AWSN
AWSN
Key Takeaways:
● WSNs enhance existing applications and create new ones by providing detailed, real-time information.
● They are about delivering precise information with minimal resource consumption.
● Applications span a wide range of fields from disaster relief to healthcare, agriculture, logistics, and beyond.
● Share some general problems with MANETs but have distinct differences.
● Applications: Typically involve sensing, computing, and communication for environmental interaction.
● Traffic Characteristics: Very different from human-driven networks; exhibit low data rates with potential for bursty
traffic during events.
● Scale: Must handle larger numbers of entities (thousands to hundreds of thousands) than MANETs.
● Energy: Stricter requirements on network lifetime, with limited options for recharging or replacing batteries.
● Dependability and QoS: Different requirements; WSNs need new QoS concepts considering energy constraints.
● Data Centric: Favor data-centric protocols due to redundant deployment, unlike MANETs.
● Simplicity and Resource Scarcity: Require simpler operating and networking software due to limited resources.
● Mobility: Mobility issues in WSNs include handling moving phenomena and mobile information sinks.
Key Takeaways:
● MANETs: More focused on extending communication reach and supporting mobile nodes in human-driven
applications.
● WSNs: Designed for environmental interaction with stricter energy, scalability, and simplicity requirements, often
using data-centric protocols.
Key Differences:
Commonalities:
● Both involve self-configuring, energy-constrained nodes and need to handle mobility and dependability.
1. Miniaturization of Hardware:
● Smaller chip feature sizes reduce power consumption.
● Improvements in microcontrollers, memory chips, and radio modems enhance energy efficiency.
● Reduced chip size(improved energy efficiency)) and cost enable affordable, redundant node deployment.
2. Sensing Equipment:
● Wide range of possible sensors, specific details covered in Chapter 2.
3. Power Supply:
● High-capacity batteries with low self-discharge rates.
● Efficiently provide small amounts of current.
● Energy scavenging options (e.g., solar cells, vibration-based power generation) for recharging.
4. Software:
● Operating System (OS) or runtime environment architecture for single nodes.
■ Supports simple retasking, cross-layer information exchange, and modularity.
● Network architecture for task division among multiple nodes.
■ Structures interfaces for application programmers.
● Design of appropriate communication protocols.
UNIT 2 - ARCHITECTURES
Single-node Architecture for Wireless Sensor Networks
Requirements for Sensor Nodes:
Interconnections:
2.1.2 Controller
Microcontrollers vs. Microprocessors, FPGAs, and ASICs:
● Controller Role:
● Core(CPU) of the sensor node
● Collects data from the sensors, processes this data, decides when and where to send it, receives data
from other sensor nodes, and decides on the actuator’s behavior
● Executes various programs (time-critical signal processing, communication protocols, application
programs)
● Trade-offs between flexibility, performance, energy efficiency, and costs
● General-Purpose Processors:
● High power consumption, excessive for WSNs
● Used in desktop computers
● Microcontrollers:
● Suited for embedded systems
● Flexible, low power consumption, built-in memory
● Can enter sleep states to save energy
● Typically lacks a memory management unit
● Preferred for WSNs due to flexibility and low power
● Digital Signal Processors (DSPs):
● Geared for processing large amounts of vectorial data
● Not typically used in WSNs due to modest communication requirements
● Field-Programmable Gate Arrays (FPGAs):
● Reprogrammable, adaptable
● Higher energy consumption and reprogramming time
● Application-Specific Integrated Circuits (ASICs):
● Custom-designed for specific applications
● High performance, energy efficiency
● Higher development cost, less flexible
● Suitable for large-scale, dedicated WSN applications
● Combination Approaches:
● Splitting tasks between energy-efficient ASICs and flexible microcontrollers
Examples of Microcontrollers:
● Intel StrongARM:
● High-end processor, used in older WSN prototypes
● 32-bit RISC core, up to 206 MHz
● Texas Instruments MSP 430:
● Designed for embedded applications
● 16-bit RISC core, up to 4 MHz
● Various interconnection options, on-chip RAM (2-10 kB)
● Several 12-bit ADC and RTC
● Suitable for typical WSN tasks
● Atmel ATmega 128L:
● 8-bit microcontroller for embedded applications
● Equipped with interfaces for common peripherals
2.1.3 Memory
● Types of Memory:
● Random Access Memory (RAM):
■ Stores intermediate sensor readings and packets from other nodes
■ Fast but volatile (loses content when power is off)
● Read-Only Memory (ROM), EEPROM, Flash Memory:
■ Stores program code
■ EEPROM and flash memory allow data to be erased/written (flash memory does this in blocks)
● Flash Memory:
● Used for intermediate data storage incase RAM is insufficient/off.
