wireless sensor network

211
WIRELESS SENSOR NETWORKS WIRELESS SENSOR NETWORKS Ian F. Akyildiz Ian F. Akyildiz Broadband & Wireless Networking Laboratory Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering School of Electrical and Computer Engineering Georgia Institute of Technology Georgia Institute of Technology Tel: 404-894-5141; Fax: 404-894-7883 Tel: 404-894-5141; Fax: 404-894-7883 Email: [email protected] Email: [email protected] Web: http://www.ece.gatech.edu/research/labs/bwn Web: http://www.ece.gatech.edu/research/labs/bwn

Upload: amjad-afridi

Post on 01-Feb-2016

228 views

Category:

Documents


5 download

DESCRIPTION

Wireless Sensor Network full description

TRANSCRIPT

Page 1: Wireless Sensor Network

WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS

Ian F. AkyildizIan F. Akyildiz

Broadband & Wireless Networking LaboratoryBroadband & Wireless Networking Laboratory

School of Electrical and Computer EngineeringSchool of Electrical and Computer Engineering

Georgia Institute of TechnologyGeorgia Institute of Technology

Tel: 404-894-5141; Fax: 404-894-7883 Tel: 404-894-5141; Fax: 404-894-7883

Email: [email protected]: [email protected]

Web: http://www.ece.gatech.edu/research/labs/bwnWeb: http://www.ece.gatech.edu/research/labs/bwn

Page 2: Wireless Sensor Network

2IFA’2004

Internet, Internet, Satellite, Satellite, etcetc

Sink

Sink

TaskManager

1. INTRODUCTION1. INTRODUCTIONSENSOR NETWORKS ARCHITECTURESENSOR NETWORKS ARCHITECTURE

Several Several thousand nodesthousand nodes

Nodes are tens Nodes are tens of feet of each of feet of each otherother

Densities as high Densities as high as 20 nodes/m3as 20 nodes/m3

•I.F.Akyildiz, W.Su, Y. Sankarasubramaniam, E. Cayirci, I.F.Akyildiz, W.Su, Y. Sankarasubramaniam, E. Cayirci, ““Wireless Sensor Networks: A Survey”, Wireless Sensor Networks: A Survey”, Computer Networks (Elsevier) JournalComputer Networks (Elsevier) Journal, March 2002., March 2002.

Page 3: Wireless Sensor Network

3IFA’2004

Key technologies that Key technologies that enableenable sensor networks: sensor networks:

Micro electro-mechanical Micro electro-mechanical systems (MEMS)systems (MEMS)

Wireless communicationsWireless communicationsDigital electronicsDigital electronics

Page 4: Wireless Sensor Network

4IFA’2004

Sensor Network Sensor Network ConceptConcept

Sensors nodes are very close to each Sensors nodes are very close to each otherother

Sensor nodes have local processing Sensor nodes have local processing capabilitycapability

Sensor nodes can be randomly and Sensor nodes can be randomly and rapidly deployed even in places rapidly deployed even in places inaccessible for humansinaccessible for humans

Sensor nodes can organize themselves to Sensor nodes can organize themselves to communicate with an access pointcommunicate with an access point

Sensor nodes can collaboratively workSensor nodes can collaboratively work

Page 5: Wireless Sensor Network

5IFA’2004

SENSOR NODE SENSOR NODE HARDWAREHARDWARE

Power UnitPower Unit Power GeneratorPower Generator

Sensor ADCSensor ADCProcessorProcessor

MemoryMemoryTransceiverTransceiver

Location Finding SystemLocation Finding System MobilizerMobilizer

SmallSmall Low powerLow power Low bit rateLow bit rate High density High density Low cost (dispensable)Low cost (dispensable) AutonomousAutonomous AdaptiveAdaptive

SENSING UNITPROCESSING UNIT

Page 6: Wireless Sensor Network

6IFA’2004

Example: MICA MotesExample: MICA MotesBWN Lab @ GaTechBWN Lab @ GaTech

Processor andRadio platform(MPR300CB) isbased on Atmel ATmega 128Llow power microcontrollerthat runs TinyOsoperating systemfrom its internalflash memory.

Page 7: Wireless Sensor Network

7IFA’2004

Berkeley MotesBerkeley Motes

Page 8: Wireless Sensor Network

8IFA’2004

Specifications of the Specifications of the MoteMote

Processor/Radio Processor/Radio BoardBoard

MPR300CBMPR300CB RemarksRemarks

SpeedSpeed 4 MHz4 MHz

FlashFlash 128K bytes128K bytes

SRAMSRAM 4K bytes4K bytes

EEPROMEEPROM 4K bytes4K bytes

Radio FrequencyRadio Frequency 916MHz or 916MHz or 433MHz433MHz

ISM BandISM Band

Data RateData Rate 40 Kbits/Sec40 Kbits/Sec MaxMax

Power Power 0.75 mW0.75 mW

Radio Range Radio Range 100 feet100 feet ProgrammableProgrammable

PowerPower 2 x AA batteries2 x AA batteries

Page 9: Wireless Sensor Network

9IFA’2004

Examples for Sensor Examples for Sensor NodeNodess

UC Berkeley: COTS DustUC Berkeley:

Smart Dust

UCLA: WINS

Rockwell: WINS

JPL: Sensor Webs

Page 10: Wireless Sensor Network

10IFA’2004

Examples for Sensor Examples for Sensor NodeNodessRene Rene MoteMote

Dot Dot MoteMote

weC MoteMica node

Page 11: Wireless Sensor Network

11IFA’2004

Zylog’s eZ80Zylog’s eZ80 Provides a way to Provides a way to

internet-enabled process internet-enabled process control and monitoring control and monitoring applications.applications.

Temperature sensor, Temperature sensor, water leak detector and water leak detector and many more applicationsmany more applications

Metro IPWorks™ Metro IPWorks™ software stack software stack embeddedembedded

Enables users to access Enables users to access Webserver data and files Webserver data and files from anywhere in the from anywhere in the world.world.

Page 12: Wireless Sensor Network

12IFA’2004

Systronix STEP Systronix STEP boardboard

A first tool to support A first tool to support hardware development hardware development and prototyping with and prototyping with the new Dallas TINI the new Dallas TINI Java Module.Java Module.

Embedding the internet Embedding the internet with TINI javawith TINI java

A complete Java Virtual A complete Java Virtual Machine, TCP/IP stack, Machine, TCP/IP stack, ethernet hardware, ethernet hardware, control area network, control area network, iButton network and iButton network and dual RS232 all on dual RS232 all on SIMM72 moduleSIMM72 module

Page 13: Wireless Sensor Network

13IFA’2004

2. Sensor Networks 2. Sensor Networks ApplicationsApplications

Sensor networks may consist of sensor types Sensor networks may consist of sensor types such as:such as:

Seismic Seismic Low sampling rate magneticLow sampling rate magnetic ThermalThermal VisualVisual InfraredInfrared AcousticAcoustic Radar. Radar. 

Page 14: Wireless Sensor Network

14IFA’2004

Sensor Networks Sensor Networks ApplicationsApplications

Sensors can monitor ambient conditions including:Sensors can monitor ambient conditions including: TemperatureTemperature HumidityHumidity Vehicular movementVehicular movement Lightning conditionLightning condition PressurePressure Soil makeupSoil makeup Noise levelsNoise levels The presence or absence of certain kinds of objectsThe presence or absence of certain kinds of objects Mechanical stress levels on attached objects, andMechanical stress levels on attached objects, and Current characteristics (speed, direction, size) of Current characteristics (speed, direction, size) of

an objectan object

Page 15: Wireless Sensor Network

15IFA’2004

Sensor Networks Sensor Networks ApplicationsApplications

Sensors can be used for:Sensors can be used for:

Continuous sensing Continuous sensing Event detectionEvent detection Event identificationEvent identification Location sensingLocation sensing Local control of actuatorsLocal control of actuators

Page 16: Wireless Sensor Network

16IFA’2004

Sensor Networks Sensor Networks ApplicationsApplications

MilitaryMilitary EnvironmentalEnvironmental HealthHealth HomeHome Other commercialOther commercial Space explorationSpace exploration Chemical processingChemical processing Disaster reliefDisaster relief

Page 17: Wireless Sensor Network

17IFA’2004

Sensor Networks Sensor Networks ApplicationsApplications

Military Applications:Military Applications:Command, control, communications, computing, Command, control, communications, computing, intelligence, surveillance, reconnaissance, targeting intelligence, surveillance, reconnaissance, targeting (C4SRT)(C4SRT) Monitoring friendly forces, equipment and Monitoring friendly forces, equipment and

ammunition ammunition Battlefield surveillanceBattlefield surveillance Reconnaissance of opposing forces and Reconnaissance of opposing forces and

terrainterrain TargetingTargeting Battle damage assessmentBattle damage assessment Nuclear, biological and chemical (NBC) attack Nuclear, biological and chemical (NBC) attack

detection and reconnaissancedetection and reconnaissance

Page 18: Wireless Sensor Network

18IFA’2004

SensIT: SensIT: Sensor Information Technology

“SensIT was a program for developing software for distributed wireless sensor networks.” SensIT pursued two key thrusts: * New networking techniques* New networking techniques * Network information processing.

“ SensIT nodes can support detection, identification, and tracking of threats, as well as targeting and communication.”

http://www.darpa.mil/DARPATech2000/Speeches/ITOSpeeches/ITOSensIT(Kumar).docS. Kumar, D. Shepherd, “SensIT: Sensor information technology for the warfighter,” 4th Int. Conference on Information Fusion, 2001.

Page 19: Wireless Sensor Network

19IFA’2004

ForceNet (US Navy)ForceNet (US Navy)

ForceNet binds together Sea Strike, Sea Shield, and Sea ForceNet binds together Sea Strike, Sea Shield, and Sea Basing. Basing.

Sea StrikeSea Strike—Projecting Precise and Persistent Offensive —Projecting Precise and Persistent Offensive PowerPower Sea ShieldSea Shield—Projecting Global Defensive Assurance—Projecting Global Defensive Assurance Sea BasingSea Basing—Projecting Joint Operational Independence—Projecting Joint Operational Independence

It is It is the framework for naval warfarethe framework for naval warfare that integrates that integrates warriors, sensors, command and control, platforms, and weaponswarriors, sensors, command and control, platforms, and weapons into a networked, distributed combat force. into a networked, distributed combat force.

http://www.chinfo.navy.mil/navpalib/cno/proceedings.htmlhttp://www.chinfo.navy.mil/navpalib/cno/proceedings.html

Page 20: Wireless Sensor Network

20IFA’2004

SAD: SEAL Attack Detection SAD: SEAL Attack Detection & Anti-Submarine Warfare& Anti-Submarine Warfare

antennaantenna

ledledhookshooks

sensorsensor

cablecable

Page 21: Wireless Sensor Network

21IFA’2004

Other ProjectsOther Projects

ESG: ESG: Expeditionary Sensor Grid. .

NCCT: Network Centric Collaborative NCCT: Network Centric Collaborative Targeting.Targeting.

Sea Web. Sea Web.

Smart WebSmart Web

Sensor WebSensor Web

Page 22: Wireless Sensor Network

22IFA’2004

Other Military ApplicationsOther Military Applications

Intrusion detection (mine fields)Intrusion detection (mine fields) Detection of firing gun (small arms) Detection of firing gun (small arms) locationlocation Chemical (biological) attack detectionChemical (biological) attack detection Targeting and target tracking systemsTargeting and target tracking systems Enhanced guidance and IFF systemsEnhanced guidance and IFF systems Battle damage assessment systemBattle damage assessment system Enhanced logistics systems,Enhanced logistics systems,

Page 23: Wireless Sensor Network

23IFA’2004

Environmental Environmental ApplicationsApplications

Tracking the movements of birds, small animals, and insectsTracking the movements of birds, small animals, and insects Monitoring environmental conditions that affect crops and livestockMonitoring environmental conditions that affect crops and livestock IrrigationIrrigation Macroinstruments for large-scale Earth monitoring and Macroinstruments for large-scale Earth monitoring and planetary explorationplanetary exploration Chemical/biological detectionChemical/biological detection Biological, Earth, and environmental monitoring in marine, soil, and Biological, Earth, and environmental monitoring in marine, soil, and atmospheric contextsatmospheric contexts Meteorological or geophysical researchMeteorological or geophysical research Pollution study, Precision agriculturePollution study, Precision agriculture Biocomplexity mapping of the environmentBiocomplexity mapping of the environment Flood detection, andFlood detection, and Forest fire detection.Forest fire detection.

Page 24: Wireless Sensor Network

24IFA’2004

Forest Fire Forest Fire DetectionDetection

Maybe strategically, randomly, and Maybe strategically, randomly, and densely deployeddensely deployed Millions of sensor nodes can be deployedMillions of sensor nodes can be deployed

Purpose: Detect fire before spread Purpose: Detect fire before spread uncontrollable.uncontrollable.

Page 25: Wireless Sensor Network

25IFA’2004

Health Health ApplicationsApplications

Providing interfaces for the disabledProviding interfaces for the disabled Integrated patient monitoringIntegrated patient monitoring Diagnostics Diagnostics Monitoring the movements and internal Monitoring the movements and internal processes ofprocesses of insects or other small animals insects or other small animals Telemonitoring of human physiological dataTelemonitoring of human physiological data Tracking and monitoring doctors and Tracking and monitoring doctors and patients inside a patients inside a hospital, and hospital, and Drug administration in hospitalsDrug administration in hospitals

Page 26: Wireless Sensor Network

26IFA’2004

Drug Administration in Drug Administration in HospitalsHospitals

Purpose: Minimize prescribing the wrong medication to Purpose: Minimize prescribing the wrong medication to patientspatients..

Identify patients allergies and required medicationsIdentify patients allergies and required medications Current computerized systems can reduce medication errors Current computerized systems can reduce medication errors and prevent many Adverse Drug Events (ADE) and prevent many Adverse Drug Events (ADE) Cost of ADEs is as high as $5.6 millions/year /hospital, Cost of ADEs is as high as $5.6 millions/year /hospital, and 770,000 Americans injured and die annually because of and 770,000 Americans injured and die annually because of ADEs.ADEs. Save hospitals up to $500,000/yearSave hospitals up to $500,000/year Only 5% of civilian hospitals have computerized systemOnly 5% of civilian hospitals have computerized system Can prevent 84% of dosage errorsCan prevent 84% of dosage errors Start-up cost is around $2 million (cheap sensor nodes can be Start-up cost is around $2 million (cheap sensor nodes can be deployed).deployed).

Page 27: Wireless Sensor Network

27IFA’2004

Home ApplicationsHome Applications

Security Security Home automation, andHome automation, and Smart EnvironmentSmart Environment

Types: Types:

Page 28: Wireless Sensor Network

28IFA’2004

Smart Smart EnvironmentEnvironment

Purpose: Allowing users to seamlesslyPurpose: Allowing users to seamlessly interact with their environment.interact with their environment.

Two perspectives: Two perspectives: human-centered, or technology-human-centered, or technology-centeredcentered Example: “Aware Home” project at Example: “Aware Home” project at Georgia Tech.Georgia Tech.

Page 29: Wireless Sensor Network

29IFA’2004

Smart Smart EnvironmentEnvironment

Human-centered: Human-centered: A smart environment must adapt to A smart environment must adapt to the needs of the users in terms of I/O the needs of the users in terms of I/O capabilities.capabilities.

