Contentionbased node selection with applications to relay communications and load balancing
Abstract
This article proposes and analyzes a distributed probabilistic selection protocol in which several nodes perform a random access competition on a shared slotted channel. Nodes that are better suited according to some metric are preferred in the random access and are thus selected with high likelihood. Analytical performance studies are made in terms of reliability, message complexity, and delay. The protocol is applied in two case studies: relay communications and load balancing in wireless networks. In relay communications, a node is selected based on its channel state to serve as relay. In load balancing, a node is selected based on its battery charge state to perform a task. Results indicate that selecting nodes based on the observed metric contributes to better performance and longer network lifetime.
Keywords
Load Balance Relay Node Network Lifetime Receive Signal Strength Indicator Relay Selection1 Introduction
Many network protocols require a distributed solution for selecting a node from a candidate set to perform a certain task. Examples of such scenarios from the area of mobile computing include the selection of a cluster head in multihop networks[1], a relay node in cooperative wireless communications[2], and a gathering node for data processing in sensor networks[3].
This article proposes such a distributed mechanism. The basic concepts are as follows: First, the selection is performed in a contentionbased manner with the goal to obtain low signaling overhead. Two random access methods are proposed as alternatives. The first one maximizes the probability of successful selection; the second one reduces the signaling overhead in terms of reply messages sent by candidate nodes. Second, the selection takes into account the specific capability of each node to perform a given task. This capability is quantified in terms of a metric maintained by each node. Nodes with a high metric are wellsuited to become selected and are thus preferred in the random access process.
The node selection is evaluated in two case studies. The first case study refers to the selection of a relay node in a multipath fading environment[2]. Each node maintains a metric describing its current channel quality. The selection process prefers nodes with good channels to be selected as relay. The second case study refers to the selection of nodes performing energyconsuming tasks, and the goal is to balance the load in the network. Using the battery charge state of each node as a selection metric, the proposed selection mechanism contributes toward a longer network lifetime, i.e., it increases the time span until one of the nodes fails due to an empty battery.
Many algorithms for node selection in distributed systems have been proposed in literature. Most of these algorithms employ explicit message exchange between the nodes for selection (see, e.g.,[4, 5, 6, 7, 8, 9]). Unlike these, the approach presented here is of probabilistic nature using a random access competition between the nodes. The intention is to reduce the overhead in terms of signaling and delay at the cost of a nondeterministic success of selection. The message complexity of many selection algorithms significantly depends on the number of nodes n. For example, the algorithm in[8] exhibits a message complexity of order n log(n), and that of[9], of order n. The message complexity of the selection protocols presented in this article, however, is in principle independent of n and thus suited for dense networks.
The remainder of this article is structured as follows: Section 2 presents the selection protocol and mathematically analyzes its reliability, message complexity, and delay. Section 3 first demonstrates the protocol for relay selection in wireless systems and then also for load balancing. Related work addressing selection algorithms, and relay selection and load balancing is discussed in Sections 2 and 3 individually.
Parts of this article, including some equations and results, were previously published in[10] and[11]. Those papers presented some first ideas and results of Section 2. The article at hand gives a more comprehensive analysis and presents two case studies illustrating the use and performance of the proposed approaches.
2 Contentionbased node selection
In this chapter we first present the contentionbased selection approach in Section 2.1 and performance metrics like reliability, message complexity, and delay in Section 2.2. In Section 2.3 we derive two access strategies applicable for the presented contentionbased selection, where the first one (uniform access) maximizes reliability, while the second one (slowstart access) maximizes the probability that only one reply is sent during the selection. In Section 2.4 we analyze the proposed selection schemes theoretically, while in Section 2.5 we introduce the metricbased selection which prefers bettersuited nodes to be selected. Finally, in Sections 2.6 and 2.7, we briefly recap the selection procedure and address related work, respectively.
2.1 Basic approach
A query node transmits a request message to all its neighboring nodes indicating its need to find a node to perform a certain task. The protocol continues with a contentionbased random access scheme using slotted ALOHA during s time slots. These slots are called contention slots in the following. All n nodes receiving the request compete within the contention slots in a way that each node i sends a reply in slot j with probability p_{ ij }, where i ∈ {1,…,n} and j ∈ {1,…,s}.
