Protocol Sequences With Carrier Sensing For Wireless Sensor Networks
Protocol Sequences With Carrier Sensing For Wireless Sensor Networks
B. Motivation Since that CSMA type algorithms have been the founda-
In spite of the aforementioned nice features, we note that tions of MAC technology in wireless networks, and many
all conventional protocol sequence-based schemes in [1]–[17] sophisticated CSMA versions can be closely approximated
require that all sequence entries are mapped to slots with by p-persistent CSMA if the average backoff interval is
the same time duration, as illustrated in Fig. 1, for enabling the same [20], the comparative study against the optimal
Hamming cross-correlation functions to accurately reflect the p-persistent CSMA indicates that the PS-CS is a promising
mutual interference patterns. However, such a correspondence MAC candidate for delay-constrained WSNs.
leads to a relatively low channel utilization. Hence, it has been The rest of this paper is organized as follows. In Section II,
shown in [1], [3], [5], and [12] that a protocol sequence-based we summarize the related work on protocol sequences. In
scheme can only achieve the same maximum average through- Section III, after introducing an application scenario and the
put (averaged over all possible relative offsets among users) as considered system model, we describe the proposed PS-CS
in a slotted ALOHA scheme. Further, there has been a com- scheme. In Section IV, we derive the theoretical performance
mon belief that all previously known protocol sequence-based metrics of the PS-CS scheme. Numerical studies are pro-
schemes cannot outperform CSMA type schemes in terms of vided in Section V. We in Section VI discuss the impact
average throughput and average access delay, since that CSMA of unreliable carrier sensing and imperfect wireless channel,
type schemes utilize the channel more efficiently than slot- and in Section VII provide a modification to support real-
ted ALOHA due to the employment of carrier sensing. Such time downlink for feedback control. We conclude this paper
weakness is undesirable in delay-constrained WSNs, for which in Section VIII.
information must be successfully transmitted within a short
time duration for disaster prevention, and small average delay
II. R ELATED W ORK
or worst-case delay is an essential prerequisite to energy sav-
ing. This observation leads us to explore a new type of protocol There has been a body of work in designing and analyzing
sequence-based scheme that enhances the channel utilization traditional protocol sequence-based schemes under different
by the aid of carrier sensing. targeted objectives [1]–[17]. Let the time offsets among the
users be measured in time slot duration units. Let M be the
number of sequences in a sequence set.
The first known protocol sequence set was constructed in [1]
C. Contribution by a decimation decoding technique for characterizing the
This paper proposes a modified scheme with carrier sens- zero-error capacity of the collision channel without feedback.
ing, referred to here as the PS-CS scheme. The key idea of the Such sequences possess the shift-invariant (SI) property, that
PS-CS scheme is to allow each user to perform carrier sens- is, the Hamming cross-correlation function of an arbitrary
ing when a zero is read from the assigned sequence. It will nonempty subset is independent of cyclic shifts of sequences.
be shown that the PS-CS scheme can significantly improve More general constructions of SI sequences can be found
channel utilization in comparison to conventional protocol in [2]–[4]. It was proved in [5] that SI sequences are the only
sequence-based schemes. It is worth pointing out that although solution to achieve the maximum worst-case throughput, and
the benefit comes at the expense of carrier sensing, the PS-CS it was proved in [11] that SI sequences can be used to ensure
scheme still does not need any feedback from the receiver as constant delivery delay for each user. However, an inherent
in conventional approaches. Moreover, under reliable carrier drawback of SI sequences is that the period grows exponen-
sensing, the PS-CS scheme complies with some basic char- tially in the number of users [3], which may lead to individual
acteristics of traditional protocol sequence-based algorithms, short-term starvation problem.
