Introduction to Sensor Networks

108
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University http://rabieramadan.org [email protected] 2

description

Introduction to Sensor Networks. Rabie A. Ramadan, PhD Cairo University http://rabieramadan.org [email protected] 2. Do not think how hard the problem you are solving Just, “keep your eyes on the prize”. Hardware Platforms. Augmented General Purpose PCs - PowerPoint PPT Presentation

Transcript of Introduction to Sensor Networks

Page 1: Introduction to Sensor Networks

Introduction to Sensor Networks

Rabie A. Ramadan, PhDCairo University

http://rabieramadan.org

[email protected]

2

Page 2: Introduction to Sensor Networks

Do not think how hard the problem you are solving Just,

“keep your eyes on the prize”

2

Page 3: Introduction to Sensor Networks

Hardware Platforms

Augmented General Purpose PCs• Embedded PCs (PC104), PDAs, etc..

• Usually have O.S like Linux and wireless device such as Bluetooth.

Dedicated Sensor Nodes • Commercially off the shelf components (e.g.

Berkeley Motes)

System-on-chip Sensor• Platform like Smart dust, PicoNode

3

Page 4: Introduction to Sensor Networks

Software Platforms Operating Systems and Language Platforms Typical Platforms are:

• TinyOS, nesC, TinyGALS, and Mote’ TinyOS

• Event Driven O.S.

• Requires 178 bytes of memory

• Supports Multitasking and code Modularity

• Has no file system – only static memory allocation

• Simple task scheduler nesC – extension of C language for TinyOS- set of language constructs TinyGALS - language for TinyOS for event triggered concurrent execution . Mote’ - Virtual machine for Berkeley Mote

4

Page 5: Introduction to Sensor Networks

Wireless Sensor Network Standards IEEE 802.15.4 Standard

• Specifies the physical and MAC Layers for low-rate WPANs

• Data rates of 250 kbps, 40 kbps, and 20 kbps.

• Two addressing modes: 16 - bit short and 64 - bit IEEE addressing.

• Support for critical latency devices, for example, joysticks.

• The CSMA - CA channel access.

• Fully handshaking protocol for transfer reliability.

• Power management to ensure low - power consumption.

5

Page 6: Introduction to Sensor Networks

6

CSMA-CA Protocol How it works?

Page 7: Introduction to Sensor Networks

Wireless Sensor Network Standards

IEEE 802.15.4 Standard

• The physical layer is compatible with current wireless standards such as Bluetooth

• MAC layer implements synchronization , time slot management , and basic security mechanisms.

7

Page 8: Introduction to Sensor Networks

– “the software”

– Network, Security & Application layers

– Brand management

IEEE 802.15.4– “the hardware”

– Physical & Media Access Control layers

Wireless Sensor Network Standards IEEE 802.15.4 & ZigBee In Context

PHY868MHz / 915MHz / 2.4GHz

MAC

Network

Star / Mesh / Cluster-Tree

Security32- / 64- / 128-bit encryption

Application

API

ZigBeeAlliance

IEEE 802.15.4

Customer

Silicon Stack App

8

Page 9: Introduction to Sensor Networks

ZigBee Utilization

9

RESIDENTIAL/LIGHT

COMMERCIAL CONTROL

INDUSTRIALCONTROL

ZigBeeWireless Control that

Simply Works

CONSUMER ELECTRONICS

TVVCRDVD/CDremote

securityHVAClighting controlaccess controllawn & garden irrigation

PC & PERIPHERALS

asset mgtprocess controlenvironmental

energy mgt

PERSONAL HEALTH CARE

BUILDING AUTOMATION

securityHVAC

lighting controlaccess control

mousekeyboardjoystick

patient monitoring

fitness monitoring

Page 10: Introduction to Sensor Networks

Applications Example

10

Page 11: Introduction to Sensor Networks

Put tripwires anywhere—in deserts, other areas where physical

terrain does not constrain troop or vehicle movement—to

detect, classify & track intruders [Computer Networks 2004,

ALineInTheSand webpage, ExScal webpage]

Project ExScal: Concept of operation

11

Page 12: Introduction to Sensor Networks

ExScal scenarios Border Monitoring:

