Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin (MobiCOM.

Slides:



Advertisements
Similar presentations
Directed Diffusion for Wireless Sensor Networking
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
1 Routing Techniques in Wireless Sensor networks: A Survey.
DIRECTED DIFFUSION. Directed Diffusion Data centric A node request data by sending interest for named data Data matching interest is drawn toward that.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Next Century Challenges: Scalable Coordination in Sensor Networks Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar (Some images and slides.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
Wireless sensor networks: a survey 周紹恩 指導教授 : 柯開維 1.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks.
Sensor Networks Issues Solutions Some slides are from Estrin’s early talks.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
1-1 Topology Control. 1-2 What’s topology control?
He Huang Introduction:The Flooding Time Synchronization Protocol.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Building Efficient Wireless Sensor Networks with Low-Level Naming Presented by Ke Liu CS552, Fall 2002 Binghamton University J. Heidemann, F. Silva, C.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, F. Silva Mobicom 2000.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Wireless Distributed Sensor Networks Special Thanks to: Jasvinder Singh Hitesh Nama.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Charlmek Intanagonwiwat Ramesh Govindan Deborah Estrin Presentation.
1 The Data Dissemination Problem  A region requires event- monitoring (harmful gas, vehicle motion, seismic vibration, temperature, etc.)  Deploy sensors.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Adhoc Network: Routing Protocol:AODV
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
Routing and Data Dissemination. Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts.
Wireless Sensor Networks COE 499 Energy Aware Routing
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks presented by: Stoyan Paunov Authors: Intanagonwiwat, C., Govindan,
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks ChalermekRameshDeborah Intanagonwiwat Govindan Estrin Mobicom 2000.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Data Dissemination in Sensor Networks Challenges and Solutions by Sovrin Tolia.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Sensor Network Data Dissemination based on the paper titled Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Building Wireless Efficient Sensor Networks with Low-Level Naming J. Heihmann, F.Silva, C. Intanagonwiwat, R.Govindan, D. Estrin, D. Ganesan Presentation.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented by Barath Raghavan.
A Survey on Routing Protocols for Wireless Sensor Networks Kemal Akkaya & Mohamed Younis By Yalda Edalat.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Sensor Network Routing – II Data-Centric Routing.
Wireless Sensor Networks
Wireless Sensor Networks
Protocols for Wireless Sensor Networks
Introduction to Wireless Sensor Networks
DIRECTED DIFFUSION.
Wireless Sensor Network Architectures
Internet Networking recitation #4
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
DIRECTED DIFFUSION.
Routing and Data Dissemination
Protocols.
Protocols.
Presentation transcript:

Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin (MobiCOM '00)

Distributed Microsensing Characteristics of future sensor nodes may include: – Matchbox size – Battery power – Power-conserving processors clocked at several hundred Mhz – Program and data memory of several tens of Mbytes – Radio modem – Energy efficient MAC layer Such hardware will enable distributed microsensing, in which a collection of nodes coordinate to achieve a larger sensing task

Possible Scenarios Sensor networks may be deployed in – Inhospitable physical environments Remote geographic regions Toxic urban locations – Difficult to access environments Large industrial plants Aircraft interiors

Critical Design Constraints Power conservation Scalability—must scale to several thousands of sensor nodes Robustness—high frequency of node failure expected

Directed Diffusion Directed diffusion is a new data dissemination paradigm for sensor networks – Data-centric – Determined by localized interactions: hop-to-hop rather than end-to-end Long-range communication requires more energy Hop-to-hop communication provides link diversity, helps overcome obstacles – Incorporates application-specific semantics

Directed Diffusion Elements Named data – Described with attribute- value pairs Interests – Describe sensing tasks Gradients – Network paths Reinforcement – Manages gradients

Naming Task descriptions are named by a list of attribute-value pairs: Intuitively, the task description specifies an interest for data matching the attributes. For this reason, such a task description is called an interest

Interest Dissemination sink Sink disseminates interest for a four-legged animal (~36 bytes). Initial interval is large. C’s Interest cache Interests Gradients B C source

Interest Dissemination sink Every node contains an interest cache, with separate entries for distinct interests. Entries do not contain info about sinks and therefore scale well. Overlapping entries may be aggregated for efficiency. Interests must be periodically refreshed by sink. C’s Interest cache Interests Gradients B C source

Interest Dissemination sink Each interest cache entry contains a list of gradients; events that match interest entries are propagated back to the sink via these gradients. Gradient entries contain locally unique neighbor IDs, data rates, and interval (not shown) attributes. C’s Interest cache Interests Gradients B C source Sink: 1s | B: 1s In the absence of information about which sensor nodes are likely to be able to satisfy an interest, interests are broadcasted to all neighbors. source: 1s However, a node may suppress a received interest if it recently re-sent a matching request.

