Routing protocols for sensor networks.

Slides:



Advertisements
Similar presentations
Directed Diffusion for Wireless Sensor Networking
Advertisements

A Presentation by: Noman Shahreyar
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
Introduction to Wireless Sensor Networks
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
DIRECTED DIFFUSION. Directed Diffusion Data centric A node request data by sending interest for named data Data matching interest is drawn toward that.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Routing in WSNs 28 February 2005.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Georouting in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Distributed Algorithms for Guiding Navigation across a Sensor Network Qun Li, Michael DeRosa, and Daniela Rus Dartmouth College MOBICOM 2003.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Charlmek Intanagonwiwat Ramesh Govindan Deborah Estrin Presentation.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Load Balancing Routing Scheme in Mars Sensor Network CS 215 Winter 2001 Term Project Prof : Mario Gerla Tutor: Xiaoyan Hong Student : Hanbiao Wang & Qingying.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
Multihop wireless networks Geographical Routing Karp, B. and Kung, H.T., Greedy Perimeter Stateless Routing for Wireless Networks, in MobiCom Using.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
Routing and Data Dissemination. Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts.
Data centric Storage In Sensor networks Based on Balaji Jayaprakash’s slides.
EILEEN BALCI GPSR: Greedy Perimeter Stateless Routing for Wireless Networks.
Routing Considerations for Sensor Networks Lecture 12 October 12, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor Networks Andreas.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks ChalermekRameshDeborah Intanagonwiwat Govindan Estrin Mobicom 2000.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Massively Distributed Database Systems In-Network Query Processing (Ad-Hoc Sensor Network) Fall 2015 Ki-Joune Li Pusan.
Sensor Network Data Dissemination based on the paper titled Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented.
Fundamentals of Computer Networks ECE 478/578
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
1 Routing in Internet vs. Sensor Network. 2 Sensor Network Routing –I Location/Geographic Based Routing Tian He Some materials are adapted from I. Stojmenovic.
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Wireless Sensor Networks
Wireless Sensor Networks
Protocols for Wireless Sensor Networks
A Location-Based Routing Method for Mobile Ad Hoc Networks
Delay-Tolerant Networks (DTNs)
Introduction to Wireless Sensor Networks
Distributed database approach,
DIRECTED DIFFUSION.
Wireless Sensor Networks
Wireless Sensor Network Architectures
GPSR Greedy Perimeter Stateless Routing
Surviving Holes and Barriers in Geographic Data Reporting for
Internet Networking recitation #4
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
Sensor Network Routing
Introduction to Wireless Sensor Networks
Net 435: Wireless sensor network (WSN)
THE NETWORK LAYER.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
DIRECTED DIFFUSION.
by Saltanat Mashirova & Afshin Mahini
A Survey on Routing Protocols for Wireless Sensor Networks
Overview: Chapter 3 Networking sensors
Greedy Distributed Spanning tree routing (gdstr)
Develop distributed algorithms for sensor networks which provide:
Protocols.
CMPE 252A : Computer Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Protocols.
Presentation transcript:

Routing protocols for sensor networks

Sensor node Node with computation, storage, communication and sensing capabilities. Example: Tmote 8 MHz Processor 10k RAM, 48k Flash 250kbps 2.4GHz Radio 50m range indoors / 125m range outdoors Integrated Humidity, Temperature, and Light sensors Programming and data collection via USB TinyOS support

Sensor network A collection of sensor nodes deployed in an area and connected through a multi-hop wireless network. B C A radio range

Simple deployment Gateway queries sensor readings

Hierarchical deployment Internet

Other hybrid deployments

Sensor network applications Examples: habitat monitoring chemical and biological sensors fire, earthquake emergencies vehicle tracking, traffic control surveillance of city districts defense-related networks alerts to terrorist threats …

Routing protocols for sensor networks Routing protocols must be localized, lightweight and scalable They must avoid the overhead of storing routing tables or other information that is expensive to update such as link costs or routes to every destination. Routing decisions must be made not based on destination addresses (classical approach), but based on destination attributes like: Location Type of sensors Certain range of values in a certain type of sensed data New mechanisms are needed to route packets using destination attributes.