and hence, is still able to provide guaranteed performance. To In view of this issue, some attempts have been made to seek
our best knowledge, this paper is a first attempt to combine short sequences with acceptable throughput. In general, the
sequence-based MAC and carrier sensing. constructed sequences possess the property that the Hamming
To gain a clear insight into the characteristics of the cross-correlation function of an arbitrary subset with two
proposed PS-CS, closed-form formulas are derived for eval- sequences has some small values no matter how we cyclically
uating average throughput, average delay, the worst-case shift these two sequences. For example, a class of protocol
delay, and average energy consumption. It will be con- sequences building on the idea of prime sequences, called
firmed by numerical studies that, the PS-CS can pro- wobbling sequences, was proposed in [7]. Such sequences
duce average throughput close to the optimal capacity of have a period equal to M 4 , and can produce the worst-case
p-persistent CSMA; moreover, it provides significantly better system throughput 0.25. Another class of protocol sequences
delay performance than both traditional protocol sequence- constructed by means of the Chinese remainder theorem,
based scheme and p-persistent CSMA. In addition, it will be called CRT sequences, was presented in [8]. They enjoy
shown that the PS-CS can have better energy-delay tradeoff the worst-case system throughput 0.25, while the period is
in some scenarios even when energy and delay are considered only O(M 2+ ). In addition, protocol sequences with adjustable
equally important, can produce smaller average delay even sequence weights were constructed in [12] by systematically
when some carrier sensing fault and channel error occur, and adding mark chips into some families of prime sequences, and
can be modified to support real-time transmissions from the generalized prime sequences with a more flexible parameters
receiver for feedback control. setting than CRT sequences were constructed in [17].
ZHANG et al.: PROTOCOL SEQUENCES WITH CARRIER SENSING FOR WSNs 907
The concept of user-irrepressible (UI) sequences was The propagation delay between any of the users or the
proposed in [7] and [10]. Such sequences are able to allow receiver is at most tprop seconds. Each user can perform reli-
each user to send out at least one contention-free packet in able carrier sensing to detect a busy medium, and its detection
each sequence period for all possible integer-valued relative time is tcs (tcs > tprop ) seconds. Assume that the transmission
offsets. The design goal of them is to minimize the sequence time of each packet is fixed to tpkt seconds. The channel is
period that determines the worst-case delay. SI sequences divided into time slots of equal duration tslot (tslot ≥ tcs ) sec-
are the shortest known UI sequences for M ≤ 6, CRTp onds, such that tslot = (tpkt +tprop )/l for a fixed positive integer
sequences [10] are the shortest for all prime M ≥ 7, and CRT- l. In other words, each packet exactly fits in l−η channel slots.
UI [9] sequences are the shortest for all nonprime M ≥ 8. Here, η := tprop /tslot is defined as the ratio of the maximum
CRTp and CRT-UI sequences can be seen as two variations of propagation delay to the time slot.
CRT sequences [8]. The users may start their communication session, i.e.,
Protocol sequences are also closely related with other become active from inactive at different time slots. This behav-
sequences studied in the literature, under the name of ior incurs relative offsets between the users, which can be any
cyclically permutable codes [13]–[15], conflict-avoiding arbitrary values that are integer multiples of a slot duration,
codes [21]–[23], and topological transparent schedul- but fixed throughout a transmission session.
ing [24]–[26]. Other classes of sequence-based MAC schemes Remark 1: For a traditional protocol sequence-based
include the applications of Reed-Solomon codes [27] and scheme, a time slot needs to accommodate the transmission
Gold sequences [28]. time of a packet and the propagation delay, and so the time
To the authors’ best knowledge, there is no known study on duration of a slot is required to be tslot = tpkt + tprop .
combining sequence-based MAC and carrier sensing.
C. Protocol Description
III. P ROPOSED PS-CS S CHEME Before accessing the channel by a PS-CS scheme, each user
In the first part of this section, we introduce an application is assigned a distinct protocol sequence. The operations of
scenario and the corresponding system model, while in the transmissions and carrier sensing can only begin at the begin-
rest of this section we describe the proposed PS-CS scheme. ning of a channel slot. The algorithm behaves in two operating
phases, namely, initial phase and normal phase.