Technology-centeredTechnology-centeredNew hardware technologies, New hardware technologies, networking solutions and middleware networking solutions and middleware services must be developed.services must be developed.

Page 30: Wireless Sensor Network

30IFA’2004

Smart Environment Smart Environment (Cont’d)(Cont’d)

Room 1Room 1 Room 2Room 2

User entersUser enters User entersUser enters

ComputersComputerswith embedded with embedded sensor nodes.sensor nodes.

Scanner and phoneScanner and phonewith embeddedwith embeddedsensor nodes.sensor nodes.

ServerServerWired or wireless connectionWired or wireless connection

Page 31: Wireless Sensor Network

31IFA’2004

Commercial Commercial ApplicationsApplications

Building virtual keyboardsBuilding virtual keyboards Monitoring product qualityMonitoring product quality Constructing smart office spacesConstructing smart office spaces Interactive toysInteractive toys Monitor disaster areasMonitor disaster areas Smart spaces with sensor nodes embedded Smart spaces with sensor nodes embedded insideinside Machine diagnosisMachine diagnosis Interactive museumsInteractive museums Managing inventory control Managing inventory control Environmental control in office buildingsEnvironmental control in office buildings Detecting, and monitoring car thefts, andDetecting, and monitoring car thefts, and Vehicle tracking and detection.Vehicle tracking and detection.

Page 32: Wireless Sensor Network

32IFA’2004

Vehicle Tracking and Vehicle Tracking and DetectionDetection

Purpose: Locate a vehiclePurpose: Locate a vehicle

AMPS sensor nodes are deployedAMPS sensor nodes are deployed Two ways to detect and track the Two ways to detect and track the vehiclevehicle

- determine the line of bearing (LOB) - determine the line of bearing (LOB) in eachin each cluster and then forward to the cluster and then forward to the base-station, orbase-station, or - send all the raw data to the base-- send all the raw data to the base-stationstation (uses more power as distance (uses more power as distance increases)increases)

Page 33: Wireless Sensor Network

33IFA’2004

iBadge - UCLAiBadge - UCLA

Investigate behavior of Investigate behavior of children/patientchildren/patient

Features:Features:– Speech recording/replayingSpeech recording/replaying– Position detectionPosition detection– Direction detection/estimation Direction detection/estimation

(compass)(compass)– Weather data: Temperature, Weather data: Temperature,

Humidity, Pressure, LightHumidity, Pressure, Light

Page 34: Wireless Sensor Network

34IFA’2004

iBadge - UCLAiBadge - UCLA

Page 35: Wireless Sensor Network

35IFA’2004

iButton iButton ApplicationsApplications

Caregivers AssistanceCaregivers Assistance– Do not need to keep a bunch of keys. Do not need to keep a bunch of keys.

Only one iButton will do the workOnly one iButton will do the work Elder AssistanceElder Assistance

– They do not need to enter all their They do not need to enter all their personal information again and again. personal information again and again. Only one touch of iButton is sufficientOnly one touch of iButton is sufficient

– They can enter their ATM card They can enter their ATM card information and PIN with iButtoninformation and PIN with iButton

– Vending Machine Operation AssistanceVending Machine Operation Assistance

Page 36: Wireless Sensor Network

36IFA’2004

3. Factors Influencing 3. Factors Influencing Sensor Sensor Network Design Network Design

A. Fault Tolerance (Reliability)A. Fault Tolerance (Reliability)B. ScalabilityB. ScalabilityC. Production CostsC. Production CostsD. Hardware ConstraintsD. Hardware ConstraintsE. Sensor Network TopologyE. Sensor Network TopologyF. Operating EnvironmentF. Operating EnvironmentG. Transmission Media G. Transmission Media H. Power ConsumptionH. Power Consumption

Page 37: Wireless Sensor Network

37IFA’2004

A.A. Fault ToleranceFault Tolerance(Reliability)(Reliability)

Sensor nodes may fail or be blocked due to lack of powerSensor nodes may fail or be blocked due to lack of power

have physical damage, or environmental interference.have physical damage, or environmental interference.

The failure of sensor nodes should not affect the overall The failure of sensor nodes should not affect the overall task of the sensor network.task of the sensor network.

This is called RELIABILITY or FAULT TOLERANCE,This is called RELIABILITY or FAULT TOLERANCE,

i.e., ability to sustain sensor networki.e., ability to sustain sensor network functionality without any interruptionfunctionality without any interruption

Page 38: Wireless Sensor Network

38IFA’2004

Fault Tolerance Fault Tolerance (Reliability) (Ctn’d)(Reliability) (Ctn’d)

Reliability (Fault Tolerance) of a sensor node is modeled: Reliability (Fault Tolerance) of a sensor node is modeled:

i.e., by Poisson distribution, to capture the probability of not i.e., by Poisson distribution, to capture the probability of not having a failure within the time interval (0,t)having a failure within the time interval (0,t)with lambda_k is the failure rate of the sensor node k and with lambda_k is the failure rate of the sensor node k and t is the time period.t is the time period.

G. Hoblos, M. Staroswiecki, and A. Aitouche, “Optimal Design of Fault Tolerant Sensor Networks,” G. Hoblos, M. Staroswiecki, and A. Aitouche, “Optimal Design of Fault Tolerant Sensor Networks,” IEEE International Conference on Control ApplicationsIEEE International Conference on Control Applications, pp. 467-472, Anchorage, AK, September 2000., pp. 467-472, Anchorage, AK, September 2000.

)texp()t(Rkk

Page 39: Wireless Sensor Network

39IFA’2004

Fault Tolerance Fault Tolerance (Reliability) (Ctn’d)(Reliability) (Ctn’d)

EXAMPLE:EXAMPLE:Suppose: lambda = 3.5 * 10Suppose: lambda = 3.5 * 10-3 -3 t=10sec t=10sec R = 0.97 R = 0.97 t=20sec t=20sec R= 0.93 R= 0.93 t=30sec t=30sec R= 0.9 R= 0.9 t=50sec t=50sec R=0.84 R=0.84

Page 40: Wireless Sensor Network

40IFA’2004

Fault Tolerance Fault Tolerance (Reliability) (Ctn’d)(Reliability) (Ctn’d)

Reliability (Fault Tolerance) of a broadcast range with Reliability (Fault Tolerance) of a broadcast range with N sensor nodes is calculated from:N sensor nodes is calculated from:

])(1[1)(1

N

kk tRtR

Page 41: Wireless Sensor Network

41IFA’2004

Fault Tolerance Fault Tolerance (Reliability) (Ctn’d)(Reliability) (Ctn’d)

EXAMPLE:EXAMPLE: How many sensor nodes are needed within a broadcast How many sensor nodes are needed within a broadcast radius (range) to have 99% fault tolerated network?radius (range) to have 99% fault tolerated network?

Assuming all sensors within the radio range have same Assuming all sensors within the radio range have same reliability, prev. equation becomesreliability, prev. equation becomes

NtRtR )](1[1)(

Drop t and substitute f = (1 – R).o.99 = 1 – fN N = 2

Page 42: Wireless Sensor Network

42IFA’2004

Fault ToleranceFault Tolerance(Reliability) (Ctn’d)(Reliability) (Ctn’d)

REMARK:REMARK:

1. Protocols and algorithms may be designed to 1. Protocols and algorithms may be designed to address the level of fault tolerance required by address the level of fault tolerance required by sensor networks.sensor networks.

2. If the environment has little interference, then 2. If the environment has little interference, then the requirements can be more relaxed.the requirements can be more relaxed.

Page 43: Wireless Sensor Network

43IFA’2004

Fault ToleranceFault Tolerance(Reliability) (Ctn’d)(Reliability) (Ctn’d)

Examples:Examples:1. 1. HouseHouse to keep track of humidity and temperature to keep track of humidity and temperature levels levels the sensors cannot be damaged easily or the sensors cannot be damaged easily or

interfered interfered by environments by environments low fault tolerance (reliability) low fault tolerance (reliability)

requirement!!!!requirement!!!!2. 2. BattlefieldBattlefield for surveillance the sensed data are critical for surveillance the sensed data are critical

and sensors can be destroyed by enemies and sensors can be destroyed by enemies high high fault tolerancefault tolerance

(reliability) requirement!!!(reliability) requirement!!!

Bottomline: Bottomline: Fault Tolerance (Reliability)Fault Tolerance (Reliability) depends heavily on applications!!!depends heavily on applications!!!

Page 44: Wireless Sensor Network

44IFA’2004

B. ScalabilityB. Scalability

The number of sensor nodes mThe number of sensor nodes may reach millions in ay reach millions in studyingstudying a field/applicationa field/application

The density of sensor nodes can range from few The density of sensor nodes can range from few to several to several hundreds in a region (cluster) which can be hundreds in a region (cluster) which can be less than 10m in less than 10m in diameter.diameter.

Page 45: Wireless Sensor Network

45IFA’2004

Scalability Scalability (Ctn’d)(Ctn’d)

The Sensor Node DensityThe Sensor Node Density: : i.e., the number of expected i.e., the number of expected nodes nodes

within the radio range Rwithin the radio range R::

where N is the number of scattered sensor nodeswhere N is the number of scattered sensor nodesin region A and R is the radio transmission range.in region A and R is the radio transmission range.Basically: Basically: is the number of sensor nodes within is the number of sensor nodes within the the transmission radius of each sensor node in region transmission radius of each sensor node in region A.A.

The number of sensor nodes in a region is used to The number of sensor nodes in a region is used to indicate the node density depends on the indicate the node density depends on the application.application.

ARNR /)()( 2

Page 46: Wireless Sensor Network

46IFA’2004

Network ConfigurationNetwork Configuration

Sensor nodesSensor nodes

Sink nodeSink node

Radio Range RRadio Range R

Page 47: Wireless Sensor Network

47IFA’2004

ddhop hop = 2R/3= 2R/3

Scalability (Ctn’d)Scalability (Ctn’d)

e.g., R=20m e.g., R=20m 13.33m 13.33m

Assuming that connection establishment Assuming that connection establishment is equally likely with any node within the is equally likely with any node within the radio range radio range RR of the given node, the of the given node, the expectedexpected hop distancehop distance is: is:

Page 48: Wireless Sensor Network

48IFA’2004

Network ConfigurationNetwork Configuration

Sensor nodesSensor nodes

Sink nodeSink node

Radio Range RRadio Range R

ddhoho

pp

ddnene

ii

ddneinei Expected distance to the nearest neighbor, may or may not be communicating neighbor. Expected distance to the nearest neighbor, may or may not be communicating neighbor.

ddhop hop Expected distance to the next hop, i.e., distance to communicating neighbor. d Expected distance to the next hop, i.e., distance to communicating neighbor. dhophop>=d>=dneinei

Page 49: Wireless Sensor Network

49IFA’2004

Scalability Scalability (Ctn’d)(Ctn’d)

EXAMPLE:Assume sensor nodes are evenly distributed in the sensor field, determine the node density if 200 sensor nodes are deployed in a 50x50 m2 region where each sensor node has a broadcast radius of 5 m.

Use the eq.mu (R) = (200 * pi * 52 )/(50*50) = 2 * pi

Page 50: Wireless Sensor Network

50IFA’2004

Scalability Scalability (Cont’d)(Cont’d)

Examples: Examples: 1. Machine Diagnosis Application: 1. Machine Diagnosis Application: less than 300 sensor nodes in a 5 m x 5 m region.less than 300 sensor nodes in a 5 m x 5 m region.

2. Vehicle Tracking Application:2. Vehicle Tracking Application: Around 10 sensor nodes per cluster/region.Around 10 sensor nodes per cluster/region.

3. Home Application: 3. Home Application: 2 dozens or more.2 dozens or more.

4.4. Habitat Monitoring Application:Habitat Monitoring Application: Range from 25 to 100 Range from 25 to 100 nodes/clusternodes/cluster

5. Personal Applications:5. Personal Applications: Ranges from 100s to 1000s, e.g., clothing, eye glasses, shoes, Ranges from 100s to 1000s, e.g., clothing, eye glasses, shoes, watch, jewelry.watch, jewelry.

Page 51: Wireless Sensor Network

51IFA’2004

C. Production C. Production CostsCosts

Cost of sensors must be low so that theCost of sensors must be low so that the sensor networks can be justified!!!sensor networks can be justified!!! PicoNode: less than $1PicoNode: less than $1 Bluetooth system: around $10,- Bluetooth system: around $10,- THE OBJECTIVE FOR SENSOR COSTS THE OBJECTIVE FOR SENSOR COSTS must be lower than $1!!!!!!!must be lower than $1!!!!!!! Currently: Currently: COTS Dust Motes COTS Dust Motes ranges from $25 to $172ranges from $25 to $172 (STILL VERY EXPENSIVE!!!!)(STILL VERY EXPENSIVE!!!!)

Page 52: Wireless Sensor Network

52IFA’2004

D. Sensor Node Hardware D. Sensor Node Hardware

A Sensor NodeA Sensor Node

Power UnitPower Unit Power GeneratorPower Generator

Sensor ADCSensor ADCProcessorProcessor

MemoryMemoryTransceiverTransceiver

Location Finding SystemLocation Finding System MobilizerMobilizer SmallSmall Low powerLow power Low bit rateLow bit rate High density High density Low cost (dispensable)Low cost (dispensable) AutonomousAutonomous AdaptiveAdaptive

SENSING UNITPROCESSING UNIT

Page 53: Wireless Sensor Network

53IFA’2004

E. Sensor Network Topology

Internet, Internet, SatelliteSatellite, etc, etc

SinkSink

SinkSink

TaskTaskManagerManager

Several thousand Several thousand nodesnodes

Nodes are tens of Nodes are tens of feet of each otherfeet of each other

Densities as high as Densities as high as 20 nodes/m20 nodes/m33

Page 54: Wireless Sensor Network

54IFA’2004

Sensor Network Topology Sensor Network Topology (Ctn’d)(Ctn’d)

Topology maintenance and change:Topology maintenance and change:

Pre-deployment and Deployment Pre-deployment and Deployment Phase Phase

Post Deployment PhasePost Deployment Phase Re-Deployment of Additional NodesRe-Deployment of Additional Nodes

Page 55: Wireless Sensor Network

55IFA’2004

Sensor Network Topology Sensor Network Topology (Ctn’d)(Ctn’d)

Pre-deployment and Deployment Pre-deployment and Deployment PhasePhase

Sensor networks can be deployed by:Sensor networks can be deployed by:

Dropping from a planeDropping from a plane Delivering in an artillery shell, rocket or Delivering in an artillery shell, rocket or

missilemissile Throwing by a catapult (from a ship board, Throwing by a catapult (from a ship board,

etc.)etc.) Placing in factoryPlacing in factory Being placed one by one by a human or a Being placed one by one by a human or a

robotrobot

Page 56: Wireless Sensor Network

56IFA’2004

Sensor Network Topology Sensor Network Topology (Ctn’d)(Ctn’d)

Initial deployment schemes mustInitial deployment schemes must

reduce installation cost reduce installation cost eliminate the need for any pre-eliminate the need for any pre-

organization and pre-planningorganization and pre-planning increase the flexibility of arrangement increase the flexibility of arrangement promote self organization and fault promote self organization and fault

tolerance.tolerance.

