree data center networks with server redundancy,’’ IEEE Trans. Comput., vol. 64, no. 4, pp. 1058–1073, Apr. 2014. [17] Cisco. (2009). Cisco Catalyst 3750 Series Switches. [Online]. Available: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3750- series-switches/prod_qas09186a00801b0971.pdf [18] K. Suto, H. Nishiyama, N. Kato, K. Mizutani, O. Akashi, and A. Takahara, ‘‘An overlay-based data mining architecture tolerant to physical net- work disruptions,’’ IEEE Trans. Emerg. Topics Comput., vol. 2, no. 3, pp. 292–301, Sep. 2014. [19] V. K. M. Raj and R. Shriram, ‘‘A study on server sleep state transition to reduce power consumption in a virtualized server cluster environment,’’ in Proc. 4th COMSNETS, Bengaluru, India, Jan. 2012, pp. 1–6. [20] R. Matsuo, T. Tandai, T. Tomizawa, T. Adachi, and H. Kasami, ‘‘Energy- efficient standby mode algorithm in short-range one-to-one millime- ter wave communications,’’ in Proc. IEEE ICC, Ottawa, ON, Canada, Jun. 2012, pp. 4033–4038. [21] Y. Nakagawa et al., ‘‘A single-chip, 10-gigabit Ethernet switch LSI for energy-efficient blade servers,’’ in Proc. GreenCom, Hangzhou, China, Dec. 2010, pp. 401–411. [22] N. Bisnik, A. Abouzeid, and V. Isler, ‘‘Stochastic event capture using mobile sensors subject to a quality metric,’’ in Proc. ACM MobiCom, Los Angeles, CA, USA, Sep. 2006, pp. 98–109. [23] S. He, J. Chen, D. K. Y. Yau, H. Shao, and Y. Sun, ‘‘Energy-efficient cap- ture of stochastic events under periodic network coverage and coordinated sleep,’’ IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 1090–1102, Jun. 2012. [24] M. Dong, K. Ota, A. Liu, and M. Guo, ‘‘Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks,’’ IEEE Trans. Parallel Distrib. Syst., vol. PP, no. 99, pp. 1–11, Jan. 2015. [25] M. Dong, K. Ota, X. Li, X. Shen, S. Guo, and M. Guo, ‘‘HARVEST: A task-objective efficient data collection scheme in wireless sensor and actor networks,’’ in Proc. 3rd CMC, Qingdao, China, Apr. 2011, pp. 485–488. [26] A. Gandhi, M. Harchol-Balter, and M. A. Kozuch, ‘‘Are sleep states effective in data centers?’’ in Proc. IGCC, San Jose, CA, USA, Jun. 2012, pp. 1–10. [27] M. Ohira, A. Miura, and M. Ueba, ‘‘60-GHz wideband substrate- integrated-waveguide slot array using closely spaced elements for pla- nar multisector antenna,’’ IEEE Trans. Antennas Propag., vol. 58, no. 3, pp. 993–998, Mar. 2010. KATSUYA SUTO (S’12) received the M.S. degree in information science from the Graduate School of Information Sciences, Tohoku University, Japan, in 2013, where he is currently pursu- ing the Ph.D. degree. His research interests are in the areas of big data mining architecture, resilient network design, and wireless networking. He is a Student Member of the Institute of Electronics, Information and Communication Engineers (IEICE). He was a recipient of the prestigious Deans Award from Tohoku University in 2013. He received the best paper award at the IEEE 79th Vehicular Technology Conference (2013-Spring), the IEEE VTS Japan 2015 Young Researcher’s Encourage- ment Award, and the IEICE Academic Encouragement Award (2014). 1034 VOLUME 3, 2015 www.redpel.com+917620593389 www.redpel.com+917620593389
  • 10. K. Suto et al.: Energy-Efficient and Delay-Aware WCS for Industrial Wireless Sensor Networks HIROKI NISHIYAMA (SM’13) received the M.S. and Ph.D. degrees in information science from Tohoku University, Japan, in 2007 and 2008, respectively. He is currently an Associate Professor with the Graduate School of Infor- mation Sciences, Tohoku University. One of his outstanding achievements is Relay-by-Smartphone, which makes it possible to share information among many people using only WiFi func- tionality of smartphones. He has authored over 140 peer-reviewed papers, including many high quality publications in prestigious IEEE journals and conferences. His research interests cover a wide range of areas, including satellite communications, unmanned aircraft system networks, wireless and mobile networks, ad hoc and sensor networks, green networking, and network security. He is a member of the Institute of Electronics, Information and Communication Engineers (IEICE). He received best paper awards from many international conferences, includ- ing the IEEE’s flagship events, such as the IEEE Global Communications Conference in 2010, 2013, and 2014, and the IEEE Wireless Communica- tions and Networking Conference in 2012 and 2014. He was a recipient of the Special Award of the 29th Advanced Technology Award for Creativity in 2015, the IEEE Communications Society Asia-Pacific Board Outstanding Young