Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin.
PERFORMANCE MEASUREMENTS OF WIRELESS SENSOR NETWORKS Gizem ERDOĞAN.
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
CMPE280n An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin presented by Venkatesh Rajendran.
Investigating Mac Power Consumption in Wireless Sensor Network
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
An Energy-efficient MAC protocol for Wireless Sensor Networks
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks Debate 1 - Defense Joseph Camp Anastasios Giannoulis.
Election Algorithms and Distributed Processing Section 6.5.
Multicast Communication Multicast is the delivery of a message to a group of receivers simultaneously in a single transmission from the source – The source.
TinyOS By Morgan Leider CS 411 with Mike Rowe with Mike Rowe.
On-Demand Traffic-Embedded Clock Synchronization for Wireless Sensor Networks Sang Hoon Lee.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
Wireless Sensor Networks COE 499 Energy Aware Routing
Why Visual Sensor Network & SMAC Implementation Group Presentation Raghul Gunasekaran.
TRICKLE: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks Philip Levis, Neil Patel, Scott Shenker and David.
1 An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Wireless Sensor Network Gang Lu, Bhaskar Krishnamachari, and Cauligi Raghavendra.
Lei Tang∗ Yanjun Sun† Omer Gurewitz‡ David B. Johnson∗
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Chapter 6 Multiple Radio Access
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
By Naeem Amjad 1.  Challenges  Introduction  Motivation  First Order Radio Model  Proposed Scheme  Simulations And Results  Conclusion 2.
Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks with Biomedical Applications Jack Culpepper(NASA), Lan Dung, Melody.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Opportunistic Flooding in Low-Duty- Cycle Wireless Sensor Networks with Unreliable Links Shuo Goo, Yu Gu, Bo Jiang and Tian He University of Minnesota,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Yu Gu and Tian He Minnesota Embedded Sensor System (MESS) Department of Computer Science & Engineering This work is supported by.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
Delivery ratio-maximized wakeup scheduling for ultra-low duty-cycled WSNs under real-time constraints Fei Yang, Isabelle Augé-Blum National Institute of.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Michael Buettner, Gary V. Yee, Eric Anderson, Richard Han
RM-MAC: A Routing-Enhanced Multi-Channel MAC Protocol in Duty-Cycle Sensor Networks Ye Liu, Hao Liu, Qing Yang, and Shaoen Wu In Proceedings of the IEEE.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
CS541 Advanced Networking 1 Contention-based MAC Protocol for Wireless Sensor Networks Neil Tang 4/20/2009.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
Energy-Efficient, Application-Aware Medium Access for Sensor Networks Venkatesh Rajenfran, J. J. Garcia-Luna-Aceves, and Katia Obraczka Computer Engineering.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
An Energy-efficient MAC protocol for Wireless Sensor Networks
Data Collection and Dissemination
Net 435: Wireless sensor network (WSN)
Trickle: Code Propagation and Maintenance
Presentation by Andrew Keating for CS577 Fall 2009
Data Collection and Dissemination
Investigating Mac Power Consumption in Wireless Sensor Network
Chapter 6 Multiple Radio Access.
Presentation transcript:

Data Collection and Dissemination

Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols in low- duty-cycled WSNs with unreliable links

Prerequisites Module 5 Basic concepts of Computer Networks

Outline Data Dissemination –Estrablishing eventual consistency on a shared variable –Trickle – Address single packet Data Collection –DSF

[Dissemination_1]5 Data Dissemination - Trickle

Simple Broadcast Retransmission Broadcast Storm Problem –Redundant rebroadcasts –Severe contention –Collision

Trickle Motivation –WSNs require network code propagation Challenges –WSNs exhibit highly transient loss patterns, susceptible to environmental changes –WSNs network membership is not static –Motes must periodically communicate to learn when there is new code Periodical metadata exchange is costly

Trickle Requirement Low Maintenance Rapid Propagation Scalability

Trickle An algorithm for code propagation and maintenance in WSNs Based on “Polite Gossip” –Each node only gossip about new things that it has heard from its neighbors, but it won’t repeat gossip it has already heard, as that would be rude Code updates “trickle” through the network