If we assume these probabilities to be nodeindependent, they can be written as a vector$\overrightarrow{p}:=\left({p}_{1},\dots ,{p}_{s}\right)$, where p_{ j } := p_{ ij } ∀i,j is the probability that a node sends in contention slot j. Note that a node may send more than one reply during the selection. The reply contains a node identifier and, optionally, a metric indicating the node’s suitability for selection.
If no node transmits a reply in a given slot, the slot is called empty slot. If more than one node transmit in this slot, the messages will collide in this slot; such slots are called collision slots. Only if exactly one node transmits in a given slot the reply will be properly received by the query node. Such slots are called singleton slots; such messages are called noncolliding messages. The node sending the first noncolliding message is the winner and serves as selected node. To avoid misinterpretations, a message is called first noncolliding message if it is a noncolliding message and all previous slots were either empty or collision slots. The winner is informed by the query node in a dedicated control slot.
A main challenge in the protocol design is to use a suitable P that enables reliable and fast selection with few messages. In the following, we analyze different approaches for choosing P and compare their performance with respect to (a) reliability, the probability that the selection is successful; (b) message complexity, the number of replies sent from candidate nodes; and (c) delay, the number of contention slots used for one selection attempt.
A node selection is successful once the first noncolliding message is received. Depending on the application, the selection process can be either stopped upon such a message or it can be continued until all s slots are finished. In the following we evaluate the selection algorithms for both cases. We denote the case where the selection is stopped after the first noncolliding message as early stop, while we denote the case where the selection is not stopped as standard protocol.
In some applications the number of candidate nodes must be known or estimated to apply contentionbased node selection. The number of neighboring nodes is often known in certain technologies through the exchange of beacon signals. If not, simple and fast approaches to estimate the number of nodes can be found in[12, 13].
2.2 Performance metrics
We evaluate the proposed selection algorithms based on three metrics which are reliability, message complexity, and delay, respectively.
2.2.1 Reliability
Furthermore, we define R(0,s,·) := 0 and R(n,0,·) := 0.
2.2.2 Message complexity
We refer to Appendix B.2 in Additional file1 for derivations of these expressions.
2.2.3 Delay
The expected delay$\mathbb{E}(D)$ and its variance Var(D) can be calculated from (7).
2.2.4 Cumulative message complexity and delay
Note that so far E(M) and E(D) express message complexity and delay, respectively, for a single selection independent of whether or not the selection was successful. A simple strategy to handle unsuccessful selections is to repeat the selection until it is successful. Values for the expected cumulative message complexity and delay are given by c E(M) and c E(D) with a proportionality constant c. As shown in Appendix B.3 in Additional file1, this constant is c = 1/R(n,s, p). For example, five nodes with ten contention slots yield c = 1.067 for slowstart and c = 1.005 for uniform access.
2.3 Access strategies
We propose two access strategies, where the first one (uniform access) maximizes reliability while the second one (slowstart access) maximizes the probability that only one reply is sent under early stop, i.e., the message complexity of the selection is reduced.
2.3.1 Uniform access
This property is proven in Appendix A.1 in Additional file1. The approach using (8) as sending probabilities in the random access period of the selection protocol is called uniform access.
2.3.2 Slowstart access
where$\prod _{w=1}^{0}{(1{p}_{w})}^{n}:=1$.
Appendix A.2 in Additional file1 gives derivations of these expressions. The resulting algorithm is called slowstart access.
2.4 Performance evaluation
We evaluate the performance of both access strategies in terms of reliability, message complexity, and delay.
2.4.1 Reliability
2.4.2 Message complexity
Message complexity
Access  n  $\mathbb{E}\mathbf{\left(}\mathit{M}\mathbf{\right)}$  Var (M)  

s = 10  20  100  s = 10  20  100  
Standard protocol  
Uniform  5  10  20  100  8  16  80 
10  10  20  100  9  18  90  
100  10  20  100  9.9  19.8  99  
Slowstart  5  3.60  4.63  7.21  3.22  4.23  6.77 
10  3.72  4.82  7.61  3.52  4.61  7.38  
100  3.84  5.03  8.04  3.82  5.01  8.01  
Early stop  
Uniform  5  2.43  2.44  2.44  5.21  5.48  5.52 
10  2.56  2.58  2.58  5.96  6.41  6.40  
100  2.68  2.70  2.70  6.86  7.29  7.17  
Slowstart  5  1.22  1.13  1.03  0.60  0.35  0.08 
10  1.26  1.16  1.04  0.72  0.42  0.08  
100  1.29  1.18  1.04  0.82  0.48  0.09 
The figure illustrates that, for comparable reliabilities, slowstart access exhibits a message complexity that is approximately halved compared to uniform access. For R = 0.98 (not shown), the message complexity of slowstart remains at about onehalf compared to uniform access. Note that for access probabilities${p}_{j}\le \frac{1}{n}$, the message complexities are almost independent of n and always  for both standard protocol and early stop  bounded by the number of slots s.
