Professional Documents
Culture Documents
• Routing Techniques
Energy
Scalability
Application
& Density
Addressing Topology
Robustness
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 3
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
• Neighborhood discovery & local information exchange
• Network is more important than the sensor (WSN are
application-specific - information from a set of sensors
could be more important than the information of a
Energy single sensor (clustering or selecting or compressing)
Scalability
Application
& Density
Addressing Topology
Robustness
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 4
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
• Neighborhood discovery & local information exchange
• Network is more important than the sensor (WSN are
application-specific - information from a set of sensors
could be more important than the information of a
Energy single sensor (clustering or selecting or compressing)
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 5
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
• Neighborhood discovery & local information exchange
• Network is more important than the sensor (WSN are
application-specific - information from a set of sensors
could be more important than the information of a
Energy single sensor (clustering or selecting or compressing)
• Periodic monitoring
• Event-driven
• Sometimes also combined, e.g. Scalability • Knowledge of the entire
Cyber-physical Systems Application topology is not realistic (also
& Density
• Different applications need different because of its changes, due to,
routing protocols e.g. nodes failures or RDC
policy)
• Autonomic behavior (self-
• Conventional addressing (e.g. a organizing and optimizing) –
unique MAC address) is not met from local decisions to converge
in practice to a global optimum
• Addressing is overhead – • Topology is not network-driven
routing-based on addressing Addressing Topology but application driven!
may not work (dynamic • In-network processing for
topologies and failures) combining & extracting the
• Routing that does not rely on important information
unique IDs (position or context)
Robustness
• Short-range and/or multi-hop
• Cheap hardware – prone to failures
• Unattended and hostile environments (RF harsh)
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7 • Resilient to changes (e.g. the routing paths)
• Periodic monitoring
• Event-driven
• Sometimes also combined, e.g. Scalability • Knowledge of the entire
Cyber-physical Systems Application topology is not realistic (also
& Density
• Different applications need different because of its changes, due to,
routing protocols e.g. nodes failures or RDC
policy)
• Autonomic behavior (self-
• Conventional addressing (e.g. a organizing and optimizing) –
unique MAC address) is not met from local decisions to converge
in practice to a global optimum
• Addressing is overhead – • Topology is not network-driven
routing-based on addressing Addressing Topology but application driven!
may not work (dynamic • In-network processing for
topologies and failures) combining & extracting the
• Routing that does not rely on important information
unique IDs (position or context)
Robustness
• Short-range and/or multi-hop
• Cheap hardware – prone to failures
• Unattended and hostile environments (RF harsh)
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7 • Resilient to changes (e.g. the routing paths)
Geographical-
Data-centric Topology-driven
based
Implosion flooding
Data-centric • Always sends data to a neighbor,
even it has already received the
data from another node
• Attribute-based • Density of the network
addressing
• Sensor nodes are
homogeneous (in terms of
Overlap
sensing modality) OR are • Nodes often cover overlapping
clever enough to extract areas (e.g. temperature distr.)
some attributes from
different modalities
• Density and mapping of observed
data
• The physical phenomenon gossiping
can be described by more
than one sensors.. Resource blindness
• Flat architectures
• Fault tolerant • Amount of energy available is not
taken into account
Data-centric
Reduce participation of node when
approaching low-energy-threshold
• Attribute-based
addressing
• Sensor nodes are When node receives data, it only initiates
homogeneous (in terms of protocol if it can participate in all three stages
sensing modality) OR are with all neighbor nodes
clever enough to extract
some attributes from
different modalities
Nodes with energy below a threshold:
• The physical phenomenon
can be described by more • When node receives advertisement, it does
than one sensors.. not request the data Heinzelmann, W. R.; Kulik, J.; and
• Flat architectures Balakrishnan, H. Adaptive Protocols for
• Fault tolerant • Node still exhausts energy below threshold Information Dissemination in Wireless
by receiving ADV or REQ messages Sensor Networks. In Fifth ACM/IEEE
MOBICOM Conference (August 1999).
Data flow is initiated from the sink (requests specific information from the sensors)
Data-centric
(a) Interest propagation: exploring for matching data.