Routing protocols for sensor networks In this course, we will describe three approaches: Geographic routing Attribute-based routing Tree-based routing

Geographic routing The goal is to route packets to a node with a known geographic location (or to all nodes within a geographic region) All nodes know their geographic location Each node knows its one-hop neighbors

Geographic routing Greedy forwarding: Let s be the source node and d the destination node Let the packet currently be held by intermediate node x Node x learns its neighbors’ positions from beaconing Node x sends its packet to neighbor node y that is geographically closest to the destination d x d y s

Geographic routing Greedy forwarding is not always possible A packet may encounter a void or hole in the way to the destination, for example, none of x’s neighbors is closer to d than x local minimum -- greedy forwarding fails x s d

Geographic routing Face routing (or face traversal) is invoked to recover from local minima It works correctly on a network graph that has no crossing links - a planar graph A planar graph consists of faces, enclosed polygonal regions bounded by links Face routing uses two primitives to traverse a planar graph: the right-hand rule and face changes F5 F3 F4 F1 F2

Geographic routing The right-hand rule: y receives a packet from x and forwards it to its first neighbor counterclockwise about itself, z. 2. y z 3. 1. x

Geographic routing Face changes in face routing Line sd line cuts a series of faces in the planar graph. Face traversal successively traverses the faces cut by this line The right hand rule is augmented with a rule that describes when to change to an adjacent face A face change takes place just before traversing an edge that crosses the sd line d s

Geographic routing Face routing works correctly on planar graphs - graphs where no two edges cross How to planarize graphs? Relative Neighborhood Graph (RNG) Gabriel Graph (GG)

Geographic routing The Relative Neighborhood Graph (RNG) is planar For edge (u,v) to be included in the RNG graph, the intersection area must contain no witness w Note that when we begin with a connected graph, and remove edges not part of the RNG, we cannot disconnect the graph. w u v

Geographic routing The Gabriel Graph (GG) is planar For edge (u,v) to be included in the GG graph, the shaded circle must contain no witness w Note that when we begin with a connected graph, and remove edges not part of the RNG, we cannot disconnect the graph. RNG is a subset of the GG w u v

Geographic routing GPSR: Greedy Perimeter Stateless Routing Greedy Forwarding on the full network graph Face Routing (Perimeter Forwarding) on the planarized network graph, where Greedy Forwarding is not possible greedy forwarding perimeter forwarding greedy forwarding “Greedy Perimeter Stateless Routing for Wireless Networks”. B. Karp and H.T. Kung. In ACM/IEEE Intl Conf on Mobile Computing and Networking (MobiCom), 2000, pp. 243-254. http://www.eecs.harvard.edu/~htk/publication/2000-mobi-karp-kung.pdf

Routing protocols for sensor networks Geographic routing Attribute-based routing Tree-based routing

Attribute-based routing We want to get information from the sensor network about some type of event without knowing the ids of the nodes nor the location of nodes that generate relevant sensor data. We can express our request as a series of attribute-value pairs, e.g.: type = animal instance = horse interval = 30 min

Attribute-based routing Sinks: nodes requesting information Sources: nodes providing information Interests: records indicating a desire for certain type of information A typical interest record contains an ‘interval’ attribute field, which indicates the frequency with which the sink wishes to receive information about objects matching the other record attributes.

Attribute-based routing: Directed diffusion Directed diffusion is suitable for addressing attribute-value requests It finds good paths between sources and sinks. The cost of finding good paths is amortized over the period of use of the paths (assuming a long-lived request)

Attribute-based routing: Directed diffusion Sinks generate interests that diffuse through the sensor network N5 Event N6 N4 Source N1 Sink N0 N2 N3

Attribute-based routing: Directed diffusion Each node that receives an interest message stores: the interest record the neighbor who sent it the data rate in which results are requested in a local interest cache. The initial requested data rate is set to a very low value. gradient

Attribute-based routing: Directed diffusion interest neighbor data rate animal=elephant, … N0 every 1 hour N4 Interest cache of node N6: N5 Event N6 N4 Source N1 Sink N0 N2 N3

Attribute-based routing: Directed diffusion A source computes the highest data rate among all its gradients for a certain interest. It sends event records to all neighbors for which it has a gradient for a particular event interest. A node that receives an event record checks its cache to see if it has matching interests. If not, it drops the message Otherwise it processes the message as follows: The node caches recently seen event records. If the event record has not already arrived at the node through another path, the node forwards it to interested neighbors.