Page 57: Wireless Sensor Network

57IFA’2004

Sensor Network Topology Sensor Network Topology (Ctn’d)(Ctn’d)

POST-DEPLOYMENT PHASEPOST-DEPLOYMENT PHASE

After deployment, topology changes are due to After deployment, topology changes are due to change in sensor nodes’change in sensor nodes’

positionposition reachability (due to jamming, noise, moving reachability (due to jamming, noise, moving

obstacles, etc.)obstacles, etc.) available energyavailable energy malfunctioningmalfunctioning

Page 58: Wireless Sensor Network

58IFA’2004

F. Operating EnvironmentF. Operating Environment

Sensor networks may workSensor networks may work in busy intersectionsin busy intersections in the interior of a large machineryin the interior of a large machinery at the bottom of an oceanat the bottom of an ocean inside a twisterinside a twister at the surface of an oceanat the surface of an ocean in a biologically or chemically contaminated field in in a biologically or chemically contaminated field in

a battlefield beyond the enemy linesa battlefield beyond the enemy lines in a house or a large buildingin a house or a large building in a large warehousein a large warehouse attached to animalsattached to animals attached to fast moving vehiclesattached to fast moving vehicles in a drain or river moving with currentin a drain or river moving with current …………………………………………

Page 59: Wireless Sensor Network

59IFA’2004

G. TRANSMISSION G. TRANSMISSION MEDIAMEDIA

Radio or Infrared or Optical Media Radio or Infrared or Optical Media

ISM (Industrial, Scientific and Medical ISM (Industrial, Scientific and Medical Bands)Bands) 433 MHz ISM Band in Europe and 915 433 MHz ISM Band in Europe and 915 MHz MHz

as well as 2.4 GHz ISM Bands in North as well as 2.4 GHz ISM Bands in North

America.America.

REASONS:REASONS: Free radio, huge spectrum Free radio, huge spectrum allocation and global availability.allocation and global availability.

Page 60: Wireless Sensor Network

60IFA’2004

Transmission MediaTransmission Media In a Multihop sensor network nodes are linked by

Wireless medium– Radio Frequency (RF)

Most of the current sensor node HW is based on itDo not need Line of Sight Can hide these sensors

– Infrared (IR)License freeRobust to interferenceCheaper and easier to buildRequire line of sightShort Range Solution

– Optical MediaRequire Line of sight

Page 61: Wireless Sensor Network

61IFA’2004

H. POWER H. POWER CONSUMPTIONCONSUMPTION

Sensor node has limited power source Sensor node has limited power source (~1.2V).(~1.2V). Sensor node LIFETIME depends on battery Sensor node LIFETIME depends on battery

lifetimelifetime Sensors can be a DATA ORIGINATOR or a Sensors can be a DATA ORIGINATOR or a

DATA ROUTER.DATA ROUTER. Power conservation and power management Power conservation and power management

are important are important POWER AWARE PROTOCOLS POWER AWARE PROTOCOLS

must be developed.must be developed.

Page 62: Wireless Sensor Network

62IFA’2004

Power Consumption Power Consumption (Ctn’d)(Ctn’d)

• Power consumption in a sensor network can be Power consumption in a sensor network can be divideddivided

into three domains into three domains

CommunicationCommunication Data Processing Data Processing SensingSensing

Page 63: Wireless Sensor Network

63IFA’2004

Power Consumption Power Consumption (Ctn’d)(Ctn’d)

CommunicationCommunication

A sensorA sensor expends maximum energy expends maximum energy in in data communicationdata communication (both for (both for transmission and reception).transmission and reception).

NOTE:NOTE:For short range communication with low radiation power For short range communication with low radiation power (~0 dbm), transmission and reception power costs are (~0 dbm), transmission and reception power costs are

approximately the same,approximately the same, (e.g., modern low power short (e.g., modern low power short range transceivers consume between 15 and 300 milliwatts range transceivers consume between 15 and 300 milliwatts of power when sending and receiving).of power when sending and receiving).

Transceiver circuitry has both active and start-up Transceiver circuitry has both active and start-up

power consumptionpower consumption

Page 64: Wireless Sensor Network

64IFA’2004

Power Consumption (Ctn’d)Power Consumption (Ctn’d)

Power consumption for Power consumption for data communicationdata communication (P(Pcc))

PPcc = P = Pte te + P + Prere + P + P0 0

PPte/rete/re is the power consumed in the transmitter/receiver is the power consumed in the transmitter/receiver electronics (including the start-up power)electronics (including the start-up power) PP0 0 is the output transmit power is the output transmit power

Page 65: Wireless Sensor Network

65IFA’2004

Power Consumption in Power Consumption in Data Data CommunicationCommunication ( (PPCC) (Detailed ) (Detailed Formula)Formula)

)]([)]()([ stonRRonoutstonTTc RRPNTPTTPNP

wherewhere

PPTT is power consumed by is power consumed by transmittertransmitterPPR R is power consumed by is power consumed by receiverreceiverPPoutout is output power of is output power of transmittertransmitterTTonon is time for “transmitter on” is time for “transmitter on”

RRonon is time for “receiver on” is time for “receiver on”

TTstst is start-up time for is start-up time for transmitter transmitter

RRstst is start-up time for receiver is start-up time for receiver

NNTT is the number of times is the number of times

transmitter is switched on pertransmitter is switched on per

unit timeunit time

NNRR is the number of times receiver is the number of times receiver

is switched on per unit timeis switched on per unit time

Page 66: Wireless Sensor Network

66IFA’2004

Power Consumption in Communication Power Consumption in Communication (Ctn’d)(Ctn’d)

TTonon = L / R = L / R

where L is the packet size and R is the data rate.where L is the packet size and R is the data rate.

Low power radio transceiver has typical Low power radio transceiver has typical PPTT andand

PPRR values around 20 dBm and values around 20 dBm and PPoutout close to 0 dBm.close to 0 dBm.

Note that PicoRadio aims at a Note that PicoRadio aims at a PPcc value of –20 dBm. value of –20 dBm.

Page 67: Wireless Sensor Network

67IFA’2004

Power Consumption in Communication Power Consumption in Communication (Ctn’d)(Ctn’d)

START-UP POWER: REMARK:START-UP POWER: REMARK:

Sensors communicate in short data packetsSensors communicate in short data packets Start-up power starts dominating as packet Start-up power starts dominating as packet

size is reduced size is reduced It is inefficient to turn the transceiver ON and OFF It is inefficient to turn the transceiver ON and OFF

because a large amount of power is spent inbecause a large amount of power is spent in

turning the transceiver back ON each time.turning the transceiver back ON each time.

Page 68: Wireless Sensor Network

68IFA’2004

Power Consumption in Data Processing Power Consumption in Data Processing (Ctn’d)(Ctn’d)

This is much less than in communication.This is much less than in communication.

EXAMPLE:EXAMPLE:

Energy cost of transmitting 1 KB a distance of Energy cost of transmitting 1 KB a distance of

100 m is approx. equal to executing 3 Million 100 m is approx. equal to executing 3 Million

instructions by a 100 million instructions per instructions by a 100 million instructions per

second processor.second processor.

Local data processing is crucial in minimizing Local data processing is crucial in minimizing

power consumption in a multi-hop networkpower consumption in a multi-hop network

Page 69: Wireless Sensor Network

69IFA’2004

Power Consumption in Data Processing Power Consumption in Data Processing (Ctn’d)(Ctn’d)

Complementary Metal Oxide SemiconductorComplementary Metal Oxide Semiconductor

(CMOS) technology used in designing processors (CMOS) technology used in designing processors

has energy limitationshas energy limitations

Dynamic Voltage Scaling and other Low power Dynamic Voltage Scaling and other Low power

CPU organization strategies need to be explored CPU organization strategies need to be explored

Page 70: Wireless Sensor Network

70IFA’2004

Power Consumption in Data Power Consumption in Data Processing (Processing (PPpp))

}'/exp{2Tddoddddp VnVIVfVCP

WhereWhere

C is the total switching capacitance; VC is the total switching capacitance; Vdddd is the voltage swing; is the voltage swing;

F is the switching frequencyF is the switching frequency

The second term indicates the power loss due to leakage currents.The second term indicates the power loss due to leakage currents.

Page 71: Wireless Sensor Network

71IFA’2004

Power Consumption Power Consumption (Ctn’d)(Ctn’d)(Another Simple Energy Model)(Another Simple Energy Model)

Assuming a sensor node is only operating in transmit and receive modes with the following assumptions: Energy to run circuitry: E_{elec} = 50 nJ/bit Energy for radio transmission: E_{amp} = 100 pJ/bit/m2

Energy for sending k bits over distance d E_Tx (k,D) = E_{elec} * k + E_{amp} * k * d2

Energy for receiving k bits: E_Rx (k,D) = E_{elec} * k

Page 72: Wireless Sensor Network

72IFA’2004

ENERGY MODELENERGY MODEL

Page 73: Wireless Sensor Network

73IFA’2004

Power Consumption Power Consumption (Ctn’d) (Ctn’d) (Another Simple Energy (Another Simple Energy Model)Model)

What is the energy consumption if 1 Mbit of information is transferred from the source to the sink where the source and sink areseparated by 100 meters and the broadcast radius of each node is 5 meters?Assume the neighbor nodes are overhearing each other’s broadcast.

Page 74: Wireless Sensor Network

74IFA’2004

Power Consumption Power Consumption (Ctn’d) (Ctn’d) (Another Simple Energy (Another Simple Energy Model)Model)

E_Rx (k,D) = E_{elec} * k

100 meters / 5 meters = 20 pairs of transmitting and receiving nodes (one node transmits and one node receives)

E_Tx (k,D) = E_{elec} * k + E_{amp} * k * D2 E_{Tx} = 50 nJ/bit . 106 + 100 pJ/bit/m2 . 106 . 52 = = 0.5J + 0.0025 J = 0.0525 J

E_{Rx} = 0.05 J

E_{pair} = E_{Tx} + E_{Rx} = 0.1025JE_{T} = 20 . E_{pair} = 20. 0.1025J = 2.050 J

Page 75: Wireless Sensor Network

75IFA’2004

Power Consumption in Sensing Power Consumption in Sensing (Ctn’d)(Ctn’d)

Depends onDepends on ApplicationApplication Nature of sensing: Sporadic or ConstantNature of sensing: Sporadic or Constant Detection complexity Detection complexity Ambient noise levelsAmbient noise levels

Page 76: Wireless Sensor Network

76IFA’2004

Sensor Networks Sensor Networks Communication Communication ArchitectureArchitecture

Collect dataCollect data Route data back to the sinkRoute data back to the sink

Internet, Internet, Satellite, Satellite, etcetc

SinkSink

TaskTaskManagerManager

AABB

CC

DD

EEFF

Sensor NodeSensor Node

Sensor FieldSensor Field

Page 77: Wireless Sensor Network

77IFA’2004

Sensor Networks Sensor Networks Communication ArchitectureCommunication Architecture

Application LayerApplication Layer

Transport LayerTransport Layer

Network LayerNetwork Layer

Data Link LayerData Link Layer

Physical LayerPhysical Layer

Pow

er M

anagem

ent

Pow

er M

anagem

ent

Pla

ne

Pla

ne

Mobility

Managem

ent

Mobility

Managem

ent

Pla

ne

Pla

ne

Task M

anagem

ent P

lane

Task M

anagem

ent P

lane

Used by sink and all sensor nodesUsed by sink and all sensor nodes Combines power and routing awarenessCombines power and routing awareness Integrates data with networking protocolsIntegrates data with networking protocols Communicates power efficiently throughCommunicates power efficiently through wireless medium andwireless medium and Promotes cooperative efforts.Promotes cooperative efforts.

Page 78: Wireless Sensor Network

78IFA’2004

WHY CAN’T AD-HOC NETWORK WHY CAN’T AD-HOC NETWORK PROTOCOLS BE USED HERE?PROTOCOLS BE USED HERE?

Number of sensor nodes can be several Number of sensor nodes can be several orders of magnitude higherorders of magnitude higher

Sensor nodes are Sensor nodes are densely deployeddensely deployed and are and are prone to failuresprone to failures

The topology of a sensor network changes The topology of a sensor network changes very frequently due to very frequently due to node mobility and node mobility and node failurenode failure

Sensor nodes are limited in Sensor nodes are limited in power, power, computational capacities, and memorycomputational capacities, and memory

May not have global ID like IP address.May not have global ID like IP address. Need tight integration with sensing tasks.Need tight integration with sensing tasks.

Page 79: Wireless Sensor Network

79IFA’2004

5. APPLICATON LAYER 5. APPLICATON LAYER FRAMEWORKFRAMEWORK

Sensor Network Management Protocol Sensor Network Management Protocol (SMP)(SMP) Task Assignment and Data Advertisement Task Assignment and Data Advertisement ProtocolProtocol Sensor Query and Data Dissemination Sensor Query and Data Dissemination ProtocolProtocol

Page 80: Wireless Sensor Network

80IFA’2004

sensor node

gateway (gnode)

wireless link

TaskTaskManagerManager

Users

Server(Database)

Internet, Internet, Satellite, Satellite, etcetc

Sensor Network Topology

Page 81: Wireless Sensor Network

81IFA’2004

APPLICATON LAYERAPPLICATON LAYERSMP: Sensor Managament SMP: Sensor Managament ProtocolProtocolSystem Administrators interact with Sensors using SMP.System Administrators interact with Sensors using SMP.

TASKS:TASKS: Moving the sensor nodesMoving the sensor nodes Turning sensors on and offTurning sensors on and off Querying the sensor network configuration and the status Querying the sensor network configuration and the status

of of nodes and re-configuring the sensor networknodes and re-configuring the sensor network

Authentication, key distribution and security in dataAuthentication, key distribution and security in data communicationcommunication Time-synchronization of the sensor nodesTime-synchronization of the sensor nodes Exchanging data related to the location finding algorithmsExchanging data related to the location finding algorithms Introducing the rules related to data aggregation, Introducing the rules related to data aggregation, attribute-based naming and clustering to the sensor attribute-based naming and clustering to the sensor

nodesnodes

Page 82: Wireless Sensor Network

82IFA’2004

APPLICATON LAYERAPPLICATON LAYER(Query Processing)(Query Processing)

Users can request data from the network-> Users can request data from the network-> Efficient Query Efficient Query ProcessingProcessing

User Query Types:User Query Types:

1. 1. HISTORICAL QUERIES:HISTORICAL QUERIES:

Used for analysis of historical data stored in a storage area Used for analysis of historical data stored in a storage area (PC),(PC),

e.g., what was the temperature 2 hours back in the NW e.g., what was the temperature 2 hours back in the NW quadrant.quadrant.

2. ONE TIME QUERIES: 2. ONE TIME QUERIES:

Gives a snapshot of the network, Gives a snapshot of the network, e.g., what is the current e.g., what is the current temperature in the NW quadrant.temperature in the NW quadrant.

3. PERSISTANT QUERIES:3. PERSISTANT QUERIES:

Used to monitor the network over a time interval with Used to monitor the network over a time interval with respect to some parameters, respect to some parameters, e.g., report the temperature e.g., report the temperature for the next 2 hours.for the next 2 hours.

Page 83: Wireless Sensor Network

83IFA’2004

QUERYINGQUERYING– ContinuousContinuous

Sensors communicate their data continuously at a prespecified Sensors communicate their data continuously at a prespecified rate. rate.

– Event DrivenEvent Driven The sensors report information only when the event of interest The sensors report information only when the event of interest

occurs.occurs.

