Ad hoc and Sensor Networks Routing protocols (Part II)

Slides:



Advertisements
Similar presentations
Packet Switching COM1337/3501 Textbook: Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Chapter 3.
Advertisements

1 Data-Centric Storage in Sensornets with GHT, A Geographic Hash Table Sylvia Ratnasamy, Scott Shenker, Brad Karp, Ramesh Govindan, Deborah Estrin, Li.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
Data Centric Storage using GHT Lecture 13 October 14, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor Networks Andreas Savvides.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 Data-Centric Storage in Sensornets Sylvia Ratnasamy, Scott Shenker, Brad Karp, Ramesh Govindan, Deborah Estrin ICSI/UCB/USC/UCLA Presenter: Vijay Sundaram.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Routing in Mobile Ad Hoc Networks Marc Heissenbüttel University of Berne Bern,
UNIVERSITY OF SOUTHERN CALIFORNIA Embedded Networks Laboratory 1 Wireless Sensor Networks Ramesh Govindan Lab Home Page:
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
A Topology Discovery Algorithm for Sensor Networks Go Suzuki CS691, SSNS Spring 2003.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Ad Hoc Wireless Routing COS 461: Computer Networks
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Modeling Data-Centric Routing in Wireless Sensor Networks Bhaskar Krishnamachari, Deborah Estrin, Stephan Wicker.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Energy Efficient Routing and Self-Configuring Networks Stephen B. Wicker Bart Selman Terrence L. Fine Carla Gomes Bhaskar KrishnamachariDepartment of CS.
Load Balancing of In-Network Data-Centric Storage Schemes in Sensor Networks Mohamed Aly In collaboration with Kirk Pruhs and Panos K. Chrysanthis Advanced.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Geographic Hash Table S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin and F. Yu.
Data centric Storage In Sensor networks Based on Balaji Jayaprakash’s slides.
Decomposing Data-Centric Storage Query Hot-Spots in Sensor Netwokrs Mohamed Aly, Panos K. Chrysanthis, and Kirk Pruhs University of Pittsburgh Proceeding.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Data Centric Storage: GHT Brad Karp UCL Computer Science CS 4C38 / Z25 17 th January, 2006.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Scalable Content- Addressable Networks Prepared by Kuhan Paramsothy March 5, 2007.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
NTU IM Page 1 of 35 Modelling Data-Centric Routing in Wireless Sensor Networks IEEE INFOCOM Author: Bhaskar Krishnamachari Deborah Estrin Stephen.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
GLIDER: Gradient Landmark-Based Distributed Routing for Sensor Networks Qing Fang, Jie Gao, Leonidas J. Guibas, Vin de Silva, Li Zhang Department of Electrical.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Event query processing based on data-centric storage in wireless sensor networks Longjian Guo, Yingshu Li, and Jianzhong Li IEEE GLOBECOM Technical Conference.
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Department of Computer Science Southern Illinois University Carbondale CS441-Mobile & Wireless Computing Zigbee Standard Dr.
Introduction to Wireless Sensor Networks
Routing design goals, challenges,
Internet Networking recitation #4
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Ad hoc and Sensor Networks Routing protocols (Part II)

Outline 4.1 Routing Challenges and Design Issues in WSNs 4.2 Flat Routing 4.3 Hierarchical Routing 4.4 Location Based Routing 4.5 QoS Based Routing 4.6 Data Aggregation and Convergecast 4.7 Data Centric Networking 4.8 ZigBee 4.9 Conclusions 2

Chapter 4.6 Data Aggregation and Convergecast

Aggregation in Sensor Networks Traditional Address-Centric routing IP address routing Not suitable in large scale sensor networks Data-Centric Routing Content-based routing Enhance the data aggregation opportunity 4 Source 1Source 2 A B Sink Source 1Source 2 A B Sink a) Address-Centric (AC) Routingb) Data-Centric (DC) Routing Data Aggregation

Theoretical Results on Aggregation Let there be k sources located within a diameter X, each a distance d i from the sink. Let N A and N D be the number of transmissions required with AC and optimal DC protocols, respectively. 1. The following are bounds on N D : 2. Asymptotically, for fixed k, X, as d = min(d i ) is increased, 3. Although the problem is NP-hard in general, the optimal data aggregation tree can be formed in polynomial time when the sources induce a connected sub-graph on the communication graph. 5

Aggregation Techniques In general the formation of the optimal aggregation tree is NP- hard. Some suboptimal DC routing heuristics as follows: Center at Nearest Source (CNSDC)  All sources send the information first to the source nearest to the sink, which acts as the aggregator. Shortest Path Tree (SPTDC)  Opportunistically merge the shortest paths from each source wherever they overlap. Greedy Incremental Tree (GITDC)  Start with path from sink to nearest source. Successively add next nearest source to the existing tree. Address Centric (AC)  No aggregation, distinct shortest paths from each source to sink. 6

Performance Study Event-Radius modelRandom Sources model 7

Performance Study (cont.) Energy Costs Event-Radius model 8

Performance Study (cont.) Energy Costs Random Sources model 9

Conclusions Data aggregation can result in significant energy savings for a wide range of operational scenarios. The gains from aggregation are paid for with potentially higher delay. It should be possible to design routing algorithms for sensor networks in which this tradeoff is made explicitly. 10

