randomized algorithms for data propagation in wireless sensor networks sotiris nikoletseas...
Post on 20-Dec-2015
218 views
TRANSCRIPT
Randomized Algorithms for Data Propagation in Wireless Sensor Networks
Sotiris NikoletseasSotiris Nikoletseas
University of Patras (UoP) and (CTI), Greece.University of Patras (UoP) and (CTI), Greece.(visiting University of Geneva, Switzerland)(visiting University of Geneva, Switzerland)
COST/DYNAMO/GRAAL Meeting, Maribor, Slovenia, 2007
22
Overview of the talkOverview of the talk
models / assumptionstwo problems: data propagation and energy balancethree representative protocols:
local optimization (LTP) probabilistic redundance (PFR) energy balance (EBP)
performance evaluation: analysis simulation
conclusions / more problems / future directions
33
Work presented in this talk
- I. Chatzigiannakis, S. Nikoletseas and P. Spirakis, “Efficient and Robust Protocols for Local Detection and Propagation in Smart Dust Networks”, in the Journal of Mobile Networks (MONET), 2005.
- I. Chatzigiannakis, T. Dimitriou, S. Nikoletseas, and P. Spirakis, “A Probabilistic Algorithm for Efficient and Robust Data Propagation in Smart Dust Networks”, in the Journal of Ad-Hoc Networks, 2006.
- C. Efthymiou, S. Nikoletseas and J. Rolim, “Energy Balanced Data Propagation in Wireless Sensor Networks”, in the Wireless Networks (WINET) Journal, 2005.
44
A Wireless Sensor Network• very large number of tiny “smart” sensors• severe limitations• densely / randomly deployed in an area• self-organization• co-operation• locality
an “ad-hoc” wireless network for:
• sensing crucial events• data propagation
55
Unique characteristicsUnique characteristics
- - HugeHuge numbers, numbers, increased increased complexity, complexity, dense dense interactionsinteractions
- High- High dynamics dynamics / rapid/ rapid evolution evolution
- - AutonomicAutonomic character (open/self-organizing) character (open/self-organizing)
- - CooperationCooperation under severe constraints under severe constraints
- - LocalityLocality / lack of knowledge / lack of knowledge
66
New Challenges (I)New Challenges (I)
- - Scalability:Scalability: how does protocol how does protocol performance/correctness scale with size?performance/correctness scale with size?
- - Efficiency:Efficiency: mainly energy, time mainly energy, time
- Fault-tolerance:- Fault-tolerance: can the network tolerate can the network tolerate
faults? To what extent?faults? To what extent?
77
New Challenges (II)New Challenges (II)
Inherent trade-offs (e.g. energy vs time, fault-tolerance)Competing goals / various aspects:- minimizing total energy spent in the network- maximising the number of “alive” sensors over time- combining energy efficiency and fault-tolerance- balancing the energy dissipationApplication dependence
thusvariety of protocols needed / hybrid combinationsadaptive protocols, localitysimplicity, randomization, distributedness
88
Limitations of Previous Work
Directed Diffusion: maintains a set of paths (e.g. a tree) to get data and reinforces best paths (it is suitable for low dynamics)
LEACH: sensors create clusters and elect cluster-heads that collect/aggregate/compress data and transmit directly to the control center
(it is suitable for small area networks)
99
A smart dust “cloud” model A smart dust “cloud” model (a set of “particles” is spread in the plane)(a set of “particles” is spread in the plane)
Definitions: Let d the density of particles in the area.
Let R be the transmission range of each particle.
A receiving wall W is an infinite line in the plane. Sensor nodes
Sensor field
Control Center
The wall represents the authorities (the fixed control center).Alternatively, W may be a single point (the “sink” S). Each particle is aware of the location of W.
1010
The Problem of Local Detection and PropagationThe Problem of Local Detection and Propagation
A particle p detects a local crucial event ε
“How can particle p, via cooperation with the rest of the cloud, propagate information about event ε to the receiving wall W”
- Efficiency measures:
- propagation time (time for data to reach the control center)
- number of particle to particle transmissions (“hops”), which also characterizes energy consumption
- fault-tolerance
1111
Our Local Target Protocol (LTP)Our Local Target Protocol (LTP)
Let d(pi , pj ) the (vertical) distance of pi , pj and d(pi , W) the (vertical) distance of pi from W.