Detect movement where none should exist ,

Decide target classes, e.g., foot traffic to tanks

Ideal when combined with towers, tethered balloons, or UAVs

12

Page 13: Introduction to Sensor Networks

WSN Research Fields Sensors HW and Software Deployment Physical , MAC, Routing, Applications Data Aggregation and Data Mining Artificial Intelligence and data handling Self Healing Web Integration Heterogeneity Security Software Engineering (Simulators ) Cloud Computing and Sensor Networks Mobility Issues and Localization

13

Page 14: Introduction to Sensor Networks

Assignment 1Report the main security

considerations of IEEE 802.15.4 ?

14

Page 15: Introduction to Sensor Networks

Deployment, Clustering , and and Routing in WSN

15

Page 16: Introduction to Sensor Networks

Deployment Constraints

Sensor characteristics

Monitored field characteristics

Monitored/probed object

16

Page 17: Introduction to Sensor Networks

Deployment Parameters

17

Page 18: Introduction to Sensor Networks

Deployment Parameters

18

Diffraction: passing the signal through small opening and spreading it after passing the opening Scattering: scatter the coming signal Reflection : send the signal back towards the sender

Page 19: Introduction to Sensor Networks

Deployment Parameters

19

Page 20: Introduction to Sensor Networks

Deployment Parameters

20

Page 21: Introduction to Sensor Networks

Deployment Problems and Solutions

Random Deployment • Virtual force Algorithm

Deterministic Deployment• Circle Packing

• Energy Mapping

• Movement-Assisted Sensor Deployment

Sink Placement Problem • Single node

• Multiple sink deployment

Relay Node Placement in WSN21

Page 22: Introduction to Sensor Networks

Random Deployment

Virtual Force Algorithm

22

Page 23: Introduction to Sensor Networks

Virtual Force Algorithm Sensors are initially deployed randomly Objective:

• To maximize the Coverage

Assumptions:• Assume no prior knowledge about the monitored field

• All nodes are mobile

• Energy and obstacles might present in the field

23

Page 24: Introduction to Sensor Networks

Virtual Force Algorithm (Cont.) Attractive and Repulsive forces

Sensors do not physically move

A sequence of virtual motion paths is determined for the randomly placed sensors.

Once the effective sensor positions are identified, a one-time movement is carried out to redeploy the sensors at these positions.

24

Page 25: Introduction to Sensor Networks

Virtual Force Algorithm (Semi Distributed.)

Assumptions:

• Clustered network

• All clustered heads are able to communicate with the sink node

• The cluster head is responsible for executing the VFA and managing the one-time movement of sensors to the desired locations.

25

Page 26: Introduction to Sensor Networks

Virtual Force Algorithm (Cont.) Each sensor behaves as a “Source of force” for all other

sensors.

This force can be either positive (Attractive) or negative (Repulsive).

The closeness and wide distance between two sensors are measured using a predefined threshold.

26

Page 27: Introduction to Sensor Networks

Virtual Force Algorithm (Cont.) Sensor Binary Model

• Consider an n by m sensor field grid and assume that there are k sensors deployed in the random deployment stage.

• Each sensor has a detection range r. Assume sensor ssii is deployed at point (xi , yi ).

• For any point P at (x, y), we denote the Euclidean distance between ssii and P as d(si , P),

• The coverage of a Grid Point P can be expressed by:

27

Page 28: Introduction to Sensor Networks

Virtual Force Algorithm (Cont.)

Virtual Forces• Attraction force F12

• Repulsive force F13

• Zero Force F14

• Obstacle Force

• preferential coverage

Force

Total Force on node i =

28

Page 29: Introduction to Sensor Networks

Virtual Force Algorithm (Cont.)

Using such forces , the cluster head runs the VFA After stability occurs , Sensors are ordered to move to

the new positions

Energy and Obstacles might be problems • Any sensor will not be able to move the required

distance , the moving order is discarded

• Obstacles need an obstacle avoidance algorithm

29

Page 30: Introduction to Sensor Networks

Think…..

If some sensors are stationary, does this affect the virtual force algorithm?

What other problems you see in the algorithm?• Coverage might not be satisfied due to the limitation in

the energy since some nodes might not be able to move to the specified place.

