Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Piggybacking (Internet access) wikipedia , lookup
Distributed operating system wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Airborne Networking wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
WIRELESS SENSOR NETWORKS Ian F. Akyildiz Broadband & Wireless Networking Laboratory School of Electrical and Computer Engineering Georgia Institute of Technology Tel: 404-894-5141; Fax: 404-894-7883 Email: [email protected] Web: http://www.ece.gatech.edu/research/labs/bwn 1. INTRODUCTION SENSOR NETWORKS ARCHITECTURE Internet, Satellite, etc Sink Sink Several thousand nodes Nodes are tens of feet of each other Densities as high as 20 nodes/m3 Task Manager I.F.Akyildiz, W.Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless Sensor Networks: A Survey”, Computer Networks (Elsevier) Journal, March 2002. IFA’2004 2 Key technologies that enable sensor networks: Micro electro-mechanical systems (MEMS) Wireless communications Digital electronics IFA’2004 3 Sensor Network Concept Sensors nodes are very close to each other Sensor nodes have local processing capability Sensor nodes can be randomly and rapidly deployed even in places inaccessible for humans Sensor nodes can organize themselves to communicate with an access point Sensor nodes can collaboratively work IFA’2004 4 SENSOR NODE HARDWARE Location Finding System SENSING UNIT Mobilizer PROCESSING UNIT Processor Transceiver Sensor ADC Memory Power Unit IFA’2004 Small Low power Low bit rate High density Low cost (dispensable) Autonomous Adaptive Power Generator 5 Example: MICA Motes BWN Lab @ GaTech Processor and Radio platform (MPR300CB) is based on Atmel ATmega 128L low power microcontroller that runs TinyOs operating system from its internal flash memory. IFA’2004 6 Berkeley Motes IFA’2004 7 Specifications of the Mote Processor/Radio Board MPR300CB Remarks Speed 4 MHz Flash 128K bytes SRAM 4K bytes EEPROM 4K bytes Radio Frequency 916MHz or 433MHz ISM Band Data Rate 40 Kbits/Sec Max Power 0.75 mW Radio Range 100 feet Power 2 x AA batteries IFA’2004 Programmable 8 Examples for Sensor Nodes UCLA: WINS UC Berkeley: COTS Dust UC Berkeley: Smart Dust JPL: Sensor Webs Rockwell: WINS IFA’2004 9 Examples for Sensor Nodes Rene Mote Dot Mote Mica node IFA’2004 weC Mote 10 Zylog’s eZ80 Provides a way to internet-enabled process control and monitoring applications. Temperature sensor, water leak detector and many more applications Metro IPWorks™ software stack embedded Enables users to access Webserver data and files from anywhere in the world. IFA’2004 11 Systronix STEP board A first tool to support hardware development and prototyping with the new Dallas TINI Java Module. Embedding the internet with TINI java A complete Java Virtual Machine, TCP/IP stack, ethernet hardware, control area network, iButton network and dual RS232 all on SIMM72 module IFA’2004 12 2. Sensor Networks Applications Sensor networks may consist of sensor types such as: IFA’2004 Seismic Low sampling rate magnetic Thermal Visual Infrared Acoustic Radar. 13 Sensor Networks Applications Sensors can monitor ambient conditions including: Temperature Humidity Vehicular movement Lightning condition Pressure Soil makeup Noise levels The presence or absence of certain kinds of objects Mechanical stress levels on attached objects, and Current characteristics (speed, direction, size) of an object IFA’2004 14 Sensor Networks Applications Sensors can be used for: IFA’2004 Continuous sensing Event detection Event identification Location sensing Local control of actuators 15 Sensor Networks Applications IFA’2004 Military Environmental Health Home Other commercial Space exploration Chemical processing Disaster relief 16 Sensor Networks Applications Military Applications: Command, control, communications, computing, intelligence, surveillance, reconnaissance, targeting (C4SRT) Monitoring friendly forces, equipment and ammunition Battlefield surveillance Reconnaissance of opposing forces and terrain Targeting Battle damage assessment Nuclear, biological and chemical (NBC) attack detection and reconnaissance IFA’2004 17 SensIT: Sensor Information Technology “SensIT was a program for developing software for distributed wireless sensor networks.” SensIT pursued two key thrusts: * New networking techniques * Network information processing. “ SensIT nodes can support detection, identification, and tracking of threats, as well as targeting and communication.” http://www.darpa.mil/DARPATech2000/Speeches/ITOSpeeches/ITOSensIT(Kumar).doc S. Kumar, D. Shepherd, “SensIT: Sensor information technology for the warfighter,” 4th Int. Conference on Information Fusion, 2001. IFA’2004 18 ForceNet (US Navy) ForceNet binds together Sea Strike, Sea Shield, and Sea Basing. Sea Strike—Projecting Precise and Persistent Offensive Power Sea Shield—Projecting Global Defensive Assurance Sea Basing—Projecting Joint Operational Independence It is the framework for naval warfare that integrates warriors, sensors, command and control, platforms, and weapons into a networked, distributed combat force. http://www.chinfo.navy.mil/navpalib/cno/proceedings.html IFA’2004 19 SAD: SEAL Attack Detection & Anti-Submarine Warfare antenna led hooks cable sensor IFA’2004 20 Other Projects ESG: Expeditionary Sensor Grid. NCCT: Network Centric Collaborative Targeting. Sea Web. Smart Web Sensor Web IFA’2004 21 Other Military Applications Intrusion detection (mine fields) Detection of firing gun (small arms) location Chemical (biological) attack detection Targeting and target tracking systems Enhanced guidance and IFF systems Battle damage assessment system Enhanced logistics systems, IFA’2004 22 Environmental Applications Tracking the movements of birds, small animals, and insects Monitoring environmental conditions that affect crops and livestock Irrigation Macroinstruments for large-scale Earth monitoring and planetary exploration Chemical/biological detection Biological, Earth, and environmental monitoring in marine, soil, and atmospheric contexts Meteorological or geophysical research Pollution study, Precision agriculture Biocomplexity mapping of the environment Flood detection, and Forest fire detection. IFA’2004 23 Forest Fire Detection Purpose: Detect fire before spread uncontrollable. Maybe strategically, randomly, and densely deployed Millions of sensor nodes can be deployed IFA’2004 24 Health Applications Providing interfaces for the disabled Integrated patient monitoring Diagnostics Monitoring the movements and internal processes of insects or other small animals Telemonitoring of human physiological data Tracking and monitoring doctors and patients inside a hospital, and Drug administration in hospitals IFA’2004 25 Drug Administration in Hospitals Purpose: Minimize prescribing the wrong medication to patients. Identify patients allergies and required medications Current computerized systems can reduce medication errors and prevent many Adverse Drug Events (ADE) Cost of ADEs is as high as $5.6 millions/year /hospital, and 770,000 Americans injured and die annually because of ADEs. Save hospitals up to $500,000/year Only 5% of civilian hospitals have computerized system Can prevent 84% of dosage errors Start-up cost is around $2 million (cheap sensor nodes can be deployed). IFA’2004 26 Home Applications Types: Security Home automation, and Smart Environment IFA’2004 27 Smart Environment Purpose: Allowing users to seamlessly interact with their environment. Two perspectives: human-centered, or technology-centered Example: “Aware Home” project at Georgia Tech. IFA’2004 28 Smart Environment Human-centered: A smart environment must adapt to the needs of the users in terms of I/O capabilities. Technology-centered New hardware technologies, networking solutions and middleware services must be developed. IFA’2004 29 Smart Environment (Cont’d) Wired or wireless connection Room 2 Room 1 Scanner and phone with embedded sensor nodes. Computers with embedded sensor nodes. User enters IFA’2004 Server User enters 30 Commercial Applications Building virtual keyboards Monitoring product quality Constructing smart office spaces Interactive toys Monitor disaster areas Smart spaces with sensor nodes embedded inside Machine diagnosis Interactive museums Managing inventory control Environmental control in office buildings Detecting, and monitoring car thefts, and Vehicle tracking and