Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © 2008 1 Wireless Sensor Networks: Classic Protocols Polly Huang Department of Electrical.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

Directed Diffusion for Wireless Sensor Networking
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Group #1: Protocols for Wireless Mobile Environments.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks.
Sensor Networks Issues Solutions Some slides are from Estrin’s early talks.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin -- Adapted the authors’ Infocom 2002 talk.
Random Access MAC for Efficient Broadcast Support in Ad Hoc Networks Ken Tang, Mario Gerla Computer Science Department University of California, Los Angeles.
1-1 Routing. 1-2 Data-Centric Routing r Paradigm shift from accessing data from individual nodes to accessing “relevant” data. m Data within certain region,
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
1-1 Topology Control. 1-2 What’s topology control?
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
U NIVERSITY OF M ASSACHUSETTS, A MHERST – Department of Computer Science Routing and Data Dissemination Presented by: Li, Huan Liu, Junning.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Charlmek Intanagonwiwat Ramesh Govindan Deborah Estrin Presentation.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
1 The Data Dissemination Problem  A region requires event- monitoring (harmful gas, vehicle motion, seismic vibration, temperature, etc.)  Deploy sensors.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
1 Wireless Sensor Networks: Application Driver for Low Power Systems Deborah Estrin Laboratory for Embedded Collaborative Systems ( LECS ) UCLA Computer.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
A Simple and Effective Cross Layer Networking System for Mobile Ad Hoc Networks Wing Ho Yuen, Heung-no Lee and Timothy Andersen.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Routing and Data Dissemination. Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts.
Wireless Sensor Networks and Laboratories Polly Huang EE NTU
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks ChalermekRameshDeborah Intanagonwiwat Govindan Estrin Mobicom 2000.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Wireless Sensor Networks Nov 1, 2006 Jeon Bokgyun
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
SNU Mobile Networks Lab. S-MAC (Sensor-MAC) T-MAC (Timeout-MAC) Kae Won, Choi Kyoung hoon, Kim.
Sensor Networks February 6, 2003 Class Meeting 8 (Images from Prof. Deborah Estrin, USC)
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
Ching-Ju Lin Institute of Networking and Multimedia NTU
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
Routing and Dissemination in Wireless Sensor Networks Sandeep Gupta Based on Slides by Huan and Junning U. Mass.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Building Wireless Efficient Sensor Networks with Low-Level Naming J. Heihmann, F.Silva, C. Intanagonwiwat, R.Govindan, D. Estrin, D. Ganesan Presentation.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented by Barath Raghavan.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
MAC Protocols for Sensor Networks
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
MAC Protocols for Sensor Networks
Wireless Sensor Networks
Wireless Sensor Networks
Overview of Wireless Networks:
Introduction to Wireless Sensor Networks
Wireless Sensor Network Architectures
Introduction to Wireless Sensor Networks
Routing and Data Dissemination
Presentation transcript:

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Classic Protocols Polly Huang Department of Electrical Engineering National Taiwan University

Network and Systems Laboratory nslab.ee.ntu.edu.tw Classic Protocols Designed for outdoor sensor networks Directed diffusion S-MAC Copyright ©

Network and Systems Laboratory nslab.ee.ntu.edu.tw Directed Diffusion Largely based on slides from Chalermek Intanagonwiwat & Deborah Estrin Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw In Short A data dissemination mechanism fitting into the data-centric communication paradigm for sensor networks Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Sensor Networks Or another One way Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Applications Scientific: eco-physiology, biocomplexity mapping Infrastructure: contaminant flow monitoring (and modeling) Engineering: monitoring (and modeling) structures Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw The Real Need Specialized communication in a wild wide space Specialized: application dependent Wild: little or no infrastructure Wide: expensive to build/use communication infrastructure Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Applications: A Longer List Science: monitoring temperature change on a volcanic island Engineering: monitoring power use of industrial district Infrastructure: monitoring passenger traffic at MRT stations Military: tracking enemy migration in a dessert Disaster: emergency relief after Gozzila taking a short tour of Tokyo Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Common Vision Embed numerous distributed devices to monitor and interact with physical world Exploit spatially and temporally dense, in situation, sensing and actuation Network these devices so that they can coordinate to perform higher-level tasks Requires robust distributed systems of hundreds or thousands of devices Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Challenges Tight coupling to the physical world and embedded in unattended systems Different from traditional Internet, PDA, Mobility applications that interface primarily and directly with human users But solutions might be applicable to the Internet, PDA, Mobility applications as well Untethered, small form-factor, nodes present stringent energy constraints Living with small, finite, energy source is different from traditional fixed but reusable resources such as BW, CPU, Storage Communications is primary consumer of energy in this environment R 4 drop off dictates exploiting localized communication and in- network processing whenever possible

