Next Article in Journal
A Reference-Sampling Based Calibration-Free Fractional-N PLL with a PI-Linked Sampling Clock Generator
Next Article in Special Issue
Reliability Analysis of Wireless Sensor Network for Smart Farming Applications
Previous Article in Journal
Hardware Implementation and RF High-Fidelity Modeling and Simulation of Compressive Sensing Based 2D Angle-of-Arrival Measurement System for 2–18 GHz Radar Electronic Support Measures
Previous Article in Special Issue
PINC: Pickup Non-Critical Node Based k-Connectivity Restoration in Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Framework for Analyzing Neighbor Discovery Protocols under Non-Ideal Conditions

by
Jose Jaime Camacho-Escoto
1,
Eduardo Lopez-Bolaños
2,
Oscar Arana
2 and
Javier Gomez
1,*
1
Telecommunications Deptartment, Engineering Faculty, National Autonomous University of Mexico (UNAM), Ciudad Universitaria, Coyoacán, Mexico City 04510, Mexico
2
Department of Engineering and Computational Systems, IIMAS, National Autonomous University of Mexico, Mexico City 04510, Mexico
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(20), 6822; https://doi.org/10.3390/s21206822
Submission received: 29 August 2021 / Revised: 7 October 2021 / Accepted: 8 October 2021 / Published: 14 October 2021
(This article belongs to the Special Issue Reliability Analysis of Wireless Sensor Network)

Abstract

:
Neighbor Discovery (ND) protocols are crucial to achieving the paradigm of interconnecting thousands of small nodes (sensors or things) to the Internet, also known as the IoT. These protocols usually assume that nodes operate with few energy resources. Therefore, they cannot be fully active all the time. The vast majority of these protocols focus on increasing the probability that two nodes become active simultaneously, thus enabling mutual discovery. In addition, these protocols assume that successful discovery is guaranteed once two nodes are simultaneously active, with very few exceptions. However, many problems can disrupt the discovery, such as channel errors, collisions, synchronization mismatches, energy availability, and so forth. Most ND protocols did not consider these factors, making them vulnerable to severe performance degradation when transmission errors occur. This paper proposes a new framework to evaluate the performance of deterministic neighbor discovery protocols when transmission errors are present. The proposed framework facilitates obtaining an analytical CDF of the discovery time of such protocols with transmissions errors without having to implement the protocol in a simulator, since is time-consuming and prone to implementation errors. We applied the framework to analyze the effect of transmission errors on the discovery time in four of the most representative ND protocols in the literature. Finally, we validate the framework accuracy for the selected protocols using extensive simulations. The results show that the CDF of discovery times provided by the framework closely matches the performance results obtained through simulating these protocols. In general, neighbor discovery protocols are deeply affected as a result of transmission errors.

1. Introduction

Recently, the Internet of Things (IoT) has continued attracting significant interest from academia and industry. In this new paradigm, the Internet devices are predominantly sensors and actuators that work jointly to achieve automation, maintenance, and operational control within systems like vehicles, homes, stores, industry and agriculture, among many other systems. A large portion of the IoT devices are wireless-enabled to operate without a fixed infrastructure. Furthermore, devices in such networks run on batteries or rely on intermittently available energy-harvesting sources. Thus, energy spent on communication needs to be as low as possible.
Energy-constrained devices limit their power consumption by powering down part of their peripherals and clocks to save energy during a period referred to as ‘sleep mode’. This technique has been widely used in MAC protocols since idle listening is one of the major sources of energy waste in communications [1]. A popular approach to decrease energy consumption involves duty-cycling so that nodes use the radio channel for short periods and remain in sleep mode the rest of the time. When the clocks of all participant nodes are synchronized, the duty-cycling approach enables communication, especially when their wake-up schedules are known to all the devices in the network. However, duty-cycled communication schemes under asynchronous communication remain a challenging problem. Moreover, establishing the first contact with neighbor nodes in a wireless network is one of the most important asynchronous procedures since most upper layer applications (e.g., routing or data transfer) rely on achieving an accurate neighbor node identification. This process is known as neighbor discovery (ND). The ND problem consists of efficiently establishing a first contact with neighbor devices in terms of metrics such as discovery latency, missing probability, and power consumption.
Currently, ND algorithms can be categorized into either deterministic or stochastic groups. The deterministic protocols establish a wakeup pattern to schedule periodical operations when performing the discovery of their neighbors. Deterministic protocols, in particular can be further classified into quorum-based [2,3,4,5,6], prime number-based [7,8,9], as well as dynamic listening slots [10,11], and fixed listening slots [12,13]. In contrast, stochastic schemes [14,15,16,17,18] allow nodes to transmit beacons, listen for beacons from other nodes, or sleep in a slot based on a probability distribution. Energy efficiency is ensured by choosing a lower probability for beacon transmission or for listening. On average, stochastic schemes perform better than deterministic schemes. However, stochastic schemes provide no bound on the worst-case latency, leading to longer delays, especially for the last fraction of nodes.
Most existing ND protocols focus on achieving the lowest discovery latency or reducing power consumption. However, few works take into consideration the impact of unreliable wireless links in the ND process. For instance, factors such as intermittent energy sources, random channel errors, collisions, and clock synchronization mismatches can lead to a failure of the ND process. Moreover, since most of the proposed ND protocols present metrics on ideal conditions, the performance evaluation of different ND protocols have often been very subjective, commonly ignoring their performance under non-ideal conditions. Consequently, this paper proposes a new framework to evaluate the performance of deterministic ND protocols when transmission errors are present. The proposed framework facilitates obtaining an analytical CDF of the discovery time of such protocols with transmissions errors without implementing the protocol in a simulator, which is time-consuming and prone to implementation errors. To illustrate how the framework is used, we applied it to four of the most representative ND protocols in the literature. The work in [19] is the closest to ours, yet there are three main differences. First, the main focus of this paper is to present a framework that can study the impact of transmission errors on any deterministic ND protocol. Secondly, we study the most representative ND algorithms instead of only Quorum-based algorithms. Finally, the analysis technique presented in this paper considers standard metrics such as Cumulative Distribution Functions (CDFs) of the discovery latency. Moreover, the main contribution of this study is twofold: (i) present a framework to approximate the CDF of the discovery latency of ND protocols under non-ideal conditions, and (ii) it applies the framework to four of the most representative ND protocols with their respective CDFs when transmission errors are present.
The rest of this paper is organized as follows: For clarity, Section 2 provides an overview of the most representative ND protocols and presents works carried out under non-ideal operating conditions. Section 3 introduces the proposed framework methodology to model the behavior of deterministic ND protocols under non-ideal operating conditions. Section 4 validates the framework and describes the simulations that were carried out as well as the obtained results. Section 6 discusses the main findings and Section 7 concludes the paper.