• Mobility assumption might not be the case for all WSNs

30

Page 31: Introduction to Sensor Networks

SENSOR REPLACEMENT BASED ENERGY MAPPING

31

Page 32: Introduction to Sensor Networks

The problem

A set of sensors S is deployed in a monitored field F(A)for a period of time T.

The field is divided into a grid of cells A. Each cell is assigned a weight where represents the

importance of the cell i. The location of each sensor is assumed known; More than one sensor could be deployed in one cell. Sensors are assumed heterogeneous in terms of their

energy and mobility.

32

Page 33: Introduction to Sensor Networks

Assumptions

A sensor could be in different states; it could have its sensing off or on based on

the field monitoring requirements.• Sensing off, radio off – (sleep mode)

• Sensing off, radio receiving – (Receiving mode)

• Sensing off, radio transmitting – (Routing mode)

• Sensing on, radio receiving – (Sensing and Receiving mode)

• Sensing on, radio transmitting – (Sensing and Transmitting mode)

• Sensing on, radio off - (Sensing mode)

33

Page 34: Introduction to Sensor Networks

The main idea Knowing the energy map Knowing the energy map

of the network :of the network :• May lead to early detection to

the uncovered areas.

• Redeploy new sensors

• Turn off some of the sensors due to their coverage redundancy

• Wake up some of the nodes when needed

• Move one or mobile nodes to cover the required uncovered spots

34

Page 35: Introduction to Sensor Networks

Redeployment based Energy map

Step 1: Step 1: Energy dissipation rate prediction

• Each sensor predicts its own energy rate based on its history (e.g. Markov Chain ..)

Step 2: Step 2: sensors send their initial energy and the location, predicted energy dissipation rate to the sink node through a cluster head. • Sensors update their energy dissipation rate based on a specific

threshold (if the new dissipation rate increased more than the given threshold , the node sends the new dissipation rate)

35

Page 36: Introduction to Sensor Networks

Redeployment based Energy map

Step 3Step 3: the sink node constructs the energy map based on the received dissipated energy rate from the sensors.

The sink may move one of the mobile sensors to the uncovered spot or wake up one of the sleeping sensors

36

Page 37: Introduction to Sensor Networks

Think …….

What are the disadvantages of energy mapping algorithm ?

Sensor network is an event based network . Therefore , events are not frequently or based on specific pattern. Thus, the amount of messages to be transmitted to report the energy mapping will not be expected and might play a role in sensors energy dissipation.

Centralized algorithm

37

Page 38: Introduction to Sensor Networks

Movement-Assisted Sensor

Deployment

38

Page 39: Introduction to Sensor Networks

The problem of sensor deployment

Given the target area, how to maximize the sensor coverage with less time, movement distance and message complexity

The importance of the problem• Distributed instead of centralized

39

Page 40: Introduction to Sensor Networks

Voronoi Diagram

Definition:• Every point in a

given polygon is closer to the node in this polygon than to any other node.

40

Page 41: Introduction to Sensor Networks

Overview of the proposed algorithm

Sensors broadcast their locations and construct local Voronoi polygons

Find the coverage holes by examining Voronoi polygons

If holes exist, reduce coverage hole by moving• VOR : VORonoi-based

• Pull sensors to the sparsely covered area

41

Page 42: Introduction to Sensor Networks

Part of Assignment 1 (on CD and a printed report)

Implement both Virtual Force algorithm and Voronoi based algorithm ? Report your experience and algorithms efficiency?

Given a set of sensors with limited amount of energy. Some of these sensors are assumed mobile and others are assumed stationary. Assume similar sensing and communication ranges for all sensors. Sensors are allowed to move from one place to another iff they have enough energy to move to the required destination. In addition , the borders of the monitored area is assumed known in terms of 2D coordinates. Borders may be found in the monitored area. Advice a suitable deterministic deployment algorithm for efficient deployment to the sensors given that the deployed sensors have to be connected and important areas in the field are covered. In addition , your algorithm must guarantee the coverage of the monitored field for certain period of time.

You may look for an already given solution or come up with a convincing one .

