1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University.

Slides:



Advertisements
Similar presentations
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Advertisements

TDMA Scheduling in Wireless Sensor Networks
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
5/2/2015 Wireless Sensor Networks COE 499 Sleep-based Topology Control II Tarek Sheltami KFUPM CCSE COE
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
A Survey on Tracking Methods for a Wireless Sensor Network Taylor Flagg, Beau Hollis & Francisco J. Garcia-Ascanio.
1 Routing Techniques in Wireless Sensor networks: A Survey.
A Query-Based Routing Tree in Sensor Networks In Chul Song Yohan Roh Dongjoon Hyun Myoung Ho Kim GSN 2006 (Geosensor Network) 1.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Gossip Scheduling for Periodic Streams in Ad-hoc WSNs Ercan Ucan, Nathanael Thompson, Indranil Gupta Department of Computer Science University of Illinois.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Department of Computer Science, University of Maryland, College Park, USA TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks.
Differentiated Surveillance for Sensor Networks Ting Yan, Tian He, John A. Stankovic CS294-1 Jonathan Hui November 20, 2003.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Distributed Regression: an Efficient Framework for Modeling Sensor Network Data Carlos Guestrin Peter Bodik Romain Thibaux Mark Paskin Samuel Madden.
3 -1 Chapter 3 The Greedy Method 3 -2 The greedy method Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each.
1-1 Topology Control. 1-2 What’s topology control?
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
The Impact of Spatial Correlation on Routing with Compression in WSN Sundeep Pattem, Bhaskar Krishnamachri, Ramesh Govindan University of Southern California.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks Adam Silberstein Rebecca Braynard Carla Ellis Kamesh Munagala Jun Yang Duke University.
SIGMOD'061 Energy-Efficient Monitoring of Extreme Values in Sensor Networks Adam Silberstein Kamesh Munagala Jun Yang Duke University.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Special Topics on Algorithmic Aspects of Wireless Networking Donghyun (David) Kim Department of Mathematics and Computer Science North Carolina Central.
Efficient and Robust Query Processing in Dynamic Environments Using Random Walk Techniques Chen Avin Carlos Brito.
Information Quality Aware Routing in Event-Driven Sensor Networks Hwee-Xian TAN 1, Mun Choon CHAN 1, Wendong XIAO 2, Peng-Yong KONG 2 and Chen-Khong THAM.
Decentralized Scattering of Wake-up Times in Wireless Sensor Networks Amy L. Murphy ITC-IRST, Trento, Italy joint work with Alessandro Giusti, Politecnico.
Efficient Gathering of Correlated Data in Sensor Networks
Capacity Scaling with Multiple Radios and Multiple Channels in Wireless Mesh Networks Oguz GOKER.
Compressive Data Gathering for Large-Scale Wireless Sensor Networks Chong Luo Feng Wu Jun Sun Chang Wen Chen.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
1 EnviroStore: A Cooperative Storage System for Disconnected Operation in Sensor Networks Liqian Luo, Chengdu Huang, Tarek Abdelzaher John Stankovic INFOCOM.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Multi-Criteria Routing in Pervasive Environment with Sensors Santhanakrishnan, G., Li, Q., Beaver, J., Chrysanthis, P.K., Amer, A. and Labrinidis, A Department.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Energy-Efficient Monitoring of Extreme Values in Sensor Networks Loo, Kin Kong 10 May, 2007.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
 Tree in Sensor Network Patrick Y.H. Cheung, and Nicholas F. Maxemchuk, Fellow, IEEE 3 rd New York Metro Area Networking Workshop (NYMAN 2003)
LOCALIZED MINIMUM - ENERGY BROADCASTING IN AD - HOC NETWORKS Paper By : Julien Cartigny, David Simplot, And Ivan Stojmenovic Instructor : Dr Yingshu Li.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Masking Failures Using Anti Entropy and Redundant Independent Paths Rebecca Braynard and Amin Vahdat Internet Systems and Storage Group Duke University.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
Data-Driven Processing in Sensor Networks Adam Silberstein, Rebecca Braynard, Gregory Filpus, Gavino Puggioni, Alan Gelfand, Kamesh Munagala, Jun Yang.
Ben Miller.   A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
1 Spectrum Co-existence of IEEE b and a Networks using the CSCC Etiquette Protocol Xiangpeng Jing and Dipankar Raychaudhuri, WINLAB Rutgers.
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
Presentation transcript:

1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University

2 Sensor Networks Network of nodes –Equipped with sensing devices (e.g. temp.) –Battery-powered –Communicate via radio, among each other, to base station/root –Radio is primary energy consumer Goal: limit number/size of messages with in-network processing Base Station

3 Continuous “Select *” Query: Collect each measured value, v i, from each node, u i, at each timestep Continuous Reporting: each node transmits its value at each timestep  Maximal data transmission Sensor data is often slow moving and/or spatially correlated How can we exploit this? t0t0 t1t1 t2t2 t3t3 v0v0 v1v1 v2v2

4 Outline 1.Existing suppression techniques a.Temporal b.Spatial 2.Conch (Spatio-temporal suppression) 3.Conch construction 4.Failure handling 5.Experimental evaluation 6.Conclusion

Temporal Suppression Constraint: at u i, if v i != v i l.r., transmit v i Effective when values change slowly, or only a few change –What about large-scale change?  Change is simple, but whole-sale. All nodes transmit! Root 20 30

6 Spatial Suppression At u i, if v i = v neighbor, do not transmit –Effective when all values are similar  “Coverage” nodes transmit Root  Many nodes along front must transmit