Trickle Within a node time period –If a node hears older metadata, it broadcasts the new data –If a node hears newer metadata, it broadcasts its own metadata (which will cause other nodes to send the new code) –If a node hears the same metadata, it increases a counter If a threshold is reached, the node does not transmit its metadata Otherwise, it transmits its metadata

Trickle – Main Parameters Counter c: Count how many times identical metadata has been heard k: threshold to determine how many times identical metadata must be heard before suppressing transmission of a node’s metadata t: the time at which a node will transmit its metadata. t is in the range of [0, τ]

[Dissemination_1]: Figure 312 Trickle Maintenance – One Example Assume –No packet loss –Perfect interval synchronization How to relax these assumptions?

Trickle – Impact of Packet Loss Rates

[Dissemination_1]: Figure 514 Trickle Maintenance without Synchronization – Short Listen Problem Mote B selects a small t on each of its three intervals –Although other motes transmit, mote B’s transmissions are never suppressed The number of transmissions per intervals increases significantly

Trickle – Impact of Short Listen Problem

Solution to Short Listen Problem Instead of picking a t in the range [0, τ], t is selected in the range [τ/2, τ]

[Dissemination_1]: Section 517 Propagation Tradeoff between different values of τ –A large τ Low communication overhead Slowly propagates information –A small τ High communication overhead Propagate more quickly How to improve? –Dynamically adjust τ Lower Bound τ l Upper Bound τ h

Trickle Complete Algorithm

Data Collection

[Collection_2]20 Data Collection Link-Quality based Data Forwarding –Wireless communication links are extremely unreliable –ETX: to find high-throughput paths on multiple Sleep-Latency Based Forwarding –Duty Cycling: sensor nodes turn off their radios when not needed Idle listening waste much energy

[Collection_2]21 Sleep Latency in Low Duty-Cycle Sensor Networks Sleep now. Wake up in 35 seconds Sleep now. Wake up in 4 seconds Sleep now. Wake up in 57seconds Sleep now. Wake up in 13 seconds 35s latency 57s latency 4s latency13s latency A B C D E

Unreliable Radio Links 90% 95% 50% 70% A B C D E

State-of-the-art Solutions: ETX 50%, 100s 40%, 10s ETX = 1/ /0.5 = 4 ETX = 1/ /0.4 = 5 Expected E2E delay is 400s Expected E2E delay is 50s A B C D Sole link quality based solutions cannot help reduce E2E delay in extremely low-duty cycle sensor networks! ETX only considers link quality

State-of-the-art Solutions: DESS 10%, 10s 100%, 20s DESS = = 20s DESS = = 40s Expected E2E delay is 200s Expected E2E delay is 40s A B C D Sole sleep latency based solutions cannot help reduce E2E delay in extremely low-duty cycle sensor networks! DESS only considers sleep latency

End-to-End Delay vs. Duty Cycle Suppose one fixed forwarding node –Suffer excessive delivery delays when waiting for the fixed receiver to wake up again if the ongoing packet transmission fails

End-To-End Delay vs. Average Link Quality Given bad link quality, the end to end delay increases dramatically

Sensor States Representation Scheduling Bits –( )* Switching Rate –0.5HZ  16s round time On Off

Data Delivery Process Sleep latency is 1Sleep latency is 2Sleep latency is 3 End to End (E2E) Delay is 6 ( )*( ( (

1 st attempt: Sleep latency is 1 Main Idea ( )*( ( ( Sleep latency is 1 2 nd attempt: Sleep latency is =11 i th attempt: Sleep latency is * (i-1) ( )* nd attempt: Sleep latency is =2 We should try a sequence of forwarding nodes instead of a fixed forwarding node! Dynamic Switching-based Forwarding (DSF) is important in extremely low duty-cycle sensor networks.