Proof
As can be seen from Table1, the expected message complexities are much lower for early stop than for the standard protocol.
2.4.3 Delay
For the standard protocol the delay of one selection is always equal to the number of slots s, independent of the access strategy. Therefore, in the following we only consider the delay when applying early stop.
Delay with early stop
Access  n  $\mathbb{E}\mathbf{\left(}\mathit{D}\mathbf{\right)}$  Var (D)  

s = 10  20  100  s = 10  20  100  
Uniform  5  2.43  2.44  2.44  3.28  3.52  3.52 
10  2.56  2.58  2.58  3.72  4.08  4.08  
100  2.68  2.70  2.70  4.10  4.60  4.61  
Slowstart  5  5.00  8.80  38.90  8.54  30.67  668.80 
10  4.92  8.54  37.06  8.54  30.02  634.54  
100  4.84  8.28  35.27  8.53  29.31  599.72 
2.5 Metricbased selection
So far, all nodes have been treated as equally suited to be selected. In many scenarios, however, it is beneficial to select a node that is better suited than others with respect to a certain metric (see, e.g.,[1]). More suitable nodes should be preferred in the random access competition, i.e., such nodes should have a higher chance of sending a first noncolliding message. A similar concept is also applied, for example, in the context of qualityofservice support in wireless local area networks[14]. To obtain nodedependent slot access probabilities, we take the nodeindependent access probabilities and modify them by a metric that quantifies a node’s capabilities. The metric is defined for each node i at time instant t as a realvalued number m_{ i }(t) ∈ [0,1].
 1.
The resulting access probabilities p _{ ij }(t) must be properly bounded, i.e., p _{ ij }(t) ∈ [0,1].
 2.
The function should allow for an adjustment of the modification intensity that is imposed on the probabilities p _{ j }.
 3.
For each time instant t, the sum of nodedependent access probabilities p _{ ij }(t) in a given contention slot shall be approximately equal to the sum of nodeindependent sending probabilities, i.e., ${\sum}_{i=1}^{n}{p}_{\mathit{\text{ij}}}(t)\approx n{p}_{j}$. This property ensures that performance measures such as reliability, message complexity, and delay, as shown in Section 2.4, are not significantly altered when applying metricbased selection.
where$h(m,\overline{m},\delta ):=\text{sgn}(m\overline{m})\xb7\left\{1{\mathrm{e}}^{{[(m\overline{m})\xb7\delta ]}^{2}}\right\}$is the double logistic function.
Appendix C in Additional file1 proves that the nodedependent access probabilities are properly bounded, when applying f(·) on the nodeindependent probabilities for uniform access (8) and slowstart access (10). It also proves the third property, i.e.,${\sum}_{i=1}^{n}{p}_{\mathit{\text{ij}}}(t)\approx n\phantom{\rule{0.3em}{0ex}}{p}_{j}$.
where the distribution of the random variable M(t) represents or approximates the distribution of the values${m}_{k}(t){\overline{m}}_{k}(t)$. The term${\mathbb{E}}_{M}(\xb7)$ denotes the expected value with respect to the random variable M.
2.6 Summary of the selection protocol
In summary, the selection protocol works as follows:

The query node sets the system parameters: number of candidate nodes n and contention slots s.

The query node broadcasts a request to all n candidate nodes. This message includes the values of n and s.

Candidate nodes send a reply in each contention slot based on their metric (if we apply metricbased selection) and one of the access strategies. Slowstart access is applied if low message complexity is desired. Uniform access is applied if low delay is desired.

If the selection is successful, the winner is informed by the query node in a control slot.
2.7 Related work
In general there are selection algorithms for slotted and nonslotted channels. In the work at hand, we focus on slotted channels since they are widely used in practical applications.