2. Related Work

Over the past years, the development of ND protocols has focused on strategies that achieve the discovery of neighbor nodes constrained to a bounded latency. More recently, however, researchers have focused on accomplishing ND under energy harvesting scenarios [20]. In either case, few researchers have taken into consideration the ND problem under non-ideal wireless channel conditions [19,21]. This section first introduces the most representative ND protocols. Secondly, it presents a brief description of related works and their main differences.
As aforementioned, ND protocols can be classified into two categories: deterministic or stochastic. Table 1 presents a chronological summary of the most significant ND protocols. Most ND protocols in each subclassification share a similar working principle. For instance, Quorum-based schemes [2,3,4,5,6] guarantee that two nodes have at least one activity slot in common by being active in N in a period of N 2 slots. These schemes result in relatively high duty cycles. Prime number-based schemes, in contrast, require a node to choose a single prime number (e.g., U-Connect [7]) or a pair of prime numbers (e.g., Disco [8]) to derive their duty cycles. A node’s activity slots will be the multiples of the selected prime number(s). In this case, discovery latency is equal to the time slot corresponding to the product of the prime numbers used by the two nodes. An extension to this approach is presented in [9]; this work uses differential codes built from each pair of relative prime numbers to carry out the ND process. Active slots can be further divided into listening and transmitting slots. For instance, in dynamic listening slots schemes, ND protocols set transmission slots at fixed positions (i.e., either at the beginning or end of a predefined cycle), and listening slots are dynamically shifted to either the left or right of successive cycles. Searchlight [10] illustrates such an approach. It uses one fixed slot at the beginning of each cycle, and a dynamic slot is shifted to the right on each consecutive cycle. Another example is Blinddate [11], that uses one static slot in each cycle and two dynamic listening slots, one shifted to the right and one to the left in each consecutive cycle. The last classification considered consists of a fixed schedule for listening slots. Nihao [12] takes this approach in which there are more transmitting than listening slots in a given period. Furthermore, in Hello [13], nodes listen more at the beginning of the period and periodically wake up for transmissions. This scheme can be considered a generalization of several other mechanisms, such as Disco, U-Connect, and Searchlight.
In contrast, stochastic schemes such as Birthday [14], Aloha-like [15], and others [16,17,18], allow nodes to transmit beacons, listen for beacons from other nodes or sleep based on a probability distribution. In Panda, each sensor remains asleep initially and, then, the node sleeps with the sleep time following an exponential distribution. Following the sleep step, sensors wake up and listen for a constant time. If no packet is received in the listening state, the node broadcasts one packet to others. However, as aforementioned, none of the stochastic algorithms can guarantee successful discovery for the worst-case scenario or provide an upper bound on the discovery latency among the nodes. The only metric applicable is the expected time to discover all neighbors.
As can be noted in Table 1, a plethora of ND protocols has been proposed in the last two decades, with new solutions still appearing even today. Recently, the authors in [34] established a relationship between optimal discovery latency, channel utilization, and duty cycle. According to their analysis, some recent proposals perform optimally and cover parts of the latency/channel utilization/duty-cycle Pareto front. As these authors suggest, the coverage of the entire Pareto front implies no further potential for improvement. However, there is still potential to improve the robustness against non-ideal conditions [34]. Indeed, as far as the authors know, only a few related studies consider performance evaluations under non-ideal conditions. For instance, the authors in [19] assume a certain probability that an unreliable link would affect the discovery. Within this scenario, they proposed both deterministic and stochastic algorithms to solve the asynchronous ND problem with an unreliable link model. In [21], the authors propose Spear, a practical neighbor discovery framework that promises to reduce communication collisions, thus boosting the coincidence rate of existing ND protocols. However, the results of both [19,21] evaluations relied on the choice of protocols, their parametrizations, and the assumed setups. Hence, while a specific protocol might outperform others in such a comparison, it might perform differently if the parametrization or setup is changed. Moreover, for many protocols, it is also not clear how to optimally parametrize them. Given the different kinds of neighbor discovery protocols, there has also been no standard way of comparing them and their performance [34]. A common practice in literature consists of evaluating the performance of most ND protocols using the cumulative distribution function (CDF) of the discovery time and the worst-case boundary. Nevertheless, the worst-case boundary can only exist if there are no transmission errors, that is, under ideal conditions.
Consequently, this paper presents a framework capable of estimating the CDF of deterministic algorithms under non-ideal conditions. In particular, despite the difference in underlying principles (i.e., classifications), deterministic protocols exhibit some similarities. For instance, the active slots in Disco and anchor nodes in Searchlight show a repetitive pattern under both symmetric and asymmetric duty cycles [35]. This key observation makes it possible to develop a framework to model the CDF of deterministic protocols (i.e., Quorum, Disco, U-Connect, Hello, and Searchlight) under non-ideal conditions regardless of their parametric setups.