Each p’ receiving data does the following:
- Search Phase: It tries to discover a particle closer to W, i.e. a p’’ where d(p’’, W) < d(p’, W).
- Direct Transmission Phase: If found, then, p’ sends data to p’’
- Backtrack Phase: If repetitions of the search phase fail, then p’ sends data back to the particle it received data from.
1313
Efficiency (number of hops)Efficiency (number of hops)
DefinitionsDefinitions: Let : Let hhopt opt the (optimal) number of “hops”the (optimal) number of “hops” ((vertical to vertical to WW transmissionstransmissions) needed to reach W, if ) needed to reach W, if particles always exist in distances particles always exist in distances RR towards towards WW..
Let Let hh the actual number of hops (transmissions) the actual number of hops (transmissions) taken to taken to reach reach WW. The . The “hops” efficiency“hops” efficiency of the protocol is: of the protocol is:
where where
opth h
hC
R
Wpdhopt
),(
1414
Simplifying Assumptions for a Rigorous Analysis
The position of p′′ is random uniform in the arc of angle 2α.
Each target selection is stochastically independent of the others.
1515
Theorem:Theorem: The The expected “hops” efficiencyexpected “hops” efficiency of the of the protocol in the protocol in the α-α-uniform case is uniform case is
Also Also
Proof:Proof: A A sequence of pointssequence of points is generated, is generated,
pp00 = p, p = p, p11, p, p22, …, p, …, ph-1h-1, p, phh
where where pph-1h-1 is within is within WW’s range and ’s range and pphh is beyond is beyond WW. .
Let Let ααii the anglethe angle of of ppii w.r.t. w.r.t. ppi-1i-1’s vertical line to ’s vertical line to WW. It is:. It is:
The The vertical progressvertical progress towards towards WW is is
sin)( hCE
57.12
)(1
hCE
h
iii
h
iii ppdWpdppd
11
1
11 ),( ),( ),(
iiii Rppd cos),( 1
1616
We get:
From Wald’s equation then
since
Assuming large values for hopt and since for it is
we get the result.
sin
2
1cos)(cos
a
ai dxxE
h
ii
h
iopti h
1
1
1
coscos
)(cos)()()(cos)1( iopti EhEhEEhE
2sin1
20
opth
opt hCE
h
hE 1
sin)(
)(
sin
1717
Summary evaluation of LTP
local, simple, greedy protocol
no global structure (set of paths) maintained
good for dense networks
performance drops in sparse / faulty networks
1818
- a protocol that avoids flooding by probabilistically favouring certain (“close to optimal”) data transmissions.
-Data is broadcast with probability
Pfwd = φ/π
while it is not propagated with probability 1- Pfwd.
- our protocol is very simple, uses only local information and assumes no co-ordination between sensors.
Our Probabilistic Forwarding Protocol (PFR)Our Probabilistic Forwarding Protocol (PFR)
S
E
1
2p1
p2
1919
The Correctness of PFRThe Correctness of PFR
Lemma: PFR Lemma: PFR always succeedsalways succeeds in sending in sending information from E to S information from E to S when the network is when the network is operationaloperational
In the proof, we use geometry (i.e. we cover the In the proof, we use geometry (i.e. we cover the network area by unit squares and show that network area by unit squares and show that there are always particles “close enough” to there are always particles “close enough” to the optimal line that always broadcastthe optimal line that always broadcast))
2020
The Energy Efficiency of PFR (I)The Energy Efficiency of PFR (I)
We consider We consider particles that propagate dataparticles that propagate data
as far as possibleas far as possible from ES line from ES line
We approximate We approximate ωω
by the following by the following random walkrandom walk::
2121
The Energy Efficiency of PFR (II)The Energy Efficiency of PFR (II)
By using By using stochastic dominancestochastic dominance by a continuous by a continuous time time “discouraged arrivals” birth and death “discouraged arrivals” birth and death processprocess, we prove:, we prove:
Theorem: The Theorem: The ratio of activated particlesratio of activated particles in PFR in PFR protocol is protocol is Θ((Θ((nn00/n)/n)22),), where n where n0 0 = |ES| and = |ES| and
nn22 = = NN is the number of particles in the is the number of particles in the network. For nnetwork. For n0 0 = o(n) this o(1). = o(n) this o(1).