Many distributed algorithms for node selection are of deterministic nature (see, e.g.,[5, 7, 8]). The message complexity of these algorithms depends on n. The slowstart algorithms presented in this article are of probabilistic nature and exhibit a message complexity that is in principle almost independent of n (see Table1). In the following, we thus focus on probabilistic approaches for node selection.
Tay et al.[15] investigate and optimize the probability that the first channel access does not collide. The modeling assumptions defer, however, in the following ways: Tay et al. determine the probability distribution for nodes picking a certain slot. Consequently, each node accesses exactly one slot, implying that the sum of the probabilities equals one. In the paper at hand, we determine node access probabilities for each slot. In particular this means that the sum of the probabilities is in general not equal to one and that nodes may access several slots or no slot at all. Due to the fact that we do not impose the requirement that each node must reply in exactly one slot, we achieve a higher selection reliability: When applying the probabilities of Tay et al. for, e.g., n = 16 and s = 8, we get a reliability of R = 0.89036, while for slowstart access we get R = 0.91029. For other parameters, similar results were obtained.
Tang et al.[16] propose a selection protocol where all nodes with metric values exceeding some threshold participate in the selection. These nodes access the channel with nodeindependent probabilities, which implies that they are regarded to be equally suited. Although we employ the same basic idea of channel access for performing node selection, we extend the work of Tang et al.[16] in the following ways: We propose, derive, and analyze two access probabilities, where the first one maximizes reliability while the second one reduces message complexity. In contrast to Tang et al., we propose a metricbased selection scheme, where nodes with better metrics are preferred, and analyze this scheme in two case studies.
Shah et al.[17] propose a selection protocol where metrics of nodes are mapped to discrete timers. The better the node’s metric value, the shorter it waits until it accesses the shared medium. The assumption of this selection procedure is that metric values are samples of a continuous random distribution and, furthermore, that all metrics are statistically independent. Under these assumptions, the probability that metric values are equal is zero. In applications, however, metrics are often distributed discretely, e.g., received signal strength indicator (RSSI) in radio platforms[18]. In some applications, it might even be the aim that metrics become equal over time. We show such an application in Case study II: load balancing (Section 3.3), where the nodes’ battery states become balanced over time. For such applications, the selection algorithm proposed by Shah et al. will suffer from collisions since the likelihood that the metric values of the best and secondbest node are very close to each other (or even equal) is clearly nonzero. In contrast to this, the selection algorithm proposed in the paper at hand maintains a high reliability even if metrics are equal. Basically, in the extreme case where all nodes’ metric values are equal, the metricbased selection becomes metricindependent, and its reliability is given in Figure1.
Qin et al.[19] present an opportunistic algorithm allowing a node to send in each slot only if its metric falls within a specified interval. An extension of this algorithm is given by Yim et al.[20]. Nodes send at variable transmit powers. The main difference from the article at hand is that those protocols start with a welldefined interval and split this interval at each stage into a lower and upper interval until the best node is selected. For the case where, e.g., the metric values of the best and the secondbest node are very close to each other or even equal (e.g., if the assumption of statistical independence of the nodes’ metrics does not hold), the message complexity of these algorithms will be high. We aim for low message complexity while retaining a high selection reliability even in cases where the best and secondbest nodes exhibit the same metric value.
3 Case studies
Let us now demonstrate and analyze the metricbased selection in two case studies. The first study addresses the task of relay selection for cooperative wireless communications (Section 3.2). The second study is concerned with load balancing to increase network lifetime (Section 3.3). Before we address these case studies, however, we first consider related work on relay selection and load balancing in Section 3.1.
3.1 Related work
3.1.1 Relay selection
Bletsas et al.[21] describe a relay selection scheme with random access based on timers and channel estimation. Upon receiving a CTS packet, each relay candidate starts a timer. The value of these timers is based on channel measurements, and the timer of the relay with the best endtoend channel condition will expire first.
Lo et al.[22] propose a relay selection scheme that favors nodes with better channel gains. All relay candidates compete on a slotted channel, where each one sends a reply with a defined probability in one randomly selected slot. This message contains information about the node’s channel condition. The destination then chooses one of the candidates as the relay node. In our work, only nodes possessing a good value of the regarded metric reply, which in turn reduces the message complexity.
