Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University.

Similar presentations


Presentation on theme: "1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University."— Presentation transcript:

1 1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University

2 2 Sensor Networks Network of nodes –Equipped with sensing devices (e.g. temp.) –Battery-powered –Communicate via radio, among each other, to base station/root –Radio is primary energy consumer Goal: limit number/size of messages with in-network processing Base Station

3 3 Continuous “Select *” Query: Collect each measured value, v i, from each node, u i, at each timestep Continuous Reporting: each node transmits its value at each timestep  Maximal data transmission Sensor data is often slow moving and/or spatially correlated How can we exploit this? t0t0 t1t1 t2t2 t3t3 v0v0 v1v1 v2v2

4 4 Outline 1.Existing suppression techniques a.Temporal b.Spatial 2.Conch (Spatio-temporal suppression) 3.Conch construction 4.Failure handling 5.Experimental evaluation 6.Conclusion

5 5 10 30 Temporal Suppression Constraint: at u i, if v i != v i l.r., transmit v i Effective when values change slowly, or only a few change –What about large-scale change? 1020304050  Change is simple, but whole-sale. All nodes transmit! Root 20 30

6 6 Spatial Suppression At u i, if v i = v neighbor, do not transmit –Effective when all values are similar 1020304050 10  “Coverage” nodes transmit Root 30 20 30  Many nodes along front must transmit

7 7 Spatial Suppression Other Spatial Issues –Misses relationships between nodes that are consistent over time No temporal consideration –Spatial relationships must be explicitly defined Overhearing Plan (Event Contour, Meng 04) –Nodes listen for neighbors transmitting before them –If average of overheard values equals node’s, suppress  Without a global reporting order, root has no way to know which neighbors were overheard to trigger suppression

8 8 Spatio-temporal Want to combine advantages of temporal and spatial suppression –Avoid transmitting when values not changing –Avoid transmitting when nearby nodes are similar AND: Require both types be satisfied –More restrictive, less suppression OR: Require one type be satisfied –Ambiguous, no way for root to know which type triggered suppression

9 9 Suppression-Another Look Set constraints within the network for which data is or is not transmitted to the root The absence of a constraint report means the constraint’s state is unchanged The current state of all constraints must be sufficient to produce a query result (in this case, produce all node values)

10 10 Spatio-temporal Solution: Temporally monitor spatial constraints –Constraint: Difference in value (or model parameters) between neighboring nodes Monitor which constraints? –Leverage broadcast Each node broadcasts value when it changes All overhearing nodes calculate differences, report if changed Monitoring all 1-hop edges: Neighborhood Chain current constraint values together to determine node values –Must know one node value as starting point (ex. root) uiui ujuj monitor: v i -v j

11 11 10 30 20 30 Neighborhood Monitor all edges (between nodes that can communicate) 1020304050  Only nodes on borders must transmit Root  Still, the number of reports seems too large…redundant +20 0 +10 0 *  Use chaining to derive node values

12 12 Remaining Questions Can we do better than neighborhood by generating fewer reports? How can we monitor fewer edges and still use chaining to derive all node values? How can we prevent outlier nodes from generating lots of edge messages?

13 13 Conch Choose edges explicitly, rather than rely on broadcast Build a spanning forest over nodes –A set of trees, such that each node is in exactly one tree –Each tree must have a temporally monitored root from which chaining is done –For each edge, one node designated updater, one designated reporter Updater notifies reporter if value has changed Reporter notifies root if difference has changed  Spanning forest is not for routing!

