1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing.

Slides:



Advertisements
Similar presentations
Directed Diffusion for Wireless Sensor Networking
Advertisements

A Presentation by: Noman Shahreyar
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks Computer Science Department, UCLA International Computer Science Institute,
DIRECTED DIFFUSION. Directed Diffusion Data centric A node request data by sending interest for named data Data matching interest is drawn toward that.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Next Century Challenges: Scalable Coordination in Sensor Networks Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar (Some images and slides.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin (MobiCOM.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks.
Sensor Networks Issues Solutions Some slides are from Estrin’s early talks.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
1-1 Routing. 1-2 Data-Centric Routing r Paradigm shift from accessing data from individual nodes to accessing “relevant” data. m Data within certain region,
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Before start… Earlier work single-path routing in sensor networks
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols II.
Georouting in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
U NIVERSITY OF M ASSACHUSETTS, A MHERST – Department of Computer Science Routing and Data Dissemination Presented by: Li, Huan Liu, Junning.
Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, F. Silva Mobicom 2000.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Charlmek Intanagonwiwat Ramesh Govindan Deborah Estrin Presentation.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
1 The Data Dissemination Problem  A region requires event- monitoring (harmful gas, vehicle motion, seismic vibration, temperature, etc.)  Deploy sensors.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
Routing and Data Dissemination. Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts.
Wireless Sensor Networks COE 499 Energy Aware Routing
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks ChalermekRameshDeborah Intanagonwiwat Govindan Estrin Mobicom 2000.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Sensor Network Data Dissemination based on the paper titled Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented.
Routing and Dissemination in Wireless Sensor Networks Sandeep Gupta Based on Slides by Huan and Junning U. Mass.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Classic Protocols Polly Huang Department of Electrical.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented by Barath Raghavan.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
1 Sensor Network Routing – II Data-Centric Routing.
Wireless Sensor Networks
Wireless Sensor Networks
Protocols for Wireless Sensor Networks
Introduction to Wireless Sensor Networks
DIRECTED DIFFUSION.
Wireless Sensor Network Architectures
GPSR Greedy Perimeter Stateless Routing
Internet Networking recitation #4
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
DIRECTED DIFFUSION.
Routing and Data Dissemination
Overview: Chapter 3 Networking sensors
Protocols.
Protocols.
Presentation transcript:

1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Routing

1-2 Announcements

1-3 Transport protocols: summary

1-4 Pump Slow Fetch Quickly PSFQ r For sink-to- source communication (e.g. network reprogramming) r Reliability via retransmissions r Sequence-driven loss detection C.Y. Wan, A.T. Campbell, and L. Krishnamurthy. PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks. WSNA'02, September 28, 2002, Atlanta, Georgia, USA.

1-5 RMST r End-to-end or hop-by-hop repair (the latter is generally better) r Suggests that repair could be done at either MAC layer (ARQ retransmissions) or Transport Layer (requests based on fragment numbers etc.) r Timer-driven loss detection and local data caches r Fits with the Directed Diffusion API F. Stann and J. Heidemann. RMST: Reliable Data Transport in Sensor Networks. IEEE SNPA'03.

1-6 ESRT r Aim for overall quality of service rather than node-to-node reliability Sankarasubramaniam, Y., Akan, O.B., and Akyildiz, I.F., "ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks ", In Proc. ACM MobiHoc`03

1-7 CODA Sankarasubramaniam, Y., Akan, O.B., and Akyildiz, I.F., "ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks ", In Proc. ACM MobiHoc`03 r Receiver based congestion detection r Open loop hop-by-hop backpressure r Closed-Loop multi-source regulation

1-8 Summarizing Transport Issues r Because of harsh conditions and severe constraints, it may be better to implement reliability in a hop-by-hop rather than end-to-end manner at either the MAC or transport layer r For energy efficiency, it is best to avoid congestion entirely, or have packet losses occur close to the source. Back pressure is a useful technique. r Where possible, scheduled solutions are preferable. s

1-9 Routing

1-10 Issues/challenges r Difficult to pay special attention to any individual node: m Collecting information within the specified region. r Sensors may be inaccessible: m Embedded in physical structures. m Thrown into inhospitable terrain.

1-11 More issues/challenges… r Topological issues: m Arbitrarily large scale. m No fixed infrastructure. m Frequent topology changes Battery exhaustion. Accidents. New nodes are added.