42

Page 43: Introduction to Sensor Networks

43

Deterministic Deployment

Deployment Using Circle Packing

Page 44: Introduction to Sensor Networks

44

Deployment Using Circle Packing

Deployment of homogenous sensors

Full Coverage Deployment

Deployment of connected heterogeneous sensors

44

Page 45: Introduction to Sensor Networks

45

Deployment of homogenous sensors

s Sensing range Density

1 0.500000000000 0.785398163397

2 0.292893218813 0.539012084453

3 0.254333095030 0.609644808741

4 0.250000000000 0.785398163397

5 0.207106781187 0.673765105566

6 0.187680601147 0.663956909464

7 0.174457630187 0.669310826841

8 0.170540688701 0.730963825254

9 0.166666666667 0.785398163397

14 0.129331793710 0.735679255543

16 0.125000000000 0.785398163397

25 0.100000000000 0.785398163397

36 0.083333333333 0.785398163397

These results were based on theinformation presentedat “introduction to circle packing” book

45

Page 46: Introduction to Sensor Networks

46

Full Coverage Deployment s Sensor’s sensing range (r) s Sensor’s sensing range (r)1 0.70710678118654752440 16 0.169427051598116023952 0.55901699437494742410 17 0.165680929570774725383 0.55901699437494742410 18 0.160639663597154535234 0.35355339059327376220 19 0.157841981746673756755 0.32616058400398728086 20 0.152246811233380310056 0.29872706223691915876 21 0.148953789551099321887 0.27429188517743176508 22 0.143693177121688000498 0.26030010588652494367 23 0.141244822387931359519 0.23063692781954790734 24 0.13830288328269767697

10 0.21823351279308384300 25 0.1335487065607704969311 0.21251601649318384587 26 0.1317648756148259646312 0.20227588920818008037 27 0.1286335345030996680713 0.19431237143171902878 28 0.1273175534656137214714 0.18551054726041864107 29 0.1255535079641135331715 0.17966175993333219846 30 0.12203686881944873607

46

Page 47: Introduction to Sensor Networks

47

Sequential Packing-based Deployment Algorithm (SPDA)

Given • Sensors Sensing Ranges

• Sensors Communication Ranges

• Bounded Monitored Field

Objective • Best Connected Deployment Scheme

• Max. Coverage.

• Min. Overlapped Areas

• Benefit from the properties learned from the optimal deployment using circle packing

47

Page 48: Introduction to Sensor Networks

Sequential Packing-based Deployment Algorithm

48

Page 49: Introduction to Sensor Networks

Sequential Packing-based Deployment Algorithm

49

Page 50: Introduction to Sensor Networks

50

Potential Points

50

Page 51: Introduction to Sensor Networks

Think …..

51

How do you guarantee connectivity ?

Page 52: Introduction to Sensor Networks

52

Correctness of the Algorithm

52

Page 53: Introduction to Sensor Networks

Sink Re-Placement Problem

53

Page 54: Introduction to Sensor Networks

Potential benefits of sink relocation

Increased network longevity: shortened data paths can safe the

total energy consumed to data collection and extend the life of relaying nodes.

Improved timeliness: involves fewer relays leading to avoidance of large packet backlogs

Enhanced safety: moves the sink away from harmful events without damaging network performance

54

Page 55: Introduction to Sensor Networks

Energy-Based Relocation -- Motivation

Sink node

Inactive Sensor

Active Sensor

One hop Sensor

Dead Sensor

Can repositioning the sink node help?

Normal Operational Mode: Sensors pursue multi-hop paths to

communicate with the sink node

Issues: When the sink is stationary, nearby sensors

get involved in heavy packet forwarding and die quickly

• Nodes further away are picked as substitute relays

Consequence:

• Increase in total transmission power rapid energy depletion

• Effect grows spirally outward

To where ?

55

Page 56: Introduction to Sensor Networks

Moving the Sink

Where to go

Towards the region, whose sensors generate the most number of packets

Centroid of the last-hop nodes that route the largest traffic (use a distance * traffic metric)

B 18

30

6

A

The Sink nod directionis set to balance nodes

A and B's interestSink is placed onthe dotted arrow

C

S

56

Page 57: Introduction to Sensor Networks

Think….