detection. IFA’2004 31 Vehicle Tracking and Detection Purpose: Locate a vehicle AMPS sensor nodes are deployed Two ways to detect and track the vehicle - determine the line of bearing (LOB) in each cluster and then forward to the base-station, or - send all the raw data to the base-station (uses more power as distance increases) IFA’2004 32 iBadge - UCLA Investigate behavior of children/patient Features: – – – – Speech recording/replaying Position detection Direction detection/estimation (compass) Weather data: Temperature, Humidity, Pressure, Light IFA’2004 33 iBadge - UCLA IFA’2004 34 iButton Applications Caregivers Assistance – Do not need to keep a bunch of keys. Only one iButton will do the work Elder Assistance – They do not need to enter all their personal information again and again. Only one touch of iButton is sufficient – They can enter their ATM card information and PIN with iButton – Vending Machine Operation Assistance IFA’2004 35 3. Factors Influencing Sensor Network Design A. Fault Tolerance (Reliability) B. Scalability C. Production Costs D. Hardware Constraints E. Sensor Network Topology F. Operating Environment G. Transmission Media H. Power Consumption IFA’2004 36 A. Fault Tolerance (Reliability) Sensor nodes may fail or be blocked due to lack of power have physical damage, or environmental interference. The failure of sensor nodes should not affect the overall task of the sensor network. This is called RELIABILITY or FAULT TOLERANCE, i.e., ability to sustain sensor network functionality without any interruption IFA’2004 37 Fault Tolerance (Reliability) (Ctn’d) Reliability (Fault Tolerance) of a sensor node is modeled: R ( t ) exp( t ) k k i.e., by Poisson distribution, to capture the probability of not having a failure within the time interval (0,t) with lambda_k is the failure rate of the sensor node k and t is the time period. G. Hoblos, M. Staroswiecki, and A. Aitouche, “Optimal Design of Fault Tolerant Sensor Networks,” IEEE International Conference on Control Applications, pp. 467-472, Anchorage, AK, September 2000. IFA’2004 38 Fault Tolerance (Reliability) (Ctn’d) EXAMPLE: Suppose: lambda = 3.5 * 10-3 IFA’2004 t=10sec R = 0.97 t=20sec R= 0.93 t=30sec R= 0.9 t=50sec R=0.84 39 Fault Tolerance (Reliability) (Ctn’d) Reliability (Fault Tolerance) of a broadcast range with N sensor nodes is calculated from: N R(t ) 1 [1 Rk (t )] k 1 IFA’2004 40 Fault Tolerance (Reliability) (Ctn’d) EXAMPLE: How many sensor nodes are needed within a broadcast radius (range) to have 99% fault tolerated network? Assuming all sensors within the radio range have same reliability, prev. equation becomes R(t ) 1 [1 R(t )] N Drop t and substitute f = (1 – R). o.99 = 1 – fN N = 2 IFA’2004 41 Fault Tolerance (Reliability) (Ctn’d) REMARK: 1. Protocols and algorithms may be designed to address the level of fault tolerance required by sensor networks. 2. If the environment has little interference, then the requirements can be more relaxed. IFA’2004 42 Fault Tolerance (Reliability) (Ctn’d) Examples: 1. House to keep track of humidity and temperature levels the sensors cannot be damaged easily or interfered by environments low fault tolerance (reliability) requirement!!!! 2. Battlefield for surveillance the sensed data are critical and sensors can be destroyed by enemies high fault tolerance (reliability) requirement!!! Bottomline: Fault Tolerance (Reliability) depends heavily on applications!!! IFA’2004 43 B. Scalability The number of sensor nodes may reach millions in studying a field/application The density of sensor nodes can range from few to several hundreds in a region (cluster) which can be less than 10m in diameter. IFA’2004 44 Scalability (Ctn’d) The Sensor Node Density: i.e., the number of expected nodes within the radio range R: ( R) ( N R ) / A 2 where N is the number of scattered sensor nodes in region A and R is the radio transmission range. Basically: is the number of sensor nodes within the transmission radius of each sensor node in region A. The number of sensor nodes in a region is used to indicate the node density depends on the application. IFA’2004 45 Network Configuration Sink node Radio Range R Sensor nodes IFA’2004 46 Scalability (Ctn’d) Assuming that connection establishment is equally likely with any node within the radio range R of the given node, the expected hop distance is: dhop = 2R/3 e.g., R=20m 13.33m IFA’2004 47 Network Configuration dnei Expected distance to the nearest neighbor, may or may not be communicating neighbor. dhop Expected distance to the next hop, i.e., distance to communicating neighbor. dhop>=dnei Sink node Radio Range R dne i dho p IFA’2004 Sensor nodes 48 Scalability (Ctn’d) EXAMPLE: Assume sensor nodes are evenly distributed in the sensor field, determine the node density if 200 sensor nodes are deployed in a 50x50 m2 region where each sensor node has a broadcast radius of 5 m. Use the eq. mu (R) = (200 * pi * 52 )/(50*50) = 2 * pi IFA’2004 49 Scalability (Cont’d) Examples: 1. Machine Diagnosis Application: less than 300 sensor nodes in a 5 m x 5 m region. 2. Vehicle Tracking Application: Around 10 sensor nodes per cluster/region. 3. Home Application: 2 dozens or more. 4. Habitat Monitoring Application: Range from 25 to 100 nodes/cluster 5. Personal Applications: Ranges from 100s to 1000s, e.g., clothing, eye glasses, shoes, watch, jewelry IFA’2004 50 C. Production Costs Cost of sensors must be low so that the sensor networks can be justified!!! PicoNode: less than $1 Bluetooth system: around $10,THE OBJECTIVE FOR SENSOR COSTS must be lower than $1!!!!!!! Currently: COTS Dust Motes ranges from $25 to $172 (STILL VERY EXPENSIVE!!!!) IFA’2004 51 D. Sensor Node Hardware A Sensor Node Location Finding System SENSING UNIT Mobilizer Processor Transceiver Sensor ADC Memory Power Unit IFA’2004 Small Low power Low bit rate High density Low cost (dispensable Autonomous Adaptive PROCESSING UNIT Power Generator 52 E. Sensor Network Topology Internet, Satellite, etc Sink Several thousand nodes Nodes are tens of feet of each other Densities as high as 20 nodes/m3 Sink Task Manager IFA’2004 53 Sensor Network Topology (Ctn’d) Topology maintenance and change: IFA’2004 Pre-deployment and Deployment Phase Post Deployment Phase Re-Deployment of Additional Nodes 54 Sensor Network Topology (Ctn’d) Pre-deployment and Deployment Phase Sensor networks can be deployed by: IFA’2004 Dropping from a plane Delivering in an artillery shell, rocket or missile Throwing by a catapult (from a ship board, etc.) Placing in factory Being placed one by one by a human or a robot 55 Sensor Network Topology (Ctn’d) Initial deployment schemes must IFA’2004 reduce installation cost eliminate the need for any pre-organization and pre-planning increase the flexibility of arrangement promote self organization and fault tolerance. 56 Sensor Network Topology (Ctn’d) POST-DEPLOYMENT PHASE After deployment, topology changes are due to change in sensor nodes’ IFA’2004 position reachability (due to jamming, noise, moving obstacles, etc.) available energy malfunctioning 57 F. Operating Environment Sensor networks may work in busy intersections IFA’2004 in the interior of a large machinery at the bottom of an ocean inside a twister at the surface of an ocean in a biologically or chemically contaminated field in a battlefield beyond the enemy lines in a house or a large building in a large warehouse attached to animals attached to fast moving vehicles in a drain or river moving with current …………………… 58 G. TRANSMISSION MEDIA Radio or Infrared or Optical Media ISM (Industrial, Scientific and Medical Bands) 433 MHz ISM Band in Europe and 915 MHz as well as 2.4 GHz ISM Bands in North America. REASONS: Free radio, huge spectrum allocation and global availability. IFA’2004 59 Transmission Media In a Multihop sensor network nodes are linked by Wireless medium – Radio Frequency (RF) Most of the current sensor node HW is based on it Do not need Line of Sight Can hide these sensors – Infrared (IR) License free Robust to interference Cheaper and easier to build Require line of sight Short Range Solution – Optical Media Require Line of sight IFA’2004 60 H. POWER CONSUMPTION Sensor node has limited power source (~1.2V). Sensor node LIFETIME depends on battery lifetime Sensors can be a DATA ORIGINATOR or a DATA ROUTER. Power conservation and power management are important POWER AWARE PROTOCOLS must be developed. IFA’2004 