3. Framework to Model Deterministic Algorithms

The CDF for two devices represents the probability that a coincidence between two devices already occurred at a given time. In particular, we considered pairwise discovery since most of the related works assume that nodes join an IoT network gradually, and the discovery procedure takes place only between the nearest neighbors. Moreover, in general, it can be considered that discovering multiple devices always relies on pairwise ND. In particular, we consider the pairwise discovery paradigm since the selected ND protocols develop their respective analytical CDF (i.e., under ideal conditions) based on this particular scenario.
The CDF considers all the possible shifts between the two devices regarding the time in which they started to operate and the moment they came in range of each other. Figure 1 shows that the shift is the number of slots between the two devices given that the ND protocol of device two was started after the ND protocol of device one. This value can be arbitrarily large, and is obtained through a random uniform variable. The start slot is a random time that represents the effect of two nodes, already running their protocol, becoming neighbors at an arbitrary moment.
Many physical and MAC layer impairments can disrupt a wireless transmission from the transmitter to the receiver. For instance, channel-induced errors and collisions may prevent the receiver from getting the transmitted packet correctly at the physical layer. At the MAC layer, radios in small sensors are usually half-duplex. As a result, even if nodes wake up simultaneously, a successful reception means one node is transmitting while the other node is in receive mode; any different combination will not work. Even synchronizing nodes such that they wake up simultaneously is troublesome as clocks drift over time. Although it is difficult to consider the impact of one of these error sources in the performance of ND protocols, is far too complex to conduct a performance analysis for all of them simultaneously, at least in a single piece of research.
For this reason, this paper models transmission errors using a simple random variable that could be controlled. While this simplified error model strategy does not model any actual physical or MAC layer error source, it simplifies the analysis required to develop the framework. This simplified error model will can respond to some critical issues, such as the widespread impact of transmission errors on a particular ND protocol or, more importantly, which of the considered ND protocols are more resilient to transmission errors.
For this purpose, let P s be the probability that a transmission is successful. Any P s value below one means that there exist some transmission errors with probability P e = 1 P s . For a neighbor discovery to be considered successful, it is necessary that node A finds node B and vice versa. Therefore, node A has a probability of success P s to discover node B, and node B has a probability of success P s to discover node A.
Deterministic algorithms behave different from stochastic ones since they ensure the coincidence at most in their corresponding worst case. Nevertheless, when operating under non-ideal conditions, errors might occur that eliminate such boundaries.
To model the CDF of deterministic algorithms in non-ideal conditions, time is divided into phases p n . For each algorithm, the phase length is the number of slots required to start a new cycle (i.e., the same pattern of active/inactive slots) between both devices and is denoted as . Figure 2 shows an example of the phases for two asymmetric devices. Device 1 is active for one slot and then inactive for two slots. Device 2 is active for one slot and inactive for four slots. Thus, Device 1 has a 33% duty cycle while Device 2 has a 20% duty cycle. The phase length for those two devices is 15 since the pattern is repeated every 15 slots. For example, phases marked as p 1 and p 2 always begin with an inactive slot for Device 1 and an active slot for Device 2; the second slots are always inactive for the two devices, and so on.
For some symmetric protocols (i.e., Hello and U-Connect), might equal the worst-case boundary. It is not the case with Quorum, for which is the entire m × m square. For asymmetric protocols, the value of can be computed as:
= p f 1 · p f 2 ,
where p f 1 and p f 2 are the periodic frame sizes of a protocol for nodes 1 and 2, respectively. Periodicity assumes that the sequence of active/inactive slots will repeat itself after p f slots.
When deterministic algorithms are subject to errors, they have a fixed interval behavior, as can be seen in Figure 3. The length of each interval is . During subsequent intervals, the behavior is similar to the previous ones but scaled. Equation (2) represents the CDF composed of two parts: the behavior during the current phase and the coincidences during the former phase.
P c n = f n mod · P f s p n P f s p n 1 + P f s p n 1 ,
where f is a function representing the behavior during each phase under ideal conditions and P f s p n is the probability that a coincidence may occur during phase p n given the probability of success P s . In this paper, we consider that f can be: (i) A straight line from the origin to the worst-case and 100% of coincidences; (ii) The CDF under ideal conditions. In some cases, it is possible to develop functions that represent the protocol’s behavior more accurately by making no assumptions in the ideal CDF.
p n is the current phase and is closely related to the protocol design. For each protocol, p n is computed as:
p n = n .
When the protocol is symmetric, P f s can be computed through Equation (4). The equation computes the mean probability that the coincidence may occur in phase p n , considering that the coincidence did not occur in previous phases. This computation considers all the possible phase shifts and the number of coincidences in each of those shifts.
P f s p n = 0 p n = 0 1 · s = 0 1 1 P s 2 c ( s ) · 1 P s 2 c ( s ) p n 1 p n > 0 ,
where c s is a function representing the number of coincidences that the protocol has in a single phase, given a shift of s slots between the two devices, this function needs to be computed by analyzing the behavior of the evaluated protocol. It will be detailed later for each considered protocol as an illustration. Figure 4 shows an example of function c s for a symmetric protocol, where the length of is 16; therefore, the same sequence will be repeated after 16 slots. The active slots are 1, 2, 4, 7, 11, and 16. This figure shows a shift of 6 slots between the starting time of the two devices, so it is used to compute c 6 . For that particular shift, the deterministic protocol will have exactly two coincidences located at slots 1 and 11.
The following subsections present a brief description of four deterministic ND protocols, their ideal CDF, and their non-ideal CDF derivation by applying the proposed framework.

3.1. Disco

Disco [8] is based on the Chinese Remainder Theorem and uses prime numbers to ensure slot coincidence between devices. It introduces the idea of using relative prime numbers as the number of slots in a frame for a given device. Device d will have a frame of size p d . Then, each device activates the first slot of the frame, that is, in slots 0, p d , 2 p d , and so forth. An example of Disco slot structure for one device is shown in Figure 5 for p = 11 . Active slots are always located at the beginning of each frame and are colored in blue.
Using different relative prime numbers p 1 and p 2 for devices 1 and 2 ensures that Disco has a coincidence in at most p 1 · p 2 . It is essential to highlight that if p 1 and p 2 are not relative primes, the coincidence might not occur. The CDF of Disco in Equation (5) is a straight line from 1 to p 1 · p 2 , which means that any value has the same probability of occurrence.
P ( c n ) = n p 1 · p 2 .
As Disco uses two different relative prime numbers, it is inherently asymmetric, and to model it, we use Equation (4) with = p 1 · p 2 . Disco has exactly one coincidence every p 1 · p 2 slots. Then, the c s of Disco is represented by Equation (6).
c s = 1 .

3.2. Quorum

There are many algorithms based on Quorum techniques. In the one presented in [22], the algorithm uses an m × m matrix as the frame structure. Then, one row and one column from that matrix are chosen for active slots, which ensures that two devices will have at least two coincidences upon a frame even if both devices selected different rows and different columns. Figure 6 shows an example of a 16-slot frame for one device. The upper part shows a matrix representation where the second row and column are selected. The active slots are blue, whereas the inactive slots are white. The bottom of the figure shows the same choice of row and column but is represented as continuous slots over time.
In the worst-case scenario, the devices will have a coincidence at most in m 2 slots. The cumulative discovery latency of this Quorum system is given by:
P ( c n ) 1 ( 1 n m 2 ) 2 .
Quorum uses symmetric duty cycles, so Quorum performance under non-ideal conditions can be described by Equation (4). First, we can note that Quorum has a phase length of = m 2 , which is different from the worst-case since Quorum ensures at least two coincidences in a phase. To obtain the c s of Quorum, we first make some clarifications. First, in the case of a perfect shift (when the shift is a multiple of ), the number of coincidences is 2 m 1 . Otherwise, when s h i f t < m , the number of coincidences is m + 1 s h i f t because part of the active slots row has overlapped. Otherwise, when s h i f t mod m is 0, the number of coincidences is m. This case represents an overlap in the active slots column. In any other case, the number of coincidences is 2. Notice that s h i f t represents the relative shift, that is, s h i f t = min s h i f t , m 2 s h i f t . Equation (8) summarizes the behavior of c s for Quorum as follows:
c s = 2 m 1 s h i f t mod m 2 = 0 m + 1 s h i f t 0 < s h i f t < m m s h i f t mod m = 0 s h i f t mod m 2 0 2 o t h e r w i s e .

3.3. Hello

Hello [13] is a generalization of U-Connect. It assumes that the frame size might not be a prime number for two nodes with the same duty cycle. Devices will be active at the first slot of each frame and inactive through the rest of the frame. To ensure that a coincidence occurs, device u has to be active for the first ς u 2 slots every ς u frames. Figure 7 displays an example of the slot structure in one device for ς = 12 where the black slots, called guardians [13], represent the active slots because those are the first of each frame. Blue slots are active because those are the first ς u 2 in the first frame and are referred to as patrols. Notice that the blue slots will appear again after ς frames.
In Hello, devices 1 and 2 will have a coincidence at most at ς 1 · ς 2 slots. The discovery latency for the case ς 1 = ς 2 = ς can be approximated as:
P ( c n ) n / ς ς 2 .
The symmetric version of Hello relies on devices having the same duty cycle. Equation (4) is used to compute Hello’s behavior under non-ideal conditions. For Hello, c s has four cases according to the protocol: when the two devices are fully synchronized, when the absolute value of the shift between both devices is less than half the frame size ς , when the shift is a modulus of ς , and all the other cases. For Hello, we define the absolute value of the shift as s h i f t = min s h i f t , ς 2 s h i f t . Equation (10) models the behavior of c s for Hello in each of the above cases.
c s = ς + ς 2 s h i f t mod ς 2 = 0 ς 2 + 1 s h i f t 0 < s h i f t < ς 2 ς s h i f t mod ς = 0 s h i f t mod ς 2 0 1 o t h e r w i s e .
In the case of Hello, for function f, we will use a line since the CDF has the same form.

