Balaaji Tirouvengadam  Introduction  FT, WSN  Stages in forming WSN  FT Algorithms for different stages  Summary  Questions.

Slides:



Advertisements
Similar presentations
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
Advertisements

ECE /24/2005 A Survey on Position-Based Routing in Mobile Ad-Hoc Networks Alok Sabherwal.
Distributed Algorithms for Mobile Sensor Networks Chelsea Sanders Ben Tullis.
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Fault Tolerant Routing in Tri-Sector Wireless Cellular Mesh Networks Yasir Drabu and Hassan Peyravi Kent State University Kent, OH
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Distributed Algorithms for Guiding Navigation across a Sensor Network Qun Li, Michael DeRosa, and Daniela Rus Dartmouth College MOBICOM 2003.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Methods Demarcating into two parts to present, one is the method of location update, the other is method of data communication, namely ILSR. Location Update.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
The Coverage Problem in Wireless Ad Hoc Sensor Networks Supervisor: Prof. Sanjay Srivastava By, Rucha Kulkarni
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Multihop wireless networks Geographical Routing Karp, B. and Kung, H.T., Greedy Perimeter Stateless Routing for Wireless Networks, in MobiCom Using.
1 National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN Architecture and Protocols 2nd MobileMAN.
Clustering in Mobile Ad hoc Networks. Why Clustering? –Cluster-based control structures provides more efficient use of resources for large dynamic networks.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
On Non-Disjoint Dominating Sets for the Lifetime of Wireless Sensor Networks Akshaye Dhawan.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Bounded relay hop mobile data gathering in wireless sensor networks
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
“Controlled Straight Mobility and Energy-Aware Routing in Robotic Wireless Sensor Networks ” Rafael Falcon, Hai Liu, Amiya Nayak and Ivan Stojmenovic
Node failure tolerance in wireless sensor networks CS 2310 Seminar Mengsi Lou.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
به نام خدا سيد عليرضا كارداني مجتبي اميرخاني Path Set Selection in Mobile Ad Hoc Networks زمستان 1382.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Seminar on Joint Scheduling for Wireless Sensor Network (Proposed by: Chong Liu, Kui Wu, Yang Xiao, Bo Sun) Presented by: Saurav Kumar Bengani.
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Distributed Topology Control In Wireless Sensor Networks with Assymetric Links Presenter: Himali Saxena.
Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
In the name of God.
Prof. Yu-Chee Tseng Department of Computer Science
Wireless Sensor Networks 6. WSN Routing
Presented by: Rohit Rangera
Wireless Sensor Network Architectures
Robustness of wireless ad hoc network topologies
Robustness of wireless ad hoc network topologies
Effective Replica Allocation
Introduction Wireless Ad-Hoc Network
A Distributed Clustering Scheme For Underwater Sensor Networks
On Constructing k-Connected k-Dominating Set in Wireless Networks
Survey on Coverage Problems in Wireless Sensor Networks
Communication Driven Remapping of Processing Element (PE) in Fault-tolerant NoC-based MPSoCs Chia-Ling Chen, Yen-Hao Chen and TingTing Hwang Department.
Presentation transcript:

Balaaji Tirouvengadam

 Introduction  FT, WSN  Stages in forming WSN  FT Algorithms for different stages  Summary  Questions 12/5/20112

 Wireless Sensor Networks  Application specific  Fault Tolerance  Ensures Reliability  Why FT in WSN  Failure is part of the system  Limited power, harsh environment …  Malicious  FT parameter – varies with its applications 12/5/20113

 Fault Types  Hardware Faults  Software Faults  Application  Middleware  Communication Link Faults 12/5/20114

 Fault Detection  Self Diagnosis  e.g. Battery depletion  Cooperative Diagnosis  e.g. Failure in communication link  Fault Recovery  Uses the redundant element (common practice)  E.g. Memory, link, secondary power source etc.,  Deploying redundant sensing nodes  Multipath routing – for k path, the system is k-1 fault tolerable 12/5/20115

