Dept. of Computer Science & Engineering The Chinese Univ. of Hong Kong On Fault Tolerance, Performance, and Reliability for Wireless and Sensor Networks.

Slides:



Advertisements
Similar presentations
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Advertisements

SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks Xiaorui Wang, Guoliang Xing, Yuanfang Zhang*, Chenyang Lu, Robert Pless,
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
Beyond Trilateration: On the Localizability of Wireless Ad Hoc Networks Reported by: 莫斌.
Expected-Reliability Analysis for Wireless CORBA with Imperfect Components Chen Xinyu
KAIST Adaptive Triangular Deployment Algorithm for Unattended Mobile Sensor Networks Suho Yang (September 4, 2008) Ming Ma, Yuanyuan Yang IEEE Transactions.
1 School of Computing Science Simon Fraser University, Canada PCP: A Probabilistic Coverage Protocol for Wireless Sensor Networks Mohamed Hefeeda and Hossein.
July, 2007Simon Fraser University1 Probabilistic Coverage and Connectivity in Wireless Sensor Networks Hossein Ahmadi
The Chinese Univ. of Hong Kong Energy-Conserving Coverage Configuration for Dependable Wireless Sensor Networks Chen Xinyu Term Presentation
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Sensibility-Based Sleeping Configuration Protocol for Dependable Wireless Sensor.
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Robust Communications for Sensor Networks in Hostile Environments Ossama Younis and Sonia Fahmy Department of Computer Sciences, Purdue University Paolo.
A Survey of Energy-Efficient Scheduling Mechanisms in Sensor Networks Author : Lan Wang·Yang Xiao(2006) Presented by Yi Cheng Lin.
Results Showing the potential of the method for arbitrary networks The following diagram show the increase of networks’ lifetime in which SR I =CR I versus.
Queueing Analysis for Access Points with Failures and Handoffs of Mobile Stations in Wireless Networks Chen Xinyu and Michael R. Lyu The Chinese Univ.
Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
The Chinese Univ. of Hong Kong Node Scheduling Schemes for Coverage Preservation and Fault Tolerance in Wireless Sensor Networks Chen Xinyu Group Meeting.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Dept. of Computer Science & Engineering, CUHK Fault Tolerance and Performance Analysis in Wireless CORBA Chen Xinyu Supervisor: Markers: Prof.
SRDS’03 Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Xinyu Chen and Michael R. Lyu The Chinese Univ. of Hong Kong Hong.
1 Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis Ekta Jain and Qilian Liang, Department of Electrical Engineering,
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
1 Topology Control of Multihop Wireless Networks Using Transmit Power Adjustment Infocom /12/20.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Point-Distribution Index and Its Application to Sensor Grouping Problem Y. Zhou.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
ISADS'03 Message Logging and Recovery in Wireless CORBA Using Access Bridge Michael R. Lyu The Chinese Univ. of Hong Kong
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Fault Tolerance in CORBA and Wireless CORBA Chen Xinyu 18/9/2002.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
KAIS T Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua MobiCom ‘05 Presentation by.
SenSys 2003 Differentiated Surveillance for Sensor Networks Ting Yan Tian He John A. Stankovic Department of Computer Science, University of Virginia November.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Distributed Algorithms for Dynamic Coverage in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Presented by Rukmini and Diksha Chauhan Virginia Tech 2 nd May, 2007 Movement-Based Checkpointing and Logging for Recovery in Mobile Computing Systems.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
Scalable Coverage Maintenance for Dense Wireless Sensor Networks Jun Lu, Jinsu Wang, Tatsuya Suda University of California, Irvine Secon ‘ 06.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Prof. Yu-Chee Tseng Department of Computer Science
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Speaker : Lee Heon-Jong
Presentation transcript:

Dept. of Computer Science & Engineering The Chinese Univ. of Hong Kong On Fault Tolerance, Performance, and Reliability for Wireless and Sensor Networks CHEN Xinyu Supervisor: Prof. Michael R. Lyu Aug. 1, 2005