3.4. Searchlight

Searchlight [10] uses two active slots during each frame, namely an anchor and a probe. The anchor is always the first slot in the frame, and the probe varies from frame to frame. The original manuscript shows that it is sufficient to choose the probe from the first (or last) half of the frame to guarantee an anchor-probe coincidence. Thus, Searchlight ensures that the coincidence occurs at most after f = t 2 frames under ideal conditions, where t is the number of slots in a frame.
Although the original manuscript presents two versions, we focused on Searchlight-S (sequential) since Searchlight-R (random) has a stochastic component. Searchlight-S chooses the probe sequentially in a round-robin manner. The example in Figure 8 displays the first three frames of a single device for Searchlight-S when t = 12 . The black slots are the anchors, and the blue slots represent the probes. It can be seen that anchors are always at the beginning of each frame while the probe sequentially moves to the right. The process will continue up to the t 2 -th frame, after which the probe will restart to the same position as in Frame 1.
In the literature, there is not a latency model for Searchlight-S. However, we propose an approximation as:
P ( c n ) = 2 t · t 2 · n n f 2 .
For the symmetric Searchlight-S version, we have four cases to compute function c s . The first case is when devices are fully synchronized, so all possible anchors and probes are coincidences (there are t coincidences). The second case is when the shift is equivalent to a phase, all the anchors are coincidences, but no probe will coincide. The third case is when the shift between devices is the largest possible, that is, t 2 . In that case, one probe from each device has a coincidence with an anchor. In the last case, the devices tend to synchronize their probes. This way, a fraction of the probes coincide while there is only one anchor-probe coincidence. In any other case, there is one coincidence. The function that summarizes the five cases is presented in Equation (12).
c s = t s h i f t mod t t 2 = 0 t 2 s h i f t mod t = 0 s h i f t mod t t 2 0 2 s h i f t mod t = t 2 t 2 i + 1 s h i f t = i · t + i 0 < i < t 2 i Z t 2 i + 1 t t 2 s h i f t = i · t + i 0 < i < t 2 i Z 1 o t h e r w i s e .

3.5. Stochastic Algorithms

Stochastic algorithms are inherently unbounded since it is impossible to predict a limit upon which the coincidence is guaranteed. Stochastic trials are good in practice despite the lack of boundaries since they have a lower mean coincidence time. Although the presented framework cannot be applied to these protocols, they were considered to compare their performance under unreliable transmissions.

3.5.1. Birthday

In [14], the authors propose a neighbor discovery technique based on the birthday math problem where the probability of encounter between devices increases when the number of nodes increases. In Birthday BLT, the devices may appear in three states: sleep, transmit or receive. In each slot, a device will choose its state randomly. It will be in transmit state with a probability of p t , receive state with a probability of p r , and sleep with a probability of 1 p t p r . Since it is a stochastic technique, it cannot ensure that the coincidence will occur after a given time. On the other hand, Birthday’s discovery latency can be expressed as:
P ( c n ) = 1 1 p t · p r n .
Equation (14) models Birthday’s CDF under non-ideal conditions, as follows:
P c n = 1 1 2 · P s · p t · P s · p r n .
When p t = p r = p 2 , Equation (14) becomes Equation (15). Values of p t and p s are chosen to maintain a duty cycle of p and have the same transmitting or receiving probability.
P c n = 1 1 P s · p 2 2 n .

3.5.2. Random

Optimization of the basic Birthday protocol refers to the process in which each device randomly chooses its active slots according to its duty cycle. So, when two devices coincide at the same active slot, they exchange information and identify as neighbors. For simplicity, throughout this paper, we assume that devices send beacons at the beginning and end of each active time slot and listen to beacons from other devices during the remaining slot time. Although this is not the only strategy designed to exchange information between nodes in an active slot, it is by far the most widely used strategy in the literature [19].
Let p be the node’s duty cycle. That is, the probability that a node is active in a particular slot is also p. We define the probability that a couple of devices are simultaneously active, for the first time, at slot n as:
P ( c = n ) = ( 1 p 2 ) n 1 ( p 2 ) .
So, the discovery latency in the Random protocol can be expressed as:
P ( c n ) = i = 1 n ( 1 p 2 ) i 1 ( p 2 ) .
Then, the probability that a coincidence occurred at most at the n-th slot is represented as:
P ( c n ) = 1 1 p 2 n .
Plain [19] is one of the few protocols designed to work under unreliable scenarios. Its behavior, as well as its CDF, are very similar to those of Random. The main difference is that Plain will always be active in p 100 slots, while Random might not always accomplish this (although in average it does accomplish it). For this reason, this paper only considers Random.
The Random protocol is extended to non-ideal conditions by adding the probability of success P s to Equation (17) as follows:
P c n = i = 1 n 1 P s · p 2 i 1 P s · p 2
P c n = 1 1 P s · p 2 n .

4. Framework Validation

This section validates the proposed framework using simulations developed in Python. For this, we implemented the behavior of each protocol according to their specifications, adding the probability of success P s . Each protocol was simulated 100k times using a different seed for each experiment. The seed changed random numbers, shifts, and the start of each simulation for each protocol. A coincidence occurs when the protocol dictates that both devices are active during the same slot and a uniform randomly generated number R P s for each of the two devices. The simulation parameters for each protocol for 10% and 1% duty cycle are shown in Table 2. Those parameters are selected to accomplish the required duty cycle as close as possible.

4.1. Simulator Validation under Ideal Conditions

We used Figure 9 and Figure 10 to validate the simulator accuracy versus the analytical CDF already found in the literature under ideal conditions (i.e., P s = 1 ) before moving to perform extensive simulations in non-ideal conditions. This validation was performed under ideal conditions since those are the only CDFs available in the literature for the reviewed protocols. It should be recalled that some analytic CDFs relied on assumptions regarding the shifts to obtain a more straightforward equation. Usually, the obtained CDF does not consider the cases in which the shift is perfect or a modulus of the period [7,22]. When frame size increases, these cases are less likely to occur, and thus the approximation becomes more accurate. This effect can be observed in Figure 10, in which the analytic plots fit much better than in Figure 9, in which the duty cycle is higher (and the frame size is consequently smaller).

