Internet of Things Amr El Mougy Gina Maher.

Slides:



Advertisements
Similar presentations
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Network
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
Investigating Mac Power Consumption in Wireless Sensor Network
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Cross-Layer Application-Specific WSN Design over SS-Trees -Prepared by Amy.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Efficient MAC Protocols for Wireless Sensor Networks
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
CS 712 | Fall 2007 Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua. National University.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
11/15/20051 ASCENT: Adaptive Self- Configuring sEnsor Networks Topologies Authors: Alberto Cerpa, Deborah Estrin Presented by Suganthie Shanmugam.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
Energy-Efficient Wake-Up Scheduling for Data Collection and Aggregation Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior.
Michael Buettner, Gary V. Yee, Eric Anderson, Richard Han
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
Data Predicted Wakeup Based Duty Cycle MAC for Wireless Sensor Networks Presented By: Muhammad Mostafa Monowar Networking Lab Kyung Hee University. Authors:
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
MAC Protocols for Sensor Networks
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
An Energy-efficient MAC protocol for Wireless Sensor Networks
Internet of Things Amr El Mougy Alaa Gohar.
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
Protocols for Wireless Sensor Networks
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Ad-hoc Networks.
Wireless Sensor Network Protocols
Presented by: Rohit Rangera
SENSYS Presented by Cheolki Lee
< November, 2011 > Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Improved Low Energy Mechanism based.
Data Collection and Dissemination
Wireless Sensor Network Architectures
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Introduction to Wireless Sensor Networks
Lei Chen and Wendi B. Heinzelman , University of Rochester
Net 435: Wireless sensor network (WSN)
Net301 lecture9 11/5/2015 Lect 9 NET301.
Energy Conservation in Sensor Networks
A Survey on Routing Protocols for Wireless Sensor Networks
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing IEEE Standard.
Data Collection and Dissemination
Presented By: Muhammad Mostafa Monowar Networking Lab
On Achieving Maximum Network Lifetime Through Optimal Placement of Cluster-heads in Wireless Sensor Networks High-Speed Networking Lab. Dept. of CSIE,
doc.: IEEE <doc#>
Overview: Chapter 3 Networking sensors
Investigating Mac Power Consumption in Wireless Sensor Network
Speaker : Lee Heon-Jong
Protocols.
Protocols.
Exploring Energy-Latency Tradeoffs for Sensor Network Broadcasts
Presentation transcript:

Internet of Things Amr El Mougy Gina Maher

Data Collection in Sensor Networks

Data Collection from BLE Sensors BLE sensors are standalone. Data collection has to be done from each sensor individually Mainly two methods for BLE data collection: Smartphones (public sensing) Gateway Communication is typically one way Configuration parameters are allowed in the reverse direction

Comparison of Gateways and Smartphones Fixed data collection point  reliable Reliability depends on the smartphone density Medium cost Low cost Requires an additional device to configure the sensors Can send configuration commands from the phone Depending on the type, it can support WiFi, cellular connection, or both Always supports WiFi and cellular connections Always participates in the data collection Participation depends on the user’s willingness Dedicated for data collection Data collection competes with other applications Typically has stable power source Battery-powered

Structure of BLE Gateway Processor/Application Host API BLE Stack Profiles TCP/IP BLE Physical/Link Layers Ethernet Stack Cellular Stack WiFi Stack

Gateway Types Payload Extraction Packet Encapsulation (Data Pipe) BLE Attribute WiFi Packet Handle UUID Value WiFi - H IP-H TCP-H Value BLE Attribute Handle UUID Value WiFi Packet WiFi - H IP-H TCP-H Handle UUID Value

Data Collection from ZigBee Sensors Smartphones generally do not support ZigBee All ZigBee networks have a PAN coordinator where all data is collected From there the data can uploaded to the Internet Thus, the coordinator can act as a gateway

Why is Data Collection Challenging? Reliability, automation and fault-tolerance WSNs are required to remain operational for long durations without human intervention All nodes have dual function: sensing and relaying Transmissions typically consume the most energy Nodes go to low power (sleep) state to conserve energy This is called duty cycling. Low duty cycles mean nodes remain in sleep state for longer durations to conserve energy Generated data needs a path to the PAN coordinator Sleeping nodes will not participate in forwarding  need to plan sleep schedules carefully Sensor data is many-to-one. Control data is one-to-many Control traffic is minor but often more critical. Reliability is often imposed Energy efficiency is at the core of all challenges!!

