ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY.

Slides:



Advertisements
Similar presentations
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
Advertisements

ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY Presented By: Abbas Kazerouni EE 360 paper presentation, winter 2014, EE Department, Stanford.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Presentation by: Noman Shahreyar
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
Protocols for Wireless Sensor Networks
Kyung Tae Kim, Hee Yong Youn (Sungkyunkwan University)
1 Message Oriented Middleware and Hierarchical Routing Protocols Smita Singhaniya Sowmya Marianallur Dhanasekaran Madan Puthige.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Introduction to Wireless Sensor Networks
A Survey on Routing Protocols for Wireless Sensor Networks
Tufts Wireless Laboratory Tufts University School Of Engineering Energy-Efficient Structuralized Clustering for Sensor-based Cyber Physical Systems Jierui.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin LECS – UCLA Modified and Presented by Sugata Hazarika.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
By M. JAFFAR KHAN SP11-REE-029
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
Progress Report Wireless Routing By Edward Mulimba.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Wireless Ad Hoc Network Routing Protocols CSE Maya Rodrig.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Georouting in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
Wireless Distributed Sensor Networks Special Thanks to: Jasvinder Singh Hitesh Nama.
APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks Arati Manjeshwar, Dharma P. Agrawaly.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
Ad Hoc Wireless Routing COS 461: Computer Networks
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Multihop wireless networks Geographical Routing Karp, B. and Kung, H.T., Greedy Perimeter Stateless Routing for Wireless Networks, in MobiCom Using.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
A Survey on Routing Protocols for Wireless Sensor Networks Kemal Akkaya, Mohamed Younis 19 th July, 2005 Seo, DongMahn.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
REECH ME: Regional Energy Efficient Cluster Heads based on Maximum Energy Routing Protocol Prepared by: Arslan Haider. 1.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
S& EDG: Scalable and Efficient Data Gathering Routing Protocol for Underwater Wireless Sensor Networks 1 Prepared by: Naveed Ilyas MS(EE), CIIT, Islamabad,
Scalable Routing Protocols for
Modeling In-Network Processing and Aggregation in Sensor Networks Ajay Mahimkar The University of Texas at Austin March 24, 2004.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY.
Routing protocols for sensor networks.
Protocols for Wireless Sensor Networks
A Location-Based Routing Method for Mobile Ad Hoc Networks
Threshold sensitive Energy Efficient sensor Network (TEEN)
Introduction to Wireless Sensor Networks
Wireless Sensor Network Architectures
GPSR Greedy Perimeter Stateless Routing
Sensor Network Routing
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
by Saltanat Mashirova & Afshin Mahini
Lecture 36 Routing in WSN Part III Dr. Ghalib A. Shah
A Survey on Routing Protocols for Wireless Sensor Networks
Overview: Chapter 3 Networking sensors
CMPE 252A : Computer Networks
Presentation transcript:

ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY

Outline  Background  Classification of Routing Protocols  Data Centric Protocols  Flooding and Gossiping  SPIN  Directed Diffusion  Rumor Routing

Background  Sensor nodes  Small, wireless, battery powered  Energy, bandwidth constrained  Data sensing, relaying, aggregating  No global addressing scheme  Sink nodes  More powerful nodes  Usually gateway to wired networks  Data collecting and processing

Goal  So at network layer, it is highly desirable to find methods for energy efficient route discovery and relaying of data from the sensor nodes to the BS so that the life time of the network is maximized.

Routing Protocols

Data-centric Protocols  The ability to query a set of sensor nodes  Attribute-based naming  Data aggregation during relaying  For example:  Flooding & Gossiping  SPIN  Directed Diffusion  Rumor Routing

Flooding & Gossiping  In flooding, sensor broadcasts packets to all its neighbors till dst reached or packets' ttl == 0  In gossiping, sensor sends packets to a randomly selected neighbor which does the same

Flooding & Gossiping(cont.)  Pros  Simple  No routing, no state maintenance  Cons  Implosion  Overlap  Resource blindness  Delay in Gossiping

SPIN – Sensor Protocols for Information via Negotiation  Metadata negotiation done before transmitting the actual data.  3-way handshake: ADV, REQ, DATA  Event-driven

SPIN(cont.)  Pros  Solve the classic problems  Topological changes are localized  Cons  No guarantee on the delivery of data

Directed Diffusion  Sink node floods named “interest” with larger update interval  Sensor node sends back data via “gradients”  Sink node then sends the same “interest” with smaller update interval  Query-driven