4.2. Analytic Model Validation under Non-Ideal Conditions

The model proposed in Section 3 was validated via simulations for each protocol. We present comparisons between analytic and simulation plots and the error between both to characterize the discrepancies. Simulations were run 100k times to maximize the convergence of the protocol and decrease the error due to simulations. Each of the simulations uses a randomly generated shift and start to comply with CDF definitions. There are two devices in each simulation, and we plotted the protocol’s analytical CDF, simulations, and the error between both.
Figure 11 shows the validation for Disco. Its CDF under ideal conditions behaves quite linearly, and f n mod is also modeled as a line with f x = x p 1 p 2 . Accordingly, in Figure 11a, the approximation of the analytic model fits very well compared with the simulations. The error plotted in Figure 11b never goes over 0.4 × 10 3 . It is thus related to the randomness of the simulations. To prove this, we ran the experiments ten more times, and the mean error in the interval 0 , 2000 decreased three times compared with 100k simulations. However, the time needed to complete 1 million experiments took ten times longer.
For Quorum, we use two different approaches of f n mod , as shown in Figure 12. The first approach uses f as a straight line with f x = x m 2 , while the second approach uses the Quorum’s CDF under ideal conditions f x = 1 ( 1 x m 2 ) 2 . Figure 12a, shows that none of the models fit perfectly, like in Disco. Instead, both approaches demonstrate different behaviors. The straight-line approach tends to be under the simulations line, while the CDF approach is above for both P s = 50 % and P s = 90 % . On the other hand, Figure 12b shows that the CDF overcomes the line approximation for P s = 90 % in the first phase. Nevertheless, for P s = 50 % , the line approximation produced better results. These plots show that the proposed model’s accuracy is closely related to selecting f n mod .
An ideal CDF of the Hello protocol is modeled as a line. Although authors in [7] state that this is only an approximation and does not consider special cases occuring at the beginning and end of a phase. For that reason, for Figure 13, we modeled f n mod as the line represented by f x = x ς 2 (in this case, the CDF). Figure 13a shows that the model is not very accurate during the first phase but improves afterwards. The same behavior occurs in Figure 13b, where the maximum error is about 5 % for P s = 90 % and then decreases until it becomes imperceptible during the third phase and so on. The assumptions of the CDF caused this effect. The ideal CDF did not consider the case where the absolute value of the shift between two devices is lower than ς 2 , where the number of overlapping active slots is more than one. It also did not consider cases where the shift is a multiple of ς , where the number of overlapping active slots in a phase is always ς . Such cases with a high probability of discovery during the first phases are less likely to occur during later phases. Thus, they have much weight only during the first phases and become less significant in later phases.
Searchlight was evaluated using the ideal CDF as a straight line with f x = x t t 2 . The results are shown in Figure 14. The CDF plotted in Figure 14a shows that the error from Figure 14b has a similar trend to the one observed in Hello (i.e., showing errors that decrease after each phase). This behavior is related to: (i) devices with a perfect shift, the only shift where all the anchors and probes coincide, and (ii) devices with shifts where some probes show coincidences.
Finally, Figure 15 shows the validations for Random and Birthday protocols, respectively. Both algorithms use uniformly distributed random variables to select the state in a given slot. Furthermore, both use the same approximation to compute their non-ideal CDFs. Both figures show the CDF plots for P s = 90 % and P s = 50 % . Figure 15 show that the obtained approximation fits very well for both probabilities of success.

5. Protocol Comparison under Non-Ideal Conditions

When subject to unreliable conditions, neighbor protocols demonstrated a very different behavior from that observed under ideal conditions. This section aims to compare the behavior demonstrated by the six analyzed protocols. Simulations in this section made it possible to handle parameters like duty cycle and probability of coincidence to compare the performance of the neighbor discovery protocols performance under reliable and unreliable conditions. We omit the Plain [19] protocol since the behavior is very similar to that of Random, and the differences are imperceptible.

5.1. Duty Cycle vs. Error

To assess the impact of the duty cycle, we evaluate P s for 90% and 50%. Figure 16 presents plots in which 98% and 80% of coincidences have already occurred in a given slot. Notice that for each plot, when a given algorithm is the n-th best algorithm for the given probability of error and encounter probability, it remains the n-th best algorithm regardless of the duty cycle. There are minor deviations from this behavior caused by the inaccuracy of the duty cycle.
Figure 16a shows that most protocols reached 98% of coincidences simultaneously, but Disco and Birthday were always the best and worst protocols, respectively. On the other hand, in Figure 16b, there is a more significant difference for 80% of discoveries between Random, Hello, Quorum and Searchlight. In this plot, Disco and Birthday are also the best and the worst, respectively. When evaluated at P s = 50 % , Figure 16c,d indicate that Birthday, Hello, Quorum and Searchlight have similar behaviors. However, Random and Disco differ from the rest of the protocols and have the best performance for both 98% and 80% of discoveries. It is worth noting that for P s = 50 % , Birthday’s performance was very similar to that of Quorum, Searchlight, and Hello.
In general, plots indicate that as the duty cycle increases, the number of slots to achieve a discovery decreases for any percentage of coincidence, and error probability ( P e = 1 P s ) behavior demonstrates the same trend. This is a natural consequence of each protocol design. In order to change the duty cycle in some protocols, the frame size could be constant, but the number of active slots increases. Other designs have fixed active slots, so frame size decreases.
Comparing Figure 16a,d emphasizes how stochastic protocols perform much better than the rest of the previously described protocols when P s decreases; despite duty cycle changes, they keep overcoming deterministic protocols.

5.2. Probability of Coincidence vs. Error

A parameter that affects the relative effectiveness of a particular algorithm compared to others is the probability of success P s . As seen in Figure 17, algorithms that have a good performance when P s = 1 decrease their performance along with P s . For example, in Figure 17a, Hello had one of the lowest latencies for P s = 1 but had the highest latency when P s < 0.5 . This effect is more visible for lower duty cycles and a higher percentage of discoveries. Another example in Figure 17c is the Random algorithm, the second-worst when P s = 1 but becomes the second-best when P s < 0.85 .
The slope of the plots in Figure 17 provides a good view regarding the sensitivity of each protocol to changes in P s . Deterministic protocols have more negative slopes in the presence of transmission errors, which makes them more sensitive to changes in P s . On the other hand, stochastic protocols are more resilient to variations in P s , and their slopes are less negative. Protocols that have a good performance at achieving 80% of discoveries do not necessarily have good performance for 98% of discoveries. Disco is the only deterministic algorithm that outperforms the stochastic ones in each scenario. This occurs because of the constant value of the c s and the reduced worst-case boundary, allowing all possible shifts to have the same probability of coincidence. Moreover, the other deterministic protocols reviewed benefited some shifts but harmed others while having greater worst-case boundaries.