1-12 More issues/challenges… r User and environmental demands also contribute to dynamics: m Nodes move. m Objects move. r Data-centric and application-centric view: m Location. m Time. m Type of sensor. m Range of values…

1-13 More issues/challenges… r Not node-to-node packet switching, but node- to-node data propagation. r High level tasks are needed: At what speed and in what direction was that elephant traveling? Is it the time to order more inventory?

1-14 Challenges r Energy-limited nodes r Computation m Aggregate data m Suppress redundant routing information r Communication m Bandwidth-limited m Energy-intensive Goal: Minimize energy dissipation

1-15 Challenges r Scalability: ad-hoc deployment in large scale m Fully distributed w/o global knowledge. m Large numbers of sources and sinks. r Robustness: unexpected sensor node failures r Dynamics: no a-priori knowledge m Sink mobility. m Target mobility.

1-16 Directed Diffusion A Scalable and Robust Communication Paradigm for Sensor Networks C. Intanagonwiwat R. Govindan D. Estrin

1-17 Application Example: Remote Surveillance m “Give me periodic reports about animal location in region A every t seconds”. m Tell me in what direction that vehicle in region Y is moving?

1-18 Basic Idea r In-network data processing (e.g., aggregation, caching). r Distributed algorithms using localized interactions. r Application-aware communication primitives. m Expressed in terms of named data.

1-19 Elements of Directed Diffusion r Naming m Data is named using attribute-value pairs. r Interests m A node requests data by sending interests for named data. r Gradients m Gradients is set up within the network designed to “draw” events, i.e. data matching the interest. r Reinforcement m Sink reinforces particular neighbors to draw higher quality ( higher data rate) events.

1-20 Naming r Content based naming. m Tasks are named by a list of attribute – value pairs. m Task description specifies an interest for data matching the attributes. m Animal tracking: Interest ( Task ) Description Type = four-legged animal Interval = 20 ms Duration = 1 minute Location = [-100, -100; 200, 400] Request Node data Type =four-legged animal Instance = elephant Location = [125, 220] Confidence = 0.85 Time = 02:10:35Reply

1-21 Interest r The sink periodically broadcasts interest messages to each of its neighbors. r Every node maintains an interest cache. m Each item corresponds to a distinct interest. m No information about the sink. m Interest aggregation : identical type, completely overlap rectangle attributes. r Each entry in the cache has several fields m Timestamp: last received matching interest. m Several gradients: data rate, duration, direction.

1-22 Source Sink Interest = Interrogation Gradient = Who is interested ( data rate, duration, direction ) Setting Up Gradient Neighbor’s choices : 1. Flooding 2. Geographic routing 3. Cache data to direct interests

1-23 Data Propagation r Sensor node computes the highest requested event rate among all its outgoing gradients. r When a node receives data : m Find a matching interest entry in its cache Examine the gradient list, send out data by rate. m Cache keeps track of recent seen data items (loop prevention). m Data message is unicast individually to the relevant neighbors.

1-24 Source Sink Reinforcing the Best Path Low rate eventReinforcement = Increased interest The neighbor reinforces a path: 1. At least one neighbor 2. Choose the one from whom it first received the latest event (low delay) 3. Choose all neighbors from which new events were recently received

1-25 Local Behavior Choices  For propagating interests  In the example, flood  More sophisticated behaviors possible: e.g. based on cached information, GPS  For setting up gradients  data-rate gradients are set up towards neighbors who send an interest.  Others possible: probabilistic gradients, energy gradients, etc.

1-26 Local Behavior Choices r For data transmission m Multi-path delivery with selective quality along different paths m Probabilistic forwarding m Single-path delivery, etc. r For reinforcement m Reinforce paths based on observed delays m Losses, variances etc.

1-27 Initial simulation study of diffusion r Key metric m Average Dissipated Energy per event delivered indicates energy efficiency and network lifetime diffusion r Compare diffusion to m Flooding omniscient multicast m Centrally computed tree (omniscient multicast)

1-28 Diffusion Simulation Details ns-2 r Simulator: ns-2 r Network Size: Nodes r Transmission Range: 40m r Constant Density: 1.95x10 -3 nodes/m 2 (9.8 nodes in radius) r MAC: Modified Contention-based MAC r Energy Model: Mimic a realistic sensor radio [Pottie 2000] m 660 mW in transmission, 395 mW in reception, and 35 mw in idle

1-29 Diffusion Simulation r Surveillance application m 5 sources are randomly selected within a 70m x 70m corner in the field m 5 sinks are randomly selected across the field m High data rate is 2 events/sec m Low data rate is 0.02 events/sec m Event size: 64 bytes m Interest size: 36 bytes m All sources send the same location estimate for base experiments

1-30 Average Dissipated Energy Average Dissipated Energy (Joules/Node/Received Event) Network Size Diffusion Omniscient Multicast Flooding Diffusion can outperform flooding and even omniscient multicast. (suppress duplicate location estimates)

1-31 Conclusions  Can leverage data processing/aggregation inside the network.  Achieve desired global behavior through localized interactions.  Empirically adapt to observed environment.