61 Power Consumption (Ctn’d) • Power consumption in a sensor network can be divided into three domains Communication Data Processing Sensing IFA’2004 62 Power Consumption (Ctn’d) Communication A sensor expends maximum energy in data communication (both for transmission and reception). NOTE: For short range communication with low radiation power (~0 dbm), transmission and reception power costs are approximately the same, (e.g., modern low power short range transceivers consume between 15 and 300 milliwatts of power when sending and receiving). Transceiver circuitry has both active and start-up power consumption IFA’2004 63 Power Consumption (Ctn’d) Power consumption for data communication (Pc) Pc = Pte + Pre + P0 Pte/re P0 IFA’2004 is the power consumed in the transmitter/receiver electronics (including the start-up power) is the output transmit power 64 Power Consumption in Data Communication (PC) (Detailed Formula) Pc NT [ PT (Ton Tst ) Pout (Ton )] N R [ PR ( Ron Rst )] where PT is power consumed by transmitter PR is power consumed by receiver Pout is output power of transmitter NT is the number of times Ton is time for “transmitter on” transmitter is switched on per Ron is time for “receiver on” unit time Tst is start-up time for transmitter N is the number of times receiver R Rst is start-up time for receiver is switched on per unit time IFA’2004 65 Power Consumption in Communication (Ctn’d) Ton = L / R where L is the packet size and R is the data rate. Low power radio transceiver has typical PT and PR values around 20 dBm and Pout close to 0 dBm. Note that PicoRadio aims at a Pc value of –20 dBm. IFA’2004 66 Power Consumption in Communication (Ctn’d) START-UP POWER: REMARK: Sensors communicate in short data packets Start-up power starts dominating as packet size is reduced It is inefficient to turn the transceiver ON and OFF because a large amount of power is spent in turning the transceiver back ON each time. IFA’2004 67 Power Consumption in Data Processing (Ctn’d) This is much less than in communication. EXAMPLE: Energy cost of transmitting 1 KB a distance of 100 m is approx. equal to executing 3 Million instructions by a 100 million instructions per second processor. Local data processing is crucial in minimizing power consumption in a multi-hop network IFA’2004 68 Power Consumption in Data Processing (Ctn’d) Complementary Metal Oxide Semiconductor (CMOS) technology used in designing processors has energy limitations Dynamic Voltage Scaling and other Low power CPU organization strategies need to be explored IFA’2004 69 Power Consumption in Data Processing (Pp) Pp C V 2 dd f Vdd Io exp{Vdd / n'VT } Where C is the total switching capacitance; Vdd is the voltage swing; F is the switching frequency The second term indicates the power loss due to leakage currents. IFA’2004 70 Power Consumption (Ctn’d) (Another Simple Energy Model) Assuming a sensor node is only operating in transmit and receive modes with the following assumptions: Energy to run circuitry: E_{elec} = 50 nJ/bit Energy for radio transmission: E_{amp} = 100 pJ/bit/m2 Energy for sending k bits over distance d E_Tx (k,D) = E_{elec} * k + E_{amp} * k * d2 Energy for receiving k bits: E_Rx (k,D) = E_{elec} * k IFA’2004 71 ENERGY MODEL IFA’2004 72 Power Consumption (Ctn’d) (Another Simple Energy Model) What is the energy consumption if 1 Mbit of information is transferred from the source to the sink where the source and sink are separated by 100 meters and the broadcast radius of each node is 5 meters? Assume the neighbor nodes are overhearing each other’s broadcast. IFA’2004 73 Power Consumption (Ctn’d) (Another Simple Energy Model) 100 meters / 5 meters = 20 pairs of transmitting and receiving nodes (one node transmits and one node receives) E_Tx (k,D) = E_{elec} * k + E_{amp} * k * D2 E_{Tx} = 50 nJ/bit . 106 + 100 pJ/bit/m2 . 106 . 52 = = 0.5J + 0.0025 J = 0.0525 J E_Rx (k,D) = E_{elec} * k E_{Rx} = 0.05 J E_{pair} = E_{Tx} + E_{Rx} = 0.1025J E_{T} = 20 . E_{pair} = 20. 0.1025J = 2.050 J IFA’2004 74 Power Consumption in Sensing (Ctn’d) Depends on Application Nature of sensing: Sporadic or Constant Detection complexity Ambient noise levels IFA’2004 75 Sensor Networks Communication Architecture Sensor Node Internet, Satellite, etc Task Manager IFA’2004 Sink F E C B A Sensor Field D Collect data Route data back to the sink 76 Sensor Networks Communication Architecture Data Link Layer Physical Layer IFA’2004 Task Management Plane Network Layer Mobility Management Plane Transport Layer Power Management Plane Application Layer Used by sink and all sensor nodes Combines power and routing awareness Integrates data with networking protocols Communicates power efficiently through wireless medium and Promotes cooperative efforts. 77 WHY CAN’T AD-HOC NETWORK PROTOCOLS BE USED HERE? Number of sensor nodes can be several orders of magnitude higher Sensor nodes are densely deployed and are prone to failures The topology of a sensor network changes very frequently due to node mobility and node failure Sensor nodes are limited in power, computational capacities, and memory May not have global ID like IP address. Need tight integration with sensing tasks. IFA’2004 78 5. APPLICATON LAYER FRAMEWORK Sensor Network Management Protocol (SMP) Task Assignment and Data Advertisement Protocol Sensor Query and Data Dissemination Protocol IFA’2004 79 Sensor Network Topology Internet, Satellite, etc Users sensor node gateway (gnode) Server Task Manager (Database) wireless link IFA’2004 80 APPLICATON LAYER SMP: Sensor Managament Protocol System Administrators interact with Sensors using SMP. TASKS: Moving the sensor nodes Turning sensors on and off Querying the sensor network configuration and the status of nodes and re-configuring the sensor network Authentication, key distribution and security in data communication Time-synchronization of the sensor nodes Exchanging data related to the location finding algorithms Introducing the rules related to data aggregation, attribute-based naming and clustering to the sensor nodes IFA’2004 81 APPLICATON LAYER (Query Processing) Users can request data from the network-> Efficient Query Processing User Query Types: 1. HISTORICAL QUERIES: Used for analysis of historical data stored in a storage area (PC), e.g., what was the temperature 2 hours back in the NW quadrant. 2. ONE TIME QUERIES: Gives a snapshot of the network, e.g., what is the current temperature in the NW quadrant. 3. PERSISTANT QUERIES: Used to monitor the network over a time interval with respect to some parameters, e.g., report the temperature for the next 2 hours. IFA’2004 82 QUERYING – Continuous Sensors communicate their data continuously at a prespecified rate. – Event Driven The sensors report information only when the event of interest occurs. – Observer Initiated (request-reply): Sensors only report their results in response to an explicit request from the observer. Aggregate queries Complex queries Queries for replicated data – Hybrid IFA’2004 83 APPLICATON LAYER Sensor Query and Tasking Language (SQTL): (C-C Shen, et.al., “Sensor Information Networking Architecture and Applications”, IEEE Personal Communications Magazine, pp. 52-59, August 2001.) SQTL is a procedural scripting language. It provides interfaces to access sensor hardware: - getTemperature, turnOn for location awareness: - isNeighbor, getPosition and for communication: - tell, execute. IFA’2004 84 APPLICATON LAYER Sensor Query and Tasking Language (SQTL): By using the upon command, a programmer can create an event handling block for three types of events: - Events generated when a message is received by a sensor node, - Events triggered periodically, - Events caused by the expiration of a timer. These types of events are defined by SQTL keywords receive, every and expire, respectively. IFA’2004 85 Simple Abtract Querying Example Select [ task, time, location, [distinct | all], amplitude, [[avg | min |max | count | sum ] (amplitude)]] from [any , every , aggregate m] where [ power available [<|>] PA | location [in | not in] RECT | tmin < time < tmax | task = t | amplitude [<|==|>] a ] group by task based on [time limit = lt | packet limit = lp | resolution = r | region = xy] IFA’2004 86 Data Centric Query Attribute-based naming architecture Data centric protocol Observer sends a query and gets the response from valid sensor node No global ID IFA’2004 87 APPLICATON LAYER Task Assignment and Data Advertisement Protocol INTEREST DISSEMINATION * Users send their interest to a sensor node, a subset of the nodes or the entire network. * This interest may be about a certain attribute of the sensor field or a triggering event. ADVERTISEMENT OF AVAILABLE DATA * Sensor nodes advertise the available data to the users and the users query the data which they are interested in. IFA’2004 88 APPLICATON LAYER Sensor Query and Data Dissemination Protocol Provides user applicatons with interfaces to issue queries, respond to queries and collect incoming replies. These queries are not issued to particular nodes, instead ATTRIBUTE BASED NAMING (QUERY) “The locations of the nodes that sense temperature higher than 70F” LOCATION BASED NAMING (QUERY) “Temperatures read by the nodes in region A” IFA’2004 89 Interest Dissemination Interest dissemination is performed to assign the sensing tasks to the sensor nodes. Either sinks broadcast the interest or sensor nodes broadcast an advertisement for the available data and wait for a request from the sinks. 