2 Dept. of Computer Science & Engineering Outline  Introduction and thesis focus  Wireless Networks  Fault tolerance  Performance Message sojourn time Program execution time  Reliability  Wireless Sensor Networks  Sleeping configuration Coverage with fault tolerance  Conclusions and future directions

3 Dept. of Computer Science & Engineering Wireless Network (IEEE )  Wireless Infrastructure Network  At least one Access Point (Mobile Support Station) is connected to the wired network infrastructure and a set of wireless terminal devices  No communications between wireless terminal devices  Wireless Ad Hoc Network  Composed solely of wireless terminal devices within mutual communication range of each other without intermediary devices  Wireless Sensor Network Terminal device with sensing capability

4 Dept. of Computer Science & Engineering Wireless CORBA Architecture Visited Domain Home Domain Terminal Domain Access Bridge Static Host Terminal Bridge GIOP Tunnel ab 1 ab 2 GTP Messages Home Location Agent GIOP Tunnel GTP Messages GIOP Tunnel GTP Messages Terminal Domain Terminal Bridge Terminal Domain Terminal Bridge GIOP Tunnel GTP Messages GIOP: General Inter-ORB Protocol GTP: GIOP Tunneling Protocol  Control message  Computational message Mobile Host Handoff : allow a mobile host to roam from one cell to another while maintaining network connection CORBA: Common Object Request Broker Architecture

5 Dept. of Computer Science & Engineering Wireless Ad Hoc Sensor Network

6 Dept. of Computer Science & Engineering Thesis Focus

7 Dept. of Computer Science & Engineering Chapter 3 Message Logging and Recovery in Wireless CORBA  Motivation  Permanent failures Physical damage  Transient failures Mobile host Wireless link Environmental conditions  Fault-tolerant CORBA  Objective  To construct a fault-tolerant wireless CORBA

8 Dept. of Computer Science & Engineering Fault-Tolerant Wireless CORBA Architecture Client Object Terminal Bridge Recovery Mechanism ORB Platform Mobile Host Recovery Mechanism Logging Mechanism Platform Access Bridge Mobile Side Fixed Side Access Point (Mobile Support Station) ORB Recovery Mechanism Logging Mechanism ORB Platform Static Server GIOP Tunnel Multicast Message Object Replica Recovery Mechanism

9 Dept. of Computer Science & Engineering Access Bridge 3 Reconnect Mobile Host Handoff Access Bridge 1 Access Bridge 2 Home Location Agent Handoff Location update Handoff Location update Collect last checkpoint and succeeded message logs Sorted by Ack. SN Mobile Host Recovery Messages replay

10 Dept. of Computer Science & Engineering Chapter 4 Message Queueing and Scheduling at Access Bridge  Motivation  Previous work Task response time in the presence of server breakdowns  Wireless mobile environments Due to failures and handoffs of mobile hosts, the messages at access bridge cannot be dispatched  Objective  To derive the expected message sojourn time at access bridge in the presence of failures and handoffs of mobile hosts  To evaluate different message scheduling strategies

11 Dept. of Computer Science & Engineering Mobile Host’s State Transition 0 1   mm  2  State 0 : normal  State 1 : handoff (H)  State 2 : recovery (U)   : handoff rate   m : failure rate   : handoff completion rate   : recovery rate

12 Dept. of Computer Science & Engineering 1 2 m Basic Dispatch Model m  q0q m  : message arrival rate for each mobile host  m : number of mobile hosts   : service rate of the dispatch facility

13 Dept. of Computer Science & Engineering Static Processor-Sharing Dispatch Model  /m q1q1 q2q2 qmqm

14 Dept. of Computer Science & Engineering  /m qiqi  mm 01 2 priority Head-of-the-line Priority Queue  : message arrival rate   : handoff rate   m : mobile host’s failure rate   : handoff completion rate   : mobile host’s recovery rate 