• Attribute-based (b) Gradient setup: caching the interest message and the trace of the route from which
addressing it has been received (forming a reserved path towards the sink). Forwarding based
on flooding (or optimized, to compensate implosion and/or resource blindness)
• Sensor nodes are
homogeneous (in terms of (c) Source node: the one that has data / task matching the interest
sensing modality) OR are (d) When data become available, source sends data to sink using the gradient route.
clever enough to extract
some attributes from Routing becomes proactive
different modalities
• The physical phenomenon
can be described by more
than one sensors..
• Flat architectures
• Fault tolerant
Intanagonwiwat, Chalermek, et al. "Directed diffusion for wireless sensor networking." Networking, IEEE/ACM Transactions on 11.1 (2003): 2-16.
Intanagonwiwat, Chalermek, et al. "Directed diffusion for wireless sensor networking." Networking, IEEE/ACM Transactions on 11.1 (2003): 2-16.
ACQUIRE
Data-centric
• d: latency vs. energy-efficiency -> the larger the d the faster the
network resolves the query (at the expense of update costs…)
• Attribute-based • Amortization factor c: the frequency of updating w.r.t. queries,
addressing e.g.:
• Sensor nodes are
homogeneous (in terms of If c = 0.01 =>
sensing modality) OR are
Then an update has
clever enough to extract
some attributes from to be made every 100 queries
different modalities
• The physical phenomenon
can be described by more
than one sensors..
• Flat architectures
• Fault tolerant
• SAR
Topology-driven
• SPEED
Topology-driven
Nodes E,F,G are the
candidates for
• Information available with forwarding the
respect to the network
topology packet
• Associated network Selection is made
metrics (e.g. QoS)
• Proactive or reactive w.r.t.:
(similar to ad-hoc routing Advancing in
protocols)
• Address-based routing for distance
constructing a specific
routing topology (e.g.
tree)
(sink – static)
S
• Distance-based:
(sink – static)
• Distance-based:
(sink – static)
• Distance-based:
(sink – static)
(adjust transmission power & minimize
the possibility of collisions
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 33
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
• Distance-based:
D. Compass-based routing
Feasible area
Choose next hop that is angularly
closest to destination Infeasible
i area
S
(sink – static)
(sink – static)
• Reception-based:
0.7
• Best-reception within the feasible area
• Blacklisted based on Packet Reception
Ratio (i.e. the most reliable) within the
feasible area. Feasible area
0.9 0.4
Infeasible
i area
S 0.6
1
• Reception + Distance:
𝑑(𝐵, 𝐷)
A A: Concave node
𝑑(𝐴, 𝐷)
• No trace route
“Guide to Wireless Sensor Networks”, S. Misra, I. Woungang, S. C. Misra, 2009, Springer, Ch 4
D
Each intermediate node forwards i-th received copy
of the same message to the i-th best closest to
destination neighbor.
Xu Lin, Ivan Stojmenovic, Location-based localized alternate, disjoint and multi-path routing algorithms for wireless
networks, Journal of Parallel and Distributed Computing, Volume 63, Issue 1, January 2003, Pages 22-32
A node becomes concave if there is no neighbors left GEDIR: A-B-J (pck dropped)
to forward the message. Altr. GEDIR: A-B-J-B-C-J-C-F-G-H-D
Disj. GEDIR: A-B-J-C-F-G-H-D
Xu Lin, Ivan Stojmenovic, Location-based localized alternate, disjoint and multi-path routing algorithms for wireless
networks, Journal of Parallel and Distributed Computing, Volume 63, Issue 1, January 2003, Pages 22-32
Applying locally the left-hand or the right-hand rule. How: find a successor node in clockwise or counter-
clockwise order respectively
S D S D
Non-planar planar
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 44
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
• Planar graph routing techniques
GG: If max(d(u,w ),
d(v,w)) < d(u,v) -> uv
is not part of the GG
Spring Semester 2016-2017
CS-541 Wireless Sensor Networks
46
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
• Planar graph routing techniques
Each face is traversed completely in order to determine the edge that intersects the s-t line
and is closest to the target.
The message is passed to that endpoint & face changes.
Use position where face was entered and destination position to determine
when face can be left again, switch back to greedy routing
• Previous hop
• To sum up:
• Virtual Coordinates
Why?
Generate virtual coordinates for the sensor nodes – e.g. using the connectivity graph
• Virtual Coordinates
• Virtual Coordinates
• Virtual Coordinates
NoGeo
• Virtual Coordinates
NoGeo
• Perimeter nodes know that they are perimeter nodes, but don’t know their location
Flooding to discover the distances (in hops) between all perimeter nodes
Create a globally-known distance vector between all perimeters.