71 75 68 Sink 67 66 71 71 68 71 69 Query: Sensor nodes that read >70oF temperature IFA’2004 90 Data Aggregation (Data Fusion) The sink asks the sensor nodes to report certain conditions. Data coming from multiple sensor nodes are aggregated. 71 75 68 Sink 66 67 71 71 68 71 69 Query: Sensor nodes that read >70oF temperature IFA’2004 91 Location Awareness (Attribute Based Naming) Query an Attribute of the sensor field Region A 71 75 68 Sink 67 66 71 71 Region C Query: Temperatures read by the nodes in Region A IFA’2004 71 68 69 Region B Important for broadcasting, multicasting, geocasting and anycasting 92 APPLICATON LAYER RESEARCH NEEDS Sensor Network Management Protocol Task Assignment and Data Advertisement Protocol Sensor Query and Data Dissemination Protocol Sophisticated GUI (Graphical User Interface) Tool IFA’2004 93 NETWORK LAYER (ROUTING BASIC KNOWLEDGE) The constraints to calculate the routes: 1. Additive Metrics: Delay, hop count, distance, assigned costs (sysadmin preference), average queue length... 2. Bottleneck Metrics: Bandwidth, residual capacity and other bandwidth related metrics. REMARK: All routing algorithms are based on the same principle used as in Dijkstra's, which is used to find the minimum cost path from source to destination. Dikstra and Bellman solve the SHORTEST PATH PROBLEM… RIP (Distant Vector Algorithm) -> Bellman/Ford Algorithm OSPF (Open Shortest Path Algorithm) Dikstra Algorithm IFA’2004 94 Routing Algorithms Constraints Regarding Power Efficiency (Energy Efficient Routing) E (PA=1) F (PA=4) Maximum power available (PA) route Minimum hop route Minimum energy route D (PA=3) T Sink Maximum minimum PA node route (Route along which the minimum PA is larger than the A (PA=2) B (PA=2) C (PA=2) minimum PAs of the other routes is preferred, e.g., Route 3 is the Route 1: Sink-A-B-T (PA=4) most efficient; Route 1 is the Route 2: Sink-A-B-C-T (PA=6) second). Route 3: Sink-D-T (PA=3) Route 4: Sink-E-F-T (PA=5) IFA’2004 95 Why can’t we use conventional routing algorithms here? Global (Unique) addresses, local addresses. Unique node addresses cannot be used in many sensor networks - sheer number of nodes - energy constraints - data centric approach Node addressing is needed for - node management - sensor management - querying - data aggregation and fusion - service discovery - routing IFA’2004 96 Addressing in Sensor Networks 1. Attribute based naming and data centric routing 2. Spatial addressing (location awareness) 3. Address reuse 4. Query mapping. IFA’2004 97 NETWORK LAYER (ROUTING for SENSOR NETWORKS) Important considerations: Sensor networks are mostly data centric An ideal sensor network has attribute based addressing and location awareness Data aggregation is useful unless it does not hinder collaborative effort Power efficiency is always a key factor IFA’2004 98 Some Concepts Data-Centric – Node doesn't need an identity What is the temp at node #27 ? – Data is named by attributes Where are the nodes whose temp recently exceeded 30 degrees ? How many pedestrians do you observe in region X? Tell me in what direction that vehicle in region Y is moving? Application-Specific – Nodes can perform application specific data aggregation, caching and forwarding IFA’2004 99 Attribute Based Naming Data-Centric Routing Interest dissemination is performed to assign the sensing tasks to the sensor nodes. Either sinks broadcast the interest or sensor nodes broadcast an advertisement for the available data and wait for a request from the sinks. 71 75 68 Sink 67 66 71 71 68 Query: Nodes that read >70oF temperature IFA’2004 71 69 100 Data Centric Routing Attribute-based naming architecture Data centric protocol Observer sends a query and gets the response from valid sensor node No global ID IFA’2004 101 Data Aggregation (Data Fusion) To solve the implosion and overlap problems in data centric routing. Sensor network is perceived as a reverse multicast tree. The sink asks the sensor nodes to report certain conditions. Data coming from multiple sensor nodes are aggregated. 71 75 68 Sink 66 67 71 71 68 71 69 Query: Nodes that read >70oF temperature IFA’2004 102 Data Aggregation Categorization of Data Aggregation Schemes: 1. Temporal or spatial aggregation 2. Snapshot or periodical aggregation 3. Centralized or distributed aggregation 4. Early or late aggregation IFA’2004 103 Polygonal (Spatial) Addressing Location Awareness Region A 71 75 68 Sink 67 66 71 71 Region C Query: Temperatures read by the nodes in Region A IFA’2004 71 68 69 Region B Important for broadcasting, multicasting, geocasting and 104 anycasting Taxonomy of Routing Protocols for Sensor Networks Categorization of Routing Protocols for Wireless Sensor Networks: (K. Akkaya, M. Younis, “A Survey on Routing Protocols for Wireless Sensor Networks,” Elsevier AdHoc Networks, 2004) 1. Data Centric Protocols Flooding, Gossiping, SPIN, SAR (Sequential Assignment Routing) , Directed Diffusion, Rumor Routing, Gradient Based Routing, Constrained Anisotropic Diffused Routing, COUGAR, ACQUIRE 2. Hierarchical LEACH, TEEN (Threshold Sensitive Energy Efficient Sensor APTEEN, PEGASIS, Energy Aware Scheme Network Protocol), 3. Location Based MECN, SMECN (Small Minimum Energy Com Netw), GAF (Geographic Adaptive Fidelity), GEAR IFA’2004 105 Conventional Approach FLOODING Broadcast data to all neighbor nodes A C B D E F G IFA’2004 106 ROUTING ALGORITHMS Gossiping GOSSIPING: Sends data to one randomly selected neighbor. Example: IFA’2004 107 Problems of Flooding and Gossiping PROBLEMS: Although these techniques are simple and reactive, they have some disadvantages including: * Implosion (NOTE: Gossiping avoids this by selecting only one node; but this causes delays to propagate the data through the network) * Overlap * Resource Blindness * Power (Energy) Inefficient IFA’2004 108 Problems Implosion (a) A B (a) (a) C D Data Overlap q r A s B (a) (q,r) C (r,s) Resource Blindness IFA’2004 No knowledge about the available power of resources 109 Gossiping Uses randomization to save energy Selects a single node at random and sends the data to it Avoids implosions Distributes information slowly Energy dissipates slowly IFA’2004 110 The Optimum Protocol A “Ideal” – – – – Shortest-path routes Avoids overlap Minimum energy Need global topology information IFA’2004 C B D E F G 111 Ideal Dissemination No implosion and no overlap Disseminate in shortest possible time IFA’2004 112 SPIN: Sensor Protocol for Information via Negotiation (W.R. Heinzelman, J. Kulik, and H. Balakrishan, “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks”, Proc. ACM MobiCom’99, pp. 174-185, 1999 ) Two basic ideas: Sensors communicate with each other about the data that they already have and the data they still need to obtain to conserve energy and operate efficiently exchanging data about sensor data may be cheap Sensors must monitor and adapt to changes in their own energy resources IFA’2004 113 SPIN Uses three types of messages: ADV, REQ, and DATA. When a sensor node has something new, it broadcasts an advertisement (ADV) packet that contains the new data, i.e., the meta data. - Interested nodes send a request (REQ) packet. Data is sent to the nodes that request by DATA packets. This will be repeated until all nodes will get a copy. - IFA’2004 114 SPIN Good for disseminating information to all sensor nodes. SPIN is based on data-centric routing where the sensors broadcast an advertisement for the available data and wait for a request from interested sinks 1. 