15 Dept. of Computer Science & Engineering Dynamic Processor-Sharing Dispatch Model q1q1 q2q2 qmqm  /L L

16 Dept. of Computer Science & Engineering Cyclic Polling Dispatch Model q1q1 q2q2 qmqm      : switchover rate

17 Dept. of Computer Science & Engineering Feedback Dispatch Model m  q0q0

18 Dept. of Computer Science & Engineering Simulation and Analytical Results (1)  Number of mobile hosts m

19 Dept. of Computer Science & Engineering Simulation and Analytical Results (2)  Mobile host’s failure rate  m

20 Dept. of Computer Science & Engineering Chapter 4 Summary  Analyze and simulate the message sojourn time at access bridge in the presence of mobile host failures and handoffs  Observation  The basic model and the static processor-sharing model demonstrate the worst performance  The dynamic processor-sharing model and the cyclic polling model are favorite to be employed However, the cyclic polling model and the feedback model engage a switchover cost  In the basic model and the feedback model, the number of mobile hosts covered by an access bridge should be small

21 Dept. of Computer Science & Engineering Chapter 5 Program Execution Time at Mobile Host  Motivation  Previous work Program execution time with and without checkpointing in the presence of failures on static hosts with given time requirement without failures  Wireless mobile environments Underlying message-passing mechanism –Network communications –Discrete message exchanges Handoff Wireless link failures

22 Dept. of Computer Science & Engineering Program Termination Condition  A program at a mobile host will be successfully terminated if it continuously receives n computational messages  Objective  To derive the cumulative distribution function of the program execution time with message number n in the presence of failures, handoffs, and checkpointings  To evaluate different checkpointing strategies

23 Dept. of Computer Science & Engineering Assumptions and Mobile Host’s State Transition 0 1  2 3 mm mm mm  * 2l2l  State 0 : normal  State 1 : handoff (H)  State 2 : recovery  State 3 : checkpointing  : message dispatch rate at access bridge  * : message arrival rate at mobile host   : handoff rate   : checkpointing rate   m : mobile host’s failure rate   l : wireless link’s failure rate

24 Dept. of Computer Science & Engineering Composite Checkpointing State 3 46   mm mm 2l2l ll 5 mm mm   State 4 : take checkpoint (T 1 )  State 5 : save checkpoint (T 2 )  State 6 : handoff (H) 4 5

25 Dept. of Computer Science & Engineering Composite Recovery State  2 mm 10 mm mm 2l2l mm ll mm mm mm mm mm mm  State 7 : repair (R)  State 8 : retrieve checkpoint (T 3 )  State 9 : reload checkpoint (T 4 )  State 10 : handoff (H) 79 8

26 Dept. of Computer Science & Engineering Deterministic Checkpointing Strategy  The number of messages in a checkpointing interval is fixed with u  Checkpointing rate  dc = /u  Number of intervals w =  Checkpointing time C = T 1 (h,l) + T 2 (l)  Recovery time R’ = [R + T 3 (l) + T 4 (h,l) ] (f)

27 Dept. of Computer Science & Engineering Random Checkpointing Strategy  Create a checkpoint when I messages have been received since the last checkpoint  I: a random variable with a geometric distribution whose parameter is p  Checkpointing rate  rc = p

28 Dept. of Computer Science & Engineering Without Failures  Without checkpointing  Deterministic checkpointing  Random checkpointing If u = p -1, then p(n-1)  w-1, which indicates that on average the random checkpointing creates more checkpoints than the deterministic checkpointing.  w: number of checkpointing intervals  p: parameter of geometric distribution

29 Dept. of Computer Science & Engineering Time-based Checkpoint Strategy  The checkpointing interval is a constant time v  Checkpointing rate  tc = 1/v

30 Dept. of Computer Science & Engineering Average Effectiveness  Ratio between the expected program execution time without and with failures, handoffs and checkpoints  Checkpointing frequency

31 Dept. of Computer Science & Engineering Comparisons and Discussions (1)  Message number n

32 Dept. of Computer Science & Engineering Comparisons and Discussions (2)  Message arrival rate

33 Dept. of Computer Science & Engineering Comparisons and Discussions (3)  Optimal checkpointing frequency

34 Dept. of Computer Science & Engineering Chapter 5 Summary  Derive the Laplace-Stieltjes transform of the cumulative distribution function of the program execution time and its expectation for three checkpointing strategies  Observation  The performance of the random checkpointing approach is more stable against varying parameter conditions  Different checkpointing strategies, even including the absence of checkpointing, can be engaged

