Adaptive Protocols for Information Dissermination in Wireless Sensor Networks Authors : Joanna Kulik, Wendi Rabiner, Hari Balakrishnan 2008. 6. 3. Speaker.

Slides:



Advertisements
Similar presentations
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Advertisements

COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
A Presentation by: Noman Shahreyar
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
1 X-Matrix Team MSc Data Communications, Networks and Distributed Systems; Computer Science Department, UCL The X – Matrix Team Adaptive Protocols for.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
An Application-Specific Protocol Architecture for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (MIT)
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU Negotiation-based protocols for Disseminating Information in Wireless.
SPIN : S ENSOR P ROTOCOL FOR I NFORMATION VIA N EGOTIATION SUBMITTED BY : SANCHAITA CHATTERJEE ROLL : CSE -4 TH YEAR.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
15-441: Computer Networking Lecture 26: Networking Future.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
CS 599 Intelligent Embedded Systems1 Adaptive Protocols for Information Dissemination in Wireless Sensor Networks W.R.Heinzelman, J.kulik, H.Balakrishnan.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
RFC 2453 RIP 2 (Routing Information Protocol) Daher Kaiss.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Wireless Distributed Sensor Networks Special Thanks to: Jasvinder Singh Hitesh Nama.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
Data Dissemination and Fusion In Sensor Networks.
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Presented by Fei Huang Virginia Tech April 4, 2007.
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Routing and Data Dissemination. Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Energy-Conserving Data Placement and Asynchronous Multicast in Wireless Sensor Networks Sagnik Bhattacharya, Hyung Kim, Shashi Prabh, Tarek Abdelzaher.
Data Dissemination in Sensor Networks Challenges and Solutions by Sovrin Tolia.
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
TDMA scheduling algorithms for WSN Speaker: Chan-Yu Tsai Advisor: Dr. Ho-Ting Wu Date: 2015/5/6.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
On Reducing Broadcast Transmission Cost and Redundancy in Ad Hoc Wireless Networks Using Directional Antennas Minglu Li ( Department of Computer Science.
Self-stabilizing energy-efficient multicast for MANETs.
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
Coping with Link Failures in Centralized Control Plane Architecture Maulik Desai, Thyagarajan Nandagopal.
ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY.
1 Power-efficient Clustering Routing Protocol Based on Applications in Wireless Sensor Network Authors: Tao Liu and Feng Li Form:International Conferecnce.
SPIN: Sensor Protocols for Information via Negotiation
2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)
Protocols for Wireless Sensor Networks
Delay-Tolerant Networks (DTNs)
Mesh-based Geocast Routing Protocols in an Ad Hoc Network
Energy-Efficient Communication Protocol for Wireless Microsensor Networks by Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Presented.
Net 435: Wireless sensor network (WSN)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Speaker : Lee Heon-Jong
Presentation transcript:

Adaptive Protocols for Information Dissermination in Wireless Sensor Networks Authors : Joanna Kulik, Wendi Rabiner, Hari Balakrishnan Speaker Jaewan. Cho Supervisor Y.H. Han Advanced Ubiquitous Computing

2 Contents Introduction SPIN: Sensor Protocol for Information via Negotiation Other Data Dissemination Algorithms Sensor Network Simulations Related Work Conclusions 2008 Advanced Ubiquitous Computing

Computer Network3 Introduction Wireless Networks of sensors are likely to be widely deployed in the future Several obstacles need to be overcome Energy Computation Communication Three deficiencies of simple approach render inadequate as a protocol for sensor networks Implosion Overlap Resource blindness

Computer Network4 Introduction Implosion A D BC (A) The implosion problem. In this graph, node A starts by flooding its data to all of its neighbors. Two copies of the data eventually arrive at node D. The system energy waste energy and bandwidth in one unnecessary send and receive.

Computer Network5 Introduction Overlap The overlap problem. Two sensors cover an overlapping geographic region. When these sensors flood their data to node C, C receives two copies of the data marked r. C AB (r,s) (q,r) q r s

Computer Network6 Introduction Resource blindness In classic flooding, nodes do not modify their activities based on the amount of energy available to them at a given time. A network of embedded sensors can be “resource-aware” and adapt its communication and computation to the state of its energy resource. The SPIN (Sensor Protocols for Information via Negotiation) family of protocols incorporates two key innovations that overcome these deficiencies :  negotiation  resource-adaptation

Computer Network7 Introduction A simulation-based study of five dissemination protocols Experimental protocols SPIN-1 SPIN-2 The other three protocols function as comparison protocols flooding gossiping ideal

