Professional Documents
Culture Documents
ss Sensor Networks
1
Overview
• Routing in WSNs is challenging due to distinguish from ot
her wireless networks like mobile ad hoc networks or cel
lular networks.
• First, it is not possible to build a global addressing scheme for a
large number of sensor nodes. Thus, traditional IP-based protoc
ols may not be applied to WSNs. In WSNs, sometimes getting th
e data is more important than knowing the IDs of which nodes
sent the data.
• Second, in contrast to typical communication networks, almost
all applications of sensor networks require the flow of sensed d
ata from multiple sources to a particular BS.
2
Overview (cont.)
• Third, sensor nodes are tightly constrained in terms of energ
y, processing, and storage capacities. Thus, they require care
fully resource management.
• Fourth, in most application scenarios, nodes in WSNs are ge
nerally stationary after deployment except for, may be, a few
mobile nodes.
• Fifth, sensor networks are application specific, i.e., design re
quirements of a sensor network change with application.
• Sixth, position awareness of sensor nodes is important since
data collection is normally based on the location.
• Finally, data collected by many sensors in WSNs is typically b
ased on common phenomena, hence there is a high probabil
ity that this data has some redundancy.
3
Overview (cont.)
4
Outline
5
Routing Challenges and Design Issu
es in WSNs
6
Overview
9
Data Delivery Model
• Time-driven (continuous)
• Suitable for applications that require periodic data monitorin
g
• Event-driven
• React immediately to sudden and drastic changes
• Query-driven
• Respond to a query generated by the BS or another node in t
he network
• Hybrid
• The routing protocol is highly influenced by the data re
porting method
10
Node/Link Heterogeneity
11
Fault Tolerance
12
Scalability
13
Network Dynamics
14
Transmission Media
15
Connectivity
16
Coverage
17
Data Aggregation/Convergecast
18
Quality of Service
19
Routing Protocols in WSNs: A taxono
my
Routing protocols in WSNs
20
Flat Routing
21
Overview
• In flat network, each node typically plays the same role and sensor n
odes collaborate together to perform the sensing task.
• Due to the large number of such nodes, it is not feasible to assign a gl
obal identifier to each node. This consideration has led to data centri
c routing, where the BS sends queries to certain regions and waits for
data from the sensors located in the selected regions. Since data is be
ing requested through queries, attribute-based naming is necessary t
o specify the properties of data.
• Prior works on data centric routing, e.g., SPIN and Directed Diffusion,
were shown to save energy through data negotiation and elimination
of redundant.
22
2.1
SPIN
Sensor Protocols for Information via Negot
iation
23
SPIN -Motivation
24
SPIN (cont.)- Motivation
25
SPIN (cont.)-Implosion
Node
x x
The direction
of data sending
The connect
between nodes
B C
x x
D
26
SPIN (cont.)- Overlap
r
q s
Node
The direction
of data sending
The connect
between nodes
The searching A B
range of the
node
(q, r) (s, r)
C
27
SPIN (cont.)- Resource blindness
• In flooding, nodes do not modify their activities based
on the amount of energy available to them.
28
SPIN (cont.)
• Negotiation
• Before transmitting data, nodes negotiate with each other to
overcome implosion and overlap
• Only useful information will be transferred
• Observed data must be described by meta-data
• Resource adaptation
• Each sensor node has resource manager
• Applications probe manager before transmitting or processin
g data
• Sensors may reduce certain activities when energy is low
29
SPIN (cont.)- Meta-Data
• Completely describe the data
• Must be smaller than the actual data for SPIN to be beneficia
l
• If you need to distinguish pieces of data, their meta-data sho
uld differ
30
SPIN (cont.)- SPIN family
32
SPIN (3-Step Protocol)
DATA
A
REQ
AQ
ADV
DAA D AT
R
V E
Q
DTA
V AD
DAD
A VEA
RT
RE
Q V B
A
ATD
D A
AD
DTVA
V
DAA
REQ
REQ
33
SPIN (3-Step Protocol)
DATA
A
DA
TA A
DAT
B
ATA
D
A
DAT
34
SPIN (3-Step Protocol)
DATA
A
DA
TA A
DAT
B
ATA
D
A
DAT
36
SPIN (cont.)- Conclusion
• SPIN protocols hold the promise of achieving high performance at a low
cost in terms of complexity, energy, computation, and communication
• Pros
• Each node only needs to know its one-hop neighbors
• Significantly reduce energy consumption compared to floodi
ng
• Cons
• Data advertisement cannot guarantee the delivery of data
• If the node interested in the data are far from the source,
data will not be delivered
• Not good for applications requiring reliable data delivery,
e.g., intrusion detection
37
2.2
Directed Diffusion
A Scalable and Robust Communication
Paradigm for Sensor Networks
38
Overview
Sink Node
39
Overview (cont.)