35 Dept. of Computer Science & Engineering Chapter 6 Reliability Analysis for Various Communication Schemes  Motivation  Previous work Two-terminal reliability: the probability of successful communication between a source node and a target node  Wireless mobile environments Handoff causes the change of number and type of engaged communication components  Objective  To evaluate reliability of wireless networks in the presence of handoff

36 Dept. of Computer Science & Engineering Expected Instantaneous Reliability (EIR)  End-to-end expected instantaneous reliability at time t   x (t) : the probability of the system in state x at time t  R x (t) : the reliability of the system in state x at time t

37 Dept. of Computer Science & Engineering Assumptions  There will always be a reliable path in the wired network  The wireless link failure is negligible  All the four components, access bridge, mobile host, static host, and home location agent, of wireless CORBA are failure-prone and will fail independently  Constant failure rates:  a,  m,  s, and  h

38 Dept. of Computer Science & Engineering Four Communication Schemes  Static Host to Static Host (SS)  Traditional communication scheme  Mobile Host to Static Host (MS)  2 system states  Static Host to Mobile Host (SM)  5 system states  Mobile Host to Mobile Host (MM)  11 system states

39 Dept. of Computer Science & Engineering The MS Scheme (Mobile Host – Static Host)

40 Dept. of Computer Science & Engineering EIR of the MS Scheme

41 Dept. of Computer Science & Engineering MTTF (Mean Time To Failure) of the MS Scheme

42 Dept. of Computer Science & Engineering The SM Scheme (Static Host – Mobile Host) Three options for location-forwarding after a handoff:  Mobile Interoperable Object Reference (MIOR)  GIOP (General Inter-ORB Protocol) message with status LOCATION_FORWARD  LF_HLA: the address of the mobile host’s home location agent  LF_QHLA: the address of the mobile host’s current access bridge by querying the home location agent ③ LF_AB: the address of the mobile host’s access bridge to which it moves

43 Dept. of Computer Science & Engineering EIR of the SM Scheme (LF_QHLA)

44 Dept. of Computer Science & Engineering EIR with Location-Forwarding Strategies

45 Dept. of Computer Science & Engineering Time-Dependent Reliability Importance  Measure the contribution of component-reliability to the system expected instantaneous reliability

46 Dept. of Computer Science & Engineering Reliability Importance of the SM Scheme

47 Dept. of Computer Science & Engineering The MM Scheme (Mobile Host – Mobile Host)

48 Dept. of Computer Science & Engineering The MM Scheme (Mobile Host – Mobile Host)

49 Dept. of Computer Science & Engineering Markov Models for the MM Scheme

50 Dept. of Computer Science & Engineering Chapter 6 Summary  Measure the end-to-end reliability of wireless networks in the presence of mobile host handoff  Observation  Handoff and location-forwarding procedures should be completed as soon as possible  The reliability importance of different components should be determined with specific failure and service parameters  The number of engaged components during a communication state is more critical than the number of system states

51 Dept. of Computer Science & Engineering Chapter 7 Sensibility-Based Sleeping Configuration in Sensor Networks  Motivation  Maintaining coverage Every point in the region of interest should be sensed within given parameters  Extending system lifetime The energy source is usually battery power Battery recharging or replacement is undesirable or impossible due to the unattended nature of sensors and hostile sensing environments  Fault tolerance Sensors may fail or be blocked due to physical damage or environmental interference Produce some void areas which do not satisfy the coverage requirement  Scalability High density of deployed nodes Each sensor must configure its own operational mode adaptively based on local information, not on global information

52 Dept. of Computer Science & Engineering Objective: Coverage Configuration  Coverage configuration is a promising way to extend network lifetime by alternately activating only a subset of sensors and scheduling others to sleep according to some heuristic schemes while providing sufficient coverage and tolerating sensor failures in a geographic region

53 Dept. of Computer Science & Engineering Boolean Sensing Model (BSM)  Each sensor has a certain sensing range sr  Within this sensing range, the occurrence of an event could be detected by the sensor alone  N i : sensor i  y : a measuring point   : deployed sensors in a deployment region   d(N i,y) : distance between N i and y  sr i : sensing radius of sensor N i