– Observer Initiated (request-reply):Observer Initiated (request-reply): Sensors only report their results in response to an explicit request Sensors only report their results in response to an explicit request

from the observer. from the observer.

Aggregate queries

Complex queries

Queries for replicated data

– HybridHybrid

Page 84: Wireless Sensor Network

84IFA’2004

APPLICATON LAYERAPPLICATON LAYER

Sensor Query and Tasking Language (SQTL):Sensor Query and Tasking Language (SQTL):(C-C Shen, et.al., “Sensor Information Networking Architecture and Applications”, (C-C Shen, et.al., “Sensor Information Networking Architecture and Applications”, IEEE Personal Communications MagazineIEEE Personal Communications Magazine, pp. 52-59, August 2001.), pp. 52-59, August 2001.)

SQTL is a procedural scripting language.SQTL is a procedural scripting language. It provides interfaces to It provides interfaces to access sensor hardwareaccess sensor hardware: :

- getTemperature, turnOn- getTemperature, turnOn

for for location awarenesslocation awareness::

- isNeighbor, getPosition- isNeighbor, getPosition

and for and for communicationcommunication::

- tell, execute.- tell, execute.

Page 85: Wireless Sensor Network

85IFA’2004

APPLICATON LAYERAPPLICATON LAYER

Sensor Query and Tasking Language (SQTL):Sensor Query and Tasking Language (SQTL):

By using the By using the uponupon command, a programmer can command, a programmer can create an event handling block for three types of create an event handling block for three types of events:events:- - Events generated when a message is received by a sensor Events generated when a message is received by a sensor node,node,

- Events triggered periodically,- Events triggered periodically,

- Events caused by the expiration of a timer.- Events caused by the expiration of a timer.

These types of events are defined by SQTL These types of events are defined by SQTL keywordskeywords receivereceive, , everyevery and and expireexpire, respectively., respectively.

Page 86: Wireless Sensor Network

86IFA’2004

Simple Abtract Querying Example

Select [ task, time, location, [distinct | all], amplitude, [[avg | min |max | count | sum ] (amplitude)]]from [any , every , aggregate m] where [ power available [<|>] PA | location [in | not in] RECT | tmin < time < tmax | task = t | amplitude [<|==|>] a ]group by task based on [time limit = lt | packet limit = lp | resolution = r | region = xy]

Page 87: Wireless Sensor Network

87IFA’2004

Data Centric QueryData Centric Query

Attribute-based Attribute-based naming naming architecturearchitecture

Data centric Data centric protocolprotocol

Observer sends a Observer sends a query and gets query and gets the response from the response from valid sensor nodevalid sensor node

No global IDNo global ID

Page 88: Wireless Sensor Network

88IFA’2004

APPLICATON LAYER APPLICATON LAYER Task Assignment and Data Advertisement Task Assignment and Data Advertisement ProtocolProtocol

INTEREST DISSEMINATIONINTEREST DISSEMINATION * * Users send their interest to a sensor Users send their interest to a sensor node, node, a subset of the nodes or the entire a subset of the nodes or the entire network.network. * This interest may be about a certain * This interest may be about a certain attribute attribute of the sensor field or a triggering event.of the sensor field or a triggering event.

ADVERTISEMENT OF AVAILABLE DATAADVERTISEMENT OF AVAILABLE DATA * * Sensor nodes advertise the available Sensor nodes advertise the available data to data to the users and the users query the data the users and the users query the data which which they are interested in.they are interested in.

Page 89: Wireless Sensor Network

89IFA’2004

APPLICATON LAYERAPPLICATON LAYERSensor Query and Data Dissemination Sensor Query and Data Dissemination ProtocolProtocol

Provides user applicatons with interfaces to issue queries, respond to queries and collect incoming replies.These queries are not issued to particular nodes, instead

ATTRIBUTE BASED NAMING (QUERY) “The locations of the nodes that sense temperature higher than 70F”LOCATION BASED NAMING (QUERY) “Temperatures read by the nodes in region A”

Page 90: Wireless Sensor Network

90IFA’2004

Interest DisseminationInterest Dissemination

SinkSink

Query:Query:

Sensor nodes that read >70Sensor nodes that read >70ooF F temperaturetemperature

7171

6868

6868

6969

7171

7575

7171

6767

7171

6666

Interest dissemination is performed to assign the sensing tasks to the sensor nodes. Either sinks broadcast the interest or sensor nodes broadcast an advertisement for the available data and wait for a request from the sinks.

Page 91: Wireless Sensor Network

91IFA’2004

Data Aggregation (Data Data Aggregation (Data Fusion)Fusion)

Query:Query:

Sensor nodes that read >70Sensor nodes that read >70ooF F temperaturetemperature

7171

7575

SinkSink

6868

6868

6969

71717171

6767

7171

6666

The sink asks the sensor nodes to report certain conditions. Data coming from multiple sensor nodes are aggregated.

Page 92: Wireless Sensor Network

92IFA’2004

Location Awareness Location Awareness (Attribute Based Naming)(Attribute Based Naming)

SinkSink

Query:Query:

Temperatures read by the nodes Temperatures read by the nodes in Region A in Region A

7171

6868

6868

6969

7171

7575

7171

6767

7171

6666

Region ARegion A

Region BRegion B

Region CRegion C

Query an Attribute of the sensor field

Important for broadcasting, multicasting, geocasting and anycasting

Page 93: Wireless Sensor Network

93IFA’2004

APPLICATON LAYER RESEARCH APPLICATON LAYER RESEARCH NEEDSNEEDS

Sensor Network Management ProtocolSensor Network Management Protocol Task Assignment and Data Advertisement Task Assignment and Data Advertisement ProtocolProtocol Sensor Query and Data Dissemination Sensor Query and Data Dissemination ProtocolProtocol Sophisticated GUI Sophisticated GUI

(Graphical User Interface) Tool(Graphical User Interface) Tool

Page 94: Wireless Sensor Network

94IFA’2004

NETWORK LAYER NETWORK LAYER (ROUTING(ROUTING BASIC KNOWLEDGE) BASIC KNOWLEDGE)

The constraints to calculate the routes:The constraints to calculate the routes:1. Additive Metrics: 1. Additive Metrics: Delay, hop count, distance, assigned costs (sysadmin Delay, hop count, distance, assigned costs (sysadmin preference), preference), average queue length...average queue length...

2. Bottleneck Metrics: 2. Bottleneck Metrics: Bandwidth, residual capacity and other bandwidth Bandwidth, residual capacity and other bandwidth related metrics. related metrics.

REMARK:REMARK:All routing algorithms are based on the same principle used as in All routing algorithms are based on the same principle used as in Dijkstra's, Dijkstra's, which is used to find the which is used to find the minimum cost pathminimum cost path from source to from source to destination.destination.Dikstra and Bellman solve the SHORTEST PATH PROBLEM…Dikstra and Bellman solve the SHORTEST PATH PROBLEM…RIP (Distant Vector Algorithm) -> Bellman/Ford AlgorithmRIP (Distant Vector Algorithm) -> Bellman/Ford AlgorithmOSPF (Open Shortest Path Algorithm) OSPF (Open Shortest Path Algorithm) Dikstra Algorithm Dikstra Algorithm

Page 95: Wireless Sensor Network

95IFA’2004

Routing Algorithms Constraints Regarding Power Efficiency (Energy Efficient Routing)

SinkSink

E (PA=1)E (PA=1) F (PA=4)F (PA=4)

D (PA=3)D (PA=3)

A (PA=2)A (PA=2)B (PA=2)B (PA=2)

C (PA=2)C (PA=2)

TT

Route 1: Sink-A-B-T (PA=4)Route 1: Sink-A-B-T (PA=4)Route 2: Sink-A-B-C-T (PA=6)Route 2: Sink-A-B-C-T (PA=6)Route 3: Sink-D-T (PA=3)Route 3: Sink-D-T (PA=3)Route 4: Sink-E-F-T (PA=5)Route 4: Sink-E-F-T (PA=5)

Maximum power available (PA) routeMaximum power available (PA) route Minimum hop routeMinimum hop route Minimum energy routeMinimum energy route Maximum minimum PA node Maximum minimum PA node routeroute (Route along which the (Route along which the minimum PA is larger than the minimum PA is larger than the minimum PAs of the other routesminimum PAs of the other routes is preferred, e.g., Route 3 is the is preferred, e.g., Route 3 is the most efficient; Route 1 is the most efficient; Route 1 is the second).second).

Page 96: Wireless Sensor Network

96IFA’2004

Global (Unique) addresses, local addresses.

Unique node addresses cannot be used in many sensor networks

- sheer number of nodes- energy constraints- data centric approach

Node addressing is needed for- node management- sensor management- querying- data aggregation and fusion- service discovery- routing

Why can’t we use conventional routing algorithms here?

Page 97: Wireless Sensor Network

97IFA’2004

Addressing in Sensor Networks

1. Attribute based naming and data centric routing

2. Spatial addressing (location awareness)

3. Address reuse

4. Query mapping.

Page 98: Wireless Sensor Network

98IFA’2004

NETWORK LAYER NETWORK LAYER (ROUTING for SENSOR NETWORKS)(ROUTING for SENSOR NETWORKS)

Important considerations:Important considerations:

Sensor networks are mostly data Sensor networks are mostly data centriccentric

An ideal sensor network has attribute An ideal sensor network has attribute based addressing and location based addressing and location awarenessawareness

Data aggregation is useful unless it Data aggregation is useful unless it does not hinder collaborative effortdoes not hinder collaborative effort

Power efficiency is always a key factorPower efficiency is always a key factor

Page 99: Wireless Sensor Network

99IFA’2004

Some ConceptsSome Concepts

Data-Centric– Node doesn't need an identity

What is the temp at node #27 ?

– Data is named by attributesWhere are the nodes whose temp recently exceeded

30 degrees ? How many pedestrians do you observe in region X? How many pedestrians do you observe in region X? Tell me in what direction that vehicle in region Y is Tell me in what direction that vehicle in region Y is

moving?moving?

Application-Specific– Nodes can perform application specific

data aggregation, caching and forwarding

Page 100: Wireless Sensor Network

100

IFA’2004

Attribute Based NamingData-Centric RoutingData-Centric Routing

SinkSink

Query:Query:

Nodes that read >70Nodes that read >70ooF F temperaturetemperature

7171

6868

6868

6969

7171

7575

7171

6767

7171

6666

Interest dissemination is performed to assign the sensing tasks to the sensor nodes. Either sinks broadcast the interest or sensor nodes broadcast an advertisement for the available data and wait for a request from the sinks.

Page 101: Wireless Sensor Network

101

IFA’2004

Data Centric Data Centric RoutingRouting

Attribute-based Attribute-based naming naming architecturearchitecture

Data centric Data centric protocolprotocol

Observer sends a Observer sends a query and gets query and gets the response from the response from valid sensor nodevalid sensor node

No global IDNo global ID

Page 102: Wireless Sensor Network

102

IFA’2004

Data Aggregation (Data Data Aggregation (Data Fusion)Fusion)

Query:Query:

Nodes that read >70Nodes that read >70ooF F temperaturetemperature

7171

7575

SinkSink

6868

6868

6969

71717171

6767

7171

6666

To solve the implosion and overlap problems in data centric routing. Sensor network is perceived as a reverse multicast tree. The sink asks the sensor nodes to report certain conditions. Data coming from multiple sensor nodes are aggregated.

Page 103: Wireless Sensor Network

103

IFA’2004

Data AggregationData Aggregation

Categorization of Data Aggregation Schemes:

1. Temporal or spatial aggregation

2. Snapshot or periodical aggregation

3. Centralized or distributed aggregation

4. Early or late aggregation

Page 104: Wireless Sensor Network

104

IFA’2004

Polygonal (Spatial) Polygonal (Spatial) AddressingAddressing Location AwarenessLocation Awareness

SinkSink

Query:Query:

Temperatures read by the nodes Temperatures read by the nodes in Region A in Region A

7171

6868

6868

6969

7171

7575

7171

6767

7171

6666

Region ARegion A

Region BRegion B

Region CRegion C

Important for broadcasting, multicasting, geocasting and anycasting

Page 105: Wireless Sensor Network

105

IFA’2004

Taxonomy of Routing Taxonomy of Routing ProtocolsProtocols for Sensor Networksfor Sensor NetworksCategorization of Routing Protocols for Wireless Sensor

Networks:(K. Akkaya, M. Younis, “A Survey on Routing Protocols for Wireless Sensor Networks,” Elsevier AdHoc (K. Akkaya, M. Younis, “A Survey on Routing Protocols for Wireless Sensor Networks,” Elsevier AdHoc Networks, 2004)Networks, 2004)

1. Data Centric Protocols Flooding, Gossiping, SPIN, SAR (Sequential Assignment Routing) , Directed Diffusion, Rumor Routing, Gradient Based Routing, Constrained Anisotropic Diffused Routing, COUGAR, ACQUIRE

2. Hierarchical LEACH, TEEN (Threshold Sensitive Energy Efficient Sensor Network

Protocol), APTEEN, PEGASIS, Energy Aware Scheme

3. Location Based MECN, SMECN (Small Minimum Energy Com Netw), GAF (Geographic Adaptive Fidelity), GEAR

Page 106: Wireless Sensor Network

106

IFA’2004

Conventional Conventional ApproachApproachFLOODINGFLOODING

B

D E

FG

C

A

Broadcast data to all neighbor nodesBroadcast data to all neighbor nodes

Page 107: Wireless Sensor Network

107

IFA’2004

ROUTING ALGORITHMSROUTING ALGORITHMSGossipingGossiping

GOSSIPING:Sends data to one randomly selected neighbor.

Example:Example:

Page 108: Wireless Sensor Network

108

IFA’2004

Problems ofFlooding and Gossiping

PROBLEMS:PROBLEMS:

Although these techniques are simple and Although these techniques are simple and reactive, they have some disadvantages reactive, they have some disadvantages including: including:

* * Implosion (NOTE: Gossiping avoids this by selecting only one node; but this causes delays to propagate the data through the network)

* Overlap * Resource Blindness * Power (Energy) Inefficient

Page 109: Wireless Sensor Network

109

IFA’2004

ProblemsProblems

A B

C (r,s)(q,r)

q s

Data OverlapData OverlapImplosionImplosion

A

B C

D

(a)

(a)

(a)

(a)

Resource BlindnessResource Blindness

No knowledge about the available power of resourcesNo knowledge about the available power of resources

r

Page 110: Wireless Sensor Network

110

IFA’2004

GossipingGossiping

Uses randomization to save energyUses randomization to save energySelects a single node at random and sends the Selects a single node at random and sends the data to itdata to it

Avoids implosionsAvoids implosions Distributes information slowlyDistributes information slowly Energy dissipates slowlyEnergy dissipates slowly

Page 111: Wireless Sensor Network

111

IFA’2004

The Optimum The Optimum ProtocolProtocol

B

D E

FG

C

A““Ideal”Ideal”

– Shortest-path routesShortest-path routes– Avoids overlapAvoids overlap– Minimum energyMinimum energy– Need global topology Need global topology

informationinformation

Page 112: Wireless Sensor Network

112

IFA’2004

Ideal DisseminationIdeal Dissemination

No implosion No implosion and no and no overlapoverlap

Disseminate Disseminate in shortest in shortest possible timepossible time

Page 113: Wireless Sensor Network

113

IFA’2004

SPIN: Sensor Protocol for Information via Negotiation(W.R. Heinzelman, J. Kulik, and H. Balakrishan, “Adaptive Protocols for (W.R. Heinzelman, J. Kulik, and H. Balakrishan, “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks”,Information Dissemination in Wireless Sensor Networks”, Proc. ACM MobiCom’99Proc. ACM MobiCom’99, pp. 174-185, 1999 ), pp. 174-185, 1999 )

Two basic ideas:Two basic ideas: Sensors communicate with each other Sensors communicate with each other

about the data that they already have about the data that they already have and the data they still need to obtainand the data they still need to obtain

to conserve energy and operate efficientlyto conserve energy and operate efficiently exchanging data exchanging data aboutabout sensor data may be sensor data may be

cheapcheap

Sensors must monitor and adapt to Sensors must monitor and adapt to changeschanges

in their own energy resourcesin their own energy resources

Page 114: Wireless Sensor Network

114

IFA’2004

SPINSPIN

- - Uses three types of messages: ADV, REQ, and DATA.- When a sensor node has something new, it broadcasts- an advertisement (ADV) packet that contains the new - data, i.e., the meta data.- Interested nodes send a request (REQ) packet. - Data is sent to the nodes that request by DATA - packets.- This will be repeated until all nodes will get a copy.