2. 1. ADV 2. REQ 3. DATA 3. IFA’2004 115 SPIN Meta-Data <=> Data Naming ADV A B REQ A B DATA A IFA’2004 B ADV- advertise/name data REQ- request specific data DATA- requested data 116 SPIN ADV REQ DATA IFA’2004 ADV DATA REQ 117 EXAMPLE Sensor A sends meta-data to neighbor A B IFA’2004 118 Sensor B requests data from Sensor A A B IFA’2004 119 Sensor A sends data to Sensor B A B IFA’2004 120 Sensor B aggregates data and sends meta-data for A and B to neighbors A B IFA’2004 121 All but 1 neighbor request data A B IFA’2004 122 Sensor B sends requested data to neighbors A B IFA’2004 123 SPIN-1 Protocol SPIN-1 – 3-stage handshake protocol – Advantages Simple Implosion avoidance Disadvantages * Cannot isolate the nodes that do not want to receive the information. * Consume unnecessary power. IFA’2004 124 SPIN-2 Spin-2 – SPIN-1 + low-energy threshold – Modifies behavior based on current energy resources IFA’2004 125 SPIN-2 Adds a simple energy conservation heuristic When energy is plentiful, SPIN-2 behaves like SPIN-1 When energy approaches a low-energy threshold, SPIN-2 node reduces its participation in the protocol (DORMANT) participate in a stage of protocol only if the node believes that it can complete all the remaining stages IFA’2004 126 SPIN Algorithm Variants Flooding -- Each node floods new data to all of its neighbors. Gossiping -- Each node floods all its data to one, randomly selected neighbor. Negotiating -- nodes decide what data to send based on meta-data advertisements. SPIN-1 Zzz... IFA’2004 Sleeping -- Same as negotiating, except that nodes stop sending messages when energy is low. SPIN-2 127 CONCLUSIONS Flooding converges first – No delays SPIN-1 – Reduces energy by 70% – No redundant DATA messages SPIN-2 distributes – 10% more data per unit energy than SPIN-1 – 60% more data per unit energy than flooding IFA’2004 128 ROUTING ALGORITHM (DIRECTED DIFFUSION) (C. Intanagonwiwat, R. Gowindan and D. Estrin, “Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks”, Proc. ACM MobiCom’00, pp. 56-67, 2000.) This is a DATA CENTRIC ROUTING scheme!!!! - The idea aims at diffusing data through sensor nodes by using a naming scheme for the data. - The main reason behind this is to get rid off unnecessary operation of routing schemes to save Energy. Also Robustness and Scaling requirements need to be considered. - IFA’2004 129 Data Centric Data-Centric – Sensor node does not need an identity What is the temp at node #27 ? – Data is named by attributes Where are the nodes whose temp recently exceeded 30 degrees ? How many pedestrians do you observe in region X? Tell me in what direction that vehicle in region Y is moving? Application-Specific – Nodes can perform application specific data aggregation, caching and forwarding IFA’2004 130 DIRECTED DIFFUSION DD is data centric, i.e., data generated by sensor nodes is NAMED by ATTRIBUTE-VALUE pairs. * A sensor node requests data by sending interests for named data. * Data matching the interest is then drawn down towards that node. * Intermediate sensor nodes can cache or transform data and may direct interests based on previously cached data. * IFA’2004 131 DIRECTED DIFFUSION * An arbitrary sensor node (usually the SINK) uses attribute-value pairs (interests) for the data and queries the sensors in an on-demand basis. * In order to create a query, an interest is defined using a list of attribute-value pairs such as name of objects, interval, duration, geographical area, etc. * The sink queries the sensors in an on-demand basis using these pairs. * The sink broadcasts this interest to sensor nodes. * Each sensor node then stores this interest entry in its cache. * The interests in the caches are then used to compare the received data with the values in the interests. - IFA’2004 132 DIRECTED DIFFUSION Example: * The users query is transformed into an interest that is diffused towards nodes in regions X or Y. * When a node in that region receives an interest it activates its sensors which begin collecting information about pedestrians. * When the sensors report the presence of pedestrians this returns along the reverse path of interest propagation. * Intermediate nodes might aggregate the data, e.g., more accurately pinpoint the pedestrians location by combining reports from several sensors. * An important feature of directed diffusion is that interest and data propagation and aggregation are determined by localized interactions (message changes between neighbors or nodes within some vicinity) IFA’2004 133 DIRECTED DIFFUSION Data is named using attribute-value pairs, e.g., Example: (Animal Tracking Task) Type = four legged animal (detect animal location) Interval = 20 ms (send back events every 20 ms) Duration = 10 seconds (.. for the next 10 seconds) Rec = [-100,100,200,00] (from sensors within the rectangle) The task description specifies an interest for data matching for attributes called INTEREST. IFA’2004 134 DIRECTED DIFFUSION The data sent in response to interests are also named similarly. Example: Sensor detecting the animal generates the following data: Type – four legged animal (type of animal seen) Instance= elephant (instance of this type) Locaton = (125,220) (node location) Intensity = 0.6 (signal amplitude measure) Confidence = 085 (confidence in the match) Timestamp= 01:20:40 (event generation time) IFA’2004 135 Directed Diffusion Source Sink Data Delivery Gradient Setup Interest Propagation IFA’2004 136 DIRECTED DIFFUSION INTERESTS and GRADIENTS The named task description constitutes an INTEREST. An interest is injected into the network at some (arbitrary) node in the network Suppose it is SINK. INTERESTS are diffused through the sensor network. Example: A task with a specified type and rect, a duration of 10 minutes and an interval of 10 ms is initiated by a sensor node in the network. * The interval parameter specifies an event data rate. * Here the specified data rate is 100 events per second. * The sink node records the task, the task state is purged from the node after the time indicated by the duration attribute. • IFA’2004 137 DIRECTED DIFFUSION * For each active task, SINK periodically broadcasts an interest message to each of its neighbors. * This initial interest contains the specified rect and duration attributes, but contains a much larger interval attribute. • Every node maintains an interest cache. * Each item in the cache corresponds to a distinct interest. IFA’2004 138 DIRECTED DIFFUSION An ENTRY in the interest cache has several fields: * A TIMESTAMP field (timestamp of the last received matching interest) and several GRADIENT fields up to one per neighbor. * A GRADIENT is a relay link to a neighbor from which the interest was received. -* - Each GRADIENT contains A data rate field (requested by the specific neighbor) A duration field (approximate lifetime of the interest) REMARK: Hence by utilizing interest and gradients, paths are IFA’2004 established between sink and sources, i.e., sensors. 139 DIRECTED DIFFUSION When a node receives an interest it checks to see of the interest exists in the cache. If no matching exists, the node creates a new entry. If there exists an entry, but no gradient for the sender of the interest, the node adds a gradient with the specified value. It also updates the entry’s timestamp and duration fields. Finally, if both an entry and gradient exist, the node simply updates the timestamp and duration fields. IFA’2004 140 Directed Diffusion Features Sink sends interest, i.e., task descriptor, to all sensor nodes. Interest is named by assigning attribute-value pairs. source source sink Interest Propagation source sink Gradient Setup sink Data Delivery Drawbacks Cannot change interest unless a new interest is broadcast. IFA’2004 141 LEACH Low Energy Adaptive Clustering Hierarchy (LEACH) (W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,'' IEEE Proceedings of the Hawaii International Conference on System Sciences, pp. 1-10, January, 2000.) - * LEACH is a clustering based protocol which minimizes energy dissipation in sensor networks. Idea: * Randomly select sensor nodes as cluster heads, so the high energy dissipation in communicating with the base station is spread to all sensor nodes in the sensor network. * Forming clusters