6. Discussion

In the literature, most of the proposed ND protocols were designed and tested under ideal conditions. They assumed that whenever two nodes become active in the same slot, neighbor discovery was guaranteed. However, a more realistic scenario would consider channel errors, lack of energy, sync issues, among other factors. All these factors may cause the neighbor discovery process to fail. This paper introduced a novel framework for evaluating the performance of deterministic ND protocols under non-ideal conditions, a framework later validated by simulations. A discussion of the findings is as follows:
In general, reducing the probability of a successful transmission ( P s ) increases the latency for all ND protocols. Nevertheless, the latency of studied ND protocols is not likewise affected by the probability of error P e (recall that P e = 1 P s ). Table 3 summarizes results from Figure 17, showing the number of slots required to achieve 90 % and 98 % of coincidences under several values of error probability (i.e., 0 % , 30 % , and 50 % ). As can be noted, a P e of 30% doubles the number of slots required for stochastic algorithms to reach 90% and 98% of coincidences compared with a P e = 0%. In contrast, deterministic protocols require 2.27 and 5.78 times more slots to reach 90% and 98% of coincidences for a P e = 30% versus a P e = 0%. Furthermore, for P e = 50%, while stochastic protocols require four times more slots than for P e = 0 % , deterministic protocols require up to 14.04 times more slots under similar conditions. The above results show that deterministic ND protocols perform well but only under ideal conditions. Once transmission errors appear, these protocols’ rigid, precise operation breaks, requiring more slots to discover a neighbor than otherwise simple, memory-less stochastic protocols.
In most deterministic protocols, if the frame shift between two nodes is known, the slot in which the two nodes will discover each other under ideal conditions can almost be predicted. This operation predicts in which slots the two nodes will meet and in which other slots they will not meet. Together with the periodic behavior of deterministic protocols, this condition made it possible to design the framework presented in this paper. This framework requires computing three main parameters from the protocol operation, namely, the period length , the function describing the coincidences given a shift c s , and the function describing the protocol’s behavior during each phase f n mod . The presented framework can save much time in evaluating the performance of a newly designed deterministic ND protocol since it takes much less time to obtain results compared to simulations.
The and c s can be directly obtained for each protocol specification. On the other hand, f n mod needs to be computed not necessarily from the protocol specification. To obtain quick results, f n mod can be easily approximated as a straight line from the origin to the worst-case boundary (and 100% of the coincidences). This approximation will have better results for low P s values, even if the ideal CDF is unknown. Besides, the selection of f n mod for a protocol is crucial to the framework’s performance. A poor function choice might lead to greater errors, especially for high values of P s .
The fact that some active slots in deterministic protocols have a different probability of discovery plays against these protocols once transmission errors occur. Consider, for example, the slot where the protocol’s operation predicted a discovery under ideal conditions, but failed due to transmission error. In this case, it will take many more active slots for both nodes to again reach a slot in which discovery becomes feasible. On the other hand, stochastic protocols have approximately the same probability of discovery in each active slot. If two nodes miss a discovery in one active slot due to transmission errors, they will have the same probability of discovery in the following active slot. The later behavior better suits operation under non-ideal conditions, and this is the reason behind the lower increase in latency values for the Random and Birthday protocols found in Table 3.
It should be recalled that the main goal behind most ND protocols is to discover neighbor nodes with the lowest possible bounded latency. The pursuit of this goal has led to an underestimation of simple stochastic protocols that do not provide such bounds and can lead to potentially long delays. The results presented in this work should lead to a reconsideration of this paradigm. As this work demonstrates, bounded delays for deterministic algorithms are no longer feasible in the presence of transmission errors. Their main advantage over stochastic algorithms thus disappears. This consideration should encourage a departure from traditional bounded delays and CDF metrics and should make it possible to consider other metrics for protocol evaluation in the future, such as the expected latency. The design process of future ND protocols must consider the impact of transmission errors from the start and not only as part of their performance evaluation.
Finally, this work did not consider power consumption in the overall evaluation of the protocols. While it seems apparent that longer latency values due to transmission errors will translate into higher power consumption, it is a topic that needs to be addressed carefully, especially now that bounded delays are no longer present. While this paper summarizes all the non-ideal conditions that may give rise to transmission errors, it might happen that the discovery failed simply because one node did not have enough energy to transmit in energy-harvesting scenarios. In this latter case, the discovery failure did not account for any power consumed by the node. This and other power-related issues need to be considered in the future.

7. Conclusions

Neighbor discovery remains a crucial task for the adequate operation of many IoT applications, allowing wireless-enabled nodes to find each other in power-depleted environments. While previous studies of ND protocols considered ideal communication conditions, this paper proposes a new framework for evaluating the performance of deterministic neighbor discovery protocols when transmission errors are present. This framework can be used even if the error-free CDF of the ND protocol is unknown and can yet achieve lower errors. In particular, the proposed framework characterizes an ND protocol in terms of its fixed-length interval behavior given the set of possible shifts. The proposed framework was applied to four of the most representative deterministic ND protocols found in the literature (i.e., Disco, Searchlight, Quorum, and Hello) to illustrate its usage and validate the framework’s accuracy. Comparing the behavior of the four selected protocols, as well as two stochastic ND protocols (i.e., Birthday and Random) which were added for comparison purposes, we found, in general, neighbor discovery latency increases for all the considered protocols as the probability of transmission failure increases. However, results suggest that deterministic ND protocols are more vulnerable to performance degradation than non-deterministic ND protocols that are more resilient to transmission errors. This framework shortens the time needed to study the impact of transmission errors on existing and future designs of ND protocols that will otherwise have to be implemented in a simulator, a process that can be time-consuming and is prone to error.

Author Contributions

Conceptualization, J.G. and J.J.C.-E.; Formal analysis, J.J.C.-E. and E.L.-B.; Software, J.J.C.-E.; Writing–original draft J.J.C.-E. and E.L.-B.; Investigation, O.A.; Writing–review and editing, J.G. and O.A.; Project administration, J.G. All authors read and agreed to publish to the published version of the manuscript.

Funding

This research was funded in part by UNAM-PAPIIT grant number IN119820.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
NDNeighbor Discovery
IoTInternet of Things
CDFCummulative Distribution Function
MACMedium Access Control