14 14 10 30 20 30 Conch 1020304050  Only 1 node on each border transmits Root  Chain is longer, but derivation is at root, so is free +20 0 +10 0 0 0 0 *

15 15 Conch Construction Intuitions –Conch forest is not used for routing Routing layer handles sending edge reports to base station (e.g. along a shortest path tree) –Use edges connecting nodes with correlated behavior These trigger the fewest reports –Don’t insist on connecting nodes with uncorrelated or erratic behavior Spanning forest, not spanning tree

16 16 Conch Construction Initially use any spanning forest to collect “training data” –Any Conch plan returns all node values, from which we can calculate all edge statistics Score correlation for all possible edges –Number of rounds in which nodes have uncorrelated activity Use linear programming to choose updaters, reporters –Prefer reporters be closer to root –Prefer single reporter for multiple correlated edges

17 17 Conch Construction Use Prim’s or Kruskal’s –Repeatedly choose edge with lowest score that connects (at least) one new node to the tree Root ! ! : monitored node : monitored edge

18 18 Failure Major issue for all suppression strategies –Ambiguity: Does the absence of a particular report indicate its constraint is not violated, or that it is violated, but the report was lost In Conch, the more effective suppression, the more detrimental each failure Root 30 50 30 +0 +20

19 19 Redundancy Add redundant constraints –Spanning forest provides minimal number of constraints needed to derive node values –Neighborhood provides maximal possible redundancy Redundancy provides multiple paths for chaining between tree roots and nodes –But if failure occurs, chains are inconsistent –Two calculations lead to different values for c r a b c 0+1 +2 +1 to +2 c=r+0+2c=r+1+2

20 20 Redundancy Goal: choose a set of constraints to trust such that they produce a consistent setting of node values Factors to consider –Failure rate –Change frequency –Time since last report We show given failure rates (assuming independence) how to use linear programming to find “best” solution

21 21 Experiments: Overview 4 Algorithms –Temporal Suppression –Spatial Suppression Nodes report in fixed order Suppression based on average of reporting node neighbors earlier in order –Neighborhood –Conch Simulation of Mica2 motes Radio costs: energy cost for bytes sent+received –Updater to reporter messages –Reporter to base station messages

22 22 Experiment: Density Adjust Density Nodes rise uniformly

23 23 Experiment: Outliers Some percentage of nodes are outliers, all others correlated Conch degrades to temporal suppression when no correlation exists Non-outliers never changeNon-outliers consistently rise

24 24 Experiment: Wavefront Vertical front moves from left to right, raising the values of nodes over which it passes –Values correlated on x-coordinate Only Conch edges newly or no longer intersecting a value border report –When edges are vertical, wavespeed does not impact number of reporting edges t0t0 t1t1 Case 1 Case 2

25 25 Experiment: Wavefront Conch construction matters Conch explicitly chooses (near) vertical edges Shortest-Path Routing Tree (Conch-Comm) Conch

26 26 Conclusions Conch provides a framework for monitoring using spatio-temporal suppression Conch forest is built to exploit the spatial correlations in network We have used value-based as example, but it can be extended to model parameters, etc. Failure causes ambiguity in suppression –We are developing stronger techniques for planning for failure, and for interpreting results affected by failure

27 27 Questions?

28 28 Monitoring Parameters Temperature measured as x=f(t,p) –t is time of day –p is a current baseline dictating temperature Monitor p and error, e=x-f(t,p) p and e should change less often than x p values are spatially correlated e values are spatially correlated due to events affecting nearby nodes –Shade canopies in a forest

29 29 Experiment: Reliability Node values all take random walk Random message loss at varying rates Conch trees with varying numbers of redundant edges

30 30 Conch Plan Conch plan involves nodes reporting and edges reporting Formally: –For each tree root, u r, if v r changes, u r transmits v r to base station –For each edge e ij in spanning forest, node u i is updater and node u j is reporter If v i changes, u j transmits v i to u j Reporter evaluates (v i - v j ) –If (v i - v j ) != (v i - v j ) old, u j transmits (v i - v j ) to base station


Download ppt "1 Constraint-Chaining: On Energy -Efficient Continuous Monitoring in Sensor Networks Adam Silberstein Rebecca Braynard Jun Yang Duke University."

Similar presentations


Ads by Google