Page 115: Wireless Sensor Network

115

IFA’2004

SPINSPIN

Good for disseminating information to all sensor nodes.Good for disseminating information to all sensor nodes. SPIN is based on data-centric routing where the sensors SPIN is based on data-centric routing where the sensors broadcast an broadcast an advertisement for the available data and wait for a request from advertisement for the available data and wait for a request from interested sinksinterested sinks

1. ADV1. ADV2. REQ2. REQ3. DATA3. DATA

1.1.

2.2.

3.3.

Page 116: Wireless Sensor Network

116

IFA’2004

SPINSPIN

ADV- advertise/name ADV- advertise/name datadata

REQ- request specific REQ- request specific datadata

DATA- requested dataDATA- requested data

A B

ADV

A B

REQ

A B

DATA

Meta-Data <=> Data Naming

Page 117: Wireless Sensor Network

117

IFA’2004

SPINSPIN

ADVADVREQREQ

DATADATA

ADVADVREQREQDATADATA

Page 118: Wireless Sensor Network

118

IFA’2004

B

A

EXAMPLEEXAMPLE

Sensor A sends meta-data to neighborSensor A sends meta-data to neighbor

ADV

Page 119: Wireless Sensor Network

119

IFA’2004

Sensor B requests data from Sensor ASensor B requests data from Sensor A

REQB

A

Page 120: Wireless Sensor Network

120

IFA’2004

Sensor A sends data to Sensor BSensor A sends data to Sensor B

DATA

B

A

Page 121: Wireless Sensor Network

121

IFA’2004

Sensor B aggregates data and sends meta-Sensor B aggregates data and sends meta-data for A and B to neighborsdata for A and B to neighbors

ADV

AD

VADV

ADV

AD

V ADV

B

A

Page 122: Wireless Sensor Network

122

IFA’2004

All but 1 neighbor request dataAll but 1 neighbor request data

REQ

RE

Q

REQ

RE

Q

REQB

A

Page 123: Wireless Sensor Network

123

IFA’2004

Sensor B sends requested data to Sensor B sends requested data to neighborsneighbors

DATA

DA

TA

DATA

DA

TA

DATA

B

A

Page 124: Wireless Sensor Network

124

IFA’2004

SPIN-1 ProtocolSPIN-1 Protocol

SPIN-1SPIN-1– 3-stage handshake protocol3-stage handshake protocol– AdvantagesAdvantages

SimpleSimpleImplosion avoidanceImplosion avoidance

DisadvantagesDisadvantages

* Cannot isolate the nodes that do not want to receive the * Cannot isolate the nodes that do not want to receive the information.information. * Consume unnecessary power.* Consume unnecessary power.

Page 125: Wireless Sensor Network

125

IFA’2004

SPIN-2SPIN-2

Spin-2Spin-2– SPIN-1 + low-energy thresholdSPIN-1 + low-energy threshold– Modifies behavior based on Modifies behavior based on

current energy resourcescurrent energy resources

Page 126: Wireless Sensor Network

126

IFA’2004

SPIN-2SPIN-2

Adds a simple energy conservation Adds a simple energy conservation heuristicheuristic

When energy is plentiful, SPIN-2 When energy is plentiful, SPIN-2 behaves like SPIN-1behaves like SPIN-1

When energy approaches a low-energy When energy approaches a low-energy threshold, SPIN-2 node reduces its threshold, SPIN-2 node reduces its participation in the protocol participation in the protocol (DORMANT)(DORMANT)

participate in a stage of protocol only if the nodeparticipate in a stage of protocol only if the node

believes that it can complete all the remaining believes that it can complete all the remaining stagesstages

Page 127: Wireless Sensor Network

127

IFA’2004

SPIN Algorithm SPIN Algorithm VariantsVariants

Zzz...

FloodingFlooding -- Each node floods new data -- Each node floods new data to all of its neighbors. to all of its neighbors.

GossipingGossiping -- Each node floods all its -- Each node floods all its data to one, randomly selected data to one, randomly selected neighbor.neighbor.

NegotiatingNegotiating -- nodes decide what data -- nodes decide what data to send based on meta-data to send based on meta-data advertisements. SPIN-1advertisements. SPIN-1

SleepingSleeping -- Same as negotiating, -- Same as negotiating, except that nodes stop sending except that nodes stop sending messages when energy is lowmessages when energy is low. SPIN-2. SPIN-2

Page 128: Wireless Sensor Network

128

IFA’2004

CONCLUSIONSCONCLUSIONS

Flooding converges firstFlooding converges first– No delaysNo delays

SPIN-1 SPIN-1 – Reduces energy by 70%Reduces energy by 70%– No redundant DATA messagesNo redundant DATA messages

SPIN-2 distributes SPIN-2 distributes – 10% more data per unit energy than 10% more data per unit energy than

SPIN-1SPIN-1– 60% more data per unit energy than 60% more data per unit energy than

floodingflooding

Page 129: Wireless Sensor Network

129

IFA’2004

ROUTING ALGORITHMROUTING ALGORITHM(DIRECTED DIFFUSION)(DIRECTED DIFFUSION)

(C. Intanagonwiwat, R. Gowindan and D. Estrin, “Directed Diffusion: A Scalable and Robust (C. Intanagonwiwat, R. Gowindan and D. Estrin, “Directed Diffusion: A Scalable and Robust

Communication Paradigm for Sensor Networks”, Communication Paradigm for Sensor Networks”, Proc. ACM MobiCom’00Proc. ACM MobiCom’00, pp. 56-67, 2000.), pp. 56-67, 2000.)

- This is a DATA CENTRIC ROUTING scheme!!!!This is a DATA CENTRIC ROUTING scheme!!!!- The idea aims at diffusing data through sensor nodes by The idea aims at diffusing data through sensor nodes by using using

a a naming schemenaming scheme for the data. for the data.- The main reason behind this is to get rid off The main reason behind this is to get rid off unnecessaryunnecessary

operation of routing schemes tooperation of routing schemes to save save EnergyEnergy..

Also Also RobustnessRobustness and and ScalingScaling requirements need to be requirements need to be considered.considered.

Page 130: Wireless Sensor Network

130

IFA’2004

Data CentricData Centric

Data-CentricData-Centric– Sensor node does not need an identitySensor node does not need an identity

What is the temp at node #27 ?What is the temp at node #27 ?

– Data is named by attributesData is named by attributesWhere are the nodes whose temp recently exceeded Where are the nodes whose temp recently exceeded

30 degrees ?30 degrees ? How many pedestrians do you observe in region X? How many pedestrians do you observe in region X? Tell me in what direction that vehicle in region Y is Tell me in what direction that vehicle in region Y is

moving?moving?

Application-SpecificApplication-Specific– Nodes can perform application specific Nodes can perform application specific

data aggregation, caching and forwardingdata aggregation, caching and forwarding

Page 131: Wireless Sensor Network

131

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

* * DD is data centric, i.e., data generated by sensor nodes is NAMED by ATTRIBUTE-VALUE pairs. * A sensor node requests data by sending interests for named data. * Data matching the interest is then drawn down towards that node. * Intermediate sensor nodes can cache or transform data and may direct interests based on previously cached data.

Page 132: Wireless Sensor Network

132

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

* * An arbitrary sensor node (usually the SINK) uses attribute-value pairs (interests) for the data and queries the sensors in an on-demand basis. * In order to create a query, an interest is defined using a list of attribute-value pairs such as name of objects, interval, duration, geographical area, etc. * The sink queries the sensors in an on-demand basis using these pairs. * The sink broadcasts this interest to sensor nodes. * Each sensor node then stores this interest entry in its cache. * The interests in the caches are then used to compare the received data with the values in the interests.-

Page 133: Wireless Sensor Network

133

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

Example: * The users query is transformed into an interest that is diffused towards nodes in regions X or Y.

* When a node in that region receives an interest it activates its sensors which begin collecting information about pedestrians.

* When the sensors report the presence of pedestrians this returns along the reverse path of interest propagation.

* Intermediate nodes might aggregate the data, e.g., more accurately pinpoint the pedestrians location by combining reports from several sensors.

* An important feature of directed diffusion is that interest and data propagation and aggregation are determined by localized interactions (message changes between neighbors or nodes within some vicinity)

Page 134: Wireless Sensor Network

134

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

Data is named using attribute-value pairs, e.g.,Data is named using attribute-value pairs, e.g.,

Example: (Animal Tracking Task)Example: (Animal Tracking Task)

TypeType = four legged animal = four legged animal (detect animal location)(detect animal location)

IntervalInterval = 20 ms = 20 ms (send back events every 20 ms)(send back events every 20 ms)

DurationDuration = 10 seconds = 10 seconds (.. for the next 10 seconds)(.. for the next 10 seconds)

Rec Rec = [-100,100,200,00] = [-100,100,200,00] (from sensors within the rectangle)(from sensors within the rectangle)

The task description specifies an interest for data matching for The task description specifies an interest for data matching for attributesattributes

called INTEREST.called INTEREST.

Page 135: Wireless Sensor Network

135

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

The data sent in response to interests are also named similarly.The data sent in response to interests are also named similarly.

Example: Example:

Sensor detecting the animal generates the following data:Sensor detecting the animal generates the following data:

Type Type – four legged animal – four legged animal (type of animal seen)(type of animal seen)

InstanceInstance= elephant = elephant (instance of this type)(instance of this type)

LocatonLocaton = (125,220) = (125,220) (node location)(node location)

IntensityIntensity = 0.6 = 0.6 (signal amplitude measure)(signal amplitude measure)

ConfidenceConfidence = 085 = 085 (confidence in the match)(confidence in the match)

TimestampTimestamp= 01:20:40 = 01:20:40 (event generation time)(event generation time)

Page 136: Wireless Sensor Network

136

IFA’2004

Directed DiffusionDirected Diffusion

Interest PropagationInterest Propagation

SourceSource SinkSink

Gradient SetupGradient SetupData DeliveryData Delivery

Page 137: Wireless Sensor Network

137

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

INTERESTS and GRADIENTSINTERESTS and GRADIENTS

The named task description constitutes an INTEREST.The named task description constitutes an INTEREST.

An interest is injected into the network at some (arbitrary) node in the An interest is injected into the network at some (arbitrary) node in the network.network.

Suppose it is SINK.Suppose it is SINK.

INTERESTS are diffused through the sensor network.INTERESTS are diffused through the sensor network.

Example:Example:• A task with a specified A task with a specified typetype and and rectrect, a duration of 10 minutes and an , a duration of 10 minutes and an

interval of 10 ms is initiated by a sensor node in the network.interval of 10 ms is initiated by a sensor node in the network.

* The interval parameter specifies an event data rate.* The interval parameter specifies an event data rate.

* Here the specified data rate is 100 events per second.* Here the specified data rate is 100 events per second.

* The sink node records the task, the task state is purged from the node * The sink node records the task, the task state is purged from the node

after the time indicated by the duration attribute.after the time indicated by the duration attribute.

Page 138: Wireless Sensor Network

138

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

* For each active task, SINK periodically broadcasts an interest * For each active task, SINK periodically broadcasts an interest message message

to each of its neighbors.to each of its neighbors.

* This initial interest contains the specified* This initial interest contains the specified rect rect and and duration duration attributesattributes, ,

but contains a much larger interval attribute.but contains a much larger interval attribute.

• Every node maintains an interest cache. Every node maintains an interest cache.

* Each item in the cache corresponds to a distinct interest.* Each item in the cache corresponds to a distinct interest.

Page 139: Wireless Sensor Network

139

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSIONAn ENTRY in the interest cache has several fields:An ENTRY in the interest cache has several fields:

* A * A TIMESTAMP fieldTIMESTAMP field (timestamp of the last received matching (timestamp of the last received matching

interest) and several interest) and several GRADIENT fieldsGRADIENT fields up to one per neighbor. up to one per neighbor.

* A GRADIENT is a relay link to a neighbor from which the interest * A GRADIENT is a relay link to a neighbor from which the interest

was received.was received.

-* Each GRADIENT contains * Each GRADIENT contains - A data rate field A data rate field (requested by the specific neighbor)(requested by the specific neighbor)

A duration field A duration field (approximate lifetime of the interest)(approximate lifetime of the interest)

REMARK: Hence by utilizing interest and gradients, paths are REMARK: Hence by utilizing interest and gradients, paths are

established between sink and sources, i.e., sensors.established between sink and sources, i.e., sensors.

Page 140: Wireless Sensor Network

140

IFA’2004

DIRECTED DIFFUSIONDIRECTED DIFFUSION

When a node receives an interest it checks to see of the interest When a node receives an interest it checks to see of the interest existsexists

in the cache.in the cache.

If no matching exists, the node creates a new entry.If no matching exists, the node creates a new entry.

If there exists an entry, but no gradient for the sender of the interest,If there exists an entry, but no gradient for the sender of the interest,

the node adds a gradient with the specified value.the node adds a gradient with the specified value.

It also updates the entry’s timestamp and duration fields.It also updates the entry’s timestamp and duration fields.

Finally, if both an entry and gradient exist, the node simplyFinally, if both an entry and gradient exist, the node simply

updates the timestamp and duration fields.updates the timestamp and duration fields.

Page 141: Wireless Sensor Network

141

IFA’2004

Directed DiffusionDirected Diffusion

FeaturesFeatures

Sink sends interest, i.e., task descriptor, to all sensor nodes.Sink sends interest, i.e., task descriptor, to all sensor nodes. Interest is named by assigning attribute-value pairs.Interest is named by assigning attribute-value pairs.

sinksink

sourcesource

sinksink

sourcesource

sinksink

sourcesource

Interest PropagationInterest Propagation Gradient SetupGradient Setup Data DeliveryData Delivery

DrawbacksDrawbacks

Cannot change interest unless a new interest is broadcast.Cannot change interest unless a new interest is broadcast.