Computer Network8 SPIN: Sensor Protocol for Information via Negotiation The SPIN family of protocols rests upon two basic ideas: To operate efficiently and to conserve energy Nodes in a network must monitor and adapt to changes in their own energy resources to extend the operating lifetime of the system. Meta-Data SPIN does not specify a format for meta-data SPIN relies on each application to interpret and synthesize its own meta-data SPIN Messages ADV - new data advertisement REQ - request for data DATA - data message

SPIN: Sensor Protocol for Information via Negotiation SPIN Resource Management Can make informed decisions about using their resources effectively Specifies an interface that applications can use to probe their available resources SPIN Implementation Implement the basis SPIN message types, message handling routines and, resource management functions Sensor applications can then use these libraries to construct their own SPIN protocols SPIN-1 : 3-Stage Handshake Protocol Simple handshake protocol for disseminating data through a lossless network Work in three stages (ADV-REQ-DATA) Computer Network9

SPIN: Sensor Protocol for Information via Negotiation SPIN-1 : 3-Stage Handshake Protocol Node A starts by advertising its data to node B (a). Node B responds by sending a request to node A (b). After receiving the requested data (c), node B then sends out advertisement to its neighbors (d), who in turn send requests back to B (e, f). Computer Network10

SPIN: Sensor Protocol for Information via Negotiation SPIN-2 : SPIN-1 with a Low-Energy Threshold Adds a simple energy-conservation heuristic to the SPIN-1 protocol When energy is plentiful, SPIN-2 nodes communicate using the same 3-stage protocol as SPIN-1 node When its energy is approaching a low-energy threshold, it adapts by reducing its participation in the protocol SPIN-1 : 3-Stage Handshake Protocol SPIN-1 can be run in a completely unconfigured network with a small, startup cost to determine nearest neighbors If the topology of the network changes frequently, these change only have to travel one hop before the nodes can continue running the algorithm Computer Network11

Other Data Dissemination Algorithms Classic Flooding Disseminate a piece of data across the network starts by sending a copy of this data to all of its neighbors The amount of time it takes a group of nodes to received some data and then forward that data on to their neighbors is called a round The algorithm finishes, or converges, when all the nodes in the network have received a copy of the data Flooding converges in O (d) rounds, when d is the diameter of the network Although flooding exhibits the same appealing simplicity as SPIN-1, it does not solve either the implosion or the overlap problem Computer Network12

Other Data Dissemination Algorithms Gossiping. At every step, each node only forwards data on to one neighbor, which it selects randomly. After node D receives the data, it must forward the data back to the sender (B), otherwise the data would never reach node C Gossiping An alternative to the classic flooding approach that uses randomization to conserve energy A D B C (a) Although gossiping largely avoids implosion, it does not solve the overlap problem Computer Network13

Other Data Dissemination Algorithms Ideal dissemination of observed data a and c. Potential implosion, caused by B and C’s common neighbor, and overlap, caused A and C’s overlapping data, do not occur Ideal Dissemination Every node sends observed data along a shortest-path route and every node receives each piece of distinct data only once No energy is ever wasted transmitting and receiving useless data A (a,c) D B C (c) (a) (a.c) (c) (a) Computer Network14

Sensor Network Simulations ns Implementation ns is an event-driven network simulator with extensive support for simulation of TCP, routing, and multicast protocols The ns Node class was extended to create a Resource-Adapting Node Computer Network15

Sensor Network Simulations Simulation Testbed Assumes no network losses and no queuing delays Topology of the 25-node, wireless test network. The edges shown here signify communicating neighbors. Characteristic of the 25-node wireless test network Computer Network16

Sensor Network Simulations Unlimited Energy simulations Data Acquired Over Time Energy Dissipated Over Time For the experiment Gave all the nodes a virtually infinite supply of energy and ran each data distribution protocol until it converged. Result Since energy is not limited, SPIN-1 and SPIN-2 are identical protocols. Therefore, the results only compare SPIN-1 with flooding, gossiping, and the ideal data distribution protocol. Computer Network17

Sensor Network Simulations Data Acquired Over Time Percent of total data acquired in the system over time for each protocol The entire time scale until all the protocols converge A blow up Of the first 0.22 seconds Computer Network18

Sensor Network Simulations Energy Dissipated Over Time Total amount of energy dissipated in the system for each protocol The entire time scale until all the protocols converge A blow up Of the first 0.22 seconds Computer Network19

Sensor Network Simulations Energy Dissipated Over Time Message profiles for the simulations. SPIN-1 does not send any redundant data message Computer Network20