40
Directed Diffusion
41
Directed Diffusion (cont.)
42
Data Naming
• Expressing an Interest
• Using attribute-value pairs
• e.g.,
Type = Wheeled vehicle // detect vehicle location
Interval = 20 ms // send events every 20ms
Duration = 10 s // Send for next 10 s
Rect = [-100,100, 200,400] // from sensors in this area
43
Interests and Gradients
• Interest propagation
• The sink broadcasts an interest
• Exploratory interest with low data-rate
• Neighbors update interest-cache and forwards it
• Flooding
• Geographic routing
• Use cached data to direct interests
• Gradient establishment
• Gradient set up to upstream neighbor
• Low data-rate gradient
• Few packets per unit time needed
44
Gradient Set Up
45
Exploratory Gradient
Exploratory Request
Gradient
Event
Event
46
Data Propagation
47
Reinforcement (1/4)
• Positive reinforcement
• Sink selects the neighboring node
• Original interest message but with high data-rate
• Neighboring node must also reinforce at least one neighbor
• Low-delay path is selected
• Exploratory gradients still exist: useful for faults
Reinforced gradient
Event
Event Reinforced gradient
Source
A sensor field
Sink
48
Reinforcement (2/4)
• Path failure and recovery
• Link failure detected by reduced rate, data loss
• Choose next best link (i.e., compare links based on infrequ
ent exploratory downloads)
• Negatively reinforce lossy link
• Either send interest with base (exploratory) data rate or al
low neighbor’s cache to expire over time
Link
Link A-M
A-M lossy
lossy
Event
Event D A
A reinforces
reinforces BB
M B
B reinforces
reinforces CC
Source A
C
C reinforces
reinforces DD
C
B Sink
or
or
A
A negative
negative reinforces
reinforces M
M
M
M negative
negative reinforces
reinforces D
D
49
Reinforcement (3/4)
• Multipath routing B
• Consider each gradient’s link quality Source
• Using negative reinforcement Event
Event
A
• Path Truncation Sink
• Loop removal
• For resource saving Multiple paths
• Ex:
• B gets same data from both A and D, bu
t D always delivers late due to looping
• B negative reinforces D, D negative reinf
orces E, E negative reinforces B D E
• Loop B→E →D →B eliminated
• Conservative negative reinforces useful for fault A B C
resilience
A removable loop
50
Design Considerations
• Design Space for Diffusion
52
Conclusions
• Directed diffusion, a paradigm proposed for event monitoring sensor net
works
• Directed Diffusion has some novel features - data-centric dissemination,
reinforcement-based adaptation to the empirically best path, and in-net
work data aggregation and caching.
• Notion of gradient (exploratory and reinforced)
• Energy efficiency achievable
• Diffusion mechanism resilient to fault tolerance
• Conservative negative reinforcements proves useful
53
Hierarchical Routing
54
Overview
55
3.1
LEACH
Low-Energy Adaptive Clustering Hierarchy
56
LEACH
57
LEACH (cont.)
觀測區域
~100m
Base Station 59
LEACH: Adaptive Clustering
All nodes marked with a given symbol belong to the same cluster, and
the cluster head nodes are marked with a ●.
60
Algorithm
• Periodic process
• Two phases per round:
• Setup phase
• Advertisement: Execute election algorithm
• Members join to cluster
• Cluster-head broadcasts schedule
• Steady-State phase
• Data transmission to cluster-head using TDMA
• Cluster-head transfers data to BS (Base Station)
61
Algorithm (cont.)
Fixed-length cycle
Self-election of cluster
heads Members Cluster head Broadcast
Cluster heads compete compete with CDMA code to members
with CSMA CSMA 62
62
Algorithm Summary
• Set-up phase
• Node n choosing a random number m between 0 and 1
• If m < T(n) for node n, the node becomes a cluster-head where
P
if n G
T ( n ) 1 P [r * mod(1/ P )]
0 otherwise ,
• where P = the desired percentage of cluster heads (e.g., P= 0.05), r=the curre
nt round, and G is the set of nodes that have not been cluster-heads in the la
st 1/P rounds. Using this threshold, each node will be a cluster-head at some
point within 1/P rounds. During round 0 (r=0), each node has a probability P
of becoming a cluster-head.
63
Algorithm Summary (cont.)
• Set-up phase
• Cluster heads assign a TDMA schedule for their members
where each node is assigned a time slot when it can trans
mit.
• Each cluster communications using different CDMA codes
to reduce interference from nodes belonging to other clus
ters.
• TDMA intra-cluster
• CDMA inter-cluster
• Spreading codes determined randomly
• Broadcast during advertisement phase
64
Algorithm Summary (cont.)