Page 142: Wireless Sensor Network

144

IFA’2004

LEACHLEACH

Low Energy Adaptive Clustering Hierarchy Low Energy Adaptive Clustering Hierarchy (LEACH)(LEACH)(W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient (W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,'' Communication Protocol for Wireless Microsensor Networks,'' IEEE IEEE Proceedings of the Hawaii International Conference on System SciencesProceedings of the Hawaii International Conference on System Sciences, pp. , pp. 1-10, January, 2000.)1-10, January, 2000.)

- * * LEACH is a clustering based protocol which minimizes LEACH is a clustering based protocol which minimizes energy dissipation energy dissipation

in sensor networks.in sensor networks.

Idea:Idea:

* Randomly select sensor nodes as cluster heads, so the * Randomly select sensor nodes as cluster heads, so the high energyhigh energy

dissipation in communicating with the base station is dissipation in communicating with the base station is spread to all sensor spread to all sensor

nodes in the sensor network. nodes in the sensor network.

* Forming clusters is based on the received signal * Forming clusters is based on the received signal strength.strength.

* Cluster heads can then be used kind of routers (relays) * Cluster heads can then be used kind of routers (relays) to the sink.to the sink.

-

Page 143: Wireless Sensor Network

145

IFA’2004

LEACHLEACH

Two Phases: Set-up Phase and Steady-PhaseTwo Phases: Set-up Phase and Steady-Phase In Set-up Phase: * Sensors may elect themselves to be a local cluster head at any time with a certain probability. (Reason: to balance the energy dissipation) * A sensor node chooses a random number between 0 and 1. * If this random number is less than the threshold T(n), the sensor node becomes a cluster-head. T(n) = P / {1 – P[r mod (1/P)]} if n is element of G

where P is the desired percentage to become a cluster head (e.g., 0.05) r is the current round G is the set of nodes that have not been a cluster head in the last 1/P rounds.* After the cluster heads are selected, the cluster heads advertise to all sensor nodes in the network that they are the new cluster heads.

- Each node accesses the network through the cluster head Each node accesses the network through the cluster head that requires that requires

minimum energy to reach.minimum energy to reach.

Page 144: Wireless Sensor Network

146

IFA’2004

Dynamic ClustersDynamic Clusters

Page 145: Wireless Sensor Network

147

IFA’2004

LEACHLEACH

Once the nodes receive the advertisement, they determine Once the nodes receive the advertisement, they determine the clusterthe cluster

that they want to belong based on the that they want to belong based on the signal strengthsignal strength of of the advertisement the advertisement

from the cluster heads to the sensor nodes.from the cluster heads to the sensor nodes.

The nodes inform the appropriate cluster heads that they The nodes inform the appropriate cluster heads that they will be a memberwill be a member

of the cluster.of the cluster.

Afterwards the cluster heads assign the time on which the Afterwards the cluster heads assign the time on which the sensor nodes can sensor nodes can

send data to them.send data to them.

Page 146: Wireless Sensor Network

148

IFA’2004

LEACHLEACH

STEADY STATE PHASE:STEADY STATE PHASE:

Sensors begin to sense and transmit data to the cluster Sensors begin to sense and transmit data to the cluster heads whichheads which

aggregate data from the nodes in their clusters.aggregate data from the nodes in their clusters.

After a certain period of time spent on the steady state,After a certain period of time spent on the steady state,

the network goes into start-up phase again and enters the network goes into start-up phase again and enters another round ofanother round of

selecting cluster heads.selecting cluster heads.

Page 147: Wireless Sensor Network

149

IFA’2004

LEACHLEACH

Optimum Number of Clusters ---????????

- too few: nodes far from cluster heads– too many: many nodes send data to SINK.

Page 148: Wireless Sensor Network

150

IFA’2004

LEACHLEACH

Achieves over a factor of 7 reduction in energy dissipation compared to direct communication.

The nodes die randomly and dynamic clustering increases lifetime of the system.

It is completely distributed and requires no global knowledge of the network.

It uses single hop routing where each node can transmit directly to the cluster head and the sink.

It is not applicable to networks deployed in large regions.

Furthermore, the idea of dynamic clustering brings extra overhead, e.g., head changes, advertisements etc. which may diminish the gain in energy consumption.

Page 149: Wireless Sensor Network

151

IFA’2004

Other ProtocolsOther Protocols

1. Energy Aware Routing R. Shah, J. Rabaey, “Energy Aware Routing for Low Energy Ad Hoc Sensor Networks,” IEEE WCNC’02, Orlando, March 2002.

2. Rumor Routing D. Braginsky, D. Estrin, “Rumor Routing Algorithm for Sensor Networks,” ACM WSNA’02, Atlanta, October 2002.

3. Threshold sensitive Energy Efficient sensor Network (TEEN) A. Manjeshwar, D.P. Agrawal, “TEEN: A Protocol for Enhanced Efficiency in Wireless Sensor Networks,” IEEE WCNC’02, Orlando, March 2002.

4. Constrained Anisotropic Diffusion Routing (CADR) M. Chu, H.Hausecker, F. Zhao, “Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks,” International Journal of High Performance Computing Applications, Vol. 16, No. 3, August 2002.

Page 150: Wireless Sensor Network

152

IFA’2004

Other ProtocolsOther Protocols

5. Power Efficient Gathering in Sensor Information Systems (PEGASIS) S. Lindsey, C.S. Raghavendra, “PEGASIS: Power Efficient Gathering in Sensor Information Systems,” IEEE Aerospace Conference, Montana, March 2002.

6. Self Organizing Protocol L. Subramanian, R.H. Katz, “An Architecture for Building Self Configurable Systems,” IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, Boston, August 2000.

7. Geographic Adaptive Fidelity (GAF) Y. Yu, J. Heideman, D. Estrin, “Geography-informed Energy Conservation for Ad Hoc Routing,” ACM MobiCom’01, Rome, July 2001.

Page 151: Wireless Sensor Network

153

IFA’2004

Open Research Open Research IssuesIssues

• Store and Forward Technique that combines data fusion and aggregation.

• Routing for Mobile Sensors Investigate multi-hop routing techniques for high mobility environments.

• Priority Routing Design routing techniques that allow different priority of data to be aggregated, fused, and relayed.

• 3D Routing

Page 152: Wireless Sensor Network

154

IFA’2004

TRANSPORT LAYERTRANSPORT LAYER(PRIOR KNOWLEDGE)(PRIOR KNOWLEDGE)

END TO END RELIABILITY END TO END RELIABILITY CONGESTION CONTROLCONGESTION CONTROL

TCP (Transmission Control Protocol)TCP (Transmission Control Protocol) for for Data TrafficData Traffic

UDP (User Datagram Protocol)UDP (User Datagram Protocol) for Real for Real Time TrafficTime Traffic

Page 153: Wireless Sensor Network

155

IFA’2004

Transport LayerTransport Layer

Internet, Internet, Satellite, Satellite, etcetc

SinkSink

SinkSink

UserUser

End-to-end End-to-end communication communication between a sensor between a sensor node and usernode and user

End to end reliable End to end reliable event transfer event transfer

Page 154: Wireless Sensor Network

156

IFA’2004

TRANSPORT LAYERTRANSPORT LAYERRelated WorkRelated Work

RMST (Reliable Multisegment Transport) RMST (Reliable Multisegment Transport) F. Stann and J. Heidemann, “RMST: Reliable Data Transport in Sensor Networks,” In Proc. IEEE SNPA’03, May 2003, Anchorage, Alaska, USA

RMST is a transport layer protocol for directed diffusion.RMST is a transport layer protocol for directed diffusion. RMST provides end-to-end data-packet transfer reliability.RMST provides end-to-end data-packet transfer reliability. RMST is a selective NACK-based protocol that can be RMST is a selective NACK-based protocol that can be configured for in-network caching and repair.configured for in-network caching and repair. There are two modes for RMST: There are two modes for RMST: Caching Mode and Non-Caching ModeCaching Mode and Non-Caching Mode.. CACHING MODE:CACHING MODE: A number of nodes along a reinforced path, A number of nodes along a reinforced path, (path being used to convey the data to the sink by directed(path being used to convey the data to the sink by directed diffusion), are assigned as RMST nodes.diffusion), are assigned as RMST nodes.

Page 155: Wireless Sensor Network

157

IFA’2004

Reliable Multi-Segment Reliable Multi-Segment Transport (RMST)Transport (RMST)

SinkSink

RMST NodeRMST NodeSource NodeSource Node

Each RMST node caches the Each RMST node caches the fragments identified by FragNo of a fragments identified by FragNo of a flow identified by RmstNo.flow identified by RmstNo. Watchdog timers are maintained Watchdog timers are maintained for each flow. When a fragment is for each flow. When a fragment is not received before the timer not received before the timer expires, a negative expires, a negative acknowledgement is sent backward acknowledgement is sent backward in the reinforced path.in the reinforced path. The first RMST node that has the The first RMST node that has the required fragment along the path required fragment along the path retransmitretransmitss the fragment. the fragment. Sink acts as the last RMST node. Sink acts as the last RMST node. In non-caching In non-caching mmode, sink is the ode, sink is the only RMST node.only RMST node. RMST relies on directed diffusion RMST relies on directed diffusion scheme for recovery from the failed scheme for recovery from the failed reinforced paths.reinforced paths.

Page 156: Wireless Sensor Network

158

IFA’2004

C. Y. Wan, A. T. Campbell and L. Krishnamurthy, “PSFQ: A Reliable Transport Protocol for Wireless C. Y. Wan, A. T. Campbell and L. Krishnamurthy, “PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks,” Sensor Networks,” In Proc. ACM WSNA’02In Proc. ACM WSNA’02, September 2002, Atlanta, GA, September 2002, Atlanta, GA

Related Work Related Work PSFQ - Pump Slowly Fetch PSFQ - Pump Slowly Fetch Quickly Quickly

– Slow injection of packets into the networkSlow injection of packets into the network– Aggressive hop-by-hop recovery in case of packet lossesAggressive hop-by-hop recovery in case of packet losses– ““PUMP” performs controlled flooding and requires each PUMP” performs controlled flooding and requires each

intermediate node to create and maintain a data cache intermediate node to create and maintain a data cache to be used for local loss recovery and in-sequence data to be used for local loss recovery and in-sequence data delivery.delivery.

– Applicable only to strict sensor-sensor guaranteed Applicable only to strict sensor-sensor guaranteed deliverydelivery

– And for control and management end-to-end reliability And for control and management end-to-end reliability for the downlink from sink to sensorsfor the downlink from sink to sensors

– Does not address congestion controlDoes not address congestion control

Page 157: Wireless Sensor Network

159

IFA’2004

Pump Slowly Fetch Quickly Pump Slowly Fetch Quickly (PSFQ)(PSFQ)

PSFQ comprises three functions: PSFQ comprises three functions: * * Message Relaying (PUMP operation), Message Relaying (PUMP operation), * Relay initiated error recovery (FETCH operation) and * Relay initiated error recovery (FETCH operation) and * Selective status reporting (REPORT operation).* Selective status reporting (REPORT operation). Every intermediate node maintains a data cache.Every intermediate node maintains a data cache. A node that receives a packet checks its content against its A node that receives a packet checks its content against its local local cache, and discards any duplicates.cache, and discards any duplicates. If the received packet is new, the TTL field in the packet is If the received packet is new, the TTL field in the packet is decremented.decremented. If the TTL field is higher than 0 after being decremented, and If the TTL field is higher than 0 after being decremented, and there there is no gap in the packet sequence numbers, the packet is is no gap in the packet sequence numbers, the packet is scheduled toscheduled to be forwarded. be forwarded. The packets are delayed for a random period between Tmin The packets are delayed for a random period between Tmin andand Tmax, and then relayed.Tmax, and then relayed. A node goes to FETCH mode once a sequence number gap is A node goes to FETCH mode once a sequence number gap is detected.detected. The node in FETCH mode requests a retransmission from The node in FETCH mode requests a retransmission from neighboringneighboring nodes.nodes.

Page 158: Wireless Sensor Network

160

IFA’2004

Related WorkRelated Work

Wireless TCP variants are NOT suitable for Wireless TCP variants are NOT suitable for sensor networkssensor networks– Different notion of end-to-end reliabilityDifferent notion of end-to-end reliability– Huge buffering requirementsHuge buffering requirements– ACKing is energy drainingACKing is energy draining

BOTTOMLINE:BOTTOMLINE: Traditional end-to-end Traditional end-to-end guaranteed reliability guaranteed reliability (TCP solutions)(TCP solutions) cannot be applied here.cannot be applied here.

New Reliability Notion is required!!!New Reliability Notion is required!!!

Page 159: Wireless Sensor Network

161

IFA’2004

Event Radius Sink

Sensor nodes

Event-to-Sink Reliability Event-to-Sink Reliability (ESRT) (ESRT) O. B. Akan, I. F. Akyildiz and Y. Sankarasubramaniam, O. B. Akan, I. F. Akyildiz and Y. Sankarasubramaniam, to appear in IEEE Transactions on Networking, Fall 2004.to appear in IEEE Transactions on Networking, Fall 2004.Also in Also in Proc. of ACM MobiHoc’03, Annapolis, Maryland, June Proc. of ACM MobiHoc’03, Annapolis, Maryland, June 20032003..

Sensor networks are Sensor networks are event-drivenevent-driven Multiple correlated data flows from event to Multiple correlated data flows from event to

sink sink GOAL:GOAL: To reliably detect/estimate event To reliably detect/estimate event

features based on the collective reports of features based on the collective reports of several sensor nodes observing the event.several sensor nodes observing the event.

Event-to-sink collective reliability notionEvent-to-sink collective reliability notion

Page 160: Wireless Sensor Network

162

IFA’2004

Event-to-Sink Reliable Transport Event-to-Sink Reliable Transport (ESRT)(ESRT)

ESRT is the first scheme that focuses on the end-to-end ESRT is the first scheme that focuses on the end-to-end reliable event transfer.reliable event transfer. The end-to-end event transfer reliability is controlled The end-to-end event transfer reliability is controlled based on the reporting frequencies of sensor nodes.based on the reporting frequencies of sensor nodes.

SinkSink

aa

bb

cc

dd

Page 161: Wireless Sensor Network

163

IFA’2004

End-to-end Reliable Event End-to-end Reliable Event TransferTransfer

SinkSink

rr

aa

bb

cc

dd

rr

event regionevent region

sensor coveragesensor coverage

sensor rangesensor range

Page 162: Wireless Sensor Network

164

IFA’2004

Event-to-Sink Event-to-Sink ReliabilityReliability

Sink decides about event features every Sink decides about event features every time units (decision intervals) time units (decision intervals) DEFINITION 1: Observed Event Reliability DEFINITION 1: Observed Event Reliability

rrii is the number of data packets received in decision interval is the number of data packets received in decision interval i i at sinkat sink DEFINITION 2: Desired Event ReliabilityDEFINITION 2: Desired Event Reliability RR is the number of packets required for reliable event detection is the number of packets required for reliable event detection (a(application specific and is known a-priori at pplication specific and is known a-priori at

the sink)the sink)

((If If rrii > > R, then the event is reliably detected. Else, appropriate R, then the event is reliably detected. Else, appropriate actions must be taken to achieve R.)actions must be taken to achieve R.) DEFINITION 3: Reporting Rate DEFINITION 3: Reporting Rate ff is the frequency of packet transmissions at a source node is the frequency of packet transmissions at a source node

TRANSPORT PROBLEM IN SENSOR NETWORKS:TRANSPORT PROBLEM IN SENSOR NETWORKS: To configure the reporting rate, f, of source nodes so as to achieve the required event detection reliability, R, at To configure the reporting rate, f, of source nodes so as to achieve the required event detection reliability, R, at

the sink with minimum resource utilization.the sink with minimum resource utilization.