What about putting the sink node initially in the center of all nodes? Will this be the best position for the sink node?

No , because sensor networks again are event based networks

57

Page 58: Introduction to Sensor Networks

Part of your assignment Device an algorithm for Multiple Sink Network Design

Problem in Large Scale Wireless Sensor Networks?

You may look at : • E. Ilker Oyman and Cem Ersoy,

Multiple Sink Network Design Problem in Large Scale Wireless Sensor Networks,, IEEE International Conference on Communications, 2004

58

Page 59: Introduction to Sensor Networks

Relay Node Placement in WSNClustering Algorithms

59

Page 60: Introduction to Sensor Networks

Clustering Facts Clustering plays a dominant role in delaying the first

node death, while aggregation plays a dominant role in delaying the last node death

In each cluster one node acts as a cluster head which is in charge of coordinating with other cluster heads

60

Page 61: Introduction to Sensor Networks

LEACH Algorithm The LEACH Network is made up of nodes, some of

which are called cluster-heads

• The job of the cluster-head is to collect data from their surrounding nodes and pass it on to the base station

• LEACH is dynamic because the job of cluster-head rotates

LEACH is considered as clustering and routing protocol

61

Page 62: Introduction to Sensor Networks

The Amount of Energy Depletion

This is the formula for the amount of energy depletion by data transfer:

62

Page 63: Introduction to Sensor Networks

LEACH’s Two Phases

The LEACH network has two phases: the set-up phase and the steady-state

• The Set-Up Phase• Where cluster-heads are chosen

• The Steady-State• The cluster-head is maintained

• Data is transmitted between nodes

63

Page 64: Introduction to Sensor Networks

Stochastic Threshold Algorithm Cluster-heads can be chosen stochastically

(randomly based) on this algorithm:

If n < T(n), then that node becomes a cluster-head The algorithm is designed so that each node becomes

a cluster-head at least once.

64

Page 65: Introduction to Sensor Networks

Deterministic Threshold Algorithm A modified version of this protocol is known as

LEACH-C (or LEACH Centralized) This version has a deterministic threshold

algorithm, which takes into account the amount of energy in the node…

65

Page 66: Introduction to Sensor Networks

Think more …..

How to modify LEACH to include more parameters such as node degree?

66

Page 67: Introduction to Sensor Networks

67/103

HEED: Hybrid Energy Efficient Distributed Clustering

Page 68: Introduction to Sensor Networks

HEED: Hybrid Energy Efficient Distributed Clustering

HEED was designed to select different cluster heads in a field according to the amount of energy that is distributed in relation to a neighboring node.

Four primary goals: Four primary goals:

• prolonging network life-time by distributing energy consumption

• terminating the clustering process within a constant number of iterations/steps

• minimizing control overhead

• producing well-distributed cluster heads and compact clusters.68

Page 69: Introduction to Sensor Networks

Heed Algorithm Each node performs neighbor discovery, and broadcasts its cost to the detected

neighbors. Each node sets its probability of becoming a cluster head, Chprob , as follows:

Where, Cprob is the initial percentage of cluster heads among n nodes (it was set to 0.05),

Eresidual and Emax are the residual and the maximum energy of a node (corresponding to the fully charged battery), respectively.

The value of CHprob is not allowed to fall below the threshold pmin .

69

Page 70: Introduction to Sensor Networks

Disadvantage (LEACH and HEED) – think….

Nodes’ score is computed based on node identifiers , and each node holds its message transmission until all its neighbors with lower IDs have done so.

It is assumed that the network topology does not change during the algorithm execution, and it is thus valid for each node to wait until it overhears every higher-scored neighbor transmitting.

70

Page 71: Introduction to Sensor Networks

Think…

How to solve Heed’s problems?

71

Page 72: Introduction to Sensor Networks

HEED Assignment Previous Algorithm is used with homogenous sensors (all have the

same characteristics ).

Device another clustering algorithm for heterogeneous WSN (nodes with different capabilities) .