 Node Placement  Topology Control  Target / Event detection  Data Aggregation 12/5/20116

 More crucial for immobile nodes  Determines the system  Robustness  Efficiency & performance  Architecture  Flat network  Two tier 12/5/20117

 Two tier network architecture  Sensor  Relay Nodes  Sink  Relay Nodes (RN)  Should be fault tolerant  Form the back bone of the WSN  There should be at least 2 disjoint path between two RN  Minimum RN will be chosen to keep the network k- connected  Each sensor connects to at least one RN  Sensor does only sensing, routing / data forwarding is done by RN  Increases Sensors operational life 12/5/20118

 Node Placement is not always the final solution  Topology Control is must to maintain the fault tolerance of the system 12/5/20119

 An algorithm is proposed by Yong Chen et al. in [3]  A CDS graph is constructed for a system  CDS forms the backbone network  For each node in CDS, it adds the neighbour of the node to the backbone to meet required vertex connectivity  Power on/off model is applied to the so formed model  Redundant nodes in the backbone goes to sleep mode, thus maintaining k-vertex connection  Fair rotation among active and sleep nodes  So any point of time k-vertex connection is maintain thereby allows the system to work even if (k-1) node fails 12/5/201110

 A FT TC algorithm was proposed for heterogeneous network by M. Cardei et al. in [4]  Heterogeneous network ?  WSN with mixed hardware capabilities  Some nodes are more powerful than other nodes  Super Nodes (SN)  More communication range, higher power …  Their model Assumes SN  SN is highly reliable  They address only sensor to sensor & sensor to SN 12/5/201111

12/5/ [4]

 M. Cardei et al. constructed a reduced graph with directed edges for the system  The proposed 3 algorithm which can be applied on top of the derived reduced graph  For simplicity, only one algorithm is discussed here.  Minimum Weight-Based Anycast Topology Control [4]  There are k-vertex disjoint path between a given vertex and any other vertex in the subgraph  the sum of the weight of the selected edges is minimized. 12/5/201113

 In Figure  square : SN  circle : sensor  SN can communicate each other, so can be merged to one node : root node 12/5/ [4]

 Rules for adding directions to the edges  Edge between sensor  replaced with bidirectional edge with same weightage  Edge between sensor and root node  Replaced with unidirectional edge towards root node  Only the edge to the closest SN is kept 12/5/ [4]

 Shantanu Das et al. proposed a FT topology control approach in [5]  This can be employed in networks which has limited mobility to the sensor nodes  The intention of the author  To remove all critical nodes  Single point of failure  To make the network bi-connected  More fault tolerant  Sub graphs are interconnected by two nodes 12/5/201116

 P-hop sub graph  In the given sub graph any node can reach any other node within p hops  P-hop critical node  A node which make the P-hop sub graph disconnect on its failure  Bi-connected network  Not even one p-hop critical node  All critical nodes  non critical nodes  Asks two of its neighbour node to move closer to each other to establish a redundant link  This movement can break an existing link 12/5/201117

 Three possibilities can exists in a network  Critical node with  No critical neighbour ( all its neighbour are non critical nodes)  One critical neighbour  More than one critical neighbour 12/5/201118

 Critical node with no critical neighbour – 1/2 12/5/

 Critical node with no critical neighbour – 2/2 12/5/

 Critical node with no critical neighbour:  The critical node identifies the two disconnected sub graph  Chooses one node from each graph such a way that those two nodes can move closer to establish a new link  The neighbour node are chosen such a way that the existing links are not much disturbed (some case disconnection of some non critical node cannot be avoided)  Since the two nodes make another path, the critical node will now become non critical 12/5/201121