Reference B. Krishnamachari, D. Estrin, and S. B. Wicker, "The impact of data aggregation in wireless sensor networks," In Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (ICDCSW'02), pp , Vienna, Austria, July

Chapter 4.7 Data centric networking

4.7.2 Data-centric Storage Data centric storage Data is stored inside the network. All data with the same name (or data range) will be stored at the same sensor network location Why data centric storage? Energy efficiency Robustness against mobility and node failures Scalability 13

One-dimensional Data Storage Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table (GHT [Ratnasamy et al. 2003]) Data Storage and Retrieval Perimeter Refresh Protocol Structured Replication 14

One-dimensional Data Storage GHT Put(k, v)- stores v (observed data) according to the key k Get(k)- retrieve whatever value is associated with key k Hash function Hash the key into the geographic coordinates Put() and Get() operations on the same key “k” hash k to the same location (12,24) user query response data Hash (‘elephant’)=(12,24) Put (“elephant”, data) Get (“elephant”) Hash (‘elephant’)=(12,24) An example for GHT 15

Perimeter Refresh Protocol Assume key k hashes at location L A is closest to L so it becomes the home node E F B D A C L home Replica 16

Structured Replication Augment event name with hierarchy depth Given root r and given hierarchy depth d Compute 4 d – 1 mirror images of r Example of structured replication with a 2-level decomposition 17

Conclusions Data centric storage entails naming of data and storing data at nodes within the sensor network GHT uses Perimeter Refresh Protocol and structured replication to enhance robustness and scalability DCS is useful in large sensor networks and there are many detected events but not all event types are Queried 18

Multi-dimensional Data Storage Multi-Dimensional Range Queries in Sensor Networks (DIM [Li et al. 2003]) Building Zones Data Insertion Query Propagation 19

Building Zones Divide network into zones. Each node mapped to one zone. Encode zones based on division. Each zone has a unique code. Map m-d space to zones. Zones organized into a virtual binary tree L  [1/2, 1)L  [0, 1/2) T  [1/2, 1) T  [0, 1/2) L  [0, 1/4) L  [1/4, 1/2)L  [1/2, 3/4) L  [3/4, 1) T  [3/4, 1) T  [1/2, 3/4) T  [1/4, 1/2) T  [0, 1/4) L: Light, T: Temperature 20

Data Insertion Encode events Compute geographic destination Hand to GPSR Intermediate nodes can refine the destination estimation L  [1/2, 1) L  [0, 1/4) L  [0, 1/2) T  [1/2, 1) T  [0, 1/2) L  [1/4, 1/2)L  [1/2, 3/4) L  [3/4, 1) T  [3/4, 1) T  [1/2, 3/4) T  [1/4, 1/2) T  [0, 1/4) E 1 = Store E 1 L: Light, T: Temperature 21

Query Propagation Split a large query into smaller sub- queries. Encode each sub- query. Process sub- queries separately, resolving locally or forwarding to other nodes based on their codes L  [1/2, 1) L  [0, 1/4) L  [0, 1/2) T  [1/2, 1) T  [0, 1/2) L  [1/4, 1/2)L  [1/2, 3/4) L  [3/4, 1) T  [3/4, 1) T  [1/2, 3/4) T  [1/4, 1/2) T  [0, 1/4) Q 10 = Q 1 = Q 12 = Q 11 = L: Light, T: Temperature 22

Conclusions DIM resolves multi-dimensional range queries efficiently. Work that still needs to be done Skewed data distribution  These can cause storage and transmission hotspots. Existential queries  Whether there exists an event matching a multi- dimensional range. Node heterogeneity  Nodes with larger storage space assert larger-sized zones for themselves. 23

Chapter 4.8 ZigBee 24

The ZigBee Standard ZigBee is a low cost, low power, low complexity, and low data rate wireless communication technology at short range. Based on IEEE , it is mainly used as a low data rate monitoring and controlling sensor network 25

The Network Layer ZigBee identifies three device types The ZigBee coordinator (one in the network) is an FFD managing the whole network A ZigBee router is an FFD with routing capabilities A ZigBee end-device corresponds to a RFD or FFD acting as a simple device The ZigBee network layer supports three types of network configurations: Star topology Tree topology Mesh topology 26

The Network Layer (cont.) ZigBee coordinator ZigBee router ZigBee end device (a) Star network(b) Tree network(c) Mesh network 27

Network Formation and Address Assignment (Tree Network) Before forming a network, the coordinator determines Maximum number of children of a router (Cm) Maximum number of child routers of a router (Rm) Depth of the network (Lm) Note that a child of a router can be a router or an end device, so Cm ≥ Rm The coordinator and routers can each have at most Rm child routers and at most Cm − Rm child end devices 28

Network Formation and Address Assignment (cont.) For the coordinator, the whole address space is logically partitioned into Rm + 1 blocks The first Rm blocks are to be assigned to the coordinator’s child routers and the last block is reserved for the coordinator’s own child end devices From Cm, Rm, and Lm, each router computes a parameter called Cskip to derive the starting addresses of its children’s address pools 29