You may have a look at the following paper

• Harneet Kour and Ajay K. Sharma, “Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network, ” International Journal of Computer Applications (0975 – 8887) Volume 4 – No.6, July 2010

72

Page 73: Introduction to Sensor Networks

Mobility Resistant Clustering in Multi-Hop Wireless Networks --- Distributed Efficient Clustering Approach (DECA) ---

73

Page 74: Introduction to Sensor Networks

DECA Each node periodically transmits a Hello message to identify itself, and based

on such Hello messages, each node maintains a neighbor list.

Define for each node the score function as:

Where E stands for the node residual energy, C stands for the node connectivity, I stands for the node identifier, and the weights follow

The computed score is then used to compute the delay for this node to announce itself as the cluster head. The higher the score, the sooner the node will transmit.

The computed delay is normalized between 0 and a certain upper bound Dmax

74

Page 75: Introduction to Sensor Networks

Think…

How mobility can affect DECA algorithm?

The connectivity parameter changes with mobility and the node might be selected as a cluster head multiple times

75

Page 76: Introduction to Sensor Networks

Multimodal Limited Similarity Clustering (MFLC)

76

Page 77: Introduction to Sensor Networks

MFLC for single and multimodal sensor networks

A single feature sensor network is a network with each sensor node reports only one feature.

Multimodal sensor network is a network with nodes report more than one feature.

MFLC adapts LEACH clustering technique to support the multimodal sensor networks.

MFLC differs from the LEACH on the criteria used for a node to decide to be a cluster head or not.

77

Page 78: Introduction to Sensor Networks

MFLC single and multimodal sensor networks

Score Equation :

78

Page 79: Introduction to Sensor Networks

Data Similarity Clustering Based Fuzzy Logic (DSBF)

79

Page 80: Introduction to Sensor Networks

DSBF

Phase One: Computing Node Degrees

Phase Two: Cluster Head Election

Phase Three: Data Reporting

80

Page 81: Introduction to Sensor Networks

Phase One: Computing Node Degrees

The node degree based similarity feature is computed

The node degree in this context means the number of similar sensors around Ss

81

Page 82: Introduction to Sensor Networks

Phase Two: Cluster Head Election

82

Page 83: Introduction to Sensor Networks

Fuzzy C-Means Clustering for Efficient Operations in WSNs

83/103

Page 84: Introduction to Sensor Networks

Main idea

84/103

Instead of one cluster per node use multiple clusters with different membership functions

Page 85: Introduction to Sensor Networks

Multilayer clustering example

85/103

Page 86: Introduction to Sensor Networks

Semi Distributed Clustering

Monitoring Nodes Clustering

86/103

Page 87: Introduction to Sensor Networks

Think

Can the percentage more than 100% ?

87/103

Page 88: Introduction to Sensor Networks

Routing in WSN

88

Page 89: Introduction to Sensor Networks

89

Page 90: Introduction to Sensor Networks

Flat Routing Each node plays the same role Data-centric routing

• Due to not feasible to assign a global id to each node• Save energy through data negotiation and elimination of redundant data

Protocols• Sensor Protocols for Information via Negotiation (SPIN)• Directed diffusion (DD)• Rumor routing• Minimum Cost Forwarding Algorithm (MCFA)• Gradient-based routing (GBR)• Information-driven sensor querying/Constrained anisotropic diffusion routing

(IDSQ/CADR)• COUGAR• ACQUIRE• Energy-Aware Routing• Routing protocols with random walks

90

Page 91: Introduction to Sensor Networks

Sensor Protocols for Information via Negotiation (SPIN)

91/103

Page 92: Introduction to Sensor Networks

Features• Negotiation

• to operate efficiently and to conserve energy• using a meta-data

• Resource adaptation• To extend the operating lifetime of the system• monitoring their own energy resources

SPIN Message• ADV – new data advertisement• REQ – request for ADV data• DATA – actual data message

• ADV, REQ messages contain only meta-data

Sensor protocols for information via negotiation (SPIN)

92

Page 93: Introduction to Sensor Networks

Sensor protocols for information via negotiation (SPIN)• Operation process

Step1

ADV

Step3

DATA

Step2

REQ

Step4

ADV

Step5

REQ

Step6

DATA

93

Page 94: Introduction to Sensor Networks

Sensor protocols for information via negotiation (SPIN)

Resource adaptive algorithm• When energy is plentiful

• Communicate using the 3-stage handshake protocol• When energy is approaching a low-energy threshold

• If a node receives ADV, it does not send out REQ• Energy is reserved to sensing the event

Advantage • Simplicity

• Each node performs little decision making when it receives new data

• Need not forwarding table• Robust to topology change

Drawback • Large overhead

• Data broadcasting

94

Page 95: Introduction to Sensor Networks

Think…. In SPIN

What about mobile nodes?