 Example showing node movement causing disconnection 12/5/201122

 Critical node with one critical neighbour – 1/3 12/5/

 Critical node with one critical neighbour – 2/3 12/5/

 Critical node with one critical neighbour – 3/3 12/5/

 Critical node with one critical neighbour:  Critical node with larger node id is chosen first  It will try to relocate its non critical node to establish a link  Now the critical node with higher node id will become non critical  Repeat above process till critical node with no critical neighbour case is reached. 12/5/201126

 Critical node with several critical neighbour:  Critical node  Available – if it has a non critical neighbour  Non available – if it does no have any non critical node  Critical head  Critical node with higher node value among available critical node  Pairwise merging strategy  Critical head dominates pair merging and selects one of its critical neighbour to pair with it. 12/5/ Critical nodes 1 (3 is unavailable), 5, 6 Pair : (1.3) (5,4) (6,4) Dominated node : 1, 5, 6 The steps are repeated

 The assumption is that in a dense sensor network  The event region will be shared by many sensors  The data among the sensors are collected and compared to derive a decision.  The faulty sensor reading will be masked by the majority of non faulty sensors  There are many techniques used in literatures  Calculating the median for a group of sensors  Calculating the failure probability of a node to decide on its future decision correctness 12/5/201128

 Reliable aggregation in Track Topology  Edges : Primary, backup & side edge  The back up node just listens  Each message is attached with a bit vector, informing about faulty links  Backup node aggregates the received data along with its on seeing a error bit from the side edge 12/5/201129

 Fault Tolerance is very crucial for sensor networks  Many algorithms have been proposed in literature addressing the FT issues  Few of FT algorithms were discussed 12/5/201130

 Construct a reduced graph and show the directed edges in it using the following figure Note: The black square represents the super nodes, which can communicate each other with high reliability (a message sent to any super node is considered that all other SN will receive it) 12/5/201131

 Reduced Graph  Directed reduced graph 12/5/201132

 The below shown figure is 2-hop network with 4 and 5 as its critical nodes, Assume the nodes can be moved, use node mobility to remove node criticality and derive a bi-connected network (Note: critical node id with higher value will dominate the lower value, assume the node mobility is not breaking any of the existing connection) 12/5/

 Moved nodes : 7 and 1 12/5/

 Describe the steps involved in converting critical node into non critical node, when a critical node has several critical nodes as its neighbour 12/5/201135

 Identify the Available and non available critical nodes  Critical nodes with higher node id than its neighbouring available critical node will declare itself as Critical head  Critical head pairs up with its neighbour critical node and dominates the pair to remove criticality 12/5/201136

[1] “Guide to Wireless Sensor Networks”, Chapter 10 Fault-Tolerant Algorithms/Protocols in Wireless Sensor Networks, Hai Liu, Amiya Nayak, and Ivan Stojmenovi´c [2] J.L. Brediny, E.D. Demainez, M.T. Hajiaghayiz, and D. Rus, “Deploying Sensor Networks with Guaranteed Capacity and Fault Tolerance,” MobiHoc 2005, urbana-champaign, IL, 2005 [3] Y. Chen, and S.H. Son, “A Fault Tolerant Topology Control in Wireless Sensor Networks,” Proceedings of the ACS/IEEE 2005 International Conference on Computer Systems and Applications, 2005 [4]M. Cardei, S. Yang, and J. Wu, “Algorithms for Fault-Tolerant Topology in Heterogeneous Wireless Sensor Networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 19,no. 4, pp. 545–558, 2008 [5]S. Das, H. Liu, A. Kamath, A. Nayak, and I. Stojmenovic, “Localized Movement Control for Fault Tolerance of Mobile Robot Networks,” The First IFIP International Conference on Wireless Sensor and Actor Networks (WSAN 2007), Albacete, Spain, 24–26 Sept [6]S. Gobriel, S. Khattab, D. Mosse, J. Brustoloni, and R. Melhem, “Fault Tolerant Aggregation in Sensor Networks Using Corrective Actions,” Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, vol. 2, pp. 595–604, /5/201137

12/5/201138