Data Propagation sink Initial interests request data at slow rates (e.g. 1 event per second). C’s Interest cache Interests Gradients B C source Sink: 1s | B: 1s 1 eps C’s Data cache EVENT A sensor node that detects a target searches its interest cache for a matching entry; if it finds one, it begins sending data messages (~64 bytes) towards the sink via its gradient list at the highest specified rate. source: 1s

Data Propagation sink Upon receiving a data message, nodes check their interest caches. If no match is found, the data message is silently dropped. C’s Interest cache Interests Gradients B C source Sink: 1s | B: 1s 1 eps C’s Data cache EVENT If a match is found, the node checks its data cache, which keeps track of recently seen data items. If no data cache entry matches the message, a new entry is made in the data cache and the message is re-sent to the node’s neighbors. match If a data cache entry matches the data message, the message is silently dropped. source: 1s

Reinforcement sink After the sink starts receiving these low data rate events, it reinforces one particular neighbor in order to “draw down” higher quality (higher data rate) events. C’s Interest cache Interests Gradients B C source Sink: 1s | B: 1s 1 eps C’s Data cache EVENT It does this explicitly by re-sending the original interest message, but with a smaller interval value, to the empirically low delay path node. Nodes update their caches and can then propagate reinforcement messages according to local policies. For example, the node might choose that neighbor from whom it first received the latest event matching the interest S:.01s 100 eps source: 1s

Considerations Embedding application semantics in communication logic allows for optimizations such as loop prevention and downconversion (for instance, interpolating high rate messages for a low rate receiver) Negative reinforcement is used to prune superfluous gradients

Negative Reinforcement Could use time outs or explicit degrade messages as negative reinforcement mechanisms Orthogonal to the mechanism, NR controls can be propagated according to a number of different rules – E.g.: negatively reinforce that neighbor from which no new events have been received within a window of N events or T time units

Network Topology This paradigm works with multiple sources (but sinks may draw redundant data) and multiple sinks hosting identical interests (in which case the second sink can immediately draw down high quality via its cache)

Local Repair Reinforcement rules can be applied by intermediate nodes to repair faulty links: – Node C can discover better path by requesting higher rates from non-faulty neighbors – Reinforcement must be applied carefully to prevent all downstream nodes from doing the same, which will result in discovery of a good path, but will waste resources

Design Parameters

Evaluation: Metrics Average Dissipated Energy – Measures the ratio of total dissipated energy per node in the network to the number of distinct events seen by sinks – Computes average work done by a node as well as the overall lifetime of sensor nodes Average Delay – Measures the average one-way latency between transmitting an event and receiving it at a sink Event Delivery Ratio – Ratio of the number of distinct events received to the number originally sent

Evaluation: Setup ns-2 simulated 1.6 Mbps MAC layer (with RTS/CTS—not optimal for this application because nodes expend as much power idle as when receiving) 5 different sensor fields, ranging from 50 nodes (at 160m x 160m) to 250 nodes (at same average density) DD compared against Flooding and Omniscient Multicast (which approximately represents achievable IP-based performance)

Evaluation: Comparative Results DD dissipates less energy than OM because of in- network aggregation, in which intermediate nodes suppress duplicate location estimates. However, the savings is not equal to the number of identical sources because 1)both schemes spend significant energy listening, and 2)design parameters are conservative and frequently draw down high quality data along multiple paths.

Evaluation: Comparative Results Flood’s poor performance (which is exclusively dependent upon broadcast) an artifact of the MAC layer: random delay imposed to avoid broadcast collisions. MAC with TDMA might equalize Flood’s performance.

Evaluation: Dynamics Create node failures in the paths diffusion is most likely to use, as well as creating random failures elsewhere in the network At any instant, 10 or 20% of nodes unusable No “settling time” between failures

Evaluation: Dynamics Performance actually improves in some cases because overly-conservative reinforcement rules maintain several high-quality paths during normal operation, some of which fail due to node failures in this experiment, thus decreasing energy consumption.

Evaluation: Dynamics

Evaluation: Other Factors Even conservative negative reinforcement prunes enough redundant paths to achieve substantial energy savings

Evaluation: Other Factors DD expends substantially less energy when it can aggregate (or suppress) duplicate messages. Conservative negative reinforcement rules account for decrease in energy consumption without diffusion in larger networks: in such networks, the lengths of paths pruned by negative reinforcement are sizeable and result in proportionally sizeable decreases in energy consumption.

Evaluation: Other Factors If there are no gains to be had from wise transmission management (i.e. if idle mode consumes as much power as receive mode), then there is no point in implementing complicated communication schemes because idle time will dominate the performance of all schemes.

Related Work Distributed Sensor Networks – WINS and Piconet Reaction-diffusion models for morphogenesis and models of ant colony behavior Ad hoc unicast routing (particularly reactive protocols) Multicast routing protocols – reinforcements similar to join/prune – interest dissemination and gradient setup similar to data- driven shortest-path tree setup Router assist for localized error recovery in reliable multicast Web caching

Conclusions Diffusion is data-centric All communication is neighbor-to-neighbor, not end- to-end No routers—each node can interpret all messages No globally unique IDs (but locally unique IDs needed) Application-specific semantics embedded in communication