References

  1. Ye, W.; Heidemann, J.; Estrin, D. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, New York, NY, USA, 23–27 June 2002; Volume 3, pp. 1567–1576. [Google Scholar] [CrossRef]
  2. Maekawa, M. A N algorithm for mutual exclusion in decentralized systems. ACM Trans. Comput. Syst. (TOCS) 1985, 3, 145–159. [Google Scholar] [CrossRef]
  3. Lang, S.D.; Mao, L.J. A comparison of two torus-based k-coteries. In Proceedings of the 10th International Conference on Parallel and Distributed Computing and Systems, Tainan, Taiwan, 14–16 December 1998; pp. 300–306. [Google Scholar]
  4. Luk, W.S.; Wong, T.T. Two new quorum based algorithms for distributed mutual exclusion. In Proceedings of the 17th International Conference on Distributed Computing Systems, Baltimore, MD, USA, 27–30 May 1997; pp. 100–106. [Google Scholar]
  5. Lai, S.; Ravindran, B.; Cho, H. Heterogenous quorum-based wake-up scheduling in wireless sensor networks. IEEE Trans. Comput. 2010, 59, 1562–1575. [Google Scholar] [CrossRef]
  6. Meng, T.; Wu, F.; Chen, G. Code-based neighbor discovery protocols in mobile wireless networks. IEEE/Acm Trans. Netw. 2015, 24, 806–819. [Google Scholar] [CrossRef]
  7. Kandhalu, A.; Lakshmanan, K.; Rajkumar, R. U-connect: A low-latency energy-efficient asynchronous neighbor discovery protocol. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, Stockholm, Sweden, 12–16 April 2010; pp. 350–361. [Google Scholar]
  8. Dutta, P.; Culler, D. Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, Raleigh, NC, USA, 5–7 November 2008; pp. 71–84. [Google Scholar]
  9. Meng, T.; Wu, F.; Chen, G. On designing neighbor discovery protocols: A code-based approach. In Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 1689–1697. [Google Scholar]
  10. Bakht, M.; Trower, M.; Kravets, R.H. Searchlight: Won’t you be my neighbor? In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Istanbul, Turkey, 22–26 August 2012; pp. 185–196. [Google Scholar]
  11. Wang, K.; Mao, X.; Liu, Y. BlindDate: A neighbor discovery protocol. IEEE Trans. Parallel Distrib. Syst. 2014, 26, 949–959. [Google Scholar] [CrossRef]
  12. Qiu, Y.; Li, S.; Xu, X.; Li, Z. Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networks. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  13. Sun, W.; Yang, Z.; Wang, K.; Liu, Y. Hello: A generic flexible protocol for neighbor discovery. In Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 540–548. [Google Scholar]
  14. McGlynn, M.J.; Borbash, S.A. Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks. In Proceedings of the 2nd ACM International Symposium on Mobile ad Hoc Networking & Computing, Long Beach, CA, USA, 4–5 October 2001; pp. 137–145. [Google Scholar]
  15. Sun, G.; Wu, F.; Chen, G. Neighbor discovery in low-duty-cycle wireless sensor networks with multipacket reception. In Proceedings of the 2012 IEEE 18th International Conference on Parallel and Distributed Systems, Singapore, 17–19 December 2012; pp. 490–497. [Google Scholar]
  16. Vasudevan, S.; Towsley, D.; Goeckel, D.; Khalili, R. Neighbor discovery in wireless networks and the coupon collector’s problem. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China, 20–25 September 2009; pp. 181–192. [Google Scholar]
  17. Zeng, W.; Vasudevan, S.; Chen, X.; Wang, B.; Russell, A.; Wei, W. Neighbor discovery in wireless networks with multipacket reception. In Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paris, France, 17–19 May 2011; pp. 1–10. [Google Scholar]
  18. Song, T.; Park, H.; Pack, S. A probabilistic neighbor discovery algorithm in wireless ad hoc networks. In Proceedings of the 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), Seoul, Korea, 18–21 May 2014; pp. 1–5. [Google Scholar]
  19. Li, W.; Zhang, J.; Jiang, F.; Li, Z.; Xu, C. Asynchronous neighbor discovery with unreliable link in wireless mobile networks. Peer -Peer Netw. Appl. 2019, 12, 635–646. [Google Scholar] [CrossRef]
  20. Geissdoerfer, K.; Zimmerling, M. Bootstrapping Battery-Free Wireless Networks: Efficient Neighbor Discovery and Synchronization in the Face of Intermittency. In Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, Boston, MA, USA, 12–14 April 2021; pp. 439–455. [Google Scholar]
  21. Gu, Z.; Wang, Y.; Shi, W.; Tian, Z.; Ren, K.; Lau, F. A practical neighbor discovery framework for wireless sensor networks. Sensors 2019, 19, 1887. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Tseng, Y.C.; Hsu, C.S.; Hsieh, T.Y. Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks. Comput. Netw. 2003, 43, 317–337. [Google Scholar] [CrossRef]
  23. Jiang, J.R.; Tseng, Y.; Hsu, C.S.; Lai, T.H. Quorum-based asynchronous power-saving protocols for IEEE 802.11 ad hoc networks. Mob. Netw. Appl. 2005, 10, 169–181. [Google Scholar] [CrossRef]
  24. Jiang, J.R. Expected quorum overlap sizes of quorum systems for asynchronous power-saving in mobile ad hoc networks. Comput. Netw. 2008, 52, 3296–3306. [Google Scholar] [CrossRef]
  25. You, L.; Yuan, Z.; Yang, P.; Chen, G. ALOHA-like neighbor discovery in low-duty-cycle wireless sensor networks. In Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, Cancun, Mexico, 28–31 March 2011; pp. 749–754. [Google Scholar]
  26. Own, C.M.; Meng, Z.; Liu, K. Handling neighbor discovery and rendezvous consistency with weighted quorum-based approach. Sensors 2015, 15, 22364–22377. [Google Scholar] [CrossRef] [PubMed]
  27. Chen, L.; Fan, R.; Bian, K.; Gerla, M.; Wang, T.; Li, X. On heterogeneous neighbor discovery in wireless sensor networks. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 693–701. [Google Scholar]
  28. Chen, L.; Li, Y.; Chen, Y.; Liu, K.; Zhang, J.; Cheng, Y.; You, H.; Luo, Q. Prime-set-based neighbour discovery algorithm for low duty-cycle dynamic WSNs. Electron. Lett. 2015, 51, 534–536. [Google Scholar] [CrossRef]
  29. Chen, H.; Lou, W.; Wang, Z.; Xia, F. On achieving asynchronous energy-efficient neighbor discovery for mobile sensor networks. IEEE Trans. Emerg. Top. Comput. 2016, 6, 553–565. [Google Scholar] [CrossRef]
  30. Margolies, R.; Grebla, G.; Chen, T.; Rubenstein, D.; Zussman, G. Panda: Neighbor discovery on a power harvesting budget. IEEE J. Sel. Areas Commun. 2016, 34, 3606–3619. [Google Scholar] [CrossRef]
  31. Cao, Z.; Gu, Z.; Wang, Y.; Cui, H. Panacea: A low-latency, energy-efficient neighbor discovery protocol for wireless sensor networks. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar]
  32. Shen, T.; Wang, Y.; Gu, Z.; Li, D.; Cao, Z.; Cui, H.; Lau, F.C. Alano: An Efficient Neighbor Discovery Algorithm in an Energy-Restricted Large-Scale Network. In Proceedings of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Chengdu, China, 9–12 October 2018; pp. 353–361. [Google Scholar]