Nosratinia et al.[23] present a distributed relay selection protocol, where each node decides on its own whether or not to assist other nodes. Each node maintains a priority list used for cooperation purposes. In contrast to our proposal, the aim of this protocol is to achieve full diversity across the network.
Adam et al.[24] study relay selection with explicit consideration of the energy required to receive data. They propose a relay selection scheme that exhibits benefits with respect to energy efficiency. Nodes compete in the relay selection process by setting timers based on the channel state.
Lima et al.[25] present a contentionbased relay selection mechanism. Nodes access the medium based on a common probability. Whenever a collision occurs, the relays split into subgroups. The goal is to get replies from many relay candidates such that the source can select the most appropriate one.
These papers demonstrate the importance of a selection protocol for cooperative relay communications. The paper at hand performs a much more comprehensive analysis of such a relay selection protocol than previous work in this area.
3.1.2 Load balancing
Several algorithms for load balancing in task assignments have been proposed for mobile and wireless networks. Examples include the following: Tonguz et al.[26] present a mathematical framework for the evaluation of dynamic load balancing strategies in cellular networks. Alanyali et al.[27] focus on dynamic resource allocation and analyze the performance of two call assignment policies, i.e., least loaded routing and least relatively loaded routing. Further load balancing strategies are proposed and evaluated, e.g., in[28] and[29]. In the case study presented in this article, each node determines its suitability to perform a certain task on its own. The design of the random access scheme keeps the overhead at a low level.
3.2 Case study I: relay selection
A current field of application for contentionbased selection can be found in cooperative wireless communications. In such systems, a radio link between a source and a destination node is supported by one or more relay nodes[2]. An important task is to select an appropriate relay from the set of all possible relay candidates to forward messages to the destination[24]. We focus on ondemand relaying techniques, where relaying is only performed if requested by the destination[24]. We assume that all relay candidates receive the message from the source. Relay selection is carried out by the destination.
3.2.1 Relay selection algorithm
The destination acts as query node and transmits a request message with transmit power κ. Relay selection should put preference on nodes having good channel conditions to the destination node. Assuming symmetric channels, each node measures the reception power of the selection requests from the destination and averages these reception powers over time.
Applying the resulting modification function$f\left({m}_{i}(t),{\overline{m}}_{i}(t),\delta \right)$in (11), each node computes its access probabilities for this selection and replies in each slot accordingly. For largeenough channel coherence time, the selected relay will exhibit good channel conditions for relaydestination communications.
3.2.2 Performance study
Let us now investigate the performance of this metricbased relay selection algorithm by simulations. As a case study, we employ TelosB nodes, which are programmable wireless platforms. The nodes have a transmit power κ = 0 dBm and a receiver sensitivity θ = −94 dBm[18]. The pathloss exponent is set to α = 3. Furthermore, we assume Rayleigh fading. We randomly place n relay candidates using a uniform distribution in an area of size A = 1,200 m × 1,200 m. The query node (additional node) is placed at the center of the area. Random access for relay selection is performed with s = 10 contention slots.
For each request sent by the query node, each relay candidate computes its metric and access probabilities. We perform 1,000 simulation runs, each consisting of 100 selection attempts. At the beginning of each simulation run, nodes are randomly (re)distributed and selection thresholds are reset.
Message complexity of relay selection ( n=5 )
Access  δ  Early stop  No early stop  

Mean  Var  Mean  Var  
Slowstart  mi  1.3  0.87  3.85  3.52 
5  1.30  0.87  3.86  3.54  
10  1.29  0.84  3.81  3.63  
15  1.27  0.77  3.71  3.68  
20  1.26  0.74  3.61  3.77  
Uniform  mi  2.43  5.41  10.04  8.55 
5  2.46  5.63  10.10  8.86  
10  2.41  5.55  9.92  10.22  
15  2.34  5.36  9.59  11.10  
20  2.25  5.19  9.24  13.64 
 1.
The percentage of selections γ _{1} where the best node is selected.
 2.
The percentage of selections γ _{2} where the best or secondbest node is selected.
For uniform access, one can also apply more extreme values for δ, without decreasing the reliability too much: When applying, e.g., δ = 50, the best node is selected in γ_{1} = 53% of all cases, while the best or the secondbest node is selected in γ_{2} = 78% of all cases. The reliability remains at high levels, i.e., the median is 99.6%; 90% of all reliabilities are larger than 96%.