Page 163: Wireless Sensor Network

165

IFA’2004

r vs f relationshipr vs f relationship

rr shows initial linear increase with shows initial linear increase with ff until until f = ff = fmaxmax

For For f > ff > fmaxmax , , rr drops due to congestion because the drops due to congestion because the network is unable to handle the network is unable to handle the increased injection of data packets increased injection of data packets

This behavior is independent of the number of nodes This behavior is independent of the number of nodes nn ffmaxmax decreases with increasing decreases with increasing nn (congestion occurs at lower reporting frequencies (congestion occurs at lower reporting frequencies

with greater number of source nodes n)with greater number of source nodes n)

Page 164: Wireless Sensor Network

166

IFA’2004

ESRT: Event-to-Sink ESRT: Event-to-Sink Reliable TransportReliable Transport

OBJECTIVE: OBJECTIVE: Achieve reliable event detection with minimum Achieve reliable event detection with minimum

energy expenditure and congestion resolution.energy expenditure and congestion resolution. SALIENT FEATURES:SALIENT FEATURES:

– Self-configurationSelf-configuration – Adapts to random, dynamic – Adapts to random, dynamic network topologynetwork topology

– Collective identification Collective identification – Does not require – Does not require individual node IDsindividual node IDs

– Biased implementation Biased implementation – Graceful transfer of – Graceful transfer of complexity to the sink complexity to the sink

Sensor nodes need only two additional functionsSensor nodes need only two additional functions– Implement a congestion detection mechanismImplement a congestion detection mechanism– Listen to sink broadcasts for frequency updatesListen to sink broadcasts for frequency updates

Page 165: Wireless Sensor Network

167

IFA’2004

f

ESRT: Protocol ESRT: Protocol OverviewOverview

Determine reporting frequency Determine reporting frequency ff to achieve to achieve desired reliability desired reliability RR with minimum resource with minimum resource utilizationutilization

Source (Sensor nodes): Source (Sensor nodes): – Send data with reporting frequency Send data with reporting frequency f f – Monitor buffer level and notify congestion to the sinkMonitor buffer level and notify congestion to the sink

Sink: Sink: – Measures the Measures the observed event reliabilityobserved event reliability rrii at the end of at the end of

decision interval decision interval ii – Normalized reliability Normalized reliability i i == rri i / R/ R – Performs congestion decision based on the feedback Performs congestion decision based on the feedback

from the sources nodes (to determine from the sources nodes (to determine f f >><< f fmaxmax). ).

– Update Update f f based on based on ii and and f f >><< f fmaxmax (congestion) to achieve (congestion) to achieve

desired event reliabilitydesired event reliability RR

Page 166: Wireless Sensor Network

168

IFA’2004

StateState DescriptionDescription ConditionCondition

(NC,LR)(NC,LR) (No congestion, Low reliability)(No congestion, Low reliability) f < ff < fmaxmax and and < 1 - < 1 -

(NC,HR)(NC,HR) (No congestion, High (No congestion, High reliability)reliability)

f f f fmaxmax and and > 1+ > 1+

(C,HR)(C,HR) (Congestion, High reliability)(Congestion, High reliability) f < ff < fmaxmax and and > 1 > 1

(C,LR)(C,LR) (Congestion, Low reliability)(Congestion, Low reliability) f < ff < fmaxmax and and 1 1

OOROOR Optimal Operating RegionOptimal Operating Region f < ff < fmaxmax and and [[1- 1- , 1+ , 1+ ]]

ESRT: Network ESRT: Network StatesStates

Page 167: Wireless Sensor Network

169

IFA’2004

ESRT: ESRT: Congestion Detection MechanismCongestion Detection Mechanism

ACK/NACK not suitableACK/NACK not suitable We use local buffer level monitoring in We use local buffer level monitoring in

sensor nodes sensor nodes

Mark Congestion Notification (CN ) field in packet if congested, i.e., bk + b > B (the node infers that it will experience congestion in the next reporting interval)

bk bk-1

b

B

f

Event

IDCNCN

(1 bit)Destinatio

n

Time

Stamp Payload FEC

bk : Buffer fullness level at the end of reporting interval k

b : Buffer length increment

B : Buffer size

f : reporting frequency

Page 168: Wireless Sensor Network

170

IFA’2004

StateState Frequency UpdateFrequency Update CommentsComments

(NC,LR)(NC,LR) ffi+1i+1 = f = fi i / / iiMultiplicative increase, achieve desired Multiplicative increase, achieve desired reliability asapreliability asap

(NC,HR)(NC,HR) ffi+1i+1 = f = fi i ((i i + 1) / 2+ 1) / 2iiConservative decrease, no compromise on Conservative decrease, no compromise on reliabilityreliability

(C,HR)(C,HR) ffi+1i+1 = f = fi i / / iiAggressive decrease to state (NC,HR)Aggressive decrease to state (NC,HR)

(C,LR)(C,LR) ffi+1i+1 = f = fi i ii

Exponential decrease, relieve congestion asapExponential decrease, relieve congestion asap

OOROOR ffi+1i+1 = f = fiiUnchangedUnchanged

ESRT: Frequency ESRT: Frequency UpdateUpdate

Page 169: Wireless Sensor Network

171

IFA’2004

S0 = (NC,LR) S0 = (NC,HR)

ESRT PerformanceESRT Performance

Page 170: Wireless Sensor Network

172

IFA’2004

S0 = (C,HR) S0 = (C,LR)

ESRT PerformanceESRT Performance

Page 171: Wireless Sensor Network

173

IFA’2004

ConclusionsConclusions

Sensor network paradigm necessitates the Sensor network paradigm necessitates the notion of notion of event-to-sink reliabilityevent-to-sink reliability

Existing end-to-end guaranteed reliability Existing end-to-end guaranteed reliability solutions lead to over-utilization of scarce solutions lead to over-utilization of scarce sensor resourcessensor resources

ESRT is a novel solution propose exclusively for ESRT is a novel solution propose exclusively for reliable event transport in sensor networksreliable event transport in sensor networks– Tailored for sensor environments Tailored for sensor environments – Biased implementationBiased implementation– Energy conservationEnergy conservation– Collective identification, self-configurationCollective identification, self-configuration– ESRT can also address concurrent multiple ESRT can also address concurrent multiple

eventsevents

Page 172: Wireless Sensor Network

174

IFA’2004

Open Research Open Research IssuesIssues

Extend Extend ESRTESRT to address reliable transport of to address reliable transport of concurrent multiple events concurrent multiple events in the sensor field.in the sensor field.

Explore possible other Explore possible other reliability metricsreliability metrics– Total expected mean square distortionTotal expected mean square distortion– Minimum mean squared error estimationMinimum mean squared error estimation

Develop unified transport layer protocols for Develop unified transport layer protocols for sink-to-sensorssink-to-sensors and and bi-directional bi-directional reliable reliable transport in WSNtransport in WSN

Research to Research to integrate WSN domain into NGWI integrate WSN domain into NGWI (Next Generation Wireless Internet)(Next Generation Wireless Internet)– Adaptive Transport Protocols for WSN-Ad Hoc Adaptive Transport Protocols for WSN-Ad Hoc

environmentsenvironments

Page 173: Wireless Sensor Network

175

IFA’2004

Medium Access Control Medium Access Control (MAC)(MAC)

Multiple users need to access the limited available communication resources.

MAC aims at providing fair and efficient resource access

Page 174: Wireless Sensor Network

176

IFA’2004

Medium Access Control Medium Access Control (MAC)(MAC)(Prior Knowledge)(Prior Knowledge)

ALOHAALOHA Slotted ALOHASlotted ALOHA Reserved ALOHAReserved ALOHA CSMA (nonpersistant, p-persistant,1-CSMA (nonpersistant, p-persistant,1-persistant)persistant) TDMATDMA FDMAFDMA CDMACDMA

Page 175: Wireless Sensor Network

177

IFA’2004

AlohaAloha

Slotted AlohaSlotted Aloha

Aloha/Slotted AlohaAloha/Slotted Aloha

sender A

sender B

sender C

collision

sender A

sender B

sender C

collision

t

t

Page 176: Wireless Sensor Network

178

IFA’2004

User 1

User 2

User n

…Time

Frequency

FDMA (Frequency FDMA (Frequency Division Multiple Access)Division Multiple Access)

Page 177: Wireless Sensor Network

179

IFA’2004

1 2 3 … nFrequency

Total bandwidth

4

FDMA Bandwidth FDMA Bandwidth StructureStructure

Page 178: Wireless Sensor Network

180

IFA’2004

Frequency 1 User 1

Frequency 2 User 2

Frequency n User n

Base Station

… …

Mobile Stations

FDMA Channel FDMA Channel AllocationAllocation

Page 179: Wireless Sensor Network

181

IFA’2004

Use

r 1

Use

r 2

Use

r n

Time

Frequency

TDMA (Time Division TDMA (Time Division Multiple Access)Multiple Access)

Page 180: Wireless Sensor Network

182

IFA’2004

1 2 3 … nTime

Frame

4

TDMA Frame TDMA Frame StructureStructure

Page 181: Wireless Sensor Network

183

IFA’2004

Time 1

Time 2

Time n……

Base Station

User 1

User 2

User n

Mobile Stations

TDMA Frame TDMA Frame AllocationAllocation

Page 182: Wireless Sensor Network

184

IFA’2004U

ser

1

Time

Frequency

Use

r 2

Use

r n

Code

...

CDMA (Code Division CDMA (Code Division Multiple Access )Multiple Access )

Page 183: Wireless Sensor Network

185

IFA’2004

Medium Access Control Medium Access Control (MAC)(MAC)

Existing MAC protocols cannot be used for sensorExisting MAC protocols cannot be used for sensor

networks because sensor MACs must have inbuilt networks because sensor MACs must have inbuilt

Power management, mobility management and Power management, mobility management and

failure recovery strategies failure recovery strategies

Page 184: Wireless Sensor Network

186

IFA’2004

Medium Access Control Medium Access Control (MAC)(MAC)for Sensor Networksfor Sensor Networks

Self-Organizing Medium Access Control for Sensor Self-Organizing Medium Access Control for Sensor

Networks (SMACS) and Eavesdrop and Register Networks (SMACS) and Eavesdrop and Register (EAR)(EAR) Hybrid TDMA-FDMAHybrid TDMA-FDMA CSMA basedCSMA based

Page 185: Wireless Sensor Network

187

IFA’2004

Medium Access Control Medium Access Control (MAC)(MAC) SMACS and EARSMACS and EAR

Available bandwidth is far greater than the maximum data rate Available bandwidth is far greater than the maximum data rate of sensorsof sensors

Neighbor discovery and channel assignment combinedNeighbor discovery and channel assignment combined Random wake up during the connection phaseRandom wake up during the connection phase In EAR mobile nodes are given full control of the connection In EAR mobile nodes are given full control of the connection processprocess

Mobile nodes keep a record of neighbor nodesMobile nodes keep a record of neighbor nodes

EAR is transparent to SMACSEAR is transparent to SMACS

ShortcomingsShortcomings

Nodes belonging to different subnets might not be able to Nodes belonging to different subnets might not be able to connect connect A mainly static network is assumedA mainly static network is assumed

W. Ye, J. Heidemann and D. Estrin, “An Energy Efficient MAC W. Ye, J. Heidemann and D. Estrin, “An Energy Efficient MAC Protocol for Wireless Sensor Networks,” Protocol for Wireless Sensor Networks,” In Proc. ACM MOBICOM In Proc. ACM MOBICOM ’01, ’01, pp. 221–235, Rome, Italy 2001pp. 221–235, Rome, Italy 2001

Page 186: Wireless Sensor Network

188

IFA’2004

CSMA BasedCSMA Based

Traffic in sensor networks is highly correlated, Traffic in sensor networks is highly correlated, dominantly periodic, variable.dominantly periodic, variable.

Constant listening times are energy efficientConstant listening times are energy efficient Random delay avoids repeated collisions Random delay avoids repeated collisions

Not suitable for delay-sensitive applicationsNot suitable for delay-sensitive applications Under higher load, RTS/CTS involves Under higher load, RTS/CTS involves considerable considerable messaging overheadmessaging overhead

Page 187: Wireless Sensor Network

189

IFA’2004

Motivation for Our Motivation for Our WorkWork

WSN are characterized by dense deployment of sensor WSN are characterized by dense deployment of sensor nodesnodes

MAC Layer ChallengesMAC Layer Challenges– Limited power resourcesLimited power resources– Need for a self-configurable, distributed protocolNeed for a self-configurable, distributed protocol– Data centric approach rather than per-node fairnessData centric approach rather than per-node fairness

Exploit Exploit spatial correlationspatial correlation to to reduce transmissions in MAC reduce transmissions in MAC layer !layer !

Page 188: Wireless Sensor Network

190

IFA’2004

Collaborative Medium Access Based on Spatial Correlation in Sensor Networks M. C. Vuran and I. F. Akyildiz, December 2003.M. C. Vuran and I. F. Akyildiz, December 2003.

Nodes Nodes nnii observe variables observe variables XXi i ,, i=1,2,3,4,5i=1,2,3,4,5

Minimum of 5 transmissions are requiredMinimum of 5 transmissions are required Due to correlation, assume Due to correlation, assume XX11=X=X22 and X and X33=X=X44

Only 3 transmissions needed!Only 3 transmissions needed! Regulate medium access to decrease number of Regulate medium access to decrease number of

transmissions!transmissions!

1 2 3 4

5

S

Page 189: Wireless Sensor Network

191

IFA’2004

DefinitionsDefinitions

Correlation region Correlation region of node of node nnii

– Region of radius Region of radius r r centered around nodecentered around node n nii

Correlation neighborsCorrelation neighbors of node of node nnii

– Nodes inside the correlation region of node Nodes inside the correlation region of node nnii

Page 190: Wireless Sensor Network

192

IFA’2004

Collaborative MAC Collaborative MAC ProtocolProtocol

If a node If a node nnii transmits data then transmits data then all its correlation neighbors all its correlation neighbors have redundant informationhave redundant information

Route-thru data has higher Route-thru data has higher priority over generated datapriority over generated data

Filter outFilter out transmission of transmission of redundant data and redundant data and prioritizeprioritize filtered data through the network!filtered data through the network!