• Steady-state phase
• All source nodes send their data to their cluster heads
• Cluster heads perform data aggregation/fusion through lo
cal transmission
• Cluster heads send aggregated data back to the BS using a
single direct transmission
65
An Example of a LEACH Network
Node
Cluster-Head Node
X Node that has been cluster-head in the last 1/P rounds
Cluster Border 66
Conclusions
• Advantages
• Increases the lifetime of the network
• Even drain of energy
• Distributed, no global knowledge required
• Energy saving due to aggregation by CHs
• Disadvantages
• LEACH assumes all nodes can transmit with enough powe
r to reach BS if necessary (e.g., elected as CHs)
• Each node should support both TDMA & CDMA
• Need to do time synchronization
• Nodes use single-hop communication
67
Location Based Routing
68
Overview
69
4.1
GEAR
Geographical and Energy Aware Routing
70
Geographical and Energy Aware Routing (GEAR)
• The protocol, called Geographic and Energy Aware Routing (GEAR), uses
energy aware and geographically-informed neighbor selection heuristics
to route a packet towards the destination region.
• The key idea is to restrict the number of interests in directed diffusion by
only considering a certain region rather than sending the interests to the
whole network. By doing this, GEAR can conserve more energy than dire
cted diffusion.
• The basic concept comprises of two main parts
• Route packets towards a target region through geographical
and energy aware neighbor selection
• Disseminate the packet within the region
71
Energy Aware Neighbor Computation
• Each node N maintains state h(N, R) which is called learned cost to regi
on R, where R is the target region
• Each node infrequently updates neighbor of its cost
• When a node wants to send a packet, it checks the learned cost to that
region of all its neighbors
• If a node does not have the learned cost of a neighbor to a region, the e
stimated cost is computed as follows:
c(Ni, R) = αd(Ni, R) + (1-α)e(Ni)
where
α = tunable weight, from 0 to 1.
d(Ni, R) = normalized the largest distance among neighbors of N
e(Ni) = normalized the largest consumed energy among neighbor
s of N
72
Energy Aware Neighbor Computation
(cont.)
• When a node wants to forward a packet to a destinati
on, it checks to see if it has any neighbor closer to des
tination than itself
• In case of multiple choices, it aims to minimize the lea
rned cost h(Nmin, R)
• It then sets its own cost to:
h(N, R) = h(Nmin, R) + c(N, Nmin)
c(N, Nmin) = the transmission cost from N and Nmin
73
Forwarding Around Holes
K L T
B–T= 5 C–T=2
x x
F G xH I J
h(C,T) = h(B,T)+c(C,B)
5
A B C D E
74
Recursive Geographic Forwarding
• Once the target region is reached, the packets are disseminated withi
n the region by recursive geographic forwarding
• Forwarding stops when a node is the only one in a sub-region
Ni
75
Recursive Geographic Forwarding (co
nt.)
• When network density is low recursive geographic for
warding is subject to two pathologies: inefficient trans
missions and non-termination
76
Recursive Geographic Forwarding (co
nt.)
• Inefficient Transmission
• Recursive geographic forwarding vs. Restricted flooding
E B
F 77
Recursive Geographic Forwarding
(cont.) Pathologies
• Non-Termination
• In the recursive geographic forwarding protocol, packet forwarding ter
minates when the target subregion is empty.
E H
A C
L
F
78
Recursive Geographic Forwarding
(cont.) Proposed solution for pathologies
• Solution:
• Node degree is used as a criteria to differentiate low
density networks from high density ones
• Choice of restricted flooding over recursive geograp
hic forwarding if the receiver’s node degree is belo
w a threshold value
79
Conclusion
80
4.2
GPSR
Greedy Perimeter Stateless Routing
81
Greedy Perimeter Stateless Routing
(GPSR)
82
Algorithm & Example
83
Greedy Forwarding (cont.)
84
Greedy Forwarding (cont.)
85
Greedy Forwarding (cont.)
• A simple beaconing algorithm provides all nodes with
their neighbors’ positions: periodically, each node tran
smits a beacon to broadcast MAC address, containing i
ts own identifier (e.g., IP address) and position
• Position is encoded as two four-byte floating point qua
ntities, for x and y coordinate values
• Upon not receiving a beacon from a neighbor for long
er than timeout interval T, a GPSR router assumes that
the neighbor has failed or gone out-of-range, and dele
tes the neighbor from its neighbor table
86
Greedy Forwarding (cont.)
The Problem of Greedy Forwarding
D |xD|<|wD|and|yD|
x will not choose to
forward to w or y
v z using greedy
forwarding
void
w y
x x
x
87
The Right-Hand Rule: Perimeters
• In previous works, use the right-hand rule to map perimeters by sending
packets on tours of them. The state accumulated in these packets is cach
ed by nodes, which recover from local maxima in greedy forwarding by r
outing to a node on a cached perimeter closer to the destination.