What about the multimodal Wireless nodes?

95

Page 96: Introduction to Sensor Networks

Directed Diffusion (DD)

96/103

Page 97: Introduction to Sensor Networks

Directed Diffusion (DD) Feature

• Data-centric routing protocol• A path is established between sink node and source node• Localized interactions

• The propagation and aggregation procedures are all based on local information

Four elements• Interest

• A task description which is named by a list of attribute-value pairs that describe a task

• Gradient• Path direction, data transmission rate

• Data message• Reinforcement

• To select a single path from multiple paths

97

Page 98: Introduction to Sensor Networks

Interest Propagation

Flooding Constrained or Directional flooding based on location. Directional Propagation based on previously cached data.

Source

Sink

Interest

Gradient

Page 99: Introduction to Sensor Networks

Data Propagation

Reinforcement to single path delivery.

Multipath delivery with probabilistic forwarding.

Multipath delivery with selective quality along different paths.

Source

Sink

Gradient

Data

Page 100: Introduction to Sensor Networks

Directed Diffusion (DD) Advantage

• Small delay• Always transmit the data through shortest path

• Robust to failed path

Drawback• Imbalance of node lifetime

• The energy of node on shortest path is drained faster than another

• Time synchronization technique• To implement data aggregation- paths change with interests • Not easy to realize in a sensor network

• The overhead involved in recording information• Increasing the cost of a sensor node

100

Page 101: Introduction to Sensor Networks

Think…. In DD

What about mobile nodes?

What about the multimodal Wireless nodes?

101

Page 102: Introduction to Sensor Networks

Comparison between SPIN, LEACH & Directed Diffusion

SPIN LEACH DirectedDiffusion

OptimalRoute

No No Yes

NetworkLifetime

Good Very good Good

ResourceAwareness

Yes Yes Yes

Use of meta-data

Yes No Yes102

Page 103: Introduction to Sensor Networks

Minimum Cost Forwarding Algorithm (MCFA)

Objective

• Establish the cost field

• Transmit the data through the minimum-cost path

Feature

• Optimality

• Minimum cost path criteria : hop count, energy consumption, delay etc.

• Simplicity

• Need not to maintain forwarding table

• Need not to know an ID for a neighbor node

103

Page 104: Introduction to Sensor Networks

Minimum Cost Forwarding Algorithm (MCFA)

Operation process• Each node stores its cost to the sink• The sink broadcasts an ADV message

• containing its own cost (0 initially)• Each node receiving the message transmits neighbor node

• Add the cost in ADV message to its own cost• The cost field is set up

• after the ADV message propagates through the network• The source transmits an information through using the cost field

Drawback• Limited network size

• The time to set the cost field is directly proportional to the size of the network

• Load is not balanced104

Page 105: Introduction to Sensor Networks

Think….

What about mobile nodes?

What about the multimodal Wireless nodes?

105

Page 106: Introduction to Sensor Networks

Geographic Adaptive Fidelity (GAF)

Forms a virtual grid of the covered area Each node associates itself with a point in the grid based

on its location Nodes associated with same point in grid are considered

equivalent Some nodes in an area are kept sleeping to conserve

energy Nodes change state from sleeping to active for load

balancing

106

Page 107: Introduction to Sensor Networks

Creating a Virtual Grid

Use location information (GPS) to create a virtual grid

All nodes in a grid are equivalent Only one node from a grid point is

active at a time All nodes in a grid point is within the

radio range of nodes in adjacent grids Virtual grid results in hierarchical

clusters of nodes

107

Page 108: Introduction to Sensor Networks

Think once more ….

What are the problems of GAF?

What about mobile nodes?

What about the multimodal Wireless nodes?

108