54 Dept. of Computer Science & Engineering Collaborative Sensing Model (CSM)  Capture the fact that signals emitted by a target of interest decay over the distance of propagation  Exploit the collaboration between adjacent sensors  Point Sensibility s(N i, p): the sensibility of a sensor N i for an event occurring at an arbitrary measuring point p   : energy emitted by events occurring at point p   : decaying factor of the sensing signal

55 Dept. of Computer Science & Engineering Field Sensibility  Collective-Sensor Field Sensibility (CSFS)  Neighboring-Sensor Field Sensibility (NSFS)  N(i) : one-hop communication neighbor set of sensor N i   s : required sensibility threshold   n : signal threshold

56 Dept. of Computer Science & Engineering Relations between the BSM and the CSM  Ensured-sensibility radius  Collaborative-sensibility radius   s : required sensibility threshold   n : signal threshold   : energy emitted by events occurring at point p   : decaying factor of the sensing signal

57 Dept. of Computer Science & Engineering Sleeping Candidate Condition for the BSM with Arc-Coverage  Each sensor N i knows its location (x i, y i ), sensing radius sr i, communication radius cr NiNi NjNj Sponsored Sensing Arc (SSA)  ij Sponsored Sensing Region (SSR) Sponsored Sensing Angle (SSG)  ij Covered Sensing Angle (CSG)  ij

58 Dept. of Computer Science & Engineering Complete-Coverage Sponsor (CCS)  d(N i, N j ) ≤ sr j - sr i NiNi NjNj SSG  ij is not defined CSG  ij =2  Complete-Coverage Sponsor (CCS) of N i Degree of Complete Coverage (DCC)  i = |CCS(i)| CCS(i)

59 Dept. of Computer Science & Engineering Minimum Partial Arc-Coverage (MPAC)  The minimum partial arc-coverage (MPAC) sponsored by sensor N j to sensor N i, denoted as  ij,  on SSA  ij find a point y that is covered by the minimum number of sensors  the number of N i 's non-CCSs covering the point y  SSA: Sponsored Sensing Arc  CCS: Complete-Coverage Sponsor

60 Dept. of Computer Science & Engineering Derivation of MPAC  ij Sponsored Sensing Angle (SSG)  ij Covered Sensing Angle (CSG)  ij 0 22  ij  jm  ij = 2  ij = 1  jl NiNi NjNj NlNl NmNm

61 Dept. of Computer Science & Engineering MPAC and DCC Based k-Coverage Sleeping Candidate Condition  k-coverage  “ A region is k-covered ” means every point inside this region is covered by at least k sensors.  Theorem 4  A sensor N i is a sleeping candidate while preserving k- coverage under the constraint of one-hop neighbors, iff  i ≥ k or  N j  N(i) - CCS(i),  ij > k -  i.   i : Degree of Complete Coverage (DCC)   ij : Minimum Partial Arc-Coverage (MPAC)  N(i) : one-hop communication neighbors  CCS(i): Complete-Coverage Sponsor

62 Dept. of Computer Science & Engineering Sleeping Candidate Condition for the BSM with Voronoi Diagram  Theorem 5  A sensor N i is on the boundary of coverage iff its Voronoi cell is not completely covered by its sensing disk. A sensor N i is said to be on the boundary of coverage if there exists a point y on its sensing perimeter such that y is not coverd by its one-hop working neighbors N(i).

63 Dept. of Computer Science & Engineering Theorem 6  A sensor N i is a sleeping candidate iff  It is not on the coverage boundary  When constructing another Voronoi diagram without N i, all the Voronoi vertices of its one-hop working neighbors in N i ’s sensing disk are still covered.