● Non-volatile but has long read/write delays and high energy requirements
● Memory Considerations:
● Dimensioning memory sizes (especially RAM) is crucial for cost and power efficiency
● Memory requirements are highly application-dependent, making general guidelines difficult
Transceivers:
● RFM TR 1001
● Chipcon CC 1000 and CC 2420
● Infineon TDA525x family
Common Structure:
● RF Front End:
○ Performs analog signal processing in the radio frequency band.
● Baseband Part:
○ Handles signal processing in the digital domain.
○ Communicates with the sensor node's processor or other digital circuitry.
Frequency Conversion:
● Conversion between RF and baseband occurs, sometimes through intermediate frequencies (IFs).
● DACs and ADCs:
○ Mark the boundary between analog and digital domains.
1. Transmit:
● Transmit part active.
● Antenna radiates energy.
2. Receive:
● Receive part active.
3. Idle:
● Ready to receive but not currently receiving.
● Many receive circuitry parts are active, some can be switched off.
● Eg: In Sync ckt, ele concerned with acquisition are active, while tracking is switched off and activated
only when acquisition has found something.
● Leakage is a major power dissipation source.
4. Sleep:
● Significant parts of the transceiver are switched off.
● Different sleep states with varying levels of circuitry shutdown and in associated recovery times and
startup energy.
● Complete power down requires full initialization and configuration.
● Lighter sleep modes throttle down clocks while retaining configuration and state.
Considerations:
● State Management:
● Protocol stack and operating software decide the transceiver's state based on communication needs.
● State changes dissipate power and require startup time and energy.
● Complex scheduling is needed to minimize average power consumption (power management).
Optical Communication
● Advantages:
○ Very small energy per bit for generating and detecting light.
○ Simple and efficient circuitry.
○ Minimal interference, allowing concurrent communication.
● Disadvantages:
○ Requires line of sight.
○ Strongly influenced by weather conditions.
● Example:
○ Corner-cube reflector:
■ Reflects light back to its source.
■ Can modulate signals with minimal energy.
■ Achieves data rates up to 1 kb/s.
■ Enables passive sensor readout over long distances with a powerful laser (up to 150 m using a 5
mW laser).
Ultrasound Communication
● Suitability: Ideal for environments where radio or optical waves can't penetrate, such as underwater.
● Advantages:
○ Travels long distances at low power.
○ Effective for underwater applications (e.g., marine ground floor erosion surveillance).
○ Useful in location systems due to different propagation speeds.
● Applications: Underwater sensor networks for offshore wind farm construction and other marine uses.
● CC1000:
○ Frequency: 300-1000 MHz.
○ Modulation: FSK.
○ Features: RSSI, programmable output power, crystal temperature drift compensation, frequency hopping
support.
● CC2420:
○ Frequency: 2.4 GHz.
○ Standard: IEEE 802.15.4.
○ Data Rate: 250 kbps.
○ Features: DSSS modem, low-power consumption.
● Bands:
○ 868 MHz (1 channel, 20 kbps, BPSK).
○ 915 MHz (10 channels, 40 kbps, BPSK).