Optimization Objectives EDR: Expected Delivery Ratio EED: Expected End-to-End Delay EEC: Expected Energy Consumption

Optimization Objectives(1) : EDR (100)* EDR = 90% (001)* EDR = 80% (010)* EDR = 70% % 50% 40% EDR: Expected Delivery Ratio. 0.6*0.7+ (1-0.6)*0.5*0.8 + (1-0.6)*(1-0.5)*0.4*0.9 EDR for node 1 is (EDR 1 ): Forwarding Sequence

Optimization Objectives(1) : EDR (1000)* (0001)* EDR = 90% (0010)* EDR = 80% (0100)* EDR = 70% % 50% 40% EDR: Expected Delivery Ratio. 0.6*0.7+ (1-0.6)*0.5*0.8 + (1-0.6)*(1-0.5)*0.4*0.9=0.652 EDR for node 1 is (EDR 1 ): Forwarding Sequence See Equation (3)

Optimization Objectives(2) : EED (100000)* (000001)* EDR = 90%, EED = 9 (000010)* EDR = 80%, EED = 12 (001000)* EDR = 70%, EED = %,2 50%, 3 40%,5 EED: Expected E2E Delay. 0.6*1/0.7 * (2 + 10) + (1-0.6) * 0.5 * 1 /0.8 * (3 + 12) + (1- 0.6)*(1-0.5)*0.4*1/0.9 * (5 + 9) EED for node 1 is (EED): Forwarding Sequence See Equation (4)

Optimizing EDR (100)* (001)* EDR = 80% 2 2 (010)* EDR = 70% 100% If only node 3 is selected as forwarding node: EDR 1 = 1 * 0.8 = 0.8 We should only choose a subset of neighboring nodes as forwarding nodes! Shall we try all available neighbors? If both node 2 and node 3 are selected as forwarding nodes: EDR 1 = 1 * 0.7 = 0.7

Optimizing EDR with dynamic programming (100)* EDR = 90% (001)* EDR = 80% (010)* EDR = 70% 60% 50% 40% Select only a subset of neighbors as forwarders Node 4 has to be selected Then we attempt to add more nodes into the forwarding sequence backwardly. Try or skip Try or drop

Distributed Implementation EDR b (Ø) = 1 –The sink node has no packet loss EED b (Ø) = 0 –The sink node has no delay EEC b (Ø) = 0 –The sink node has no energy consumption

Distributed Implementation sink EDR = 98%, EED = 2, EEC = 1EDR = 99%, EED = 15, EEC = 2 EDR = 100%, EED = 0, EEC = 0 EDR = 97%, EED = 20, EEC = 5 EDR = 90%, EED = 90, EEC = 12

Complete Protocol Implementation at Node e

Assignment 1. Please give one example to illustrate what the short-listen problem in the context of Trickle algorithms is. 2. How does Trickle algorithms solve the short-listen problem? 3. Why do not we use a constant τ in Trickle algorithm? 4. Why do we need to consider both link quality and the low-duty-cycle nature of wireless sensor networks when we design suitable applications?

40 Project This is a group project. Each group can have up to 3 students Project Description In this project, you will develop a multi-hop data collection tree protocol based on TinyOS 2.x. 1. Development of a multi-hop data collection tree protocol 1.1 The protocol to form a multi-hop data collection tree The base station locally broadcast a tree construction message, which includes its own ID and its depth to be 0; a. When a node, say A, receives a tree construction message from node B at its first time (i.e., node A has not joined the data collection tree yet), node A assigns its depth to be the depth of node B plus one, and its parent to be node B. After this, node A rebroadcasts the tree construction message.

41 Project - continue b. When a node, say A, already joins the data collection tree and receives a tree construction message from node B, node A just simply disregards the tree construction message. c. When a node, say A, already joins the data collection tree (suppose that node A’s parent is node B and node A’s depth is n) and receives a tree construction message from node C: 1. suppose that if node A selects node C as its parent, node A’s depth is m; 2. suppose m < n; node A will change its parent to node C.

42 Project - continue one example multi-hop data collection tree

43 Project - continue Also see attached slide tree.ppt for a dynamic view about how to construct a multi-hop data collection tree. 1.2 After the multi-hop data collection tree is formed, each node senses and transmits its light intensity to the base station every one second. For each received message, the base station displays the following information: –Node ID which originates the message; –Tree depth of the Node; –Sensed light value

44 Project - continue Basic Steps: Please follow the steps listed below: 1. Setting up TinyOS environment - XubunTOS XubunTOS can be downloaded here: 2. Go through the TinyOS tutorials at ials ials