7 Spatial Suppression Other Spatial Issues –Misses relationships between nodes that are consistent over time No temporal consideration –Spatial relationships must be explicitly defined Overhearing Plan (Event Contour, Meng 04) –Nodes listen for neighbors transmitting before them –If average of overheard values equals node’s, suppress  Without a global reporting order, root has no way to know which neighbors were overheard to trigger suppression

8 Spatio-temporal Want to combine advantages of temporal and spatial suppression –Avoid transmitting when values not changing –Avoid transmitting when nearby nodes are similar AND: Require both types be satisfied –More restrictive, less suppression OR: Require one type be satisfied –Ambiguous, no way for root to know which type triggered suppression

9 Suppression-Another Look Set constraints within the network for which data is or is not transmitted to the root The absence of a constraint report means the constraint’s state is unchanged The current state of all constraints must be sufficient to produce a query result (in this case, produce all node values)

10 Spatio-temporal Solution: Temporally monitor spatial constraints –Constraint: Difference in value (or model parameters) between neighboring nodes Monitor which constraints? –Leverage broadcast Each node broadcasts value when it changes All overhearing nodes calculate differences, report if changed Monitoring all 1-hop edges: Neighborhood Chain current constraint values together to determine node values –Must know one node value as starting point (ex. root) uiui ujuj monitor: v i -v j

Neighborhood Monitor all edges (between nodes that can communicate)  Only nodes on borders must transmit Root  Still, the number of reports seems too large…redundant *  Use chaining to derive node values

12 Remaining Questions Can we do better than neighborhood by generating fewer reports? How can we monitor fewer edges and still use chaining to derive all node values? How can we prevent outlier nodes from generating lots of edge messages?

13 Conch Choose edges explicitly, rather than rely on broadcast Build a spanning forest over nodes –A set of trees, such that each node is in exactly one tree –Each tree must have a temporally monitored root from which chaining is done –For each edge, one node designated updater, one designated reporter Updater notifies reporter if value has changed Reporter notifies root if difference has changed  Spanning forest is not for routing!

Conch  Only 1 node on each border transmits Root  Chain is longer, but derivation is at root, so is free *

15 Conch Construction Intuitions –Conch forest is not used for routing Routing layer handles sending edge reports to base station (e.g. along a shortest path tree) –Use edges connecting nodes with correlated behavior These trigger the fewest reports –Don’t insist on connecting nodes with uncorrelated or erratic behavior Spanning forest, not spanning tree

16 Conch Construction Initially use any spanning forest to collect “training data” –Any Conch plan returns all node values, from which we can calculate all edge statistics Score correlation for all possible edges –Number of rounds in which nodes have uncorrelated activity Use linear programming to choose updaters, reporters –Prefer reporters be closer to root –Prefer single reporter for multiple correlated edges

17 Conch Construction Use Prim’s or Kruskal’s –Repeatedly choose edge with lowest score that connects (at least) one new node to the tree Root ! ! : monitored node : monitored edge

18 Failure Major issue for all suppression strategies –Ambiguity: Does the absence of a particular report indicate its constraint is not violated, or that it is violated, but the report was lost In Conch, the more effective suppression, the more detrimental each failure Root

19 Redundancy Add redundant constraints –Spanning forest provides minimal number of constraints needed to derive node values –Neighborhood provides maximal possible redundancy Redundancy provides multiple paths for chaining between tree roots and nodes –But if failure occurs, chains are inconsistent –Two calculations lead to different values for c r a b c to +2 c=r+0+2c=r+1+2

20 Redundancy Goal: choose a set of constraints to trust such that they produce a consistent setting of node values Factors to consider –Failure rate –Change frequency –Time since last report We show given failure rates (assuming independence) how to use linear programming to find “best” solution

21 Experiments: Overview 4 Algorithms –Temporal Suppression –Spatial Suppression Nodes report in fixed order Suppression based on average of reporting node neighbors earlier in order –Neighborhood –Conch Simulation of Mica2 motes Radio costs: energy cost for bytes sent+received –Updater to reporter messages –Reporter to base station messages

22 Experiment: Density Adjust Density Nodes rise uniformly

23 Experiment: Outliers Some percentage of nodes are outliers, all others correlated Conch degrades to temporal suppression when no correlation exists Non-outliers never changeNon-outliers consistently rise

24 Experiment: Wavefront Vertical front moves from left to right, raising the values of nodes over which it passes –Values correlated on x-coordinate Only Conch edges newly or no longer intersecting a value border report –When edges are vertical, wavespeed does not impact number of reporting edges t0t0 t1t1 Case 1 Case 2

25 Experiment: Wavefront Conch construction matters Conch explicitly chooses (near) vertical edges Shortest-Path Routing Tree (Conch-Comm) Conch

26 Conclusions Conch provides a framework for monitoring using spatio-temporal suppression Conch forest is built to exploit the spatial correlations in network We have used value-based as example, but it can be extended to model parameters, etc. Failure causes ambiguity in suppression –We are developing stronger techniques for planning for failure, and for interpreting results affected by failure

27 Questions?

28 Monitoring Parameters Temperature measured as x=f(t,p) –t is time of day –p is a current baseline dictating temperature Monitor p and error, e=x-f(t,p) p and e should change less often than x p values are spatially correlated e values are spatially correlated due to events affecting nearby nodes –Shade canopies in a forest

29 Experiment: Reliability Node values all take random walk Random message loss at varying rates Conch trees with varying numbers of redundant edges

30 Conch Plan Conch plan involves nodes reporting and edges reporting Formally: –For each tree root, u r, if v r changes, u r transmits v r to base station –For each edge e ij in spanning forest, node u i is updater and node u j is reporter If v i changes, u j transmits v i to u j Reporter evaluates (v i - v j ) –If (v i - v j ) != (v i - v j ) old, u j transmits (v i - v j ) to base station