Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Routing and Data Dissemination Presented by: Li, Huan Liu, Junning UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts on Comparison of the Data dissemination schemes UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Differences with Current Networks Difficult to pay special attention to any individual node: Collecting information within the specified region Collaboration between neighbors Sensors may be inaccessible: embedded in physical structures. thrown into inhospitable terrain. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Differences with Current Networks Sensor networks deployed in very large ad hoc manner No static infrastructure They will suffer substantial changes as nodes fail: battery exhaustion accidents new nodes are added. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Differences with Current Networks User and environmental demands also contribute to dynamics: Nodes move Objects move Data-centric and application-centric Location aware Time aware UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Overall Design of Sensor Networks One possible solution? Internet technology coupled with ad-hoc routing mechanism Each node has one IP address Each node can run applications and services Nodes establish an ad-hoc network amongst themselves when deployed Application instances running on each node can communicate with each other UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Why Different and Difficult? A sensor node is not an identity (address) Content based and data centric Where are nodes whose temperatures will exceed more than 10 degrees for next 10 minutes? Tell me the location of the object ( with interest specification) every 100ms for 2 minutes. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Why Different and Difficult? Multiple sensors collaborate to achieve one goal. Intermediate nodes can perform data aggregation and caching in addition to routing. where, when, how? UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Why Different and Difficult? Not node-to-node packet switching, but node-to-node data propagation. High level tasks are needed: At what speed and in what direction was that elephant traveling? Is it the time to order more inventory? UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Challenges Energy-limited nodes Computation Aggregate data Suppress redundant routing information Communication Bandwidth-limited Energy-intensive Goal: Minimize energy dissipation UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Challenges Scalability: ad-hoc deployment in large scale Fully distributed w/o global knowledge Large numbers of sources and sinks Robustness: unexpected sensor node failures Dynamically Change: no a-priori knowledge sink mobility target moving UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Challenges Topology or geographically issue Time : out-of-date data is not valuable Value of data is a function of time, location, and its real sensor data. Is there a need for some general techniques for different sensor applications? Small-chip based sensor nodes Large sensors, e.g., rada Moving sensors, e.g., robotics UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science SPIN: The Goal Broadcast with minimum energy W.R.Heinzelman, J.Kulik, H.Balakrishnan UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Conventional Approach A C B D E F Flooding G Send to all neighbors E.g., routing table updates UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Resource Inefficiencies Implosion (a) (a) A B (a) C (a) D Data overlap q r A (q,r) s B C (r,s) Resource blindness UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science What is the optimum protocol? A C B D E F “Ideal” G Shortest-path routes Avoids overlap Minimum energy Need global topology information UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Two basic ideas Exchanging sensor data may be expensive, but exchanging data about sensor data may not be. Nodes need to monitor and adapt to changes in their own energy resources UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science SPIN Family Sensor Protocol for Information via Negotiation Data negotiation SPIN messages Meta-data (data naming) Application-level control Model “ideal” data paths ADV- advertise data REQ- request specific data DATA- requested data ADV A B REQ A B DATA A B Resource management UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science SPIN-PP Example: A B UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science SPIN on Point-to-Point Networks SPIN-PP 3-stage handshake protocol Advantages Simple Minimal start-up cost SPIN-EC SPIN-PP + low-energy threshold Modifies behavior based on current energy resources UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Test Network 25 Nodes 59 Edges Average degree = 4.7 neighbors Network diameter = 8 hops 16 bytes Antenna reach = 10 meters Meta-Data 500 bytes Data UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Unlimited Energy Simulations -- SPIN-PP -- Ideal -- Flooding Flooding converges first No queuing delays SPIN-PP Reduces energy by 70% No redundant DATA messages UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Limited Energy Simulations -- Ideal -- SPIN-EC -- SPIN-PP -- Flooding SPIN-EC distributes additional 20% data UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Conclusions • Successfully use meta-data negotiation to solve the implosion, overlap problem of simple flooding and gossiping. • Resource-adaptive enhancements • Simple scheme, small communication overhead, but a performance close to the ideal situation. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Future work Consider the cost of not only communicating data, but also synthesizing data, make it more realistic resourceadaptation protocols. Queuing delay, loss-prone nature of wireless channels can be incorporated and experimented. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Limitations The SPIN EC(Energy Constrained) version’s strategy may be too simple. There should be a topology dependant strategy, e.g. a narrow bridge connecting two connected component should be more energy conservative. The ideal criteria used to compare with SPIN is ideal in terms of data dissemination rate, so really not ‘ideal’ anymore when energy or other resources are limited, need a new goal function. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Directed Diffusion A Scalable and Robust Communication Paradigm for Sensor Networks C. Intanagonwiwat R. Govindan D. Estrin UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Application Example: Remote Surveillance e.g., “Give me periodic reports about animal location in region A every t seconds” Tell me in what direction that vehicle in region Y is moving? UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Basic Idea In-network data processing (e.g., aggregation, caching) Distributed algorithms using localized interactions Application-aware communication primitives expressed in terms of named data UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Elements of Directed Diffusion Naming Interests A node requests data by sending interests for named data Gradients Data is named using attribute-value pairs Gradients is set up within the network designed to “draw” events, i.e. data matching the interest. Reinforcement Sink reinforces particular neighbors to draw higher quality ( higher data rate) events UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Naming Content based naming Tasks are named by a list of attribute – value pairs Task description specifies an interest for data matching the attributes Animal tracking: Request Interest ( Task ) Description Type = four-legged animal Interval = 20 ms Duration = 1 minute Location = [-100, -100; 200, 400] Reply Node data Type =four-legged animal Instance = elephant Location = [125, 220] Confidence = 0.85 Time = 02:10:35 UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Interest The sink periodically broadcasts interest messages to each of its neighbors Every node maintains an interest cache Each item corresponds to a distinct interest No information about the sink Interest aggregation : identical type, completely overlap rectangle attributes Each entry in the cache has several fields Timestamp: last received matching interest Several gradients: data rate, duration, direction UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Setting Up Gradient Source Neighbor’s choices : 1. Flooding 2. Geographic routing 3. Cache data to direct interests Sink Interest = Interrogation Gradient = Who is interested (data rate , duration, direction) UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Data Propagation Sensor node computes the highest requested event rate among all its outgoing gradients When a node receives a data: Find a matching interest entry in its cache Examine the gradient list, send out data by rate Cache keeps track of recent seen data items (loop prevention) Data message is unicast individually to the relevant neighbors UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Reinforcing the Best Path Source The neighbor reinforces a path: 1. At least one neighbor 2. Choose the one from whom it first received the latest event (low delay) 3. Choose all neighbors from which new events were recently received Low rate event Sink Reinforcement = Increased interest UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Local Behavior Choices For propagating interests In the example, flood More sophisticated behaviors possible: e.g. based on cached information, GPS For setting up gradients data-rate gradients are set up towards neighbors who send an interest. Others possible: probabilistic gradients, energy gradients, etc. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Local Behavior Choices For data transmission Multi-path delivery with selective quality along different paths probabilistic forwarding single-path delivery, etc. For reinforcement reinforce paths based on observed delays losses, variances etc. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Initial simulation study of diffusion Key metric Average Dissipated Energy per event delivered indicates energy efficiency and network lifetime Compare diffusion to flooding centrally computed tree (omniscient multicast) UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Diffusion Simulation Details Simulator: ns-2 Network Size: 50-250 Nodes Transmission Range: 40m Constant Density: 1.95x10-3 nodes/m2 (9.8 nodes in radius) MAC: Modified Contention-based MAC Energy Model: Mimic a realistic sensor radio [Pottie 2000] 660 mW in transmission, 395 mW in reception, and 35 mw in idle UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Diffusion Simulation Surveillance application 5 sources are randomly selected within a 70m x 70m corner in the field 5 sinks are randomly selected across the field High data rate is 2 events/sec Low data rate is 0.02 events/sec Event size: 64 bytes Interest size: 36 bytes All sources send the same location estimate for base experiments UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Average