Introduction to Sensor Networks. Introduction A large number of low-cost, low-power, multifunctional, and small sensor nodes Sensor nodes consist of –sensing.

Slides:



Advertisements
Similar presentations
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos.
Advertisements

1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets R. Fonseca, Berkeley; S. Ratnasamy, Intel Research; J. Zhao, ICI; C. T. Ee,
A Presentation by: Noman Shahreyar
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Introduction to Wireless Sensor Networks
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
Wireless sensor networks: a survey 周紹恩 指導教授 : 柯開維 1.
IPSN/SPOTS 2007 Beacon Location Service A Location Service for Point-to-Point Routing in Wireless Sensor Networks EECS Department University of California,
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Beacon Vector Routing: towards scalable routing for sensor networks NEST Retreat, January 2004 Rodrigo Fonseca joint work with Sylvia Ratnasamy, Ion Stoica,
Receiver Based Forwarding for Wireless Sensor Networks Rodrigo Fonseca OASIS Retreat January 2005 Joint work with Ana Sanz Merino, Ion Stoica.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Wireless Ad Hoc Network Routing Protocols CSE Maya Rodrig.
Georouting in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Roadmap-Based End-to-End Traffic Engineering for Multi-hop Wireless Networks Mustafa O. Kilavuz Ahmet Soran Murat Yuksel University of Nevada Reno.
NAME: NASIRAHMADPROGRAM: B.S TELECOMSEMESTER: 7THREG#: SU/ PRESENTED TO: ENGR. GUL ZAMEEN KHANDATE: UNIVERSITY: SARHAD UNIVERSITY.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Introduction to Wireless Sensor Networks
Geographic Hash Table S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin and F. Yu.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Data Centric Storage: GHT Brad Karp UCL Computer Science CS 4C38 / Z25 17 th January, 2006.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Wireless Sensor Networks Nov 1, 2006 Jeon Bokgyun
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
A Survey on Sensor Networks Hussein Alzoubi Rami Alnamneh
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
PRIN WOMEN PROJECT Research Unit: University of Naples Federico II G. Ferraiuolo
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Wireless Sensor Networks
Fundamentals of Computer Networks ECE 478/578
Sensor Networks Jason Turbyfill 16 February 2005.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
1 Routing in Internet vs. Sensor Network. 2 Sensor Network Routing –I Location/Geographic Based Routing Tian He Some materials are adapted from I. Stojmenovic.
In the name of God.
A Location-Based Routing Method for Mobile Ad Hoc Networks
Introduction to Wireless Sensor Networks
Virtual Domain and Coordinate Routing in Wireless Sensor Networks
GPSR Greedy Perimeter Stateless Routing
Sensor Network Routing – III Network Embedded Routing
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
A comparison of Ad-Hoc Routing Protocols
Introduction to Wireless Sensor Networks
Overview of Unicast Routing Protocols for Multihop Wireless Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Overview: Chapter 3 Networking sensors
Greedy Distributed Spanning tree routing (gdstr)
CMPE 252A : Computer Networks
Presentation transcript:

Introduction to Sensor Networks

Introduction A large number of low-cost, low-power, multifunctional, and small sensor nodes Sensor nodes consist of –sensing –data processing –communicating components The position of sensor nodes need not be engineered or pre-determined. –sensor network protocols and algorithms must possess self-organizing capabilities

Sensor Networks vs. Ad Hoc Networks Sensor networks –Larger # nodes –More prone to failures. –Topology changes very frequently. –Mainly use broadcast communication whereas most ad hoc networks use point-to-point communications. –Limited in power, computational capacities, and memory –no global ID

Sensor networks communication architecture The sensor nodes are usually scattered in a sensor field Each of these scattered sensor nodes has the capabilities to collect data and route data back to the sink The sink may communicate with the task manager node via Internet or Satellite.

Factors influencing sensor network design fault tolerance scalability production costs operating environment sensor network topology hardware constraints transmission media power consumption

Hardware constraints A sensor node is made up of four basic components –sensing unit usually composed of two subunits: sensors and analog to digital converters (ADCs). –processing unit manages the procedures that make the sensor node collaborate with the other nodes to carry out the assigned sensing tasks. –transceiver unit connects the node to the network –power units (the most important unit)

Hardware constraints

Location finding system. –Most of the sensor network routing techniques and sensing tasks require the knowledge of location with high accuracy. Mobilizer –May be needed to move sensor nodes when it is required to carry out the assigned tasks.

