Pan Gun Park
Royal Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pan Gun Park.
mobile adhoc and sensor systems | 2009
Pan Gun Park; Piergiuseppe Di Marco; Pablo Soldati; Carlo Fischione; Karl Henrik Johansson
A generalized analysis of the IEEE 802.15.4 medium access control (MAC) protocol in terms of reliability, delay and energy consumption is presented. The IEEE 802.15.4 exponential backoff process is modeled through a Markov chain taking into account retry limits, acknowledgements, and unsaturated traffic. Simple and effective approximations of the reliability, delay and energy consumption under low traffic regime are proposed. It is demonstrated that the delay distribution of IEEE 802.15.4 depends mainly on MAC parameters and collision probability. In addition, the impact of MAC parameters on the performance metrics is analyzed. The analysis is more general and gives more accurate results than existing methods in the literature. Monte Carlo simulations confirm that the proposed approximations offer a satisfactory accuracy.
information processing in sensor networks | 2010
Pan Gun Park; Carlo Fischione; Karl Henrik Johansson
The IEEE 802.15.4 standard for wireless sensor networks can support energy efficient, reliable, and timely packet transmission by tuning the medium access control parameters macMinBE, macMax-CSMABackoffs, and macMaxFrameRetries. Such a tuning is difficult, because simple and accurate models of the influence of these parameters on the probability of successful packet transmission, packet delay and energy consumption are not available. Moreover, it is not clear how to adapt the parameters to the changes of the network and traffic regimes by algorithms that can run on resource-constrained nodes. In this paper, an effective analytical model is used to derive an adaptive algorithm at the medium access control layer for minimizing the power consumption while guaranteeing reliability and delay constraints in the packet transmission. The algorithm does not require any modifications of the IEEE 802.15.4 standard and can be easily implemented on existing network nodes. Numerical results show that the analysis is accurate, that the proposed algorithm satisfies reliability and delay constraints, and ensures a longer lifetime of the network under both stationary and transient network conditions.
sensor mesh and ad hoc communications and networks | 2009
Pan Gun Park; Carlo Fischione; Karl Henrik Johansson
Time-critical applications for wireless sensor networks (WSNs) are an important class of services supported by the standard IEEE 802.15.4. Control, actuation, and monitoring are all examples of applications where information must be delivered within some deadline. Understanding the delay in the packet delivery is fundamental to assess performance limitation for the standard. In this paper we analyze the guaranteed time slot (GTS) allocation mechanism used in IEEE 802.15.4 networks for time-critical applications. Specifically, we propose a Markov chain to model the stability, delay, and throughput of GTS allocation. We analyze the impact of the protocol parameters on these performance indexes. Monte Carlo simulations show that the theoretical analysis is quite accurate. Thus, our analysis can be used to design efficient GTS allocation for IEEE 802.15.4.
international conference on networking, sensing and control | 2011
Pan Gun Park; José Araújo; Karl Henrik Johansson
A framework for the joint design of wireless network and controllers is proposed. Multiple control systems are considered where the sensor measurements are transmitted to the controller over the IEEE 802.15.4 protocol. The essential issues of wireless networked control systems (NCSs) are investigated to provide an abstraction of the wireless network for a co-design approach. We first present an analytical model of the packet loss probability and delay of a IEEE 802.15.4 network. Through optimal control techniques we derive the control cost as a function of the packet loss probability and delay. Simulation results show the feasible control performance. It is shown that the optimal traffic load is similar when the communication throughput or control cost are optimized. The co-design approach is based on a constrained optimization problem, for which the objective function is the energy consumption of the network and the constraints are the packet loss probability and delay, which are derived from the desired control cost. The co-design is illustrated through a numerical example.