Dissipated Energy Average Dissipated Energy (Joules/Node/Received Event) 0.018 0.016 Flooding 0.014 0.012 0.01 0.008 Omniscient Multicast 0.006 0.004 Diffusion 0.002 0 0 50 100 150 200 250 300 Network Size Diffusion can outperform flooding and even omniscient multicast. (suppress duplicate location estimates) UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Conclusions Can leverage data processing/aggregation inside the network Achieve desired global behavior through localized interactions Empirically adapt to observed environment UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Comments Primary concern is energy Simulations only Only use five sources and five sinks How to exam scalability? ??? UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science TTDD: A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks Haiyun Luo Fan Ye, Jerry Cheng Songwu Lu, Lixia Zhang UCLA CS Dept. UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Assumptions Fixed source and sensor nodes, mobile or stationary sinks nodes densely applied in large field Position-aware nodes, sinks not necessarily Once a stimulus appears, sensors surrounding it collectively process signal, one becomes the source to generate the data report UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Sensor Network Model Sink Stimulus Source Sink UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Mobile Sink Excessive Power Consumption Increased Wireless Transmission Collisions State Maintenance Overhead UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Goal, Idea Efficient and scalable data dissemination from multiple sources to multiple, mobile sinks Two-tier forwarding model Source proactively builds a grid structure Localize impact of sink mobility on data forwarding A small set of sensor node maintains forwarding state UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Grid setup Source proactively divide the plane into αXα square cells, with itself at one of the crossing point of the grid. The source calculates the locations of its four neighboring dissemination points The source sends a data-announcement message to reach these neighbors using greedy geographical forwarding The node serving the point called dissemination node This continues… UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science TTDD Basics Dissemination Node Data Announcement Source Data Sink Query Immediate Dissemination Node UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science TTDD Mobile Sinks Dissemination Node Trajectory Forwarding Data Announcement Source Immediate Dissemination Node Data Sink Immediate Dissemination Node Trajectory Forwarding UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science TTDD Multiple Mobile Sinks Dissemination Node Trajectory Forwarding Data Announcement Source Data Immediate Dissemination Node Source UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Grid Maintenance Issues: Efficiency Handle unexpected dissemination node failures Solutions: Source sets the Grid Lifetime in Data Announcement DN replication: each DN recruits several sensor nodes from its one-hop neighbor, replicates the location of the upstream DN DN failure detected and replaced on-demand by on-going query and data flows UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Grid Maintenance Dissemination Node Source X Data Immediate Dissemination Node UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Grid Maintenance (cont’d) Dissemination Node Source X Data Immediate Dissemination Node UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Ns-2 Simulation Metrics Energy consumption, delay, success rate Impacts of Cell size Number of sources and sinks Sink mobility Node failure rates UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Conclusions TTDD: two-tier data dissemination Model First Infrastructure-approach in semistationary sensor networks Exploit sensor nodes being stationary and location-aware Construct & maintain a grid structure with low overhead Efficiency & effectiveness in supporting mobile sinks Proactive sources Localize sink mobility impact UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Limitations and Future work Knowledge of cell size Greedy geographical routing failures, it is not clear how the greedy geographical routing works in terms of the neighbor’s range, which may lead to a problem of finding two dissemination node for one Mobile stimulus Mobile sensor node Sink mobility speed: limited speed Data aggregation UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Comparison of routing algorithms Attributes Data Efficiency Energy Efficiency (data/energy ratio) State complexity Flooding Fastest Low b/c Implosion Small, upstream Gossiping Slowest No. 7 Lowest Random walk None Rumor Routing Very slow No. 6 Very low Some SPIN Very Fast Higher than above, SPIN-EC close to ideal Data- neighbor pairs Directed Diffusion Quite Fast No. 3 Higher than TTDD global flooding + strong aggregation Complex: Neighbor X Interest TTDD Very Fast No.2 Reasonable local flooding+ reasonable aggregation OK: Four neighbor, Constant Fastest Low: b/c heavy machinery, ‘big’ node Most complex Algo. IP Multicast UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Discussions Source initiated or Sink initiated? Why? UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science Discussion (con) Should we build more infrastructure or not, what’s the trade off? UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science The End Thank you! UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Computer Science