Hardware constraints matchbox-sized module consume extremely low power operate in high volumetric densities have low production cost and be dispensable be autonomous and operate unattended be adaptive to the environment

Sensor network topology Pre-deployment and deployment phase –Sensor nodes can be either thrown in mass or placed one by one in the sensor field. Post-deployment phase –Sensor network topologies are prone to frequent changes after deployment. Re-deployment of additional nodes phase –Addition of new nodes poses a need to re- organize the network.

Micro-sensors, on- board processing, wireless interfaces feasible at very small scale--can monitor phenomena “up close” Enables spatially and temporally dense environmental monitoring Embedded Networked Sensing will reveal previously unobservable phenomena Contaminant TransportEcosystems, Biocomplexity Marine Microorganisms Seismic Structure Response Deployment Environments for Sensor Networks

Transmission media Industrial, scientific and medical (ISM) bands –915 MHz ISM band has been widely suggested for sensor networks –offer license-free communication in most countries. Infrared –license-free and robust to interference –requirement of a line of sight between sender and receiver UWB (ultra wide band)

Power consumption Only be equipped with limited power source (<0.5 Ah 1.2V) Node lifetime strong dependent on battery lifetime Power consumption can be divided into three domains: –sensing, communication, and data processing

Sensor networks communication architecture Used by the sink and sensor nodes

Routing in Sensor Networks

Large scale sensor networks will be deployed, and require richer inter-node communication –In-network storage (DCS, GHT, DIM, DIFS) –In-network processing –“Fireworks routing” Need point-to-point routing to scale –Many nodes –Many flows –Different densities

Design Goals 1.Simple – minimum required state, assumptions 2.Scalable – low control overhead, small routing tables 3.Efficient – low routing stretch 4.Robust – node failure

GPSR: Greedy Perimeter Stateless Routing for Wireless Networks Brad Karp, H. T. Kung Harvard University

GPSR: Motivation Ad-hoc routing algorithms (DSR, AODV) –Suffer from out of date state –Hard to scale Use geographic information for routing –Assume every node knows position (x,y) –Keep a lot less state in the network –Require fewer update messages

GPSR Algorithm : Greedy Forwarding Each node knows the geographic location of its neighbors and destination Select the neighbor that is geographically closest to the destination as the next hop

GPSR Algorithm : Greedy Forwarding (Cont.) Each node only needs to keep state for its neighbors Beaconing mechanism –Provides all nodes with neighbors’ positions –Beacon contains broadcast MAC and position –To minimize costs: piggybacking

GPSR Algorithm : Greedy Forwarding (Cont.) Greedy forwarding does not always work!

Getting Around Void The right hand rule –When arriving at node x from node y, the next edge traversed is the next one sequentially counterclockwise about x from edge (x,y) –Traverse the exterior region in counter-clockwise edge order

Planarized Graphs A graph in which no two edges cross is known as planar. –Relative Neighborhood Graph (RNG) –Gabriel Graph (GG)

Relative Neighborhood Graph

Gabriel Graph

Final Algorithm Combine greedy forwarding + perimeter routing –Use greedy forwarding whenever possible –Resort to perimeter routing when greedy forwarding fails and record current location Lc –Resume greedy forwarding when we are closer to destination than Lc

Protocol Implementation Support for MAC-layer feedback Interface queue traversal Promiscuous use of the network interface Planarization of the graph

Simulation and Evaluation 50, 112, and 200 nodes with WaveLAN radios. Maximum velocity of 20 m/s 30 CBR traffic flows, originated by 22 sending nodes Each CBR flows at 2Kbps, and uses 64- byte packets

Packet Delivery Success Rate Simulation and Evaluation

Routing Protocol Overhead Simulation and Evaluation

Path Length Simulation and Evaluation

Effect of Network Diameter Simulation and Evaluation

State per Router for 200-node –GPSR node stores state for 26 nodes on average in pause time-0 –DSR nodes store state for 266 nodes on average in pause time-0 Simulation and Evaluation

Pros and Cons?