Sensor Network Simulations Energy Dissipated Over Time Energy dissipation versus node degree Computer Network21

Sensor Network Simulations Energy Dissipated Over Time Key results of the unlimited energy simulations for the SPIN-1, flooding, and gossiping protocols compared with the ideal data distribution protocol Computer Network22

Sensor Network Simulations Limited Energy Simulation Percent of total data acquired in the system for each protocol when the total system energy is limited to 1.6 Joules Computer Network23

Sensor Network Simulations Limited Energy Simulation Energy dissipated in the system for each protocol when the total system energy is limited to 1.6 Joules Computer Network24

Sensor Network Simulations Limited Energy Simulation Data acquired for a given amount of energy. SPIN-2 distributes 10% more data per unit energy than SPIN-1 and 60% more data per unit energy than flooding. Computer Network25

Sensor Network Simulations Best-Case Convergence Times Convergence time as the link bandwidth is varied between 5 kbps and 1 Mbps. The fixed processing delay is set to 5 ms and the data size is set to 500 bytes. Each node begins with a single piece of unique data. Each node begins with 3 piece of non-unique data. Computer Network26

Sensor Network Simulations Best-Case Convergence Times Convergence time as the fixed portion of the processing delay is varied between 1 ms and 9 ms. The link bandwidth is set to 1 Mbps and the data size is set to 500 bytes. Each node begins with a single piece of unique data. Each node begins with 3 piece of non-unique data. Computer Network27

Sensor Network Simulations Best-Case Convergence Times Convergence time as the size of a piece of data is varied between 100 bytes and 4000 bytes. The link bandwidth is set to 1 Mbps and the fixed processing delay is set to 5 ms. Each node begins with a single piece of unique data. Each node begins with 3 piece of non-unique data. Computer Network28

Sensor Network Simulations Best-Case Convergence Times Equations that predict the convergence time of each these protocols The convergence time for the ideal and flooding protocol are: Spin-1 has the convergence bound: Computer Network29

Sensor Network Simulations Best-Case Convergence Times Equations that predict the convergence time of each these protocols The convergence bounds for flooding and ideal become: Network parameters used to calculate convergence bounds for flooding, SPIN-1, and ideal Similarly, the convergence bounds for SPIN-1 become: Computer Network30

Sensor Network Simulations Best-Case Convergence Times Equations that predict the convergence time of each these protocols When there is a large amount of initial overlapping data, it is possible for SPIN- 1 to converge before flooding since SPIN-1 will more often send smaller data message than flooding. Network parameters used to calculate convergence bounds for flooding, SPIN-1, and ideal Computer Network31

Sensor Network Simulations Best-Case Convergence Times Equations that predict the convergence time of each these protocols Plugging parameter into Eqns. 3 and 4 give the following convergence bounds for our network: The experimental result show that, on average: flooding converges in 135 ms SPIN-1 converges in 215 ms ideal converges in 125 ms Computer Network32

Computer Network33 Related Work nodes in link-state protocols periodically disseminate their view of the network topology to their neighbors. There are generally two types of topologies used in wireless networks: centralized control and peer to peer communication. Recently, mobile ad hoc routing protocols have become an active area of research. Routing protocols based on minimum-energy routing and other power-friendly algorithms have been proposed in the literature. There has been a lot of recent interest in using IP multicast as the underlying infrastructure to efficiently and reliably disseminate data from a source to many receives on the internet

Computer Network34 Conclusions SPIN (Sensor Protocols for Information via Negotiation), a family of data dissemination protocols for wireless sensors networks SPIN uses meta-data negotiation and resource-adaptation to overcome several deficiencies in traditional dissemination approaches. Two specific SPIN protocols SPIN-1 : a 3-stage handshake protocol for disseminating data SPIN-2 : a version of SPIN-1 that backs off from communication at a low energy threshold.

Computer Network35 Conclusions Compare the SPIN-1 and SPIN-2 protocols to flooding, gossiping, and ideal dissemination protocols using the ns simulation tool. Naming data using meta-data descriptors and negotiating data transmissions using meta-data successfully solve the implosion and overlap problem. SPIN-1 and SPIN-2 are simple protocols that efficiently disseminate data, while maintaining no per neighbors state. In term of time, SPIN-1 achieves comparable results to classic flooding protocols. In terms of energy, SPIN-1 uses only about 25% as much energy as a classic flooding protocol. SPIN-2 is able to distribute 60% more data per unit energy than flooding. In all of experiments, SPIN-1 and SPIN-2 outperformed gossiping. They also come close to an ideal dissemination protocols in term of both time and energy under same conditions.

Q & A …