The Three Stages of Data Collection Node Deployment Control Message Disseminat-ion Data Delivery Area Coverage Location Coverage Flooding-Based Gossiping-Based QoS Metrics (Latency, reliability, energy)

The Node Deployment Problem Problem Statement: What is the optimum placement of sensor nodes in order to satisfy the requirements of a certain application? This placement needs to ensure that all required attributes are sensed and all nodes have a path to the PAN coordinator (the coverage and connectivity problems) Sensors are modeled as a circular disk with sensing range Rs metres and communication range Rc metres Rc Rs is determined by the sensing hardware while Rc is determined by transceiver Rs

The Node Deployment Problem Nodes go into sleep mode periodically and their batteries die Conclusion  not all deployed nodes may be active at all time Thus, redundancy is required in the network (deploy more nodes than needed) The problem now is known as the k-coverage and k-connectivity problems: every point must be covered by at least k sensors every sensor must have a path to the gateway even if k – 1 paths fail

1-coverage, 1-connectivity Examples 1-coverage, 1-connectivity Strip pattern used as building block for 1-coverage and 1-connectivity network ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Node Deployment for Area Coverage Goal is to cover every point in the area with at least k sensors Research has discovered the following pattern to be the universal element pattern for 1-coverage and k-connectivity (k ≤ 6) Where d1 and d2 are parameters that depend on Rc and Rs ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Examples ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Node Deployment for Location Coverage Goal is to cover specific points in an area with at least k sensors Coverage is straightforward and is typically manual These locations may be sparse, thus requiring relay nodes The challenge is to deploy relay nodes to ensure connectivity More that one relay node may be needed to ensure k connectivity ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Node Deployment for Location Coverage Start with the deployed sensors Add a relay node with three edges at the intersection of the medians Check the lengths of each edge. If greater than communication range, add a relay

Traffic-Aware Node Deployment The preceding algorithm does not consider traffic Nodes close to the base station relay more traffic Needs to consider the nature of traffic so as not to over-consume the batteries of certain relay nodes Example: how to optimally distribute N relay nodes if you have 2 sources S1 producing 60% of the data and S2 producing 40% of the data: S1 S2 S1 S2 1 3 N 1 3 N 1 3 N 1 3 N - Δ V V 1 3 N + Δ 1 3 N S0 S0

Data Delivery After the network is deployed, sensor data has to be relayed to the base station The network is usually viewed as a tree, rooted at the base station The tree is either manually defined or autonomously discovered If autonomously discovered, the process is either central (by the base station), or distributed (every sensor node discovers the topology on its own) Nodes also go to sleep cycles and eventually die out Data may be lost due to interference or collisions ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Data Delivery Models Event-driven: data is generated in response to an event. Data from several sensors may be highly correlated. Fusion techniques often employed Query-driven: network is interactive. Only sends data on demand Continuous-based: real-time data. Network is always sending data Time-driven: data is collected periodically from the environment Transmitted data may be loss-tolerant or not Internet routing protocols are not suitable for sensor networks since they do not consider energy efficiency

Data Delivery Functions Two main modules: Topology maintenance: construct topology that guarantees coverage and connectivity while considering network dynamics Transmission scheduler: determines when packet transmissions should take place to reduce collisions, ensure energy efficiency and consider QoS constraints ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Topology Maintenance Two main parameters to control: Transmit power: to maintain a balance between connectivity and energy efficiency (out of our scope) Duty cycles: to put the sensors in sleep mode Challenges in duty cycle management include: End-to-end delay: nodes waiting for other nodes to wake up Collision rates: shortening active cycles means more nodes trying to transmit at the same time Control overhead: mainly for synchronization ** R. Carrano, D. Passos, L. Magalhaes, and C. Albuquerque, “Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” IEEE Communication Surveys and Tutorials, Vol. 16, No. 1, 2014.