Pros and Cons Pros: –Low routing state and control traffic  scalable –Handles mobility Cons: –GPS location system might not be available everywhere. –Geographic distance does not correlate well with network proximity. –Overhead in location registration and lookup –Limitations of planarization algorithm works under unit disk model, which doesn’t hold in practical network hard to handle mobility planarization reduces network connectivity

Beacon Vector Routing Scalable Point-to-point Routing in Wireless Sensor Networks R. Fonseca, S. Ratnasamy, D. Culler, S. Shenker, I. Stoica UC Berkeley

Beacon Vector Routing Solution: fake geography –Create a routing gradient from connectivity information rather than geography Nodes assigned positions based on connectivity Greedy forwarding on this space

Beacon-Vector: Algorithm 3 pieces –Deriving positions –Forwarding rules –Lookup: mapping node IDs  positions

1.r beacon nodes (B 0,B 1,…,B r ) flood the network; a node q’s position, P(q), is its distance in hops to each beacon P(q) =  B 1 (q), B 2 (q),…,B r (q)  2.Node p advertises its coordinates using the k closest beacons (we call this set of beacons C(k,p)) 3.Nodes know their own neighbors’ positions 4.Nodes also know how to get to each beacon Beacon-Vector: deriving positions

1.Define the distance between two nodes P and Q as 2.To reach destination Q, choose neighbor to reduce dist k (*,Q) 3.If no neighbor improves, enter Fallback mode: route towards the beacon which is closer to the destination 4.If Fallback fails and you reach the beacon, do a scoped flood Does the forwarding scheme guarantee reachability? Beacon-Vector: forwarding

Beacon maintenance Route based on the beacons the source and destination have in common –Does not require perfect beacon info. Each entry in the beacon vector has a sequence number –Periodically updated by the corresponding beacon –Timeout If the #beacons < r, non-beacon nodes nominate themselves as beacons

Location directory Store location mapping at beacon nodes –Hashing H: nodeid → beaconid [14] Each node k that wants to be a destination periodically publishes its coordinates to its corresponding beacon b k = H(k) When a node wants to route to node k, it sends a lookup request to b k Cache the coordinates

Simple example B1B1 B2B2 B3B3 1,2,3 0,3,3 2,1,3 3,0,3 3,1,2 1,3,2 3,3,0 2,3,1 3,2,1 2,2,2

Simple example B1B1 B2B2 B3B3 1,2,3 0,3,3 2,1,3 3,0,3 3,1,2 1,3,2 3,3,0 2,3,1 3,2,1 2,2,2 Route from 3,2,1 to 1,2,3 D=4 D=2 Fallback towards B 1 D=4

Evaluation - Simulation Packet level simulator in C++ Simple radio model –Circular radius, “boolean connectivity” –No loss, no contention Larger scale, isolate algorithmic issues

Evaluation - Implementation Real implementation and testing in TinyOS on mica2dot Berkeley motes 4KB of RAM! –Judicious use of memory for neighbor tables, network buffers, etc Low power radios –Changing and imperfect connectivity –Asymmetric links –Low correlation with distance Two testbeds –Intel Research Berkeley, 23 motes –Soda Hall, UCB, 42 motes

Simulation Results

Effect of the number of beacons Can achieve performance comparable to that using true positions BVR, 3200 nodes

Scaling the number of nodes Number of beacons needed to sustain 95% performance Beaconing overhead grows slowly with network size (less than 2% of nodes for larger networks)

Effect of Density Great benefit for deriving coordinates from connectivity, rather than positions

Scope of floods

Other results from simulation Average stretch is consistently low –Less than 1.1 in all tests Performance with obstacles –Modeled as walls in the network ‘arena’ –Robust to obstacles, differently from geographic forwarding

Simulation Results Performance similar to that of Geographic Routing (small fraction of floods) Small number of beacons needed (<2% of nodes for over 95% of success rate w/o flooding) Scope of floods is costly Resilient to low density and obstacles Low stretch

Implementation Results

Routing performance Soda Testbed, random pairs 88.4% success w/o flood 4.57% flood (avg. dist 2.6) 0.5% stuck (no good neighbor to forward) 6.5% drops (contention and radio drops) 88.4% success w/o flood 4.57% flood (avg. dist 2.6) 0.5% stuck (no good neighbor to forward) 6.5% drops (contention and radio drops)

Coordinate stability Coordinates are quite stable –E.g., almost 80% of the nodes had 2 or fewer changes, and over 90% of the changes were smaller than 3 hops

Implementation Results Success rates and flood scopes agree with simulation Sustained high throughput (in comparison to the network capacity) Coordinates were found to be stable –Few changes observed, small changes

Conclusions BVR is simple, robust to node failures, scalable, and presents efficient routes Using connectivity for deriving routes is good for low density/obstacles The implementation results indicate that it can work in real settings

Pros and Cons?

Comments Simple and easy to implement Work in real networks Routing and transmission stretches can be high No delivery guarantee even with scoped flooding. Why? Thoughts on dynamic BVR and secure BVR for mobile networks?