Attribute-based routing: Directed diffusion Event N6 N4 Source N1 Sink N0 N2 N3 Event records are propagated back to the sink through multiple paths at the initially low data rate.

Attribute-based routing: Directed diffusion Event N6 N4 Source N1 Sink N0 N2 N3 The sink reinforces min-delay path, by sending the same interest to neighbor N4 with higher requested data rate.

Attribute-based routing: Directed diffusion Event N6 N4 Source N1 Sink N0 N2 N3 N4 reinforces min-delay path, by sending the same interest to N1 with higher requested data rate.

Attribute-based routing: Directed diffusion Event N6 N4 Source N1 Sink N0 N2 N3 The source propagates event records to the sink along the reinforced path with a high frequency.

Attribute-based routing: Directed diffusion Directed diffusion is a distributed algorithm – it works only with neighbor-to-neighbor interaction. The gradient mechanism is used to reinforce routing along the best paths. Details of the algorithm can be found below: “Directed diffusion: A scalable and robust communication paradigm for sensor networks”. Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin. In the Sixth Intl Conf on Mobile Computing and Networking (MobiCOM), 2000. http://www-csag.ucsd.edu/teaching/cse291s03/Readings/directed_diffusion.pdf

Routing protocols for sensor networks Geographic routing Attribute-based routing Tree-based routing

Tree-based routing Sensor network applications often require periodic gathering of data from multiple sensor nodes to a single base-station many-to-one communication How to identify a suitable paths from source sensor nodes to the base-station? The base-station initiates a tree construction mechanism to establish paths from sensor nodes to itself. Sensor nodes then forward their readings along the paths of the constructed tree. “TAG: a Tiny AGgregation service for ad-hoc sensor networks”. Samuel Madden, Michael J. Franklin, Joseph Hellerstein and Wei Hong. In Symposium on Operating Systems Design and Implementation (OSDI), 2002. http://db.lcs.mit.edu/madden/html/madden_tag.pdf

Tree-based routing Nodes initially set their hop-count to the base-station to infinity. The base-station broadcasts a beacon with beaconHopCount = 0. When a node hears a beacon, it compares its own nodeHopCount with the beaconHopCount. If nodeHopCount > beaconHopCount +1 nodeHopCount = beaconHopCount+1 nodeParent = beaconSender beaconHopCount++ rebroadcast beacon Otherwise ignore beacon In this way, each node selects a parent in the shortest path to the base-station. After tree construction, each node forwards data via its parent to the base-station. Base-station 1 1 2 2 2 3 3 4 4 5 4

Summary Specialized MAC and routing protocols have been designed for sensor networks. They typically aim at preserving energy and adapting to rapid changes in the network topology. S-MAC is a medium access control protocol that tries to minimize energy consumption by scheduling nodes to turn off the radio periodically Common approaches to routing data in sensor networks are: geographic, attribute-based and tree-based

Related Reading “Greedy Perimeter Stateless Routing for Wireless Networks”. B. Karp and H.T. Kung. In ACM/IEEE Intl Conf on Mobile Computing and Networking (MobiCom), 2000, pp. 243-254. http://www.eecs.harvard.edu/~htk/publication/2000-mobi-karp-kung.pdf “Directed diffusion: A scalable and robust communication paradigm for sensor networks”. Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin. In the Sixth Intl Conf on Mobile Computing and Networking (MobiCOM), 2000. http://www-csag.ucsd.edu/teaching/cse291s03/Readings/directed_diffusion.pdf “TAG: a Tiny AGgregation service for ad-hoc sensor networks”. Samuel Madden, Michael J. Franklin, Joseph Hellerstein and Wei Hong. In Symposium on Operating Systems Design and Implementation (OSDI), 2002. http://db.lcs.mit.edu/madden/html/madden_tag.pdf