1-32 Energy-efficient multipath routing

1-33 Energy-efficient multipath routing r Based on directed diffusion. r In directed diffusion: m Sink broadcasts interest. m Sensors periodically (low rate) sends back data (e.g., event detection reports). m Sink sends reinforcement on preferred path. m Reverse path is established. m Upon missing reports, sink re-broadcasts interest and sink reinforces.

1-34 Problem? r Periodic flooding of interests and events in the presence of failures. r Solution?

1-35 Solution: multiple paths r Multipath routing: m Load balancing. m Reliable delivery (by sending duplicates). m Robustness.

1-36 Observations r Primary path: “best” path. r Data sent at lower rate on alternate paths. r Upon failure on primary path, reinforcement on alternate path. r If all altremate paths fail, flooding for path re-establishment. r Overhead: alternate path maintenance. r Resilience measured as how often path re- establishment is needed.

1-37 Approach r Disjoint versus “braided” paths. r How to build multiple paths with local information only?

1-38 Localized disjoint multipaths r Sink establishes primary path. r Sink selects “next best” neighbor “A”. r A propagates “alternate path” reinforcement to its “best” neighbor “B”. r If B is already on a path between sink and source, B sends back a “negative reinforcement”. r Access to local information only may lead to longer paths.

1-39 Braided multipath r Partially disjoint. r For each node on primary path, find best path from source to sink that does not contain that node. r Paths in the braid expend equivalent energy. r Reinforcement to “best” node and alternate reinforcement to “next best” node.

1-40 Evaluation r Energy efficiency. m Overhead. r Resilience to failures. m Isolated versus patterned failures.

1-41 Results r Braided multipaths are more energy efficient. m Especially at lower densities. r Disjoint multipaths have better resilience to patterned losses. r Braided multipaths exhibit better resilience to isolated failures.

1-42 Geographic routing r Deliver packets to nodes or regions based on their geographic location. r Typically, nodes know their position and immediate neighbors.

1-43 Basic Geographic Forwarding B. Karp and H.T. Kung. GPSR: Greedy Perimeter stateless Routing for Wireless Networks. MobiCom2000. r Greedy: send packet to neighbor that is closest to destination r Can get stuck in voids. GPSR proposes a perimeter routing mode to avoid this.

1-44 Trajectory Based Forwarding D. Niculescu and B. Nath, Trajectory Based Forwarding and Its Applications. MOBICOM r Pre-encode arbitrary geographic trajectory; packet goes through nodes closest to this trajectory. r Particularly well suited for large networks with high density.

1-45 Geographic routing without location information (Rao et al.) r Apply geographic routing when (most) nodes do not have position information. r Approach: “virtual coordinates”. m Use local connectivity information.

1-46 Assumptions r Nodes know their own coordinates. r Nodes know coordinates of nodes in the 2- hop neighborhood.

1-47 Routing r Greedy: forward to neighbor closest to destination. r When packet arrived to destination, stop. r If stuck, do expanding ring search until closer node found.

1-48 Coordinate construction r A node’s coordinates is the average of its neighbors’ coordinates. r Finding perimeter nodes’ coordinates. m Beacon nodes flood “Hello” message. m Perimeter nodes discover distance in hops to other perimeter nodes. m Perimeter nodes broadcast their perimeter vector. m Perimeter nodes use triangulation to find coordinates of all perimeter nodes.

1-49 Coordinate construction (cont’d) r Deciding whether a node is on perimeter: m Use distance to beacon nodes. m If node is the farthest away from beacon node compared to all its 2-hop neighbors, then it’s on the perimeter.

1-50 Evaluation r Comparison between greedy routing using real- versus virtual coordinates. r Metrics: m Success rate: number packets reaching destination using purely greedy routing. m Average path length. m Routing load. m Overhead.

1-51 Results r Scalability. m Network size. m Density. r Mobility. r Losses. r Obstacles. r Trade-offs.