Message complexity of relay selection ( n = 20)
Access  δ  Early stop  No early stop  

Mean  Var  Mean  Var  
Slowstart  mi  1.36  1.10  4.06  4.09 
5  1.37  1.14  4.10  4.19  
10  1.35  1.07  4.04  4.21  
15  1.33  1.01  3.94  4.39  
20  1.31  0.91  3.83  4.62  
Uniform  mi  2.64  6.86  10.07  10.40 
5  2.69  7.19  10.20  10.98  
10  2.63  7.03  10.01  12.02  
15  2.53  6.80  9.66  14.75  
20  2.45  6.95  9.34  17.34 
Last but not the least, the best node is selected for slowstart access in about γ_{1} = 26% (δ = 20) or 13% (δ = 10) of all cases. For uniform access, the performance is γ_{1} = 28% and 13%, respectively. The best or secondbest node is selected at a rate of γ_{2} = 42% or 22% applying slowstart access; it is 45% or 23% for uniform access. Roughly speaking, metricbased selection chooses the best node about five times as often as metricindependent selection ( γ_{1} = 1/n = 5%) when using δ = 20.
3.2.3 Impact of discrete RSSI values
In practical applications, the RSSI value provided by radio platforms is discrete. For the CC1100E lowpower subGHz RF transceiver, for example, the RSSI value can be retrieved (in dBm) with a resolution of 0.5 dB[31]. Simulations showed that the performance of the proposed selection algorithm does not degrade due to this quantization.
3.3 Case study II: load balancing
Another application of node selection is to balance the load among several devices. We use a selection where devices with high battery charge states are preferred.
3.3.1 Load balancing algorithm
where m_{ ij } is the value of node j’s metric received by node i from node j’s last reply. Furthermore, each node calculates its sending probabilities p_{ ij } using (12) and accesses the contention slots according to these.
The first few selections are made with a metricindependent selection until nodes know (most) of the other nodes’ metrics. Once all candidate nodes can well estimate the values m_{ ij }, the protocol changes to metricbased selection.
3.3.2 Performance study
Thus, the energy consumption of listening (i.e., no reply is received during the slot) is about 6% of that of receiving.
In the following, we assume that the task to be fulfilled requires 3.6 mJ. A practical task with such an energy consumption would be, e.g., measuring temperature and atmospheric pressure. The barometer specified in[32] requires a current of 5 mA, while the temperature sensor specified in[33] requires 4 mA. We average over a time period of 350 ms to get accurate measurement values. Thus, the energy consumption for performing the measurement is (1.7 + 5 + 4)·0.35 ≈ 3.6 mJ, where 1.7 mA is the current consumption of the CC1000E in idle mode.
The simulation is performed in the following way: Each node is assigned an initial battery state of charge. The query node sends a request to all candidate nodes containing the task to perform. The candidate nodes access the channel using uniform access or slowstart access, respectively. The node that sends the first noncolliding message will have to perform the task. If the selection is unsuccessful, it will be repeated until it is successful. Since nodes are not aware of other nodes’ battery states in the beginning, we perform the first n selections always with the metricindependent strategy and then switch to the metricbased selection. As reference, we also evaluate the performance of metricindependent selection, i.e., the entire simulation is performed applying the metricindependent strategy. If not mentioned otherwise, node selection is performed over s = 10 contention slots. We compute the total energy needed for successful and unsuccessful selections and execution of the tasks. We also sum up the number of replies and delays of selections. The simulation runs until there is only one charged node left.
