Professional Documents
Culture Documents
PROTOCOLS
Chapter 5
Introduction
• Routing in WSNs is challenging due to distinguish to the
inherent characteristics from other wireless networks like
mobile ad hoc networks or cellular networks.
• First, it is not possible to build a global addressing scheme
for a large number of sensor nodes. Thus, traditional IP-
based protocols may not be applied to WSNs. In WSNs,
sometimes getting the data is more important than knowing
the IDs of which nodes sent the data.
• Second, in contrast to typical communication networks,
almost all applications of sensor networks require the flow of
sensed data from multiple sources to a particular BS(Sink
node).
Introduction
• Third, sensor nodes are tightly constrained in terms of
energy, processing, and storage capacities. Thus, they
require carefully resource management.
• Fourth, in most application scenarios, nodes in WSNs are
generally stationary after deployment except for, may be, a
few mobile nodes.
• Fifth, sensor networks are application specific, i.e., design
requirements of a sensor network change with application.
• Sixth, position awareness of sensor nodes is important since
data collection is normally based on the location.
• Finally, data collected by many sensors in WSNs is typically
based on common phenomena, hence there is a high
probability that this data has some redundancy.
Introduction
• The task of finding and maintaining routes in WSNs is
nontrivial since energy restrictions and sudden changes in
node status (e.g., failure) cause frequent and
unpredictable topological changes.
• To minimize energy consumption, routing techniques
proposed for WSNs employ some well-known routing
strategies, e.g., data aggregation and in-network
processing, clustering,
Introduction
• how do we send?
• what should be the
path?
• what should be the
route?
• what a routing
protocol has to look
into.
• So, this is what the
different routing
protocols for sensor
networks,
Issues
These factors must be overcome before efficient communication can be
achieved in WSNs
Node deployment
Energy considerations
Data Delivery
Fault tolerance
Scalability
Connectivity
Coverage
Data aggregation
Quality of service
7
Node Deployment
• Node deployment in WSNs is application
dependent and affects the performance of the
routing protocol.
• The deployment can be either deterministic or
randomized.
• In deterministic deployment, the sensors are
manually placed and data is routed through pre-
determined paths.
• In random node deployment, the sensor nodes
are scattered randomly creating an infrastructure
in an ad hoc manner.
8
Energy Considerations
• Sensor nodes can use up their limited supply of
energy performing computations and transmitting
information in a wireless environment. Energy
conserving forms of communication and
computation are essential.
• In a multi-hop WSN, each node plays a dual role
as data sender and data router. The
malfunctioning of some sensor nodes due to
power failure can cause significant topological
changes and might require rerouting of packets
and reorganization of the network.
9
SPIN (cont.)-Implosion
Node
x x
The direction
of data sending
The connect B C
between nodes
x x
D
17
r
q s
Node
The direction
of data sending
The connect
between nodes
The searching A B
range of the
node
(q, r) (s, r)
C
18
SPIN (cont.)
• Negotiation
• Before transmitting data, nodes negotiate with each
other to overcome implosion and overlap
• Only useful information will be transferred
• Resource adaptation
• Each sensor node has resource manager
• Applications probe manager before transmitting or
processing data
• Sensors may reduce certain activities when energy is
low
20
B
22
LEACH
• LEACH (Low-Energy Adaptive Clustering Hierarchy), a
clustering-based protocol that minimizes energy
dissipation in sensor networks.
• LEACH outperforms classical clustering algorithms by
using adaptive clusters and rotating cluster-heads,
allowing the energy requirements of the system to be
distributed among all the sensors.
• LEACH is able to perform local computation in each
cluster to reduce the amount of data that must be
transmitted to the base station.
.
27
LEACH (cont.)
• Sensors elect themselves to be local cluster-
heads at any given time with a certain probability.
• Each sensor node joins a cluster-head that
requires the minimum communication energy.
• Once all the nodes are organized into clusters,
each cluster-head creates a transmission
schedule for the nodes in its cluster.
• In order to balance the energy consumption, the
cluster-head nodes are not fixed; rather, this
position is self-elected at different time intervals.
28
LEACH
100 m
叢集區
觀測區域
~100m
Base Station
29
All nodes marked with a given symbol belong to the same cluster, and
the cluster head nodes are marked with a ●.
30
Algorithm
• Periodic process
• Two phases per round:
• Setup phase
• Advertisement: Execute election algorithm
• Members join to cluster
• Cluster-head broadcasts schedule
• Steady-State phase
• Data transmission to cluster-head using TDMA(Time-
division multiple access)
• Cluster-head transfers data to BS (Base Station)
31
Node
Cluster-Head Node
X Node that has been cluster-head in the last 1/P rounds
Cluster Border
32
Conclusions
• advantage:
✓Increase the life of your network.
✓Uniform energy consumption.
• Disadvantages:
✓Highly dynamic environments will add too much overhead,
such as: advertisements, etc.
✓Nodes use single-hop communication, so it is not suitable
for large sensor networks, because if the cluster-head is
very far from the BS, it will be very energy-intensive.
RPL
• Routing over Low-Power and Lossy Networks is a routing
solution for IP smart objects.
• RPL is new distance-vector routing protocol was named the
IPv6 Routing Protocol for Low Power and Lossy Networks.
• In an RPL network, each node acts as a router and becomes
part of a mesh network.
• Routing is performed at the IP layer. Each node examines
every received IPv6 packet and determines the next-hop
destination based on the information contained in the IPv6
header.
• No information from the MAC-layer header is needed to
perform next-hop determination.