Network Formation and Address Assignment (cont.) The coordinator is said to be at depth d = 0, and d is increased by one after each level Address assignment begins from the ZigBee coordinator by assigning address 0 to itself If a parent node at depth d has an address A parent : the n-th child router is assigned to address: A parent + (n − 1) × Cskip(d) + 1 the n-th child end device is assigned to address: A parent + Rm × Cskip(d) + n 30

Network Formation and Address Assignment (cont.) ZigBee coordinator ZigBee router ZigBee end device Addr = 12 Addr = 8 Addr = 9 Addr = 10 Addr = 25 Addr = 0 Cskip = 6 A4 Addr = 19 Cskip = 1 A3 Addr = 13 Cskip = 1 Addr = 24 A1 Addr = 1 Cskip = 1 Addr = 6 Addr = 3 Addr = 2 Cm = 5: Maximum number of children of a router Rm = 4: Maximum number of child routers of a router Lm = 2: Depth of the network A2 Addr = 7 Cskip = 1 the n-th child router: A parent + (n − 1) × Cskip(d) + 1 the n-th child end device: A parent + Rm × Cskip(d) + n 31

ZigBee Routing Protocol In a ZigBee network, the coordinator and routers can directly transmit packets along the tree When a device receives a packet, it first checks if it is the destination or one of its child end devices is the destination If so, this device will accept the packet or forward this packet to the designated child. Otherwise, it forwards the packet to its parent 32

ZigBee Routing Protocol (cont.) If a device n receives a packet with destination A dest. Assume that the depth of the device n is d and its address is A. This packet is for one of its descendants if the destination address A dest satisfies A < A dest < A+ Cskip(d − 1), and this packet will be relayed to the child router with address If the destination is not a descendant of this device, this packet will be forwarded to its parent 33

ZigBee Routing Protocol (cont.) ZigBee coordinator ZigBee router ZigBee end device Cm = 6 Rm = 4 Lm = 3 A < A dest < A + Cskip(d − 1) Addr = 125 Addr = 30 Addr = 31 Addr = 38 Addr = 126 Addr = 92 Addr = 63 Cskip = 7 Addr = 64 Cskip = 1 Addr = 1 Cskip = 7 Addr = 32 Cskip = 7 Addr = 33 Cskip = 1 Addr = 40 Cskip = 1 Z ? ? B C A Addr = 0 Cskip = 31 34

Route Discovery (Mesh Network) Field NameDescription Destination Address 16-bit network address of the destination Next-hop Address 16-bit network address of next hop towards destination Entry StatusOne of Active, Discovery or Inactive Routing Table in ZigBee 35

Route Discovery (cont.) Field NameDescription RREQ ID (route request) Unique ID (sequence number) given to every RREQ message being broadcasted Source Address Network address of the initiator of the route request Sender Address Network address of the device that sent the most recent lowest cost RREQ Forward CostThe accumulated path cost from the RREQ originator to the current device Residual CostThe accumulated path cost from the current device to the RREQ destination Route Discovery Table 36

Route Discovery (cont.) RREQ message Create RDT entry and record fwd path cost Update RDT entry with better fwd path cost Does RREQ report A better fwd path cost ? Send RREP Drop RREQ No Yes No Yes No Yes The RREQ processing 37 RDT entry exists for this RREQ ? Is RREQ for local node or one of end-device children ? Create RT entry (Discovery under way) And rebroadcast RREQ

Route Discovery (cont.) S D A C T B Discard route request route req. route reply Unicast Broadcast Without routing capacity 38

References P. Baronti, P. Pillai, V. Chook, S. Chessa, and F. Gotta, A. andFun Hu. Wireless sensor networks: a survey on the state of the art and the and zigbee standards. Communication Research Centre, UK, May J. Bruck, J. Gao and A. A. Jiang, “MAP: Medial Axis Based Geometric Routing in Sensor Network,” in Proceedings of ACM MobiCom, Q. Fang, J. Gao, L. Guibas, V. de Silva, and L. Zhang. GLIDER: Gradient landmark-based distributed routing for sensor networks. In Proc. of the 24th Conference of the IEEE Communication Society (INFOCOM’05), March B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris. Span: An energy- efficient coordination algorithm for topology maintenance in ad hoc wireless networks. In International Conference on Mobile Computing and Networking (MobiCom 2001), pages 85–96, Rome, Italy, July Y. Xu, J. Heidemann, and D. Estrin. Geography-informed energy conservation for ad hoc routing. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pages 70–84, Rome, Italy, July

40 Conclusions Routing in sensor networks is a new area of research, with a limited but rapidly growing set of research results We highlight the design trade-offs between energy and communication overhead savings in some of the routing paradigm, as well as the advantages and disadvantages of each routing technique Overall, the routing techniques are classified based on the network structure into four categories: flat, hierarchical, and location-based routing, and QoS based routing protocols. Although many of these routing techniques look promising, there are still many challenges that need to be solved in sensor networks