2222
The Robustness of PFRThe Robustness of PFR
--We study the case when some of these particles We study the case when some of these particles are are not operatingnot operating
- - We consider particles We consider particles very near the ES linevery near the ES line
Lemma: PFR manages to propagate the Lemma: PFR manages to propagate the information across lines parallel to ES, and information across lines parallel to ES, and of of constant distance, with fixed nonzero constant distance, with fixed nonzero probabilityprobability..
2323
Experimental evaluationExperimental evaluation- Implementation of protocols: - software simulation (in ns2 + our extensions)
- real devices (Berkeley mica-1 motes)
- more realistic (technical details)- large scale (thousands of sensors simulated)- visualization of protocol evolution
- LTP/PFR comparison findings:
LTP is best is dense networks, while PFR is best in sparse networks.
2424
Our Energy Balance Protocol (EBP) - Motivation
Most protocols tend to “strain” some specific nodes in the network:
- In a hop-by-hop scheme the nodes closer to the sink tend to be overused.
- In a direct transmission scheme the distant nodes tend to be overused.
“How can we achieve equal energy dissipation per node in order to prolong the network lifetime by avoiding early network disconnection?”
2525
The Protocol
Data Propagation: Each node in sector i propagates messages as follows:- Propagate the message to sector i−1 with probabilty pi.- Propagate the message directly to the sink with probability 1−pi.The choice of pi is made such as the average per sensor energy dissipation is the same for all sensors in the network.
2626
Computation of pi (message handling)
Let hi the number of messages that handles sector i.
Let fi the number of messages that were forwarded to sector i.
Let gi the number of messages that were generated in sector i.
Clearly: hi = fi + gi
By linearity of expectation:
E[hi] = E[fi] + E[gi]
2929
Dynamic aspects/HeterogeneityDynamic aspects/Heterogeneity
Two groups of nodesTwo groups of nodes: : - “usual” energy nodes- “usual” energy nodes- - super-nodessuper-nodes (twice as much energy) (twice as much energy)Same total energySame total energy as in the homogeneous case as in the homogeneous case(for fairness of comparison)(for fairness of comparison)Various heterogeneity degreesVarious heterogeneity degrees (20%-80% of total energy in super nodes)(20%-80% of total energy in super nodes)One more heterogeneity aspect: One more heterogeneity aspect: super-nodes super-nodes deployed in a non-uniform way (more nodes closer to the sink).
3030
Dynamic aspects/Dynamic aspects/RedeploymentRedeployment
We use the same number of nodes and separate them in g groups g0, g1, …. The group g0 is deployed at t = 0sec and each gi (for 0 < i < g) is deployed at t = i x 200sec.
We also examine the effect of non-uniform
redeployment for the nodes of groups g1, g2, … while the nodes of group g0 are always deployed uniformly.
3131
Adaptive/local exploration protocolsAdaptive/local exploration protocols
-The Adaptive Power Conservation Protocol (APCP) that locally and implicitly monitors the network conditions (density, energy) and accordingly adjusts towards good/optimal operation choices, in networks with node redeployment/heterogeneous sensors.
(I. Chatzigiannakis, A. Kinalis and S. Nikoletseas, in the Theory of Computing Systems (TOCS) Journal, 2007.)
- Fault-tolerant and Efficient Data Propagation using Limited, Local, Additional Network Information,
(I. Chatzigiannakis, A. Kinalis and S. Nikoletseas, in the Journal of Parallel and Distributed Computing (JPDC), 2007)
3232
Dynamic aspects/MobilityDynamic aspects/Mobility
Many, mobile sinks
We propose several sink mobility strategies for data collection that reduce energy a lot
(I. Chatzigiannakis, A. Kinalis and S. Nikoletseas, ACM MOBIWAC 06)
3333
Hybrid Worlds: A NanoPeers paradigmHybrid Worlds: A NanoPeers paradigm
• several similarities and differences of the two “worlds”…
• NanoPeers: a network of sensors acting as lightweight peers in a P2P overlay
• Hydrid layered models: several layers eg milli-peers coordinate micro-peers, micro-peers coordinate nano-peers, etc in the sense that higher order peers act as sinks for lower layers.
• an example application scenario: parcel delivery
- sensors (nano-peers) put on parcels- micro-peers put on boxes carrying several parcels- milli-peers put on (interconnected) warehouses
Goal: on-the-fly tracking of parcels