Network and Systems Laboratory nslab.ee.ntu.edu.tw Energy the Bottleneck Resource Communication VS Computation Cost [Pottie 2000] E α R 4 10 m: 5000 ops/transmitted bit 100 m: 50,000,000 ops/transmitted bit Avoid communication over long distances Cannot assume global knowledge, cannot pre- configure networks Achieve desired global behavior through localized interactions Empirically adapt to observed environment Can leverage data processing/aggregation inside the network Can leverage data processing/aggregation inside the network Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw In-Network Processing Sensor technology is advancing steadily Situations detected by the sensors can be surprisingly rich For example, all these at once Detecting a speech Inferring the location and identity of the speaker These information can be used to facilitate efficient dissemination of the recorded speech Suppressing speech coming from the same speaker Forwarding towards the likely listeners Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw New Design Themes Long-lived systems that can be untethered and unattended Energy efficient communication Self configuring systems that can be deployed ad hoc Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Approach Leverage data processing inside the network Exploit computation near data to reduce communication Achieve desired global behavior with adaptive localized algorithms (i.e., do not rely on global interaction or information) Dynamic, messy (hard to model), environments preclude pre-configured behavior Can ’ t afford to extract dynamic state information needed for centralized control or even Internet-style distributed control Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Why can ’ t we simply adapt Internet protocols and “ end to end ” architecture? Internet routes data using IP Addresses in Packets and Lookup tables in routers Humans get data by “ naming data ” to a search engine Many levels of indirection between name and IP address Works well for the Internet, and for support of Person- to-Person communication Embedded, energy-constrained (un-tethered, small-form-factor), unattended systems can ’ t tolerate communication overhead of indirection Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Therefore, Directed Diffusion Features Operations Evaluations Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Directed Diffusion Paradigm Data-centric communication Supported with distributed algorithms using localized interactions Application-specific in-network processing Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw IP Communication Organize system based on named nodes Per-node forwarding state Senders need to push data to the node address of sink Bob Alice To Bob My name is Alice. I am a 19-yr old girl… Chris I am Bob Bob there I am Bob Bob there I am Bob To Bob My name is Alice. I am a 19-yr old girl… To Bob My name is Alice. I am a 19-yr old girl… Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Data-Centric Communication Organize system based on named data Per-data diffusion state Sinks need to be specific about what data they’d pull Tell me about girls Tell me about girls Girl info goes there Tell me about girls Girl info goes there Tell me about girls Here’s a 19-yr old girl… Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Directed Diffusion Paradigm Data-centric communication Supported with distributed algorithms using localized interactions Application-specific in-network processing Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Localized Interaction Diffuse requests/interest across network Set up gradients to guide responses/data Diffuse responses/data based on the gradients (Pretty much the same as in the IP routing) Tell me about girls Tell me about girls Girl info goes there Tell me about girls Girl info goes there Tell me about girls Here’s a 19-yr old girl… Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Directed Diffusion Paradigm Data-centric communication Supported with distributed algorithms using localized interactions Application-specific in-network processing Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Without In-Network Processing Data are simply passed on Tell me about girls Tell me about girls Girl info goes there Tell me about girls Girl info goes there Tell me about girls Tell me about girls Here’s a 20-yr old girl… Here’s a 19-yr old girl… Here’s a 20-yr old girl… Here’s a 19-yr old girl… Here’s a 20-yr old girl… Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw With In-Network Processing Data are aggregated and then passed on Girl info goes there Here’re two 19+ yr old girls… Girl info goes there Here’s a 20-yr old girl… Here’s a 19-yr old girl… Here’re two 19+ yr old girls… Here’s a 20-yr old girl… Here’s a 19-yr old girl… Here’re two 19+ yr old girls… Application-specific Aggregation Here! Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Directed Diffusion Paradigm Data-centric communication Supported with distributed algorithms using localized interactions Application-specific in-network processing Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Example: Remote Surveillance Interrogation: e.g., “ Give me periodic reports about animal location in region A every t seconds ” e.g., “ Give me periodic reports about animal location in region A every t seconds ” Interrogation is propagated to sensor nodes in region A Sensor nodes in region A are tasked to collect data Data are sent back to the users every t seconds Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Basic Directed Diffusion Setting up gradients Source Sink Interest = Interrogation Gradient = Who is interested Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Basic Directed Diffusion Source Sink Sending data and Reinforcing the best path Low rate eventReinforcement = Increased interest Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Directed Diffusion and Dynamics Recovering from node failure Source Sink Low rate event High rate event Reinforcement Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Directed Diffusion and Dynamics Source Sink Stable path Low rate event High rate event Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Local Behavior Choices For propagating interests In this example, flood In this example, flood More sophisticated behaviors possible: e.g. based on cached information, GPS For data transmission Multi-path delivery with selective quality along different paths Multi-path delivery with selective quality along different paths probabilistic forwarding single-path delivery, etc. For setting up gradients data-rate gradients are set up towards neighbors who send an interest. data-rate gradients are set up towards neighbors who send an interest. Others possible: probabilistic gradients, energy gradients, etc. For reinforcement reinforce paths, or parts thereof, based on observed delays reinforce paths, or parts thereof, based on observed delays, losses, variances etc. other variants: inhibit certain paths because resource levels are low Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Simulation Study Key metric Average Dissipated Energy per event delivered indicates energy efficiency and network lifetime diffusion Compare diffusion to flooding flooding omniscient multicast centrally computed tree (omniscient multicast) Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Diffusion Simulation Details ns-2 Simulator: ns-2 Network Size: Nodes Transmission Range: 40m Constant Density: 1.95x10 -3 nodes/m 2 (9.8 nodes in radius) MAC: Modified Contention-based MAC Energy Model: Mimic a realistic sensor radio [Pottie 2000] 660 mW in transmission, 395 mW in reception, and 35 mw in idle Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Diffusion Simulation Surveillance application 5 sources are randomly selected within a 70m x 70m corner in the field 5 sinks are randomly selected across the field High data rate is 2 events/sec Low data rate is 0.02 events/sec Event size: 64 bytes Interest size: 36 bytes All sources send the same location estimate for base experiments All sources send the same location estimate for base experiments Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Average Dissipated Energy Average Dissipated Energy (Joules/Node/Received Event) Network Size Diffusion Omniscient Multicast Flooding Diffusion can outperform flooding and even omniscient multicast. WHY ? Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw In-network Processing Average Dissipated Energy (Joules/Node/Received Event) Network Size Diffusion With Suppression Diffusion Without Suppression Application-level suppression allows diffusion to reduce traffic and to surpass omniscient multicast. Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Negative Reinforcement Average Dissipated Energy (Joules/Node/Received Event) Network Size Diffusion With Negative Reinforcement Diffusion Without Negative Reinforcement Reducing high-rate paths in steady state is critical Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Summary of Diffusion Results Under the investigated scenarios, diffusion outperformed omniscient multicast and flooding Application-level data dissemination has the potential to improve energy efficiency significantly Duplicate suppression is only one simple example out of many possible ways. Aggregation (next) All layers have to be carefully designed Not only network layer but also MAC and application level Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Standard Standard energy model) Average Dissipated Energy (Joules/Node/Received Event) Network Size Diffusion Omniscient Multicast Flooding Standard is dominated by idle energy Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Contention-based protocol RTS-CTS-DATA-ACK RTS CTS Sender Receiver DATA ACK [Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std edition] Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw S-MAC Contention-based protocol RTS-CTS-DATA-ACK Listen interval Send packets Receive packets [W. Ye et al., “ An energy-efficient MAC protocol for wireless sensor networks ”, in INFOCOM 2002] Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Schedule synchronization Schedules can differ Neighboring nodes have same schedule Node 1 Node 2 sleep listen sleep listen sleep Schedule 2 Schedule 1 Border nodes: two schedules broadcast twice (Borrowed from S-MAC) Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Scheduling in S-MAC Unknown neighbors the same schedule Schedule 2 Schedule 1 Collision 1 Unicast Broadcast Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Questions? Copyright © 2008

Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Questions?