• This approach requires a heuristic, the no-crossing heuristic, to force the
right-hand rule to find perimeters that enclose voids in regions where ed
ges of the graph cross
x z
y 88
Right-Hand Rule Does Not Work with
Cross Edges
u
D
x originates a packet to u
w
Right-hand rule results in the
tour x-u-z-w-u-x
x
89
Remove Crossing Edge
u
v
w
Make the graph planar
Remove (w,z) from the
x graph
Right-hand rule results in
the tour x-u-z-v-x
90
Make a Graph Planar
• A graph in which no two edges cross is known as planar.
A set of nodes with radios, where all radios have identic
al, circular radio range r, can be seen as a graph: each n
ode is a vertex, and edge (n, m) exists between nodes n
and m if the distance between n and m, d(n, m)≦r.
• Convert a connectivity graph to planar non-crossing gra
ph by removing “bad” edges
• Ensure the original graph will not be disconnected
• Two types of planar graphs:
• Relative Neighborhood Graph (RNG)
• Gabriel Graph (GG)
91
Planarized Graphs (cont.)
Relative Neighborhood Graph (RNG)
w
u v
92
Planarized Graphs (cont.)
Gabriel Graph (GG)
w
u v
93
Planarized Graphs (cont.)
94
Connectedness of RNG Graph
• Key observation
• Any edge on the minimum spanning tr
ee of the original graph is not removed
• Proof by contradiction: Assume
(u,v) is such an edge but removed in R
NG
u
v
95
Planarized Graphs (cont.)
Relative
Original Gabriel Graph (GG) Neighborhood Graph
(RNG)
96
Combining Greedy and Planar Perimet
ers
• All data packets are marked initially at their originators as greedy mode
• GPSR packet headers include a flag field indicating whether the packet is
in greedy mode or perimeter mode
• Packet sources also include the geographic location of the destination in
packets
• Only a packet’s source sets the location destination field, it is left unchan
ged as the packet is forwarded through the network
• Upon receiving a greedy-mode packet for forwarding, a node searches it
s neighbor table for the neighbor geographically closest to the packet’s d
estination
• When no neighbor is closer, the node marks the packet into perimeter m
ode
97
GPSR
greedy fails
98
Combining Greedy and Planar Perimeters (cont.)
Lf
e0
99
Conclusion
100
QoS Based Routing
101
Overview
103
Challenges in QoS Routing
104
5.1
TBP (Ticket-Based Probing)
QoS of Bandwidth
105
Ticket-Based Probing
• Distributed multi path QoS routing scheme
• Bandwidth-constrained routing and delay-constrained routing
• There are numerous paths from source to destination,
we shall not randomly pick several paths to search
• We shall not use any flooding path-discovery approache
s, which may send routing messages to the entire netw
ork
• Multipath search is tolerant to imprecise information
• We want to make an intelligent hop-by-hop path selecti
on to guide the search along the best candidate paths
106
Ticket-Based Probing (cont.)
107
Ticket-Based Probing (cont.)
• A ticket is the permission to search one path. The sour
ce node issues a number of tickets based on the availa
ble state information
• Utilizes tickets to limit the number of paths searched d
uring route discovery
• A ticket is the permission to search a single path
• More tickets, more QoS constraints are required
• Probes (routing messages) are sent from the source to
ward the destination to search for a low-cost path that
satisfies the QoS requirement
• Each probe is required to carry at least one ticket
108
Ticket-Based Probing (cont.)
i
P1(1) P1
S (1)
P2(
2) )
P4(2
D
3)
j P
P3(
3(3
)
k
109
Ticket-Based Probing (cont.)
A
Demand = 3
3 3
S
D
3
C x2
3 5
2 2
6 E
B
110
Ticket-Based Probing (cont.)
Demand = 4 A
(1.1,3) (1.1,3)
3 3
S
D
C
3 2
2 5
(1.2,1) 2 2 (1.2,1)
6 E
B
(1.2,1)
111
Ticket-Based Probing (cont.)
A
Demand = 4
3 3
S (1.1,3) (1.1.1,2) D
C
3 2
(1.1.2,1)
2 (1.1.2,1) 5
(1.2,1) 2 2 (1.2,1)
6 E
B (1.2,1)
112
Ticket-Based Probing (cont.)
T1 T1
D D
S S
T2
T2
T1
D
S T2
x
113
Ticket-Based Probing (cont.)
Demand = 4 A
(1,4)
3
x
4
S
(2.1,3) D
C
3 2
x2 (2.1,3) 5
(2.1,3)
(2.2,1) 4 3 (2.2,1)
6 (2.1,3)
E
B (2.2,1)
114
Conclusion
115
Conclusion (cont.)
116