global communications conference | 2010
Piergiuseppe Di Marco; Pan Gun Park; Carlo Fischione; Karl Henrik Johansson
IEEE 802.15.4 multi-hop wireless networks are an important communication infrastructure for many applications, including industrial control, home automation, and smart grids. Existing analysis of the IEEE 802.15.4 medium access control (MAC) protocol are often based on assumptions of homogeneous traffic and ideal carrier sensing, which are far from the reality when predicting performance for multi-hop networks. In this paper, a generalized analysis of the unslotted IEEE 802.15.4 MAC is presented. The model considers heterogeneous traffic and hidden terminals due to limited carrier sensing capabilities, and allows us to investigate jointly IEEE 802.15.4 MAC and routing algorithms. The analysis is validated via Monte Carlo simulations, which show that routing over multi-hop networks is significantly influenced by the IEEE 802.15.4 MAC performance. Routing decisions based on packet loss probability may lead to an unbalanced distribution of the traffic load across paths, thus motivating the need of a joint optimization of routing and MAC.
international conference on control applications | 2007
Emmanuel Witrant; Pan Gun Park; Mikael Johansson; Carlo Fischione; Karl Henrik Johansson
Remote control over wireless multi-hop networks is considered. Time-varying delays for the transmission of sensor and control data over the wireless network are caused by a randomized multi-hop routing protocol. The characterstics of the routing protocol together with lower-layer network mechanisms give rise to a delay process with high variance and stepwise changing mean. A new predictive control scheme with a delay estimator is proposed in the paper. The estimator is based on a Kalman filter with a change detection algorithm. It is able to track the delay mean changes but efficiently attenuate the high frequency jitter. The control scheme is analyzed and its implementation detailed. Network data from an experimental setup are used to illustrate the efficiency of the approach.
sensor mesh and ad hoc communications and networks | 2008
Pan Gun Park; Carlo Fischione; Alvise Bonivento; Karl Henrik Johansson; Alberto L. Sangiovanni-Vincentelli
The novel cross-layer protocol Breath for wireless sensor networks is designed, implemented, and experimentally evaluated. The Breath protocol is based on randomized routing, MAC and duty-cycling, which allow it to minimize the energy consumption of the network while ensuring a desired packet delivery end-to-end reliability and delay. The system model includes a set of source nodes that transmit packets via multi-hop communication to the destination. A constrained optimization problem, for which the objective function is the network energy consumption and the constraints are the packet latency and reliability, is posed and solved. It is shown that the communication layers can be jointly optimized for energy efficiency. The optimal working point of the network is achieved with a simple algorithm, which adapts to traffic variations with negligible overhead. The protocol was implemented on a test-bed with off-the-shelf wireless sensor nodes. It is compared with a standard IEEE 802.15.4 solution. Experimental results show that Breath meets the latency and reliability requirements, and that it exhibits a good distribution of the working load, thus ensuring a long lifetime of the network.
Archive | 2011
Carlo Fischione; Pan Gun Park; Piergiuseppe Di Marco; Karl Henrik Johansson
Control applications over wireless sensor networks (WSNs) require timely, reliable, and energy efficient communications. This is challenging because reliability and latency of delivered packets and energy are at odds, and resource constrained nodes support only simple algorithms. In this chapter, a new system-level design approach for protocols supporting control applications over WSNs is proposed. The approach suggests a joint optimization, or co-design, of the control specifications, networking layer, the medium access control layer, and physical layer. The protocol parameters are adapted by an optimization problem whose objective function is the network energy consumption, and the constraints are the reliability and latency of the packets as requested by the control application. The design method aims at the definition of simple algorithms that are easily implemented on resource constrained sensor nodes. These algorithms allow the network to meet the reliability and latency required by the control application while minimizing for energy consumption. The design method is illustrated by two protocols: Breath and TREnD, which are implemented on a test-bed and compared to some existing solutions. Experimental results show good performance of the protocols based on this design methodology in terms of reliability, latency, low duty cycle, and load balancing for both static and time-varying scenarios. It is concluded that a system-level design is the essential paradigm to exploit the complex interaction among the layers of the protocol stack and reach a maximum WSN efficiency.