Message complexity of load balancing ( n = 5)
Access  δ  Early stop  No early stop  

Mean  Var  Mean  Var  
Slowstart  mi  1.29  0.84  3.78  3.33 
5  1.29  0.82  3.82  3.35  
10  1.29  0.82  3.83  3.33  
15  1.28  0.78  3.81  3.29  
20  1.28  0.79  3.82  3.29  
Uniform  mi  2.40  5.21  10.08  8.10 
5  2.42  5.32  10.03  7.90  
10  2.36  4.99  10.02  7.53  
15  2.37  5.03  10.04  7.40  
20  2.37  5.18  10.02  7.32 
Initial battery states ( n = 20)
i  b _{i+1}  b _{i+2}  b _{i+3}  b _{i+4}  b _{i+5} 

0  3,000  2,400  2,050  1,520  2,700 
5  2,600  2,000  3,000  2,900  2,400 
10  1,800  1,900  2,500  2,800  2,950 
15  1,600  1,900  2,130  2,750  1,800 
Message complexity of load balancing ( n = 20)
Access  δ  Early stop  No early stop  

Mean  Var  Mean  Var  
Slowstart  mi  1.35  1.07  4.03  3.99 
5  1.35  1.07  4.02  3.95  
10  1.35  1.06  4.02  3.90  
15  1.35  1.06  4.01  3.86  
20  1.35  1.06  3.96  3.85  
Uniform  mi  2.62  6.71  10.06  10.10 
5  2.62  6.67  10.06  9.81  
10  2.59  6.51  9.96  9.46  
15  2.59  6.41  9.84  9.45  
20  2.59  6.52  9.66  9.47 
4 Conclusions
This article presented and analyzed a general method for distributed node selection using a random access competition on a shared slotted channel. Two access strategies were proposed: uniform access maximizes reliability; slowstart access reduces message complexity. Making slot access probabilities dependent on a node metric, both schemes can be applied for node selection. We analyzed the selection protocol theoretically in terms of reliability, message overhead, and delay. Furthermore, we tested the protocol in two case studies, namely relay selection and load balancing.
For the application of relay selection, we applied the channel state as the metric and showed that the metricbased strategy selects one of the better relays with high likelihood compared to metricindependent selection. For the application of load balancing we applied the battery state of a node as the metric. Nodes are selected to perform a certain task. To balance the battery consumption of the nodes, we put preference on nodes that have higher battery states. The metricbased selection increases the network lifetime considerably compared to metricindependent selection.
Notes
Supplementary material
References
 1.Basagni S: Distributed clustering for ad hoc networks. In Proceedings of the International Symposium on Parallel Architectures, Algorithms, and Networks (ISPAN). Perth; 2–25 June 1999.Google Scholar
 2.Laneman JN, Tse DNC, Wornell GW: Cooperative diversity in wireless networks: efficient protocols and outage behavior. IEEE Trans. Inform. Theory 2004, 50(12):30623080. 10.1109/TIT.2004.838089MathSciNetCrossRefGoogle Scholar
 3.Chou J, Petrovic D, Ramachandran K: A distributed and adaptive signal processing approach to reducing energy consumption in sensor networks. In Proceedings of the IEEE INFOCOM. San Francisco; 30 March–3 April 2003.Google Scholar
 4.Tel G: Introduction to, Distributed Algorithms. Cambridge: Cambridge University Press; 2000.CrossRefGoogle Scholar
 5.GarciaMolina H: Elections in a distributed computing system. IEEE Trans. Comput 1982, C31: 4859.CrossRefGoogle Scholar
 6.Gallager R, Humblet P, Spira P: A distributed algorithm for minimumweight spanning trees. ACM Trans. Program. Lang. Sys 1983, 5: 6677. 10.1145/357195.357200CrossRefGoogle Scholar
 7.Korach E, Kutten S, Moran S: A modular technique for the design of efficient distributed leader finding algorithms. ACM Trans Program. Lang. Sys 1990, 12: 84101. 10.1145/77606.77610CrossRefGoogle Scholar
 8.Chang E, Roberts R: An improved algorithm for decentralized extremafinding in circular configurations of processes. Commun. ACM 1979, 22: 281283. 10.1145/359104.359108CrossRefGoogle Scholar
 9.Ramanathan M, Ferreira R, Jagannathan S, Grama A, Szpankowski W: Randomized leader election. Distributed Comput 2007, 19: 403418. 10.1007/s0044600700224CrossRefGoogle Scholar
 10.Bettstetter C, Brandner G, Vilzmann R: On colliding first messages in slotted ALOHA. In Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Cannes; 15–18 Sept 2008.Google Scholar