• Virtual Coordinates
NoGeo
• Nodes know neither their location, nor whether they are on perimeter
Explore phase for determining if it is on the perimeter: if a node is the farthest away,
among all its two-hop neighbors from the first bootstrap node, then the node decides
that it is on the perimeter.
Randomly selected
“Guide to Wireless Sensor Networks”, S. Misra, I. Woungang, S. C. Misra,
2009, Springer, Ch 4-5
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 61
University of Crete, Computer Science Department
True positions Virtual coordinates
Rao, Ananth, et al. "Geographic routing without location information." Proceedings of the 9th annual international
CS-541 Wireless Sensor Networks
conference on Mobile
Spring Semester computing and networking.
2016-2017
UniversityACM,
of Crete,2003.
Computer Science Department
62
Routing for Wireless Sensor Networks
• Virtual Coordinates
Landmark Routing:
A small subset of nodes: landmarks.
Landmarks flood the network & every node records its hop count distances to these
landmarks.
The landmark distances are used to generate virtual coordinates for routing between the
nodes.
++simple to implement
++do not depend on the scale
• Virtual Coordinates
• Virtual Coordinates
Global topology is likely to remain stable: nodes may come and go, but large-scale topology
remains the same features.
Landmarks should be selected to capture the global topology of the sensor field.
Energy
Scalability
Application
& Density
Geographical-
Data-centric based
Addressing Topology
Geographical- Robustness
based Topology-driven
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 67
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
Energy
Scalability
Application
& Density
Geographical-
Data-centric
Standard? based
Addressing Topology
Geographical- Robustness
based
Topology-driven
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 68
University of Crete, Computer Science Department
Routing for Wireless Sensor Networks
Routing Standards: IEFT Routing protocol for Low-power Lossy Networks (LLN)
Candidate parents: It includes only neighbor nodes that belong to the same DODAG
Version.
When a node stores a neighbor into the
parent set, it becomes attached to the given
DODAG.
A scalar value that represents the relative position of the node w.r.t. other nodes
and the DODAG root.
Rank of Root: minimum (0) & increases as we move away from the root.
If it is a parent (i.e. there are nodes with a higher rank than its root
own), it updates the Rank in the DIO message and sends it to all
neighboring peers.
Trickle Timer
JP Vasseur , IoT
Workshop “RPL
Tutorial” April 2011
2 operational modes:
Sensor-to-sensor routes:
Non-storing mode: the data will reach the root -> destination sensor.
Storing mode: up to the closest common ancestor & then to the destination
Di Marco, P.; Fischione, C.; Athanasiou, G.; Mekikis, P.-V., "Harmonizing MAC and routing in low power
and lossy networks," Global Communications
Spring Semester 2016-2017
Conference
CS-541 (GLOBECOM), 2013 IEEE , vol., no., pp.231,236,
Wireless Sensor Networks
83
University of Crete, Computer Science Department
9-13 Dec. 2013
Routing for Wireless Sensor Networks
Routing Standards: IEFT Routing protocol for Low-power Lossy Networks (LLN)
ETX
Q-metric
CS-541 Wireless Sensor Networks
Spring Semester 2016-2017 85
University of Crete, Computer Science Department
References and Material for Reading
“Guide to Wireless Sensor Networks”, S. Misra, I. Woungang, S. C. Misra, 2009, Springer, Ch 4-5
Intanagonwiwat, Chalermek, et al. "Directed diffusion for wireless sensor networking." Networking,
IEEE/ACM Transactions on 11.1 (2003): 2-16.
Sadagopan, Narayanan, Bhaskar Krishnamachari, and Ahmed Helmy. "Active query forwarding in
sensor networks." Ad Hoc Networks 3.1 (2005): 91-113.
Heinzelmann, W. R.; Kulik, J.; and Balakrishnan, H. Adaptive Protocols for Information Dissemination
in Wireless Sensor Networks. In Fifth ACM/IEEE MOBICOM Conference (August 1999).
“Wireless Sensor Networks”, Ian F. Akyildiz, Mehmet Can Vuran, 2010, Willey, Ch 7
"Wireless Sensor Networks: An Information Processing Approach”, F. Zhao, L. Guibas, 2004, Elsevier
/ Morgan Kaufmann – Ch 3