Directed Diffusion (cont)  Pros  On demand route setup  Each node does aggregation and caching, thus good energy efficiency and low delay  Cons  Query-driven, not a good choice for continuous data delivery  Extra overhead for data matching and queries

Rumor Routing  A trade-off between Query & Event flooding  An agent, a long-lived packet, is generated when events happen  The agent propagate the event to distant nodes

Rumor Routing (cont)  Pros  Avoid query flooding  Cons  Performs well only when # of events is small  Overhead to maintain agents and event-tables

Hierarchical Routing Protocols  When sensor density increases single tier networks cause  Gateway overloading  Increased latency  Large energy consumption  Clustered Network allow coverage of large area of interest and additional load without degrading the performance

Hierarchical Routing Protocols  Idea  Partition the entire network into regions or clusters.  Select one or more nodes as the cluster head.  The routing is nodes -> cluster head A -> cluster head B -> cluster head C -> nodes  The routing between cluster heads and the routing within a cluster may follow different protocols (EGP-BGP and IGP- OSPF).  Issues resolved: Energy wasted in collision, collision avoidance, idle-listening  Achieves  Better scalability  Removes the load to less powerful nodes

The LEACH Protocol  Low-Energy Adaptive Clustering Hierarchy.  Distributed cluster formation technique that enables self-organization of large numbers of nodes.

LEACH - Setup  Set up phase  Cluster Head (CH) selection (random + rotating)  ADV  Join REQ  TDMA SCH prepared by CH (no collisions and reduced energy consumption)

LEACH - Steady State  Broken into frames, where nodes send their data to the cluster head at most once per frame during their allocated transmission slot.  Once the cluster head receives all the data, it performs data aggregation.

PEGASIS  Power-Efficient GAthering in Sensor Information Systems.  The key idea in PEGASIS is to form a chain among the sensor nodes so that each node will receive from and transmit to a close neighbor.  Well, what was so bad in LEACH except for a bad name...

PEGASIS - Concept  Be Greedy!  Align with the one that has the max signal strength, form a near-optimal chain.  Communicate with neighbors only.  But who takes care of communicating to BS?

PEGASIS - Leader  The main idea in PEGASIS is for each node to receive from and transmit to close neighbors and take turns being the leader for transmission to the BS.  Nodes take turns transmitting to the BS (i mod N node in round i out of N nodes shall transmit to BS).

Passing the buck...  Token passing approach

The TEEN Protocol  Threshold sensitive Energy Efficient sensor Network protocol.  Proactive Protocols (LEACH)  The nodes in this network periodically switch on their sensors and transmitters, sense the environment and transmit the data of interest.  Reactive Protocols (TEEN)  The nodes react immediately to sudden and drastic changes in the value of a sensed attribute.

TEEN - Functioning  At every cluster change time, the cluster-head broadcasts to its members  Hard Threshold (HT) This is a threshold value for the sensed attribute. It is the absolute value of the attribute beyond which, the node sensing this value must switch on its transmitter and report to its cluster head.  Soft Threshold (ST) This is a small change in the value of the sensed attribute which triggers the node to switch on its transmitter and transmit.

TEEN - Hard Threshold  The first time a parameter from the attribute set reaches its hard threshold value, the node switches on its transmitter and sends the sensed data.  The sensed value is stored in an internal variable in the node, called the sensed value (SV).

TEEN - Soft Threshold  The nodes will next transmit data in the current cluster period, only when both the following conditions are true:  The current value of the sensed attribute is greater than the hard threshold.  The current value of the sensed attribute differs from SV by an amount equal to or greater than the soft threshold.

TEEN - Drawback  If the thresholds are not reached, the user will not get any data from the network at all and will not come to know even if all the nodes die-Adaptive Periodic TEEN  This scheme practical implementation would have to ensure that there are no collisions in the cluster.