 11.Brandner G, Schilcher U, Gyarmati M, Bettstetter C: Noncolliding first messages: further insights toward a practical solution. In IEEE Vehicular Technology Conference. Barcelona; 26–29 April 2008.Google Scholar
 12.Bettstetter C, Adam H: Contentionbased neighborhood estimation. In Proceedings IEEE Vehicular Technology Conference (VTC). Taipei; 16–19 May 2010.Google Scholar
 13.Kodialam M, Nandgopal T, Lau W: Anonymous tracking using RFID tags. In Proceedings of the IEEE INFOCOM. Anchorage; 6–12 May 2007.Google Scholar
 14.IEEE Standards Association: IEEE 802.11e, wireless LAN medium access control (MAC) and physical layer (PHY) specifications amendment 8: medium access control (MAC) quality of service enhancements. New York: IEEE Tech. rep; 2005.Google Scholar
 15.Tay Y, Jamieson K, Balakrishnan H: Collisionminimizing CSMA and its applications to wireless sensor networks. IEEE J. Select. Areas Commun 2004, 22(6):10481057. 10.1109/JSAC.2004.830898CrossRefGoogle Scholar
 16.Tang T, Heath R: Opportunistic feedback for downlink multiuser diversity. IEEE Commun. Lett 2005, 9(10):948950. 10.1109/LCOMM.2005.10002CrossRefGoogle Scholar
 17.Shah V, Mehta N, Yim R: Optimal timer based selection schemes. IEEE Trans. Commun 2010, 58(6):18141823.CrossRefGoogle Scholar
 18.TelosB datasheet 2009.http://www.willow.co.uk/TelosB_Datasheet.pdf . Accessed 20 June 2013
 19.Qin X, Berry R: Exploiting multiuser diversity for medium access control in wireless networks. In Proceedings of the IEEE INFOCOM. San Francisco; 30 March–3 April 2003.Google Scholar
 20.Yim R, Mehta N, Molisch A: Best node selection through distributed fast variable power multiple access. In Proceedings of the IEEE International Conference on Communications (ICC). Beijing; 19–23 May 2008.Google Scholar
 21.Bletsas A, Khisti A, Reed DP, Lippman A: A simple cooperative diversity method based on network path selection. IEEE J. Select. Areas Commun 2006, 24: 659672.CrossRefGoogle Scholar
 22.Lo C, Heath R, Vishwanath S: Opportunistic relay selection with limited feedback. In IEEE Vehicular Technology Conference. Dublin; 22–25 April 2007.Google Scholar
 23.Nosratinia A, Hunter TE: Grouping and partner selection in cooperative wireless networks. IEEE J. Select. Areas Commun 2007, 25(2):369378.CrossRefGoogle Scholar
 24.Adam H, Bettstetter C, Senouci SM: Adaptive relay selection in cooperative wireless networks. In Proceedings of the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Cannes; 15–18 Sept 2008.Google Scholar
 25.de Lima C, de Abreu G: Analysis of contentionbased relay selection mechanisms in autonomous multihop networks. In Proceedings of the IEEE Information Theory Workshop on Network Information Theory. Volos; 10–12 June 2009.Google Scholar
 26.Tonguz O, Yanmaz E: The mathematical theory of dynamic load balancing in cellular networks. IEEE Trans. Mobile Comput 2008, 7(12):15041518.CrossRefGoogle Scholar
 27.Alanyali M, Hajek B: On simple algorithms for dynamic load balancing. In Proceedings of the IEEE INFOCOM. Boston; 2–6 April 1995.Google Scholar
 28.Gupta G, Younis M: Performance evaluation of loadbalanced clustering of wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC). Anchorage; 23 Feb–1 March 2003.Google Scholar
 29.Bejerano Y, Han SJ, Li LE: Fairness and load balancing in wireless LANs using association control. In Proceedings of the ACM MobiCom. New York; 2004.Google Scholar
 30.Goldsmith A: Wireless Communications. Cambridge: Cambridge University Press; 2005.CrossRefGoogle Scholar
 31.Texas Instruments: CC1100E: lowpower subGHz RF transceiver. 2013.http://www.ti.com/lit/ds/swrs082/swrs082.pdf . Accessed 20 June 2013Google Scholar
 32.Ammonit: Barometric pressure sensor AB 60/AB 100. 2012.http://www.ammonit.com/images/stories/downloadpdfs/DataSheets/AirPressure/EN_DS_Barometer_AB60AB100_40.pdf . Accessed 20 June 2013Google Scholar
 33.Global Water: WQ101 temperature sensor. 2011.http://www.globalw.com/downloads/WQ/WQ101B.pdf . Accessed 20 June 2013Google Scholar
 34.Kang I, Poovendran R: Maximizing static network lifetime of wireless broadcast ad hoc networks. In Proceedings of the IEEE International Conference on Communications (ICC). Anchorage; 11–15 May 2003.Google Scholar
Copyright information
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.