Researcher Award in 2013, the IEICE Communications Society Academic Encouragement Award in 2011, and the FUNAI Foundation’s Research Incentive Award for Information Technology in 2009. He serves as the Co-Chair of the Cognitive Radio and Networks Symposium of the IEEE International Conference on Communications (ICC) in 2015. He served as the Co-Chair of the Selected Areas in Communications Symposium of the IEEE ICC’14, an Associate Editor of the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY and the Springer Journal of Peer-to-Peer Networking and Applications, and the Secretary of the IEEE ComSoc Sendai Chapter. NEI KATO (F’13) received the bachelor’s degree from Polytechnic University, Japan, in 1986, and the M.S. and Ph.D. degrees in information engineering from Tohoku University, in 1988 and 1991, respectively. He joined the Computer Center, Tohoku University, as an Assistant Professor, in 1991, where he was pro- moted to Full Professor with the Graduate School of Information Sciences in 2003. He became a Strategic Adviser to the President of Tohoku Uni- versity in 2013. He has been involved in research on computer networking, wireless mobile communications, satellite communications, ad hoc & sensor & mesh networks, smart grid, and pattern recognition. He has authored over 300 papers in peer-reviewed journals and conference proceedings. He is a fellow of the Institute of Electronics, Information and Communication Engineers (IEICE). He received several awards, including the Minoru Ishida Foundation Research Encouragement Prize (2003), the Distinguished Contributions to Satellite Communications Award from the IEEE ComSoc of the Satellite and Space Communications Technical Committee (2005), the FUNAI Information Science Award (2007), the TELCOM System Technology Award from the Foundation for Electrical Communications Diffusion (2008), the IEICE Network System Research Award (2009), the IEICE Satellite Communications Research Award (2011), the KDDI Foundation Excellent Research Award (2012), the IEICE Communications Society Distinguished Service Award (2012), the Distinguished Contribu- tions to Disaster-Resilient Networks Research and Development Award from the Ministry of Internal Affairs and Communications, Japan, six best paper awards from the IEEE GLOBECOM/WCNC/VTC, and the IEICE Communications Society Best Paper Award (2012). He serves as the Member-at-Large on the Board of Governors of the IEEE Communications Society, the Chair of the IEEE Ad Hoc & Sensor Networks Technical Committee, the Chair of the IEEE ComSoc Sendai Chapter, the Associate Editor-in-Chief of the IEEE INTERNET OF THINGS JOURNAL, an Area Editor of the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, and an Editor of the IEEE Wireless Communications Magazine and the IEEE Network Magazine. He served as the Chair of the IEEE ComSoc Satellite and Space Communications Technical Committee (2010–2012), the Chair of the IEICE Satellite Communications Technical Committee (2011–2012), a Guest-Editor of many IEEE transactions/journals/magazines, the Sympo- sium Co-Chair of GLOBECOM’07, GLOBECOM’12, ICC’10, ICC’11, and ICC’12, the Vice Chair of the IEEE WCNC’10, WCNC’11, ChinaCom’08, and ChinaCom’09, the TPC Vice Chair of ICC’14, and the Workshop Co-Chair of VTC’10. Besides his academic activities, he also serves on the Expert Committee of the Telecommunications Council and the Ministry of Internal Affairs and Communications, and serves as the Chairperson of ITU-R SG4 and SG7, Japan. He is a Distinguished Lecturer of the IEEE Communications Society and the IEEE Vehicular Technology Society, and a Co-PI of the A3 Foresight Program supported by the Japan Society for the Promotion of Sciences, the NSFC of China, and the NRF of Korea. CHIH-WEI HUANG received the B.S. degree from National Taiwan University, Taipei, in 2001, the M.S. degree from Columbia University, New York, in 2004, and the Ph.D. degree from the University of Washington, Seattle, in 2009, all in electrical engineering. He joined the Department of Communication Engineering, National Central University, Taoyuan, Taiwan, in 2010, where he is currently an Assistant Professor with the Informa- tion Processing and Communications Laboratory. From 2006 to 2009, he was an Intern Researcher with Siemens Corporate Research and Microsoft Research. He has authored papers in a broad range of areas, including wireless networking, multimedia communications, digital signal processing, and information retrieval. VOLUME 3, 2015 1035 www.redpel.com+917620593389 www.redpel.com+917620593389