A. Application Scenario 1) Initial Phase: When an inactive user wants to become
active, this user performs carrier sensing at the beginning of
Consider a WSN in which multiple users observe the same
a channel slot. If the channel is found to be busy, the user
area of interest. Each user attempts to transmit the latest gen-
keeps silent until the end of the current slot, and still stays
erated packet to a common receive. The common receiver
at the initial phase at the next slot. If the channel is found to
transmits the aggregated data to an access point (AP) if it
be idle, the user enters into the normal phase at the next slot.
has collected a certain number of packets from different users
Such a setup ensures that this user does not begin a packet
or due to the expiry of a strict delivery deadline.
transmission before the completion of ongoing transmissions.
The PS-CS scheme is used for channel access of the users,
In this phase, the user is forbidden to read sequence values.
while an infrastructure-based scheme is used for transmissions
between the receiver and the AP. Under this scenario, higher 2) Normal Phase: Then this user executes the following
average throughput, smaller average access delay, and smaller steps by sequentially looking up the entries of the assigned
worst-case access delay between the users and receiver would protocol sequence, and repeats the sequence periodically.
• If the current sequence value is one, then the user imme-
enable more observation from more users to be quickly deliv-
ered to the AP. This is desirable for fault-tolerance and timely diately sends out a packet. Carrier sensing is not required
detection purposes. It should be noted that there is no need before transmission.
• If the current sequence value is zero, the user performs
to consider queuing delay, since that only the latest generated
packet is contained in the queue of each user. carrier sensing at the beginning of the current channel
This scenario can be further generalized to a cluster-based slot. This operation is used to detect whether one or
WSN deployed over a larger geographical area in which users more users commence transmissions at the beginning of
in the same cluster observe the same area of interest and the this slot. If the channel is found to be idle, the user is
PS-CS scheme is used for channel access within clusters. required to keep silent for one slot (including the carrier
sensing time); and otherwise the user is required to keep
silent for l slots (including the carrier sensing time). The
B. System Model user is forbidden to transmit at the current slot in this
There are K users communicating with a common receiver, case.
which is within the transmission range of each user. We • After the transmission or silence, the user reads a new
assume that the carrier sensing range is at least twice than sequence value and repeats the above operations if it
the transmission range, as shown by real experiments [30], so still has a packet to send. Otherwise, it ends its current
that there are no hidden terminals. The system is limited by transmission session and becomes inactive.
user interference, and a packet can be correctly received if and The PS-CS algorithm is illustrated schematically in Fig. 2.
only if it does not overlap with another packet on the channel. One sees this algorithm with carrier sensing can be reduced to
908 IEEE INTERNET OF THINGS JOURNAL, VOL. 5, NO. 2, APRIL 2018
Fig. 3. Example of the PS-CS access for a three-user multiple access. For
simplicity, the propagation delays are not depicted in the illustration.
one and increase the sensing time of the users that read
zero.
Fig. 2. PS-CS algorithm. Benefiting from these features, the PSCS can provide signif-
icantly better throughput and delay performance than tradi-
tional cases, which will be shown in subsequent sections.
The Hamming cross-correlation between two sequences si Proof: Suppose that the relative offsets of si is τi , for i =
and sj , denoted by Hi,j (τi , τj ), is defined as 1, 2, . . . , K. We note that (τ1 , τ2 , . . . , τK ) is an element in the
L−1 set (ZL )K , where ZL = {0, 1, . . . , L − 1}. Hence, there are LK
Hi,j τi , τj := si (n + τi )sj (n + τj ). possible combinations, and the normalized average throughput
n=0 of user i, Ri , needs to be computed over these LK instances. As
It counts the number of time-overlapping ones between si and the sequence period varies over different given relative offsets,
sj in a sequence period when si and sj have relative offsets τi we obtain Ri as the following:
and τj , respectively. L−1 L−1
(τ1 ) (τK )
Example 1: We illustrate the aforementioned definitions τ1 =0 · · · τK =0 (l − η)N h i = 1|s 1 , . . . , s K
Ri = L−1 L−1
and notation by the following three protocol sequences with (τ1 ) (τ )
lL · L − τ1 =0 · · · τK =0 (l − 1)N 0|s1 , . . . , sK K
K
common period 8, Hamming weight 4 and duty factor 1/2:
s1 = [11110000]; s2 = [11001100]; s3 = [10101010]. (l − η)LN(1|si ) K j=1,j=i N 0|sj
=
Their characteristic sets are I1 = {0, 1, 2, 3}, I2 = {0, 1, 4, 5}, lL · LK − (l − 1)L K j=1 N 0|sj
and I3 = {0, 2, 4, 6} in Z8 . A shifted version of these three l(l − η)fi K j=1,j=i (1 − fj )
sequences can be found as = .