RPL
• To cope with the constraints of computing and memory that are
common characteristics of constrained nodes, the protocol defines
two modes:
• Storing mode: All nodes contain the full routing table of the RPL
domain. Every node knows how to directly reach every other node.
• Non-storing mode: Only the border router(s) of the RPL domain
contain(s) the full routing table. All other nodes in the domain only
maintain their list of parents and use this as a list of default routes
toward the border router. This abbreviated routing table saves
memory space and CPU. When communicating in non-storing mode,
a node always forwards its packets to the border router, which knows
how to ultimately reach the final destination.
RPL
LBR-1
1 2
3
1 1
A B C
1
1 1
1
F D 4 E
1
1 1 1
1
G H I
RPL
RPL is based on the concept of a directed acyclic graph (DAG). A DAG is a
directed graph where no cycles exist.
This means that from any vertex or point in the graph, you cannot follow an
edge or a line back to this same point. All of the edges are arranged in paths
oriented toward and terminating at one or more root nodes
RPL
A basic RPL process involves building a destination-oriented directed
acyclic graph (DODAG). A DODAG is a DAG rooted to one destination.
In RPL, this destination occurs at a border router known as the DODAG
root. Figure 5-9 compares a DAG and a DODAG. You can see that that a
DAG has multiple roots, whereas the DODAG has just one.
RPL
The routing graph created by the set of DODAG parents across all nodes
defines the full set of upward routes. RPL protocol implementation should
ensure that routes are loop free by disallowing nodes from selected
DODAG parents that are positioned further away from the border router
DAG Construction
• LLN links are depicted
LBR-1
1 2 • Links are annotated w/ ETX
3
• It is expected that ETX
1 1
A B C variations will be
1 averaged/filtered as per
1 1
[ROLL-METRICS] to be
F
1
D 4 E stable enough for route
1
computation
1 1 1
• Nodes are also to observe the
1
metric and gain confidence
G H I before use
Slide #45 IETF 75 – Roll WG – July 2009
DAG Construction
• Objective Code Point for
LBR-1
1 2
example
3 • Metric: ETX
1 1 • Objective: Minimize ETX
A B C
• Depth computation: Depth ~
1
1 1 ETX
• Note that a practical computation
1 may be more coarse
F D 4 E
1
1 1 1
1
G H I
Slide #46 IETF 75 – Roll WG – July 2009
DAG Construction
• LBR-1 multicasts RA-DIO
LBR-1 • Nodes A, B, C receive and
1 2 process RA-DIO
3
• Nodes A, B, C consider link
1 1
A B C metrics to LBR-1 and the
1
1
1
optimization objective
1
• The optimization objective
F D 4 E can be satisfied by joining
1 1
1
1
the DAG rooted at LBR-1
• Nodes A, B, C add LBR-1 as
1
G H I a DAG parent and join the
DAG
Slide #47 IETF 75 – Roll WG – July 2009
DAG Construction
LBR-1 • Node A is at Depth 1 in the
1 2
DAG, as calculated by the
3
routine indicated by the
1 1
A B C example OCP (Depth ~
1
1
1
ETX)
• Node B is at Depth 3, Node
1
4
F D E C is at Depth 2
1 1
1
1
• Nodes A, B, C have
installed default routes (::/0)
1
G H I with LBR-1 as successor
Slide #48 IETF 75 – Roll WG – July 2009
DAG Construction
LBR-1 • The RA timer on Node C
1 2
expires
3
• Node C multicasts RA-DIO
1 1
A B C
• LBR-1 ignores RA-DIO from
1
1 1 deeper node
1
4
• Node B can add Node C as
F D E
alternate DAG Parent,
1
1 1 1 remaining at Depth 3
1
• Node E joins the DAG at
G H I
Depth 3 by adding Node C
as DAG Parent
Slide #49 IETF 75 – Roll WG – July 2009
DAG Construction
LBR-1 • Node A is at Depth 1, and
1 2
can reach ::/0 via LBR-1
3
with ETX 1
1 1
A B C • Node B is at Depth 3, with
1
1
1
DAG Parents LBR-1, and
can reach ::/0 via LBR-1 or
1
4
F D E C with ETX 3
1 1
1
1
• Node C is at Depth 2, ::/0
via LBR-1 with ETX 2
1
G H I • Node E is at Depth 3, ::/0
via C with ETX 3
Slide #50 IETF 75 – Roll WG – July 2009
DAG Construction
LBR-1 • The RA timer on Node A
1 2 expires
3
• Node A multicasts RA-DIO
1 1
A B C • LBR-1 ignores RA-DIO from
1 deeper node
1 1
• Node B adds Node A
1
F D 4 E • Node B can improve to a
1
more optimum position in
1 1 1
the DAG
1 • Node B removes LBR-1,
G H I
Node C as DAG Parents
Slide #51 IETF 75 – Roll WG – July 2009
DAG Construction
LBR-1 • Node A is at Depth 1, ::/0
1 2
via LBR-1 with ETX 2
3
• Node B is at Depth 2, ::/0
1 1
A B C via A with ETX 2
1
1 1 • Node C is at Depth 2, ::/0
1
via LBR-1 with ETX 2
F D 4 E
• Node E is at Depth 3, ::/0
1
1 1 1 via C with ETX 3
1
G H I
Slide #52 IETF 75 – Roll WG – July 2009
DAG Construction
LBR-1 • DAG Construction
1 2
continues…
3
1 1
A B C
1
1 1 • And is continuously
1
4
maintained
F D E
1
1 1 1
1
G H I