GPSR: GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS NETWORKS

Presentation Overview  Introduction  Algorithm Key Ideas & Concepts  Examples  Evaluation Matrices & Results  Summary

GPSR Overview  Routing Protocol that uses positions of routers and a packet’s destination to make packet forwarding decisions  GPSR keeps state only about the local topology (for only a single hop)  The word “Stateless” is not meant literally but refers to small, purely local state  GPSR scales better in per-router state than shortest- path and ad-hoc routing protocols  GPSR finds correct new route quickly under frequent topology changes

Algorithm’s Key Ideas  “The position of a packet’s destination and positions of the candidate next hops are sufficient to make correct forwarding decisions, without any other topological information.”  “Routing protocol that rely on end-to-end state concerning the path, face scaling challenge with increasing number of routers & rate of change of topology (mobility).”  “GPSR generates routing protocol traffic independent of the length of the routes through the network, therefore generates a constant, low volume protocol messages as mobility increases,”

GPSR Modes  Modes  Nominal: Greedy Forwarding  Special : Perimeter Forwarding  Greedy Forwarding  Uses only information about router’s immediate neighbors  Forwarding node makes locally optimal greedy choice of the packet’s next hop

Greedy Forwarding Example Follows successive closer geographic hops, until the destination is reached

Perimeter Forwarding  Used in the region where Greedy forwarding fails.  There are topologies in which the only route to a destination requires a packet move temporarily farther in geometric distance from the destination  Special mechanism (right hand rule) is used in such special situation

Perimeter Forwarding Example Right Hand Rule: x receives a packet from y, and forwards it to its first neighbor counterclockwise about itself, z When Greedy Forwarding Fails. x is a local maximum in geographic proximity to D w and y are farther from D

Perimeter Forwarding Example D is the destination; x is the node where the packet enters perimeter mode; forwarding hops are solid arrows; the line xD is dashed. GPSR forwards packets along the face intersected by the line xD x forwards the packet to the first edge counterclockwise about x form the line xD, follows right hand rule thereafter

Network Graphs Full Graph Greedy Forwarding Planar Graph Perimeter Forwarding

Planarized Graphs The RNG graph. For edge(u; v) to be included, the shaded lune must contain no witness w. The GG graph. For edge(u; v) to be included, the shaded circle must contain no witness w.

GPSR Operation  GPSR combines greedy forwarding on full network graph and perimeter forwarding in planarized network graphs  All nodes maintain neighbor table, which stores the address and location of their single-hop radio neighbors  The table provides all states required for forwarding decisions

GPSR Operation  All packets are marked initially as greedy mode  Upon receiving a greedy-mode packet, a node searches its neighbor table geographically closest to the packet’s destination.  If the neighbor is closer to the destination, it forwards the packet to the neighbor.  If no neighbor is closer, the packet is marked into perimeter mode.

GPSR Operation  In perimeter mode, the packet is forwarded using a simple planner graph  The packet is forwarded to progressively closer faces of the planner graph using the right hand rule  In perimeter node, the GPSR records the location where greedy failed, and the first edge a packet crosses on a new face  When the destination is not reachable, the packet will tour unsuccessfully around the entire face as no intersection with xD is detected  Upon traversing on the face second time, the repetition is detected to correctly drop the packet

Algorithm Evaluation Matrices  Packet delivery success rate  Fraction of applications’ packets delivered successfully by the routing algorithm  Routing protocol overhead  Per-node state: storage required at each node  Protocol message cost: number of protocol packets sent by the routing algorithm  Optimality of path lengths taken by data packets

Packet Delivery Success Rate GPSR with varying beacon intervals, B, compared with Dynamic Source Routing (DSR). 50 nodes GPSR delivers a slightly greater fraction of packets successfully than DSR Pause time is the time duration for which all nodes hold the same positions at waypoints. The mobility model used is the random way point model which generates waypoints at random.

Routing Protocol Overhead Total routing protocol packets sent network-wide during the simulation for GP R with varying beacon intervals, B, compared with DSR. 50 nodes. GPSR offers greater savings in routing protocol overhead

Packet Delivery Success Rate Packet Delivery Success Ra t e. F o r G P S R with B = 1.5 compared with DSR. 50, 112, a n d 200 node s. GPSR delivers 97% of its packets along optimal-length paths vs. 84.9% for DSR

Routing Protocol Overhead Total routing protocol packets sent network-wide during the simulation for GPSR with B = 1.5 compared with DSR. y axis log-scaled. 50, 112, and 200 nodes. GPSR generates drastically less routing protocol traffic w.r.t. to DSR

Summary  GPSR routing algorithm uses geography to achieve small per-node route state, small routing protocol message complexity, and extremely robust packet delivery  GPSR generates routing protocol traffic independent of the length of the routes through the network, therefore generates a constant, low volume protocol messages as mobility increases  GPSR performs better than DSR. GPSR keeps states proportional to no. of neighbors; DSR keeps sates proportional to product of no of routes learned and route length in hops.  Besides Hierarchy and Caching, Geography is leverages for scaling routing

 Thank you