Synchronous Duty Cycling All nodes keep common time reference. Not necessarily a global time Synchronization information is exchanged throughout the network to keep a certain degree of alignment Overhead increases significantly with the number of nodes Rendezvous: strict synchronization. Challenging to maintain for large networks. Suffers from data forwarding interruption (nodes go to sleep, unaware that a frame is coming Skewered: deals with data forwarding interruption. Typically a tree is formed and a schedule is set. Needs topology discovery and maintenance ** R. Carrano, D. Passos, L. Magalhaes, and C. Albuquerque, “Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” IEEE Communication Surveys and Tutorials, Vol. 16, No. 1, 2014.

Semi-Synchronous Duty Cycling Nodes are clustered and the clusters are synchronized Inter cluster communication is asynchronous Main challenge is choosing the cluster head Two ways of achieving this: Spontaneous: loose association. Only timestamps are exchanged. Not efficient, nodes may belong to many clusters Election-based: nodes communicate to elect a manager periodically (typically node with highest remaining power). Extra overhead needed ** R. Carrano, D. Passos, L. Magalhaes, and C. Albuquerque, “Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” IEEE Communication Surveys and Tutorials, Vol. 16, No. 1, 2014.

Asynchronous Duty Cycling Preamble: sending nodes transmit a preamble frame that is longer than any active/sleep cycle. Nodes wakeup periodically to check for this frame. If not found they sleep right away Receiver-initiated: nodes periodically wake up and send a beacon, indicating willingness to receive. Senders send an ACK if they have a packet to send On demand: relies on the availability of a separate radio that can trigger wake up calls. The second radio should consume less than a tenth of the energy of the primary radio ** R. Carrano, D. Passos, L. Magalhaes, and C. Albuquerque, “Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” IEEE Communication Surveys and Tutorials, Vol. 16, No. 1, 2014.

Asynchronous Duty Cycling Random: works in highly dense networks. Nodes go to sleep for a period that is proportional to the number of neighbors Schedule-based: sender and receiver schedule wake up slots such that they overlap in at least one slot. Duty cycles here are typically high ** R. Carrano, D. Passos, L. Magalhaes, and C. Albuquerque, “Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks,” IEEE Communication Surveys and Tutorials, Vol. 16, No. 1, 2014.

Reliability In some applications, reliable packet delivery is required Traditionally, this is done using sequence numbers and receiver feedback Hop-by-hop recovery notices missing sequence numbers and sends feedback asking for retransmissions High packet loss can also occur due to changing network dynamics. In this case end-to-end recovery is also needed at the base station The base station notices many sequence numbers missing and may instruct the topology maintenance module to react ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Latency A node’s transceiver consumes a decreasing amount of energy for the following states: transmission, reception or idle, and sleep Thus a node sending to its neighbor may waste time and energy waiting for it to wake up If sleep cycles are not considered, high packet loss may be incurred Also need to maximize sleep cycles Over a path, it is optimal for nodes to wake up only when they need to send/receive, and then go right back to sleep ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

DMAC Sensors on a path will wake up, receive, send, then sleep A sensor sets More Data Flag to 1 if it wishes its receives to turn back to receiving mode after transmitting, instead of going back to sleep A receiver connected to two senders will predict that there are more packets to be received, and will return to receiving after transmission Nodes use slotted CSMA. After each slot, senders can set the More to send flag to 1 to indicate that there is a retransmission ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Throughput Nodes near the base station are the bottleneck of the network in terms of throughput and energy consumption Some authors suggest dynamic placement of nodes. Thus, k coverage and connectivity are not uniform throughout the network Funneling-MAC divides the network into three regions: high intensity, low intensity, and medium intensity TDMA and more redundancy are used in the high intensity region CSMA is used as we move away from the sink ** F. Wang and J. Liu, “Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches,” IEEE Communication Surveys and Tutorials, Vol. 13, No. 4, 2011.

Control Message Dissemination Control messages come from the sink. Thus, it is a one-to-many communication Even though these are relatively a small number of packets, they are critical to network performance Two main approaches: Flooding: each node forwards any control packet it receives until reaches the maximum hop count. Many duplicates and redundancies occur. High energy consumption Gossiping: every node forwards the message but only according to some predefined probability. If properly defined, there is a high chance that the whole network is covered. Packet loss may lead to some nodes missing important messages