ACM Transactions on Sensor Networks | 2013
Pan Gun Park; Sinem Coleri Ergen; Carlo Fischione; Alberto L. Sangiovanni-Vincentelli
Most applications of wireless sensor networks require reliable and timely data communication with maximum possible network lifetime under low traffic regime. These requirements are very critical especially for the stability of wireless sensor and actuator networks. Designing a protocol that satisfies these requirements in a network consisting of sensor nodes with traffic pattern and location varying over time and space is a challenging task. We propose an adaptive optimal duty-cycle algorithm running on top of the IEEE 802.15.4 medium access control to minimize power consumption while meeting the reliability and delay requirements. Such a problem is complicated because simple and accurate models of the effects of the duty cycle on reliability, delay, and power consumption are not available. Moreover, the scarce computational resources of the devices and the lack of prior information about the topology make it impossible to compute the optimal parameters of the protocols. Based on an experimental implementation, we propose simple experimental models to expose the dependency of reliability, delay, and power consumption on the duty cycle at the node and validate it through extensive experiments. The coefficients of the experimental-based models can be easily computed on existing IEEE 802.15.4 hardware platforms by introducing a learning phase without any explicit information about data traffic, network topology, and medium access control parameters. The experimental-based model is then used to derive a distributed adaptive algorithm for minimizing the power consumption while meeting the reliability and delay requirements in the packet transmission. The algorithm is easily implementable on top of the IEEE 802.15.4 medium access control without any modifications of the protocol. An experimental implementation of the distributed adaptive algorithm on a test bed with off-the-shelf wireless sensor devices is presented. The experimental performance of the algorithms is compared to the existing solutions from the literature. The experimental results show that the experimental-based model is accurate and that the proposed adaptive algorithm attains the optimal value of the duty cycle, maximizing the lifetime of the network while meeting the reliability and delay constraints under both stationary and transient conditions. Specifically, even if the number of devices and their traffic configuration change sharply, the proposed adaptive algorithm allows the network to operate close to its optimal value. Furthermore, for Poisson arrivals, the duty-cycle protocol is modeled as a finite capacity queuing system in a star network. This simple analytical model provides insights into the performance metrics, including the reliability, average delay, and average power consumption of the duty-cycle protocol.
ACM Transactions on Sensor Networks | 2013
Pan Gun Park; Carlo Fischione; Karl Henrik Johansson
To offer flexible quality of service to several classes of applications, the medium access control (MAC) protocol of IEEE 802.15.4 wireless sensor networks (WSNs) combines the advantages of a random access with contention with a time division multiple access (TDMA) without contention. Understanding reliability, delay, and throughput is essential to characterizing the fundamental limitations of the MAC and optimizing its parameters. Nevertheless, there is not yet a clear investigation of the achievable performance of hybrid MAC. In this article, an analytical framework for modeling the behavior of the hybrid MAC protocol of the IEEE 802.15.4 standard is proposed. The main challenge for an accurate analysis is the coexistence of the stochastic behavior of the random access and the deterministic behavior of the TDMA scheme. The analysis is done in three steps. First, the contention access scheme of the IEEE 802.15.4 exponential back-off process is modeled through an extended Markov chain that takes into account channel, retry limits, acknowledgements, unsaturated traffic, and superframe period. Second, the behavior of the TDMA access scheme is modeled by another Markov chain. Finally, the two chains are coupled to obtain a complete model of the hybrid MAC. By using this model, the network performance in terms of reliability, average packet delay, average queuing delay, and throughput is evaluated through both theoretical analysis and experiments. The protocol has been implemented and evaluated on a testbed with off-the-shelf wireless sensor devices to demonstrate the utility of the analysis in a practical setup. It is established that the probability density function of the number of received packets per superframe follows a Poisson distribution. It is determined under which conditions the guaranteed time slot allocation mechanism of IEEE 802.15.4 is stable. It is shown that the mutual effect between throughput of the random access and the TDMA scheme for a fixed superframe length is critical to maximizing the overall throughput of the hybrid MAC. In high traffic load, the throughput of the random access mechanism dominates over TDMA due to the constrained use of TDMA in the standard. Furthermore, it is shown that the effect of imperfect channels and carrier sensing on system performance heavily depends on the traffic load and limited range of the protocol parameters. Finally, it is argued that the traffic generation model established in this article may be used to design an activation timer mechanism in a modified version of the CSMA/CA algorithm that guarantees a stable network performance.