is based on the received signal strength. * Cluster heads can then be used kind of routers (relays) to the sink. IFA’2004 144 LEACH Two Phases: Set-up Phase and Steady-Phase In Set-up Phase: * Sensors may elect themselves to be a local cluster head at any time with a certain probability. (Reason: to balance the energy dissipation) * A sensor node chooses a random number between 0 and 1. * If this random number is less than the threshold T(n), the sensor node becomes a cluster-head. T(n) = P / {1 – P[r mod (1/P)]} if n is element of G where P r G is the desired percentage to become a cluster head (e.g., 0.05) is the current round is the set of nodes that have not been a cluster head in the last 1/P rounds. * After the cluster heads are selected, the cluster heads advertise to all sensor nodes in the network that they are the new cluster heads. IFA’2004 145 Dynamic Clusters IFA’2004 146 LEACH Once the nodes receive the advertisement, they determine the cluster that they want to belong based on the signal strength of the advertisement from the cluster heads to the sensor nodes. The nodes inform the appropriate cluster heads that they will be a member of the cluster. Afterwards the cluster heads assign the time on which the sensor nodes can send data to them. IFA’2004 147 LEACH STEADY STATE PHASE: Sensors begin to sense and transmit data to the cluster heads which aggregate data from the nodes in their clusters. After a certain period of time spent on the steady state, the network goes into start-up phase again and enters another round of selecting cluster heads. IFA’2004 148 LEACH Optimum Number of Clusters ---???????? - too few: nodes far from cluster heads – too many: many nodes send data to SINK. IFA’2004 149 LEACH Achieves over a factor of 7 reduction in energy dissipation compared to direct communication. The nodes die randomly and dynamic clustering increases lifetime of the system. It is completely distributed and requires no global knowledge of the network. It uses single hop routing where each node can transmit directly to the cluster head and the sink. It is not applicable to networks deployed in large regions. Furthermore, the idea of dynamic clustering brings extra overhead, e.g., head changes, advertisements etc. which may diminish the gain in energy consumption. IFA’2004 150 Other Protocols 1. Energy Aware Routing R. Shah, J. Rabaey, “Energy Aware Routing for Low Energy Ad Hoc Sensor Networks,” IEEE WCNC’02, Orlando, March 2002. 2. Rumor Routing D. Braginsky, D. Estrin, “Rumor Routing Algorithm for Sensor Networks,” ACM WSNA’02, Atlanta, October 2002. 3. Threshold sensitive Energy Efficient sensor Network (TEEN) A. Manjeshwar, D.P. Agrawal, “TEEN: A Protocol for Enhanced Efficiency in Wireless Sensor Networks,” IEEE WCNC’02, Orlando, March 2002. 4. Constrained Anisotropic Diffusion Routing (CADR) M. Chu, H.Hausecker, F. Zhao, “Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks,” International Journal of High Performance Computing Applications, Vol. 16, No. 3, August 2002. IFA’2004 151 Other Protocols 5. Power Efficient Gathering in Sensor Information Systems (PEGASIS) S. Lindsey, C.S. Raghavendra, “PEGASIS: Power Efficient Gathering in Sensor Information Systems,” IEEE Aerospace Conference, Montana, March 2002. 6. Self Organizing Protocol L. Subramanian, R.H. Katz, “An Architecture for Building Self Configurable Systems,” IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, Boston, August 2000. 7. Geographic Adaptive Fidelity (GAF) Y. Yu, J. Heideman, D. Estrin, “Geography-informed Energy Conservation for Ad Hoc Routing,” ACM MobiCom’01, Rome, July 2001. IFA’2004 152 Open Research Issues • Store and Forward Technique that combines data fusion and aggregation. • Routing for Mobile Sensors Investigate multi-hop routing techniques for high mobility environments. • Priority Routing Design routing techniques that allow different priority of data to be aggregated, fused, and relayed. • 3D Routing IFA’2004 153 TRANSPORT LAYER (PRIOR KNOWLEDGE) END TO END RELIABILITY CONGESTION CONTROL TCP (Transmission Control Protocol) for Data Traffic UDP (User Datagram Protocol) for Real Time Traffic IFA’2004 154 Transport Layer Internet, Satellite, etc Sink Sink End-to-end communication between a sensor node and user End to end reliable event transfer User IFA’2004 155 TRANSPORT LAYER Related Work RMST (Reliable Multisegment Transport) F. Stann and J. Heidemann, “RMST: Reliable Data Transport in Sensor Networks,” In Proc. IEEE SNPA’03, May 2003, Anchorage, Alaska, USA RMST is a transport layer protocol for directed diffusion. RMST provides end-to-end data-packet transfer reliability. RMST is a selective NACK-based protocol that can be configured for in-network caching and repair. There are two modes for RMST: Caching Mode and Non-Caching Mode. CACHING MODE: A number of nodes along a reinforced path, (path being used to convey the data to the sink by directed diffusion), are assigned as RMST nodes. IFA’2004 156 Reliable Multi-Segment Transport (RMST) Each RMST node caches the fragments identified by FragNo of a flow identified by RmstNo. Watchdog timers are maintained for each flow. When a fragment is not received before the timer expires, a negative acknowledgement is sent backward in the reinforced path. The first RMST node that has the required fragment along the path retransmits the fragment. Sink acts as the last RMST node. In noncaching mode, sink is the only RMST node. RMST relies on directed diffusion scheme for recovery from the failed reinforced paths. Sink RMST Node Source Node IFA’2004 157 Related Work PSFQ - Pump Slowly Fetch Quickly – Slow injection of packets into the network – Aggressive hop-by-hop recovery in case of packet losses – “PUMP” performs controlled flooding and requires each intermediate node to create and maintain a data cache to be used for local loss recovery and in-sequence data delivery. – Applicable only to strict sensor-sensor guaranteed delivery – And for control and management end-to-end reliability for the downlink from sink to sensors – Does not address congestion control C. Y. Wan, A. T. Campbell and L. Krishnamurthy, “PSFQ: A Reliable Transport Protocol for Wireless Sensor Networks,” In Proc. ACM WSNA’02, September 2002, Atlanta, GA IFA’2004 158 Pump Slowly Fetch Quickly (PSFQ) PSFQ comprises three functions: * Message Relaying (PUMP operation), * Relay initiated error recovery (FETCH operation) and * Selective status reporting (REPORT operation). Every intermediate node maintains a data cache. A node that receives a packet checks its content against its local cache, and discards any duplicates. If the received packet is new, the TTL field in the packet is decremented. If the TTL field is higher than 0 after being decremented, and there is no gap in the packet sequence numbers, the packet is scheduled to be forwarded. The packets are delayed for a random period between Tmin and Tmax, and then relayed. A node goes to FETCH mode once a sequence number gap is detected. The node in FETCH mode requests a retransmission from neighboring IFA’2004 159 nodes. Related Work Wireless TCP variants are NOT suitable for sensor networks – Different notion of end-to-end reliability – Huge buffering requirements – ACKing is energy draining BOTTOMLINE: Traditional end-to-end guaranteed reliability (TCP solutions) cannot be applied here. New Reliability Notion is required!!! IFA’2004 160 Event-to-Sink Reliability (ESRT) O. B. Akan, I. F. Akyildiz and Y. Sankarasubramaniam, to appear in IEEE Transactions on Networking, Fall 2004. Also in Proc. of ACM MobiHoc’03, Annapolis, Maryland, June 2003. Event Radius Sink Sensor nodes Sensor networks are event-driven Multiple correlated data flows from event to sink GOAL: To reliably detect/estimate event features based on the collective reports of several sensor nodes observing the event. Event-to-sink collective reliability notion IFA’2004 161 Event-to-Sink Reliable Transport (ESRT) ESRT is the first scheme that focuses on the end-to-end reliable event transfer. The end-to-end event transfer reliability is controlled based on the reporting frequencies of sensor nodes. b a c Sink d IFA’2004 162 End-to-end Reliable Event Transfer event region sensor coverage r sensor range b a c Sink r IFA’2004 d 163 Event-to-Sink Reliability Sink decides about event features every time units (decision intervals) DEFINITION 1: Observed Event Reliability ri is the number of data packets received in decision interval i at sink DEFINITION 2: Desired Event Reliability R is the number of packets required for reliable event detection (application specific and is known a-priori at the sink) (If ri > R, then the event is reliably detected. Else, appropriate actions must be taken to achieve R.) DEFINITION 3: Reporting Rate f is the frequency of packet transmissions at a source node TRANSPORT PROBLEM IN SENSOR NETWORKS: To configure the reporting rate, f, of source nodes so as to achieve the required event detection reliability, R, at the sink with minimum resource utilization. IFA’2004 164 r vs f relationship r shows initial linear increase with f until f = fmax For f > fmax , r drops due to congestion because the network is unable to handle the increased injection of data packets This behavior is independent of the number of nodes n fmax decreases with increasing n (congestion occurs at lower reporting frequencies with greater number of source nodes n) IFA’2004 165 ESRT: Event-to-Sink Reliable Transport OBJECTIVE: Achieve reliable event detection with minimum energy expenditure and congestion resolution. SALIENT FEATURES: – Self-configuration – Adapts to random, dynamic network topology – Collective identification – Does not require individual node IDs – Biased implementation – Graceful transfer of complexity to the sink Sensor nodes need only two additional functions – Implement a congestion detection mechanism – Listen to sink broadcasts for frequency updates IFA’2004 166 ESRT: Protocol Overview Determine reporting frequency f to achieve desired reliability R with minimum resource utilization Source (Sensor nodes): – Send data with reporting frequency f f – Monitor buffer level and notify congestion to the sink Sink: – Measures the observed event reliability ri at the end of decision interval i – Normalized reliability i = ri / R – Performs congestion decision based on the feedback from the sources nodes (to determine f >< fmax). – Update f based on i and f >< fmax (congestion) to achieve desired event reliability R IFA’2004 167 ESRT: Network States State Description Condition (NC,LR) (No congestion, Low reliability) f < fmax and < 1 - (NC,HR) (No congestion, High reliability) f fmax and > 1+ (C,HR) (Congestion, High reliability) f < fmax and > 1 (C,LR) (Congestion, Low reliability) f < fmax and 1 Optimal Operating Region f < fmax and [1- , 1+ ] OOR IFA’2004 168 ESRT: Congestion Detection Mechanism ACK/NACK not suitable We use local buffer level monitoring in sensor nodes B bk : Buffer fullness level at the end of reporting interval k Db : Buffer length increment f B : Buffer size f : reporting frequency bk bk-1 Db Mark Congestion Notification (CN ) field in packet if congested, i.e., bk + Db > B (the node infers that it will experience congestion in the next reporting interval) Event ID IFA’2004 CN (1 bit) Time Destination Stamp Payload FEC 169 ESRT: Frequency Update State (NC,LR) Frequency Update fi+1 = fi / i Comments Multiplicative increase, achieve desired reliability asap fi+1 = fi (i + 1) / 2i Conservative decrease, no compromise on reliability (C,HR) fi+1 = fi / i Aggressive decrease to state (NC,HR) (C,LR) fi+1 = fi i (NC,HR) OOR fi+1 = fi IFA’2004 Exponential decrease, relieve congestion asap Unchanged 170 ESRT Performance S0 = (NC,LR) IFA’2004 S0 = (NC,HR) 171 ESRT Performance S0 = (C,HR) IFA’2004 S0 = (C,LR) 172 Conclusions Sensor network paradigm necessitates the notion of event-to-sink reliability Existing end-to-end guaranteed reliability solutions lead to over-utilization of scarce sensor resources ESRT is a novel solution propose exclusively for reliable event transport in sensor networks – Tailored for sensor environments – Biased implementation – Energy conservation – Collective identification, self-configuration – ESRT can also address concurrent multiple events IFA’2004 173 Open Research Issues Extend ESRT to address reliable transport of concurrent multiple events in the sensor field. Explore possible other reliability metrics – Total expected mean square distortion – Minimum mean squared error estimation Develop unified transport layer protocols for sink-tosensors and bi-directional reliable transport in WSN Research to integrate WSN domain into NGWI (Next Generation Wireless Internet) – Adaptive Transport Protocols for WSN-Ad Hoc environments IFA’2004 174 Medium Access Control (MAC) Multiple users need to access the limited available communication resources. MAC aims at providing fair and efficient resource access IFA’2004 175 Medium Access Control (MAC) (Prior Knowledge) ALOHA Slotted ALOHA Reserved ALOHA CSMA (nonpersistant, p-persistant,1-persistant) TDMA FDMA CDMA IFA’2004 176 Aloha/Slotted Aloha Aloha collision sender A sender B sender C Slotted Aloha t collision sender A sender B sender C t IFA’2004 177 FDMA (Frequency Division Multiple Access) Frequency User n … User 2 User 1 IFA’2004 Time 178 FDMA Bandwidth Structure 1 2 3 4 … n Frequency Total bandwidth IFA’2004 179 FDMA Channel Allocation User 1 User 2 … User n Mobile Stations IFA’2004 Frequency 1 Frequency 2 … Frequency n Base Station 180 TDMA (Time Division Multiple Access) … User n User 2 User 1 Frequency Time IFA’2004 181 TDMA Frame Structure 1 2 3 4 … n Time Frame IFA’2004 182 TDMA Frame Allocation Time 1 … User 2 User n Mobile Stations IFA’2004 Time 2 … User 1 … Time n Base Station 183 CDMA (Code Division Multiple Access ) . User 1 .. User 2 User n Frequency Time Code IFA’2004 184 Medium Access Control (MAC) Existing MAC protocols cannot be used for sensor networks because sensor MACs must have inbuilt Power management, mobility management and failure recovery strategies IFA’2004 185 Medium Access Control (MAC) for Sensor Networks Self-Organizing Medium Access Control for Sensor Networks (SMACS) and Eavesdrop and Register (EAR) Hybrid TDMA-FDMA CSMA based IFA’2004 186 Medium Access Control (MAC) SMACS and EAR Available bandwidth is far greater than the maximum data rate of sensors Neighbor discovery and channel assignment combined Random wake up during the connection phase In EAR mobile nodes are given full control of the connection process Mobile nodes keep a record of neighbor nodes EAR is transparent to SMACS Shortcomings Nodes belonging to different subnets might not be able to connect A mainly static network is assumed W. Ye, J. Heidemann and D. Estrin, “An Energy Efficient MAC Protocol for Wireless Sensor Networks,” In Proc. ACM MOBICOM ’01, pp. 221–235, Rome, Italy 2001 IFA’2004 187 CSMA Based Traffic in sensor networks is highly correlated, dominantly periodic, variable. Constant listening times are energy efficient Random delay avoids repeated collisions Not suitable for delay-sensitive applications Under higher load, RTS/CTS involves considerable messaging overhead IFA’2004 188 Motivation for Our Work WSN are characterized by dense deployment of sensor nodes MAC Layer Challenges – Limited power resources – Need for a self-configurable, distributed protocol – Data centric approach rather than per-node fairness Exploit spatial correlation to reduce transmissions in MAC layer ! IFA’2004 189 Collaborative Medium Access Based on Spatial Correlation in Sensor Networks M. C. Vuran and I. F. Akyildiz, December 2003. 1 2 3 4 5 S Nodes ni observe variables Xi , i=1,2,3,4,5 Minimum of 5 transmissions are required Due to correlation, assume X1=X2 and X3=X4 Only 3 transmissions needed! Regulate medium access to decrease number of transmissions! IFA’2004 190 Definitions Correlation region of node ni – Region of radius r centered around node ni Correlation neighbors of node ni – Nodes inside the correlation region of node ni IFA’2004 191 Collaborative MAC Protocol If a node ni transmits data then all its correlation neighbors have redundant information Route-thru data has higher priority over generated data Filter out transmission of redundant data and prioritize filtered data through the network! IFA’2004 192 Collaborative MAC Protocol Two reasons for medium access; Source function: Transmit event information Router function: Forward packets from other nodes in the multi-hop path to the sink Two components – Event MAC (E-MAC) – Network MAC (N-MAC) IFA’2004 193 Event MAC (E-MAC) Aims to filter out correlated sensor records First Contention Phase (FCS) – Nodes contend using IEEE 802.11 structure for the first time After a node ni captures the channel all the correlation neighbors of ni – Drop their packets – Enter Suspicious Sleep State (SSS) Nodes enter FCS after a period of time to maintain equal load-sharing IFA’2004 194 Network MAC (N-MAC) Since correlation is filtered out by E-MAC, route-thru packet has higher priority N-MAC prioritizes these packets during medium access using – Smaller backoff window size – PIFS (<SIFS) during contention IFA’2004 195 Performance Both energy consumption and latency decreases when spatial correlation is exploited IFA’2004 196 Conclusions Spatial correlation in sensor networks is exploited in the MAC layer MAC protocol collaboratively regulates medium access such that redundant transmissions is suppressed Event MAC (E-MAC) filters out correlation whereas Network MAC (N-MAC) prioritizes the route-thru packets Number of transmissions are reduced instead of number of transmitted bits Collaborative Medium Access achieves low energy consumption as well as improving event detection latency IFA’2004 197 MEDIUM ACCESS CONTROL (MAC) FURTHER RESEARCH NEEDS MAC for sensor networks must have inbuilt power management, mobility management and failure recovery strategies Need for a self-configurable, distributed protocols Data centric approach rather than per-node fairness Develop MACs which differentiate Multimedia Traffic Exploit Spatial & Temporal Correlation IFA’2004 198 Error Control Some sensor network applications like mobile tracking require high data precision Coding gain is generally expressed in terms of the additional transmit power needed to obtain the same BER without coding FEC is preferred over ARQ Since power consumption is crucial, we must take into account encoding and decoding energy expenditures Coding is profitable only if the encoding and decoding power consumption is less than the coding gain. IFA’2004 199 ERROR CONTROL RESEARCH NEEDS Design of suitable FEC codes with minimal encoding and relatively higher decoding complexities Feasibility of ARQ schemes in multihop sensor networks (hop by hop ARQ instead of end-to-end). This is needed for reliable communications (data critical) Adaptive/Hybrid FEC/ARQ schemes Extension to Rayleigh/Rician fading conditions with mobile nodes IFA’2004 200 Optimal Packet Size for Wireless Sensor Networks Y. Sankarasubramaniam, I. F. Akyildiz, S. McLaughlin, ”Optimal Packet Size for Wireless Sensor Networks”, IEEE SNPA, May 2003. Determining the optimal packet size for sensor networks is necessary to operate at high energy efficiencies. The multihop wireless channel and energy consumption characteristics are the two most important factors that influence choice of packet size. Header (2) Payload (<=73) IFA’2004 Trailer (FEC) (>=3) 201 PHYSICAL LAYER New Channel Models (I/O/Underwater/Deep Space) Explore Antennae Techniques (e.g., Smart Antennaes) Software Radios?? New Modulation Schemes SYNCH Schemes FEC Schemes on the Bit Level New Data Encryption Investigate UWB IFA’2004 202 FINAL REMARKS IFA’2004 203 Basic Research Needs • An Analytical Framework for Sensor Networks Find a Basic Generic Architecture and Protocol Development which can be tailored to specific applications. • More theoretical investigations of the Architecture and Protocol developments • Network Configuration and Planning Schemes IFA’2004 204 FURTHER OPEN RESEARCH ISSUES Research to integrate WSN domain into NGWI (Next Generation Wireless Internet) e.g., interactions of Sensor and AdHoc Networks or Sensor and Satellite or any other combinations… Explore the SENSOR/ACTOR NETWORKS Explore the SENSOR-ANTISENSOR NETWORKS SECURITY ISSUES IFA’2004 205 Some Applications • Clear Demonstration of Testbeds and Realistic Applications • Not only data or audio but also video as well as integrated traffic. SOME OF OUR EFFORTS IN BWN LAB @ GaTech • • • • • MAN for Meteorological Observations SpINet for Mars Surface Airport Security Sensors/Actors Sensor Wars Wide Area Multi-campus Sensor Network IFA’2004 206 FURTHER CHALLENGES Protocol Stack • Follow the TCP/IP Stack, i.e., keep the Strict Layer Approach ??? • Or Interleave the Layer functionalities??? • Cross Layer Optimization • Standardization??? IFA’2004 207 Commercial Viability of WSN Applications Within the next few years, distributed sensing and computing will be everywhere, i.e., homes, offices, factories, automobiles, shopping centers, supermarkets, farms, forests, rivers and lakes. Some of the immediate commercial applications of wireless sensor networks are – – – – – – – – Industrial automation (process control) Defense (unattended sensors, real-time monitoring) Utilities (automated meter reading), Weather prediction Security (environment, building etc.) Building automation (HVAC controllers). Disaster relief operations Medical and health monitoring and instrumentation IFA’2004 208 Commercial Viability of WSN Applications XSILOGY Solutions is a company which provides wireless sensor network solutions for various commercial applications such as tank inventory management, stream distribution systems, commercial buildings, environmental monitoring, homeland defense etc. http://www.xsilogy.com/home/main/index.html In-Q-Tel provides distributed data collection solutions with sensor network deployment. http://www.in-q-tel.com/tech/dd.html ENSCO Inc. invests in wireless sensor networks for meteorological applications. http://www.ensco.com/products/homeland/msis/msis_rnd.htm EMBER provides wireless sensor network solutions for industrial automation, defense, and building automation. IFA’2004 http://www.ember.com 209 Commercial Viability of WSN Applications H900 Wireless SensorNet System(TM), the first commercially available end-to-end, low-power, bi-directional, wireless mesh networking system for commercial sensors and controls is developed by the company called Sensicast Systems. The company targets wide range of commercial applications from energy to homeland security. http://www.sensicast.com The Sensor-based Perimeter Security product is introduced by a company called SOFLINX Corp. (a wireless sensor network software company) http://www.soflinx.com XYZ On A Chip: Integrated Wireless Sensor Networks for the Control of the Indoor Environment In Buildings is another commercial application project currently performed by Berkeley. http://www.cbe.berkeley.edu/research/briefs-wirelessxyz.htm IFA’2004 210 Commercial Viability of WSN Applications The Crossbow wireless sensor products and its environmental monitoring and other related industrial applications of such as surveillance, bridges, structures, air quality/food quality, industrial automation, process control are introduced. http://www.xbow.com Japan's Omron Corp has two wireless sensor projects in the US that it hopes to commercialize in the near future. Omron's Hagoromo Wireless Web Sensor project consists of wireless nodes equipped with various sensing abilities for providing security for major cargo-shipping ports around the world. http://www.omron.com Possible business opportunity with a big home improvement store chain, Home Depot, with Intel and Berkeley using wireless sensor networks http://www.svbizink.com/otherfeatures/spotlight.asp?iid=314 IFA’2004 211 Commercial Viability of WSN Applications Millennial Net builds wireless networks combining sensor interface endpoints and routers with gateways for industrial and building automation, security, and telemetry http://www.millennial.net CSEM provides sensing and actuation solutions http://www.csem.ch/fs/acuating.htm Dust Inc. develops the next-generation hardware and software for wireless sensor networks http://www.dust-inc.com Integration Associates designs sensors used in medical, automotive, industrial, and military applications to costeffective designs for handheld consumer appliances, barcode readers, and wireless computer input devices http://www.integration.com IFA’2004 212 Commercial Viability of WSN Applications Melexis produces advanced integrated semiconductors, sensor ICs, and programmable sensor IC systems. http://www.melexis.com ZMD designs, manufactures and markets high performance, low power mixed signal ASIC and ASSP solutions for wireless and sensor integrated circuits. http://www.zmd.biz Chipcon produces low-cost and low-power single-chip 2.4 GHz ISM band transceiver design for sensors. http://www.chipcon.com ZigBee Alliance develops a standard for wireless low-power, low-rate devices. http://www.zigbee.com IFA’2004 213