(1) (3) (2)
l − (l − 1) K j=1 (1 − fj )
s1 = [11100001], s2 = [01100110], s3 = [10101010].
(1) (3) (2)
The second equality of the above equation is due to the
Then, one can check that N(h2 = 1|s1 , s2 , s3 ) = 2, following result shown in [3]:
(1) (3) (2)
N(0|s1 , s2 , s3 ) = 1 and H1,3 (1, 2) = 2.
L−1
L−1
K
In the following performance analysis, as in [1]–[5], (τ ) (τ )
... N b1 , . . . , bK |s1 1 , . . . , sK K = L N(bi |si ).
[7]–[12], [16], [17], [20], and [29], we assume that each user
τ1 =0 τK =0 i=1
always has some data to send. This is a fundamental assump-
tion to investigate the performance limit as the offered load
increases and can be applied to analyze WSNs with burst We see from Theorem 1 that the average throughput of any
traffic. user only depends on the chosen duty factors and the packet
length, but is independent of the Hamming cross-correlation
B. Average Throughput property of the adopted protocol sequence set.
Massey and Mathys in their work [1] derived the average For the symmetric case that each sequence has the same
throughput of a traditional protocol sequence-based scheme. duty factor f in a PS-CS scheme, the normalized average
Since that different sequence entries may be mapped to dif- system throughput can be calculated as
ferent number of channel slots in the PS-CS scheme, the
K(l − η)f (1 − f )K−1
throughput analysis in [1] is unapplicable here. Rsym = . (3)
The normalized throughput of user i in the PS-CS for l − (l − 1)(1 − f )K
a given set of relative offsets {τ1 , . . . , τK }, denoted by Under the objective of average throughput maximization for
Ri (τ1 , τ2 , . . . , τK ), can be defined as the fraction of channel PS-CS, we are interested in finding the optimal symmetric
slots in which only user i is transmitting, that is, duty factor as a function of K and l. For l = 1, obviously
fopt = 1/K. For l > 1, interested readers can refer to [20]
(τ ) (τ )
(l − η)N hi = 1|s1 1 , . . . , sK K and [29] for a detailed discussion, since the throughput of the
Ri (τ1 , τ2 , . . . , τK ) = . (1)
(τ ) (τ ) p-persistent CSMA with the fixed packet length is prescribed
lL − (l − 1)N 0|s1 1 , . . . , sK K
by the same mathematical expression in (3), except that the
Note that the denominator in (1) denotes the time duration transmitting probability p replaces the duty factor f there. It
of a sequence period, and varies over different given relative was shown in [29] that the following approximation for the
offsets. By considering all possible combinations of relative optimal p holds for l > 1 and Kp 1:
offsets, we obtain the following average individual through-
put. It should be noted that the throughput analysis of the 1 + 2(l − 1) K−1
K −1
∼
popt = . (4)
p-persistent CSMA [20], [29] shares some similarities with our (K − 1)(l − 1)
analysis, since that the idea of using PS-CS can be described
Therefore, we obtain
as a derandomization of the p-persistent CSMA.
packet starting at the beginning of a time duration that a ran- that each sequence entry with busy channel status is mapped
domly selected protocol sequence entry is mapped to. From to l channel slots and each sequence entry with idle chan-
the protocol description in Section III-C, we believe that the nel status is mapped to one channel slot, to evaluate
average delay performance of a PS-CS scheme highly depends the expected access delay of user a, we need to investigate
on the sequence structure and Hamming cross-correlation the number of sequence entries user a has looked up until the
property, as in traditional cases [16], [17]. completion of its first contention-free transmission, and the
CRT-UI sequences [9] with the period r(2K − 1) are the number of sequence entries with idle channel status user a
shortest known UI sequences if the sequence set size is a has experienced until the completion of its first contention-free
nonprime not smaller than 8 [10]. Here, r denotes the small- transmission.
est prime not smaller than K. To make the average throughput Depending on the assigned protocol sequence and the rel-
of the PS-CS close to its maximum value, we in the PS-CS ative offset τa∗ , there exist K transmissions at the xk (τa∗ )th
adopt a slightly modified version of CRT-UI sequences, called sequence entry for k = 1, 2, . . . , K, such that
MCRT-UI sequences.
0 ≤ x1 τa∗ < x2 τa∗ . . . < xK τa∗ ≤ L − 1.
For l = 1, we set q = 2K − 1. For l ≥ 2, we set q to be the
integer closest to (K/[rfopt ]) satisfying the condition that q is By the property that the Hamming cross-correlation between
relatively prime to r and not smaller than 2K −1. The mapping any two MCRT-UI sequences is at most one, we know user
f : Zrq → Zr ⊕ Zq defined by f (a) := (a mod r, a mod q) is a must have one contention-free transmission among these K
a bijection from Zrq to Zr ⊕ Zq as r and q are relatively transmissions. Assume that user a successfully transmits with-
prime, and preserves addition and multiplication by integers. out contention for the first time at the Ya th sequence entry
Let I1 := {(y, 0) ∈ Zr ⊕ Zq : y = 0, 1, . . . , K − 1} and since the 0th entry. The possible values of Ya are xk (τa∗ ),
let Ii := {(iy mod r, y) ∈ Zr ⊕ Zq : y = 0, 1, . . . , K − 1} k = 1, 2, . . . , K. See Fig. 4 for illustration.
for i = 2, . . . , K. We obtain Ii by taking the inverse image As Ya is dependent on the relative offsets of all users, by
f −1 (Ii ), for all i. These K sequences have period L = qr. regarding the relative offsets as uniformly distributed random
The following two key features of CRT-UI sequences hold variables between 0 and L − 1, we can treat Ya as a ran-
for MCRT-UI sequences although the latter may have a larger dom variable. Denote Pr(Ya ≤ xk (τa∗ )|τa = τa∗ ) by ϕk for
sequence period: 1) each sequence has a Hamming weight k = 1, 2, . . . , K. Let Ej be the event that the transmission by
K and 2) the Hamming cross-correlation between any two user a at the xj (τa∗ )th sequence entry is contention-free. We
sequences is at most one for any relative offsets. Consequently, can apply the inclusion-exclusion principle to Ej ’s in order to
MCRT-UI sequences also have the UI property. evaluate ϕk
Example 2: Given K = 6, q = 15, the MCRT-UI con-
struction produces six sequences of period 105 and Hamming ϕk = Pr Ej1 − Pr Ej1 ∩ Ej2 + · · ·
1≤j1 ≤k 1≤j1 <j2 ≤k
weight 6. The characteristic sets are
+ (−1) k+1
Pr Ej1 ∩ . . . ∩ Ejk . (6)
I1 = {0, 15, 30, 45, 60, 75} I2 = {0, 16, 32, 48, 64, 80}
1≤j1 <...<jk ≤k
I3 = {0, 19, 31, 50, 62, 93} I4 = {0, 20, 33, 46, 79, 92}
Due to the property that the Hamming cross-correlation
I5 = {0, 10, 27, 44, 71, 88} I6 = {0, 11, 29, 40, 58, 87}. between any two MCRT-UI sequences is at most one, it
In the following, we will derive an approximated formula follows that the probability an arbitrary user b, b = a, will con-
for the average delay of the PS-CS. This paper can be viewed tend with user a at a sequence entry indexed by x1 (τa∗ ), x2 (τa∗ ),
as an extension of [16], which derived the average delay of . . ., or xm (τa∗ ) is given by Pa,b,m = (mK/L). If we apply the
the traditional CRT-UI protocol sequence-based scheme. simplifying approximation that the probabilities Pa,u,m for any
With no loss of generality, we focus on user a, and denote user u, u = a, are independent, then
its access delay by Da . Assume the assigned sequence has
mK K−1
the characteristic set Ia = {x1 , x2 , . . . , xK } with x1 < x2 < Pr Ej1 ∩ . . . ∩ Ejm = 1 − . (7)
L
. . . < xK . We define δ0 [x1 − xK mod L], δj [xj+1 − xj
mod L] for j = 1, . . . , K − 1, and δ (δ0 , δ1 , . . . , δK−1 ). For By substituting (7) into (6), we obtain
d = 0, 1, . . . , K − 1, we further define k
k mK K−1
K−1 ϕk = (−1)m+1 1− (8)
m L
Cδ (d) δj δjd m=1
j=0 for k = 1, 2, . . . , K. In particular, we have ϕK = 1
where denotes the subtraction modulo K. that conforms with the UI property of MCRT-UI sequences.
Suppose that the relative offset of user a is fixed at τa∗ , i.e., Furthermore, obviously
τa = τa∗ . Without loss of generality, we measure the access
Pr Ya = xk τa∗ |τa = τa∗ = ϕk − ϕk−1
delay of user a, starting from the beginning of a time duration
that is mapped to by a randomly selected entry in user a’s for k = 1, 2, . . . , K. We adopt the convention that ϕ0 0.
sequence. This selected entry is labeled with index 0. Let Aa be the number of sequence entries with idle chan-
Recall that the channel status corresponding to a sequence nel status that user a has experienced starting from the 0th
entry can be classified as idle or busy in the PS-CS. Since sequence entry to the Ya th sequence entry. Let E[Aa |Ya =
ZHANG et al.: PROTOCOL SEQUENCES WITH CARRIER SENSING FOR WSNs 911
xk (τa∗ ), τa = τa∗ ] be the conditional expected value of Aa . By Summing E[Da |τa ] over all possible τa uniformly dis-
the definition of Ya , we know user a’s transmissions from the tributed between 0 and L − 1, we obtain
0th sequence entry to the (Ya − 1)th sequence entry all suffer
1
L−1
from collisions if Ya > 0. It is easy to see that some other users E[Da ] = E[Da |τa ]
must be involved in these collisions. This implies that there L
τa =0
is a relative offset restriction on each involved user. However,
K−1
to simplify our analysis, we do not consider this restriction ≈ (l − (l − 1)ϕ1 )E[Ya ] + ϕ1 (l − 1) KϕK − ϕk
and consider the probability users will keep silent or not at k=1
a given slot to be independent of each other. By summing
l − (l − 1)ϕ1 Cδ (0) + L
K−1
over all possible relative offsets and exchanging the order of = + (1 − ϕk )Cδ (k)
summation and multiplication, it follows that: L 2
k=1
K−1
+ ϕ1 (l − 1) K − ϕk .
E Aa |Ya = xk τa∗ , τa = τa∗ (9)
k=1
L−1
L−1 (τa∗ )
L−1 xk
1 The equality in (9) is due to the known result proved in [16]
≈ ··· ···
LK−1
1 Cδ (0) + L
K−1
τ1 =0 τi =0,i=a τK =0 n=0
E[Ya ] = + (1 − ϕk )Cδ (k) .
K L 2
× 1 − sa (n + τa∗ ) [1 − si (n + τi )] k=1
i=1,i=a
Therefore, by (9), we can approximate the average access
delay of each user in the PS-CS. The accuracy of this approx-
xk (τa∗ )
1
L−1
L−1
L−1
imation will be examined via numerical studies presented in
= 1 − sa n + τa∗ ··· ··· Section V.
LK−1
n=0 τ1 =0 τi =0,i=a τK =0
K
D. Worst-Case Access Delay
× [1 − si (n + τi )]
We are also interested in the worst-case access delay of the
i=1,i=a
PS-CS scheme. By the UI property of MCRT-UI sequences, we
xk (τa∗ )
1
know there must be one contention-free transmission within
= 1 − sa (n + τa∗ ) (L − K)K−1 one sequence period, and hence Ya ≤ L. Assume that user a
LK−1
n=0
has experienced λ unsuccessful transmissions before its first
∗
L − K K−1 contention-free transmission. Since that each of these λ unsuc-
= xk (τa ) + 1 − k
L cessful transmissions must involve at least one other user, and
∗
each other user transmits at most K times in a sequence period,
= xk (τa ) + 1 − k ϕ1 .
we have
TABLE I TABLE II
q IN THE PS-CS FOR K = 4, 8, . . . , 28 AND l = 5, 10 PARAMETERS U SED FOR S IMULATION
Fig. 6. Average access delay (in units of tslot ) as a function of K for l = 5, 10. Fig. 9. Ratio of the EDPs of the PS-CS and p-persistent CSMA to that of the
traditional CRT-UI sequence-based scheme as a function of K for l = 5, 10
and Pcs = 0.5Ptx .
[15] S. Bitan and T. Etzion, “Constructions for optimal constant weight cycli- Yijin Zhang (M’14) received the B.S. degree
cally permutable codes and difference families,” IEEE Trans. Inf. Theory, in information engineering from the Nanjing
vol. 41, no. 1, pp. 77–87, Jan. 1995. University of Posts and Telecommunications,
[16] Y. Wu, K. W. Shum, Z. Lin, W. S. Wong, and L. Shen, “Protocol Nanjing, China, in 2004, the M.S. degree in
sequences for mobile ad hoc networks,” in Proc. IEEE Int. Conf. information engineering from Southeast University,
Commun. (ICC), Budapest, Hungary, Jun. 2013, pp. 1730–1735. Nanjing, China, in 2007, and the Ph.D. degree
[17] Y. Wu, K. W. Shum, W. S. Wong, and L. Shen, “Safety-message broad- in information engineering from the Chinese
cast in vehicular ad hoc networks based on protocol sequences,” IEEE University of Hong Kong, Hong Kong, in 2010.
Trans. Veh. Technol., vol. 63, no. 3, pp. 1467–1479, Mar. 2014. Since 2011, he has been an Associate Professor
[18] Y. Mao and L. Shen, “A framework for protocol sequence allocation in with the School of Electronic and Optical
vehicular ad hoc networks,” in Proc. IEEE Veh. Technol. Conf., Nanjing, Engineering, Nanjing University of Science and
China, May 2016, pp. 1–5. Technology, Nanjing. His current research interests include sequence design
[19] W. S. Wong, “Transmission sequence design and allocation for wide- and resource allocation in communication networks.
area ad hoc networks,” IEEE Trans. Veh. Technol., vol. 63, no. 2,
pp. 869–878, Feb. 2014.
[20] F. Cali, M. Conti, and E. Gregori, “Dynamic tuning of the IEEE 802.11
Ming Zhang received the B.S. degree in information
protocol to achieve a theoretical throughput limit,” IEEE/ACM Trans.
engineering from the Zhejiang University of Media
Netw., vol. 8, no. 6, pp. 785–799, Dec. 2000.
and Communications, Hangzhou, China, in 2013,
[21] W. Ma, C.-E. Zhao, and D. Shen, “New optimal constructions of
and the M.S. degree in information engineering from
conflict-avoiding codes of odd length and weight 3,” Designs Codes
the Nanjing University of Science and Technology,
Cryptography, vol. 73, no. 3, pp. 791–804, 2014.
Nanjing, China, in 2016.
[22] Y. Lin, M. Mishima, and M. Jimbo, “Optimal equi-difference conflict-
Her current research interest includes channel
avoiding codes of weight four,” Designs Codes Cryptography, vol. 78,
access protocol for wireless networks.
no. 3, pp. 747–776, 2016.
[23] M. Mishima and K. Momihara, “A new series of optimal tight conflict-
avoiding codes of weight 3,” Discr. Math., vol. 340, no. 4, pp. 617–629,
2017.
[24] W. Chu, C. J. Colbourn, and V. R. Syrotiuk, “The effects of synchro-
nization on topology-transparent scheduling,” Wireless Netw., vol. 12,
no. 6, pp. 681–690, Dec. 2006. Yuan-Hsun Lo (M’17) received the B.S., M.S., and
[25] Y. Liu, V. O. K. Li, K.-C. Leung, and L. Zhang, “Topology-transparent Ph.D. degrees in applied mathematics from National
scheduling in mobile ad hoc networks with multiple packet recep- Chiao Tung University, Hsinchu City, Taiwan, in
tion capability,” IEEE Trans. Wireless Commun., vol. 13, no. 11, 2004, 2006, and 2010, respectively.
pp. 5940–5953, Nov. 2014. He is currently an Assistant Professor with
[26] J. Lutz, C. J. Colbourn, and V. R. Syrotiuk, “ATLAS: Adaptive topology- the School of Mathematical Sciences, Xiamen
and load-aware scheduling,” IEEE Trans. Mobile Comput., vol. 13, University, Xiamen, China. His current research
no. 10, pp. 2255–2268, Oct. 2014. interests include combinatorics, graph theory, and
[27] C. H. Rentel and T. Kunz, “Bounds and parameter optimization of combinatorial design theory and their applications.
medium access control coding for wireless ad hoc and sensor networks,”
Ad Hoc Netw., vol. 10, no. 1, pp. 128–143, 2012.
[28] D. Kim, D. J. Esteki, Y.-C. Hu, and P. R. Kumar, “A lightweight deter-
ministic MAC protocol using low cross-correlation sequences,” in Proc.
IEEE Glob. Telecommun. Conf. (GLOBECOM), Kathmandu, Nepal, Wing Shing Wong (M’81–SM’90–F’02) received
Dec. 2011, pp. 1–6. the combined bachelor’s and master’s degrees
[29] R. Bruno, M. Conti, and E. Gregori, “Optimal capacity of p-persistent (summa cum laude) from Yale University,
CSMA protocols,” IEEE Commun. Lett., vol. 7, no. 3, pp. 139–141, New Haven, CT, USA, in 1976, and the M.S. and
Mar. 2003. Ph.D. degrees from Harvard University, Cambridge,
[30] G. Anastasi, E. Borgia, M. Conti, E. Gregori, and A. Passarella, MA, USA, in 1978 and 1980, respectively.
“Understanding the real behavior of Mote and 802.11 ad hoc networks: After researching with AT&T Bell Laboratories
An experimental approach,” Pervasive Mobile Comput., vol. 1, no. 2, for ten years, he joined the Chinese University of
pp. 237–256, 2005. Hong Kong, Hong Kong, in 1992, and is currently
[31] S. Lindsey, C. S. Raghavendra, and K. Sivalingam, “Data gathering a Professor of information engineering. He was
in sensor networks using the energy∗delay metric,” in Proc. IPDPS the Chairman of the Department of Information
Workshop Issues Wireless Netw. Mobile Comput., San Francisco, CA, Engineering from 1995 to 2002 and the Dean of the Graduate School from
USA, 2001, pp. 2001–2008. 2005 to 2014, and served as the Science Advisor with the Innovation and
[32] H. Wu and K. Wolter, “Stochastic analysis of delayed mobile offloading Technology Commission of the HKSAR Government from 2003 to 2005. His
in heterogeneous networks,” IEEE Trans. Mobile Comput., vol. 17, no. 2, current research interests include mobile communication, nonlinear filtering,
pp. 461–474, Feb. 2018, doi: 10.1109/TMC.2017.2711014. and networked control.