  33. Chen, H.; Qin, Y.; Lin, K.; Luan, Y.; Wang, Z.; Yu, J.; Li, Y. PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks. Ad. Hoc. Netw. 2020, 107, 102247. [Google Scholar] [CrossRef]
  34. Kindt, P.H.; Chakraborty, S. Performance Limits of Neighbor Discovery in Wireless Networks. arXiv 2021, arXiv:2103.05026. [Google Scholar]
  35. Sun, W.; Yang, Z.; Zhang, X.; Liu, Y. Energy-efficient neighbor discovery in mobile ad hoc and wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1448–1459. [Google Scholar] [CrossRef]
Figure 1. Slot structure used to obtain the CDFs.
Figure 1. Slot structure used to obtain the CDFs.
Sensors 21 06822 g001
Figure 2. Example of the phases in deterministic neighbor discovery protocols.
Figure 2. Example of the phases in deterministic neighbor discovery protocols.
Sensors 21 06822 g002
Figure 3. Fixed interval behavior of deterministic algorithms.
Figure 3. Fixed interval behavior of deterministic algorithms.
Sensors 21 06822 g003
Figure 4. Example for the c s function.
Figure 4. Example for the c s function.
Sensors 21 06822 g004
Figure 5. Example of Disco for p = 11 .
Figure 5. Example of Disco for p = 11 .
Sensors 21 06822 g005
Figure 6. Example of Quorum for m = 4 .
Figure 6. Example of Quorum for m = 4 .
Sensors 21 06822 g006
Figure 7. Example of Hello.
Figure 7. Example of Hello.
Sensors 21 06822 g007
Figure 8. Example of Searchlight-S for t = 12 .
Figure 8. Example of Searchlight-S for t = 12 .
Sensors 21 06822 g008
Figure 9. Validation of the simulation vs. analytic models for 10% duty cycle.
Figure 9. Validation of the simulation vs. analytic models for 10% duty cycle.
Sensors 21 06822 g009
Figure 10. Validation of the simulation vs. analytic models for 1% duty cycle.
Figure 10. Validation of the simulation vs. analytic models for 1% duty cycle.
Sensors 21 06822 g010
Figure 11. Evaluation of Disco’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Figure 11. Evaluation of Disco’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Sensors 21 06822 g011
Figure 12. Evaluation of Quorum’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Figure 12. Evaluation of Quorum’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Sensors 21 06822 g012
Figure 13. Evaluation of Hello’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Figure 13. Evaluation of Hello’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Sensors 21 06822 g013
Figure 14. Evaluation of Searchlight’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Figure 14. Evaluation of Searchlight’s analytic model at 10% duty cycle. (a) Analytic model vs. simulations. (b) Error of the analytic model.
Sensors 21 06822 g014
Figure 15. Evaluation of (a) Random’s and (b) Birthday’s analytic models vs. simulations at 10% duty cycle.
Figure 15. Evaluation of (a) Random’s and (b) Birthday’s analytic models vs. simulations at 10% duty cycle.
Sensors 21 06822 g015
Figure 16. Slot where a percentage of discoveries occur given a duty cycle. (a) Ninety-eight percent discoveries, 10% error. (b) Eighty percent discoveries, 10% error. (c) Ninety-eight percent discoveries, 50% error. (d) Eighty percent discoveries, 50% error.
Figure 16. Slot where a percentage of discoveries occur given a duty cycle. (a) Ninety-eight percent discoveries, 10% error. (b) Eighty percent discoveries, 10% error. (c) Ninety-eight percent discoveries, 50% error. (d) Eighty percent discoveries, 50% error.
Sensors 21 06822 g016
Figure 17. Slots required to achieve a percentage of discoveries given a probability of success. (a) Ninety-eight percent of coincidences with 1% duty cycle. (b) Eighty percent of coincidences with 1% duty cycle. (c) Ninety-eight percent of coincidences with 10% duty cycle. (d) Eighty percent of coincidences with 10% duty cycle.
Figure 17. Slots required to achieve a percentage of discoveries given a probability of success. (a) Ninety-eight percent of coincidences with 1% duty cycle. (b) Eighty percent of coincidences with 1% duty cycle. (c) Ninety-eight percent of coincidences with 10% duty cycle. (d) Eighty percent of coincidences with 10% duty cycle.
Sensors 21 06822 g017
Table 1. Summary of the most significant ND protocols in the literature.
Table 1. Summary of the most significant ND protocols in the literature.
YearDeterministicStochastic
Quorum-BasedPrime Number-BasedDynamic Listen SlotFixed Listen Slot
1985Grid [2]
1997Cyclic [4]
1998Torus [3]
2001 Birthday [14]
2003Quorum [22]
2005e-torus [23]
2008f-torus [24]Disco [8]
2009 Aloha-like [16]
2010[5]U-Connect [7]
2011 [17,25]
2012 Searchlight [10] Aloha-like [15]
2014 [9]Blinddate [11]Hello [13][18]
2015Code-base [6,26]Todis [27]Hedis [27] PSBA [28]
2016 Nihao [12], Q-Connect [29]Panda [30]
2018 Panacea [31], Alano [32]
2020 PWEND [33]
Table 2. Simulation parameters for 10% and 1% duty cycle.
Table 2. Simulation parameters for 10% and 1% duty cycle.
Duty Cycle10%1%
Random p = 0.1 p = 0.01
Birthday p t = 0.05 , p r = 0.05 p t = 0.005 , p r = 0.005
Disco p 1 = 9 , p 2 = 11 p 1 = 99 , p 2 = 101
Quorum m = 20 m = 200
Hello ς = 15 ς = 150
Searchlight t = 20 t = 200
Table 3. Slots required to reach 90% and 98% of coincidences for 10% Duty Cycle.
Table 3. Slots required to reach 90% and 98% of coincidences for 10% Duty Cycle.
% of CoincidencesRandomBirthdayDiscoQuorumHelloSearchlight
90% P e = 0 % 23046089270205175
P e = 30 % 475960350613760637
[2.06][2.08][3.93][2.27][3.7][3.64]
P e = 50 % 9211831795142017101468
[4][3.98][8.93][5.25][8.34][8.38]
98% P e = 0 % 39477096221339195
P e = 30 % 8011589579127811361110
[2.03][2.06][6.03][5.78][3.35][5.69]
P e = 50 % 157731261348297726262603
[4][4.05][14.04][13.47][7.74][13.34]
Results in brackets represent the proportion of slots compared to P e = 0 % .
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Camacho-Escoto, J.J.; Lopez-Bolaños, E.; Arana, O.; Gomez, J. A Framework for Analyzing Neighbor Discovery Protocols under Non-Ideal Conditions. Sensors 2021, 21, 6822. https://doi.org/10.3390/s21206822

AMA Style

Camacho-Escoto JJ, Lopez-Bolaños E, Arana O, Gomez J. A Framework for Analyzing Neighbor Discovery Protocols under Non-Ideal Conditions. Sensors. 2021; 21(20):6822. https://doi.org/10.3390/s21206822

Chicago/Turabian Style

Camacho-Escoto, Jose Jaime, Eduardo Lopez-Bolaños, Oscar Arana, and Javier Gomez. 2021. "A Framework for Analyzing Neighbor Discovery Protocols under Non-Ideal Conditions" Sensors 21, no. 20: 6822. https://doi.org/10.3390/s21206822

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop