Download What is a sensor node - Netmode

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Backpressure routing wikipedia , lookup

Network tap wikipedia , lookup

Deep packet inspection wikipedia , lookup

Computer network wikipedia , lookup

Distributed operating system wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

IEEE 1355 wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Automated airport weather station wikipedia , lookup

CAN bus wikipedia , lookup

Airborne Networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Kademlia wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Wireless Sensor Networks
Aν. Καθηγητής Συμεών Παπαβασιλείου
Εθνικό Μετσόβιο Πολυτεχνείο
Τμήμα Ηλεκτρολόγων Μηχανικών και Μηχανικών
Υπολογιστών
[email protected]
Τηλ: 210 772-2550
Sensors
What is a sensor:
Device that measures a physical
quantity and converts it into a signal
which can be read by an observer or
by an instrument.
What is a sensor node:
Node in a wireless sensor network that is capable of performing
some processing, gathering sensory information and
communicating with other connected nodes in the network.
• small size
• energy constrained
• limited capabilities
Consists of:
2
Wireless Sensor Networks
A Wireless Sensor Network (WSN)
consists of spatially distributed
autonomous sensors to monitor physical
or environmental conditions, such as
temperature, sound, vibration, pressure
etc. and to cooperatively pass their data
through the network to a main location
Operation:
•Every sensor node collects data
(acoustic, seismic etc.) from its
environment
• Data is sent to the collection center
(aka sink) for further processing
• Data gathering is realized through
multi-hop routing
3
Wireless Sensor Network Architecture
Base
Station
B
Internet
and/or
Satellite
E
D
A
C
Control &
Management
Station
Sensor
Network
Sensor
Nodes
End User
4
Sensor Network Applications
o Environment detection and
monitoring –Great Duck Island, Maine,
SEA-LABS
o Disaster Prevention
o Medical Care – Mercury project, Harvard
o Home Intelligence
o Scientific exploration
o Surveillance
5
WSNs vs Ad hoc networks I
Wireless Sensor Networks differ from traditional ad hoc networks:







The number of sensor nodes in a sensor network can be several
orders of magnitude higher than the nodes in an ad hoc network.
Sensor nodes are densely deployed.
Sensor nodes are prone to failures.
The topology of a sensor network changes very frequently.
Sensor nodes mainly use a broadcast communication paradigm,
whereas most ad hoc networks are based on point-to-point
communications.
Sensor nodes are limited in power, computational capacities, and
memory.
Sensor nodes may not have global identification (ID) because of the
large amount of overhead and large number of sensor
6
WSNs vs Ad hoc networks II
Why not port ad hoc protocols?



Ad Hoc networks require significant amount of routing data
storage and computation
 Sensor nodes are limited in memory and CPU
Topology changes due to node mobility are infrequent as in
most applications sensor nodes are stationary
 Topology changes when nodes die in the network due to
energy dissipation
Scalability with several hundred to a few thousand nodes
not well established
Therefore: Need for development of new protocols specific for WSN
7
WSN general requirements
Wireless ad hoc sensor network requirements include the following
1. Large number of (mostly stationary) sensors: Aside from the deployment
of sensors on the ocean surface or the use of mobile, unmanned, robotic sensors
in military operations, most nodes in a smart sensor network are stationary.
2. Low energy consumption: Since in many applications the sensor nodes will be
placed in a remote area, service of a node may not be possible. In this case, the
lifetime of a node may be determined by the battery life, thereby requiring the
minimization of energy expenditure.
3. Ease of installation and maintenance. In case of a malfunction, it is difficult
to visit in-situ and check the problem.
4. Network dynamic self-organization: Given the large number of nodes and
their potential placement in hostile locations, it is essential that the network be
able to self-organize; manual configuration is not feasible.
5. Querying ability: A user may want to query an individual node or a group of
nodes for information collected in the region.
8
WSN requirements summary
Technical Challenges and/or
Requirements
Design Objectives & Directions
Massive and Random deployment
Cheap and small sensor node:
scalable, flexible architecture
Data redundancy
Localized processing & data fusion
Limited resources
Resource efficiency design
Unattended operation
Self-configuration & coordination
Dynamic surrounding
Adaptability
Error-prone medium
Reliability & fault tolerance
Diverse applications
Application specific design
Safety and privacy
Security
QoS concerns
QoS design with resource
constraint;localization;attributebased naming and data centric
9
routing
Sensor Network Architectures
Layered Architecture
Clustered Architecture
10
Sensor Localization
Sensor Localization
It is essential, in some applications, for each node
to know its location



Sensed data coupled with loc. data and sent
We need a cheap, low-power, low-weight, low
form-factor, and reasonably accurate mechanism
Global Positioning Sys (GPS) is not always
feasible



GPS cannot work indoors, in dense foliage, etc.
GPS power consumption is very high
Size of GPS receiver and antenna will increase node
form factor
12
Indoor Localization


Use a fixed infrastructure
 Beacon nodes are
strategically placed
Nodes receive beacon signals
and measure:
 Signal Strength
 Signal Pattern
 Time of arrival; Time
difference of arrival
 Angle of arrival
 Nodes use measurements from multiple beacons and use
different multi-lateration techniques to estimate locations
 Accuracy of estimate depends on correlation between
measured entity and distance
Examples of Indoor Loc. Systems
RADAR (MSR), Cricket (MIT), BAT (AT&T), SPA
13
Sensor Network Localization I
No fixed infrastructure available
 Prior measurements are not always
possible
 Basic idea:




Have a few sensor nodes who have known
location information
These nodes sent periodic beacon signals
Other nodes use beacon measurements and
triangulation, multi-lateration, etc. to estimate
distance
14
Sensor Network Localization II


Receiver Signal Strength Indicator (RSSI) was used to
determine correlation to distance
 Suitable for RF signals only
 Very sensitive to obstacles, multi-path fading,
environment factors (rain, etc.)
 Was not found to have good experimental correlation
 RF signal had good range, few 10metres
RF and Ultrasound signals
 The beacon node transmits an RF and an ultrasound
signal to receiver
 The time difference of arrival between 2 signals is used
to measure distance
 Range of up to 3 m, with 2cm accuracy
15
Localization Algorithms


Based on the time diff. of arrival
Atomic Multi-lateration:


Iterative ML:




If a node receives 3 beacons, it can determine its
location (similar to GPS)
Some nodes not in direct range of beacons
Once an unknown node estimates its location, will send
out a beacon
Multi-hop approach; Errors propagated
Collaborative ML:

When 2+ nodes cannot receive 3 beacons (but can
receive say 2), they collaborate
16
Sensor MAC Protocols
Multiple Access Control (MAC) Protocols
 MAC allows multiple users to share a common channel.
 Conflict-free protocols ensure successful transmission. Channel can be
allocated to users statically or dynamically.
 Only static conflict-free protocols are used in cellular mobile
communications
- Frequency Division Multiple Access (FDMA): provides a fraction of the
frequency range to each user for all the time
- Time Division Multiple Access (TDMA) : The entire frequency band is
allocated to a single user for a fraction of time
- Code Division Multiple Access (CDMA) : provides every user a portion of
bandwidth for a fraction of time
 Contention based protocols must prescribe ways to resolve conflicts
- Static Conflict Resolution: Carrier Sense Multiple Access (CSMA)
- Dynamic Conflict Resolution: keeps track of various system parameters,
18
ordering the users accordingly
Media Access in Sensor Networks
–
Why STUDY MAC protocols in sensor networks?

Application behavior in sensor networks leads to very
different traffic characteristics from that found in conventional
computer networks

Highly constrained resources and functionality

Small packet size

Deep multi-hop dynamic topologies

The network tends to operate as a collective structure, rather
than supporting many independent point-to-point flows

Traffic tends to be variable and highly correlated

Little or no activity/traffic for longer periods and intense
traffic over shorter periods
19
Energy Consumption in Sensor Networks
• Transmission and reception of data require the
highest energy consumption

FACT:

Energy required for the transmission of 1 bit in100 m =
Energy required for the performance of 300 operation
(Pottie & Kaiser, 2000)
Increase the network lifetime
New techniques need to be found for decreasing the
energy consumption within the sensor network
20
Energy Consumption in Sensor Networks
4 main reasons for expenditure of energy
1.
2.
3.
4.
Collisions: Packets form neighboring nodes
conflict and require retransmission
Overhearing: Sensor nodes listen and receive
packets not destined to them
Control Packet Overhead: Many protocols
require the exchange of control packets
Idle listening: Sensor nodes wait and listen for
packets that may not arrive eventually
21
MAC Protocols – Properties
Wireless Sensor Networks due to their unique
nature and characteristics call for development of
new MAC protocols
Desired Properties




Energy efficient
Scalable
Adaptive
Mean delay & throughput can be of
secondary importance
22
Contention based MAC protocols I
IEEE 802.11 (DCF) was the 1ο standard protocols
for the communication of wireless devices
Based on CSMA/CA
(Carrier Sense Multiple
Access / Collision
Avoidance)
 Use of RTS/CTS packets
for avoiding the hidden
terminal problem
 Use of DATA/ACK packets

RTS / DATA
Node Α
CTS / ACK
Node B
23
Contention based MAC protocols II
Pros





Simple
Scalable – insertion / deletion of nodes easy
Robust
No synchronization required
Knowledge of the topology not needed
Cons



Multiple conflicts – το carrier sense does not work for more
than one hop
Great amount of control packets (RTS/CTS) – 40%-75% of
channel utilization
Long idle listening (~75% of total time)
24
WiseMAC

Use of np-CSMA with preamble sampling



Τhe preamble proceeds the data packet in
order to notify the receiver node (no RTS/CTS)
Method to dynamically determine the length of
the preamble packet
Every node has a sleep-wake program
Cons: Collisions because of the hidden
terminal problem
25
Periodic Listening
Its main use is for decreasing the energy
consumption caused by idle listening
Nodes “sleep” periodically and turn off their radio
listen
sleep
listen
sleep
Less energy consumption but increased delay in data
gathering
26
SMAC I
Basic features:
Periodic listen and sleep
 Collision and overhearing avoidance
 Message passing

27
SMAC II
Periodic listen and sleep
listen
listen
SYNC
CS for RTS/CTS
DATA/ACK
listen
sleep
SYNC
CS for RTS/CTS
DATA/ACK
sleep
Listen + Sleep = Frame
listen
• Nodes synchronize with each
other by sending their
schedule
• Neighboring nodes follow the same schedule
• Border nodes follow 2 or more schedules
Schedule 1
Schedule 2
At the beginning of each listen period, nodes synchronize by sending
28
SYNC
SMAC III
Collision & Overhearing Avoidance



Use of RTS/CTS
Use of physical & virtual carrier sense
Use of NAV (Neighbor Allocation Vector)




When a nodes listens the transmission of its neighbor, it can
determine how long it will last and become “silent”
This value is saved into NAV and then decreases
For a node to transmit, it has to succeed in CS but also
holds NAV=0
When a node listens to RTS/CTS, then by knowing how long
the transmission will last, it can be put to sleep
29
SMAC IV
Transmission of long packets
Break the packet into smaller junks
 Transmission of only one pair of RTS/CTS
 Neighboring nodes sleep for the whole
duration of the transmission

30
SMAC V
Main drawback
Increased delay because of the periodic
sleep of nodes
 Partial solution by adaptive listening
method

31
SMAC variations I
TMAC:
 Decrease in idle listening by transmitting
the packets in burst and then sleep
 The Listen period is adapted based on the
network load
 Use of RTS/CTS/ACK & FRTS (Future
Request to Send) control packets for
dealing with the delay caused of the sleep
period
32
SMAC variations II
DMAC:





Adapt the listen period when a node has many
packets to send
Inform the receiver nodes in order to adjust their
schedule too
No use of RTS/CTS
Use of Data prediction method – a node expects
data form its children
Use of MTS (More to Send) control packet - sent
by the children of a node to it in order to adjust
its schedule
33
SMAC variations III
ΖMAC:

It is adaptive to the level of contention and the
load of the network




Under low contention it behaves as CSMA
Under heavy load behaves as TDMA
Every node picks its slots and decides the length
of its frame
Use of control packets (no RTS/CTS) but ECN
(Explicit Contention Notification)

ECN is used to notify for two-hop contention
34
TDMA based MAC protocols



These protocols use the notion of timeslots
Each nodes transmits during its own slot
Solve the hidden terminal problem without the
use of control packets
Drawbacks



Require tight synchronization
It is hard to find a conflict-free program (NP hard
when channel reuse is wanted)
Difficult to scale
35
Spatial TDMA and CSMA

Use of 2 separate channels


Use of TDMA for transmission of data packets
Use of CSMA (low power- preamble) for
signaling (transmission of control packets)
36
TRAMA I
Time is divided into “Scheduled Access” and “Random Access”
• Random Access: for signaling
• Scheduled Access: for regular traffic
37
TRAMA II
Nodes have knowledge for all their twohop neighbors
 This information is exchanged during the
signaling which is contention based
 Each node announces the slots in which it
will transmit as well as its receivers
 When a node is not transmitting or
receiving, it is put to sleep

38