Page 191: Wireless Sensor Network

193

IFA’2004

Collaborative MAC Collaborative MAC ProtocolProtocol

Two reasons for medium Two reasons for medium access;access;

Source function: Source function: Transmit event Transmit event

informationinformation Router function: Router function: Forward packets from Forward packets from

other nodes in the multi-other nodes in the multi-hop path to the sinkhop path to the sink

Two componentsTwo components– Event MAC (E-MAC)Event MAC (E-MAC)– Network MAC (N-MAC)Network MAC (N-MAC)

Page 192: Wireless Sensor Network

194

IFA’2004

Event MAC (E-MAC)Event MAC (E-MAC)

Aims to filter out correlated sensor Aims to filter out correlated sensor recordsrecords

First Contention Phase (FCS)First Contention Phase (FCS)– Nodes contend using IEEE 802.11 Nodes contend using IEEE 802.11

structure for the first timestructure for the first time After a node After a node nnii captures the channel all captures the channel all

the correlation neighbors of the correlation neighbors of nnii – Drop their packetsDrop their packets– Enter Enter Suspicious Sleep State (SSS)Suspicious Sleep State (SSS)

Nodes enter FCS after a period of time to Nodes enter FCS after a period of time to maintain equal load-sharingmaintain equal load-sharing

Page 193: Wireless Sensor Network

195

IFA’2004

Network MAC (N-Network MAC (N-MAC)MAC)

Since correlation is filtered out by Since correlation is filtered out by E-MAC, route-thru packet has E-MAC, route-thru packet has higher priorityhigher priority

N-MAC prioritizes these packets N-MAC prioritizes these packets during medium access usingduring medium access using– Smaller backoff window sizeSmaller backoff window size– PIFS (<SIFS) during contentionPIFS (<SIFS) during contention

Page 194: Wireless Sensor Network

196

IFA’2004

PerformancePerformance

Both energy consumption and latency Both energy consumption and latency decreases when spatial correlation is exploiteddecreases when spatial correlation is exploited

Page 195: Wireless Sensor Network

197

IFA’2004

ConclusionsConclusions

Spatial correlation in sensor networks is exploited in Spatial correlation in sensor networks is exploited in the MAC layerthe MAC layer

MAC protocol collaboratively regulates medium access MAC protocol collaboratively regulates medium access such that redundant transmissions is suppressedsuch that redundant transmissions is suppressed

Event MAC (E-MAC)Event MAC (E-MAC) filters out correlation whereas filters out correlation whereas Network MAC (N-MAC) Network MAC (N-MAC) prioritizes the route-thru packetsprioritizes the route-thru packets

Number of transmissions are reduced instead of Number of transmissions are reduced instead of number of transmitted bitsnumber of transmitted bits

Collaborative Medium Access achieves low energy Collaborative Medium Access achieves low energy consumption as well as improving event detection consumption as well as improving event detection latencylatency

Page 196: Wireless Sensor Network

198

IFA’2004

MEDIUM ACCESS CONTROL MEDIUM ACCESS CONTROL (MAC) (MAC) FURTHER RESEARCH NEEDSFURTHER RESEARCH NEEDS

MAC for sensor networks must have inbuilt MAC for sensor networks must have inbuilt power power

management, mobility management and failure management, mobility management and failure recovery recovery

strategiesstrategies Need for a self-configurable, distributed Need for a self-configurable, distributed protocolsprotocols Data centric approach rather than per-node Data centric approach rather than per-node fairnessfairness Develop MACs which differentiate Multimedia Develop MACs which differentiate Multimedia TrafficTraffic

Exploit Exploit Spatial & Temporal CorrelationSpatial & Temporal Correlation

Page 197: Wireless Sensor Network

199

IFA’2004

Some sensor network applications like mobile Some sensor network applications like mobile trackingtracking require high data precisionrequire high data precision

Coding gain is generally expressed in terms of the Coding gain is generally expressed in terms of the additionaladditional transmit power needed to obtain the same BER transmit power needed to obtain the same BER without codingwithout coding

FEC is preferred over ARQFEC is preferred over ARQ

Since power consumption is crucial, we must take Since power consumption is crucial, we must take intointo account encoding and decoding energy account encoding and decoding energy expendituresexpenditures

Coding is profitable only if the encoding and decodingCoding is profitable only if the encoding and decoding power consumption is less than the coding gain.power consumption is less than the coding gain.

Error ControlError Control

Page 198: Wireless Sensor Network

200

IFA’2004

ERROR CONTROL ERROR CONTROL RESEARCH NEEDSRESEARCH NEEDS

Design of suitable FEC codes with minimal Design of suitable FEC codes with minimal encoding encoding and relatively higher decoding complexitiesand relatively higher decoding complexities

Feasibility of ARQ schemes in multihop sensor Feasibility of ARQ schemes in multihop sensor networks networks (hop by hop ARQ instead of end-to-end). This is (hop by hop ARQ instead of end-to-end). This is needed for needed for reliable communications (data critical)reliable communications (data critical)

Adaptive/Hybrid FEC/ARQ schemes Adaptive/Hybrid FEC/ARQ schemes

Extension to Rayleigh/Rician fading conditions Extension to Rayleigh/Rician fading conditions with mobilewith mobile nodesnodes

Page 199: Wireless Sensor Network

201

IFA’2004

Optimal Packet Size for Wireless Optimal Packet Size for Wireless Sensor NetworksSensor Networks

Y. Sankarasubramaniam, I. F. Akyildiz, S. McLaughlin, Y. Sankarasubramaniam, I. F. Akyildiz, S. McLaughlin, ”Optimal ”Optimal Packet Size Packet Size

for Wireless Sensor Networks”, IEEE SNPA, May 2003.for Wireless Sensor Networks”, IEEE SNPA, May 2003.

Determining the optimal packet size for sensor networks is necessary to Determining the optimal packet size for sensor networks is necessary to operate at high operate at high energy efficienciesenergy efficiencies..

The The multihop wireless channelmultihop wireless channel and and energy consumption characteristicsenergy consumption characteristics are the two most are the two most important factors that influence choice of packet size. important factors that influence choice of packet size.

Payload (Payload (<=73<=73))Header (Header (22)) Trailer (FEC) (Trailer (FEC) (>=3>=3))

Page 200: Wireless Sensor Network

202

IFA’2004

PHYSICAL LAYERPHYSICAL LAYER

New Channel Models (I/O/Underwater/Deep New Channel Models (I/O/Underwater/Deep Space) Space)

Explore Antennae Techniques Explore Antennae Techniques

(e.g., Smart Antennaes)(e.g., Smart Antennaes)

Software Radios??Software Radios??

New Modulation SchemesNew Modulation Schemes

SYNCH SchemesSYNCH Schemes

FEC Schemes on the Bit LevelFEC Schemes on the Bit Level

New Data EncryptionNew Data Encryption

Investigate UWB Investigate UWB

Page 201: Wireless Sensor Network

203

IFA’2004

FINAL REMARKSFINAL REMARKS

Page 202: Wireless Sensor Network

204

IFA’2004

Basic Research Basic Research NeedsNeeds

• An Analytical Framework for Sensor Networks Find a Basic Generic Architecture and Protocol Development which can be tailored to specific applications. • More theoretical investigations of the Architecture and Protocol developments

• Network Configuration and Planning Schemes

Page 203: Wireless Sensor Network

205

IFA’2004

FURTHER OPEN RESEARCH FURTHER OPEN RESEARCH ISSUESISSUES

Research to Research to integrate WSN domain into NGWI integrate WSN domain into NGWI (Next Generation Wireless Internet)(Next Generation Wireless Internet)

e.g., interactions of Sensor and AdHoc e.g., interactions of Sensor and AdHoc Networks or Sensor and Satellite or any other Networks or Sensor and Satellite or any other combinations…combinations…

Explore the SENSOR/ACTOR NETWORKSExplore the SENSOR/ACTOR NETWORKS

Explore the SENSOR-ANTISENSOR NETWORKSExplore the SENSOR-ANTISENSOR NETWORKS

SECURITY ISSUESSECURITY ISSUES

Page 204: Wireless Sensor Network

206

IFA’2004

Some ApplicationsSome Applications

• Clear Demonstration of Testbeds and Realistic Applications

• Not only data or audio but also video as well as integrated traffic.

SOME OF OUR EFFORTS IN BWN LAB @ GaTech

• MAN for Meteorological Observations• SpINet for Mars Surface• Airport Security Sensors/Actors• Sensor Wars• Wide Area Multi-campus Sensor Network

Page 205: Wireless Sensor Network

207

IFA’2004

FURTHER CHALLENGESFURTHER CHALLENGESProtocol StackProtocol Stack

• Follow the TCP/IP Stack, i.e., keep the Strict Layer Approach ??? • Or Interleave the Layer functionalities???

• Cross Layer Optimization

• Standardization???

Page 206: Wireless Sensor Network

208

IFA’2004

Commercial Commercial Viability of WSN Viability of WSN ApplicationsApplications

Within the next few years, distributed sensing and Within the next few years, distributed sensing and computing will be everywhere, i.e., homes, offices, computing will be everywhere, i.e., homes, offices, factories, automobiles, shopping centers, super-factories, automobiles, shopping centers, super-markets, farms, forests, rivers and lakes. markets, farms, forests, rivers and lakes.

Some of the immediate commercial applications of Some of the immediate commercial applications of wireless sensor networks are wireless sensor networks are – Industrial automation (Industrial automation (process controlprocess control))– Defense (Defense (unattended sensors, real-time unattended sensors, real-time

monitoringmonitoring))– Utilities (Utilities (automated meter readingautomated meter reading), ), – Weather predictionWeather prediction– Security (Security (environment, building etc.environment, building etc.))– Building automation (Building automation (HVAC controllersHVAC controllers). ). – Disaster relief operationsDisaster relief operations– Medical and health monitoring and instrumentationMedical and health monitoring and instrumentation

Page 207: Wireless Sensor Network

209

IFA’2004

Commercial Commercial Viability of WSN Viability of WSN ApplicationsApplications

XSILOGY SolutionsXSILOGY Solutions is a company which provides wireless sensor is a company which provides wireless sensor network solutions for various commercial applications such as tank network solutions for various commercial applications such as tank inventory management, stream distribution systems, commercial inventory management, stream distribution systems, commercial buildings, environmental monitoring, homeland defense etc. buildings, environmental monitoring, homeland defense etc. http://www.xsilogy.com/home/main/index.htmlhttp://www.xsilogy.com/home/main/index.html

In-Q-TelIn-Q-Tel provides distributed data collection solutions with sensor provides distributed data collection solutions with sensor network deployment. network deployment. http://www.in-q-tel.com/tech/dd.htmlhttp://www.in-q-tel.com/tech/dd.html

ENSCO Inc.ENSCO Inc. invests in wireless sensor networks for meteorological invests in wireless sensor networks for meteorological applications. applications. http://www.ensco.com/products/homeland/msis/msis_rnd.htmhttp://www.ensco.com/products/homeland/msis/msis_rnd.htm

EMBEREMBER provides wireless sensor network solutions for industrial provides wireless sensor network solutions for industrial automation, defense, and building automation. automation, defense, and building automation. http://www.ember.comhttp://www.ember.com

Page 208: Wireless Sensor Network

210

IFA’2004

Commercial Commercial Viability of WSN Viability of WSN ApplicationsApplications

H900 Wireless SensorNet System(TM)H900 Wireless SensorNet System(TM), the first commercially , the first commercially available end-to-end, low-power, bi-directional, wireless mesh available end-to-end, low-power, bi-directional, wireless mesh networking system for commercial sensors and controls is networking system for commercial sensors and controls is developed by the company called developed by the company called Sensicast SystemsSensicast Systems. The . The company targets wide range of commercial applications from company targets wide range of commercial applications from energy to homeland security. energy to homeland security. http://www.sensicast.comhttp://www.sensicast.com

The Sensor-based Perimeter SecurityThe Sensor-based Perimeter Security product is introduced by a product is introduced by a company called company called SOFLINX Corp.SOFLINX Corp. (a wireless sensor network (a wireless sensor network software company) software company) http://www.soflinx.comhttp://www.soflinx.com

XYZ On A Chip: Integrated Wireless Sensor Networks for the XYZ On A Chip: Integrated Wireless Sensor Networks for the Control of the Indoor Environment In BuildingsControl of the Indoor Environment In Buildings is another is another commercial application project currently performed by Berkeley. commercial application project currently performed by Berkeley. http://www.cbe.berkeley.edu/research/briefs-wirelessxyz.htmhttp://www.cbe.berkeley.edu/research/briefs-wirelessxyz.htm

Page 209: Wireless Sensor Network

211

IFA’2004

Commercial Commercial Viability of WSN Viability of WSN ApplicationsApplications

The CrossbowThe Crossbow wireless sensor products and its environmental wireless sensor products and its environmental monitoring and other related industrial applications of such as monitoring and other related industrial applications of such as surveillance, bridges, structures, air quality/food quality, surveillance, bridges, structures, air quality/food quality, industrial automation, process control are introduced. industrial automation, process control are introduced. http://www.xbow.comhttp://www.xbow.com

Japan's Omron CorpJapan's Omron Corp has two wireless sensor projects in the US has two wireless sensor projects in the US that it hopes to commercialize in the near future. that it hopes to commercialize in the near future. Omron's Omron's Hagoromo Wireless Web Sensor projectHagoromo Wireless Web Sensor project consists of wireless consists of wireless nodes equipped with various sensing abilities for providing nodes equipped with various sensing abilities for providing security for major cargo-shipping ports around the world. security for major cargo-shipping ports around the world. http://www.omron.comhttp://www.omron.com

Possible business opportunity with a big home improvement Possible business opportunity with a big home improvement store chain, Home Depot, with Intel and Berkeley using wireless store chain, Home Depot, with Intel and Berkeley using wireless sensor networkssensor networkshttp://www.svbizink.com/otherfeatures/spotlight.asp?iid=314http://www.svbizink.com/otherfeatures/spotlight.asp?iid=314

Page 210: Wireless Sensor Network

212

IFA’2004

Commercial Commercial Viability of WSN Viability of WSN ApplicationsApplications

Millennial NetMillennial Net builds wireless networks combining sensor builds wireless networks combining sensor interface endpoints and routers with gateways for industrial interface endpoints and routers with gateways for industrial and building automation, security, and telemetryand building automation, security, and telemetryhttp://www.millennial.nethttp://www.millennial.net

CSEMCSEM provides sensing and actuation solutions provides sensing and actuation solutions http://www.csem.ch/fs/acuating.htmhttp://www.csem.ch/fs/acuating.htm

Dust Inc.Dust Inc. develops the next-generation hardware and software develops the next-generation hardware and software for wireless sensor networks for wireless sensor networks http://www.dust-inc.comhttp://www.dust-inc.com

Integration AssociatesIntegration Associates designs sensors used in medical, designs sensors used in medical, automotive, industrial, and military applications to cost-automotive, industrial, and military applications to cost-effective designs for handheld consumer appliances, barcode effective designs for handheld consumer appliances, barcode readers, and wireless computer input devices readers, and wireless computer input devices http://www.integration.comhttp://www.integration.com

Page 211: Wireless Sensor Network

213

IFA’2004

Commercial Commercial Viability of WSN Viability of WSN ApplicationsApplications

MelexisMelexis produces advanced integrated semiconductors, produces advanced integrated semiconductors, sensor ICs, and programmable sensor IC systems. sensor ICs, and programmable sensor IC systems. http://www.melexis.comhttp://www.melexis.com

ZMDZMD designs, manufactures and markets high performance, designs, manufactures and markets high performance, low power mixed signal ASIC and ASSP solutions for low power mixed signal ASIC and ASSP solutions for wireless and sensor integrated circuits.wireless and sensor integrated circuits.http://www.zmd.bizhttp://www.zmd.biz

ChipconChipcon produces low-cost and low-power single-chip 2.4 produces low-cost and low-power single-chip 2.4 GHz ISM band transceiver design for sensors. GHz ISM band transceiver design for sensors. http://www.chipcon.comhttp://www.chipcon.com

ZigBee AllianceZigBee Alliance develops a standard for wireless low-power, develops a standard for wireless low-power, low-rate devices. low-rate devices. http://www.zigbee.comhttp://www.zigbee.com