64 Dept. of Computer Science & Engineering Example of Sleeping-Eligible Sensor: N 1

65 Dept. of Computer Science & Engineering Sleeping Candidate Condition for the CSM  With the NSFS, if the Voronoi cells of all a sensor’s one- hop neighbors are still covered without this sensor, then it is a sleeping candidate.  CSM: Collaborative Sensing Model  NSFS: Neighboring- Sensor Field Sensibility  sr i c : collaborative- sensibility radius

66 Dept. of Computer Science & Engineering Location Error  Assume that a sensor's obtained location is uniformly distributed in a circle located at its accurate position with radius  d  normalized deviation of location   the ratio of the maximum location deviation  d to a sensor's sensing radius  normalized distance d  the ratio of the distance between a point and a sensor to the sensor's sensing radius

67 Dept. of Computer Science & Engineering Coverage Relationship with Location Error

68 Dept. of Computer Science & Engineering Probability of Coverage with Location Error

69 Dept. of Computer Science & Engineering Sensibility-Based Sleeping Configuration Protocol (SSCP)  Round-based  Divide the time into rounds  Approximately synchronized  In each round, every live sensor is given a chance to be sleeping eligible  Adaptive sleeping  Let each node calculate its sleeping time locally and adaptively

70 Dept. of Computer Science & Engineering Performance Evaluation with ns-2  Boolean sensing model  SS: Sponsored Sector Proposed by Tian et. al. of Univ. of Ottawa, 2002 Consider only the nodes inside the sensing radius of the evaluated node  CCP: Coverage Configuration Protocol Proposed by Wang et. al. of UCLA, 2003 Evaluate the coverage of intersection points among sensing perimeters  SscpAc: the sleeping candidate condition with arc-coverage in the round-robin SSCP  SscpAcA: the sleeping candidate condition with arc-coverage in the adaptive SSCP  SscpVo: the sleeping candidate condition with Voronoi diagram in the round-robin SSCP  Collaborative sensing model  SscpCo: the sleeping candidate condition for the CSM in the round- robin SSCP  Central: a centralized algorithm with global coordination

71 Dept. of Computer Science & Engineering Performance Evaluation (1)  Communication radius cr

72 Dept. of Computer Science & Engineering Performance Evaluation (2)  Number of working vs. deployed sensors

73 Dept. of Computer Science & Engineering Performance Evaluation (3)  Field sensibility distribution

74 Dept. of Computer Science & Engineering Performance Evaluation (4)  Loss of area coverage

75 Dept. of Computer Science & Engineering Performance Evaluation (5)  Sensitivity to sensor failures  -coverage accumulated time: the total time during which  or more percentage of the original covered area still satisfies the coverage threshold

76 Dept. of Computer Science & Engineering Performance Evaluation (6)  Sensitivity to sensor failures with fault tolerance

77 Dept. of Computer Science & Engineering Chapter 7 Summary  Exploit problems of energy conservation and fault tolerance while maintaining desired coverage and network connectivity with location error in wireless sensor networks  Investigate two sensing models: BSM and CSM  Develop two distributed and localized sleeping configuration protocols (SSCPs): round-based and adaptive sleeping  Suggest three effective approaches to build dependable wireless sensor networks  increasing the required degree of coverage or reducing the communication radius during sleeping configuration  configuring sensor sleeping adaptively  utilizing the cooperation between neighboring sensors

78 Dept. of Computer Science & Engineering Conclusions and Future Directions  Build a fault tolerance architecture for wireless CORBA (Chapter 3)  Construct various and hybrid message logging protocols  Study the expected message sojourn time at access bridge (Chapter 4)  Derive analytical results for the left three models  Generalize the exponentially distributed message inter- arrival time and service time  Analyze the program execution time at mobile host (Chapter 5)  Exploit the effect of wireless bandwidth and mobile host disconnection on program execution time

79 Dept. of Computer Science & Engineering Conclusions and Future Directions (cont’d)  Evaluate reliability for various communication schemes (Chapter 6)  Develop end-to-end reliability evaluation for wireless sensor networks  Propose sleeping candidate conditions to conserve sensor energy while preserving redundancy to tolerate sensor failures and location error (Chapter 7)  Relax the assumption of known location information and no packet loss  Find a reliable path to report event to end-user  Integrate sleeping configuration protocol with routing protocol

80 Dept. of Computer Science & Engineering Q & A