○ 2.4 GHz (16 channels, 250 kbps, O-QPSK).
● Features: DSSS scheme, power dissipation of 74.9 mW in transmit mode, 83.2 mW in receive mode, 12 µA in
sleep mode.
Conexant RDSSS9M
These examples showcase a variety of transceivers with different frequencies, data rates, modulations, and features,
catering to diverse WSN applications. )
2.1.5 Sensors and actuators
Sensors
● Measure physical quantities at the pt of sensor node without manipulating the environment by active probing.
● Self-powered or require minimal energy for analog signal amplification.
● Examples: thermometer, light sensors, vibration sensors, microphones, humidity sensors, smoke detectors, etc.
Active Sensors
Practical Considerations
● Various sensor types available with trade-offs in accuracy, dependability, energy consumption, cost, and size.
● Most theoretical WSN work focuses on passive, omnidirectional sensors.
● Narrow-beam sensors like cameras are used experimentally.
● Active sensors are not extensively studied in WSN literature.
Actuators
Traditional Batteries
● Primary Batteries:
○ Non-rechargeable; provide initial power.
○ Examples: Zinc-air, lithium, alkaline.
○ Energy densities: Zinc-air (3780 J/cm³), Lithium (2880 J/cm³), Alkaline (1200 J/cm³).
● Secondary Batteries:
○ Rechargeable with energy scavenging.
○ Examples: Lithium, NiMH, NiCd.
○ Energy densities: Lithium (1080 J/cm³), NiMH (860 J/cm³), NiCd (650 J/cm³).
● Battery Requirements:
○ Capacity: High energy density, high capacity, small weight, small volume, low cost.
○ Capacity under Load: Must support variable power consumption patterns. (nodes can draw high current
in certain operation modes)
○ Self-Discharge: Low self-discharge rate for long operational life.
○ Efficient Recharging: Can recharge efficiently from low and intermittent power sources. Should also not
exhibit memory effect.
○ Relaxation: Understanding relaxation effects(self-recharging of an almost empty battery cell) to optimize
battery lifespan and capacity usage.
● Fuel Cells:
○ Convert chemical energy directly into electrical energy.
○ High energy densities but require additional components like pumps and valves.
● Heat Engines:
○ Use hydrocarbon fuels or heat to generate electricity.
○ Challenges in scaling down to micro-levels; power output predictions vary.
● Radioactive Substances:
○ Proposed for long-term energy storage in specialized applications.
● Gold Caps (Capacitors):
○ High-capacity capacitors for quick energy storage and release.
○ Do not degrade over time like batteries.
DC-DC Conversion
Energy scavenging
Limited energy store is unacceptable so energy from node’s environment must be tapped into and made available.
Photovoltaics
● Description: Converts temperature differences into electrical energy using Seebeck effect.
● Power Output: Around 80 μW/cm² at 1 V from a 5 K temperature difference.
● Applications: Suitable for harvesting energy from environmental temperature variations.
Vibrations
Flow of Air/Liquid
● Description: Utilizes flow of air or liquid to generate power, similar to wind turbines.
● Challenges: Miniaturization is a significant challenge but holds potential in MEMS technology.
Energy Source Comparison (Table 2.3)
● Batteries:
○ Zinc-air: 1050–1560 mWh/cm³.
○ Rechargeable lithium: 300 mWh/cm³ (at 3–4 V).
● Power Density (Examples):
○ Acoustic noise: 3 × 10⁻⁶ mW/cm² at 75 dB.
○ Passive human-powered systems: 1.8 mW (shoe inserts).
○ Nuclear reaction: 80 mW/cm³, 106 mWh/cm³.
Integration Challenges
● Battery Dependency: Energy scavenging often requires secondary batteries due to fluctuating power supply.
● Circuitry Requirements: Additional circuitry needed for recharging, power conversion, and managing battery
technology.
● Task Scheduling: Aligning sensor network tasks with energy scavenging characteristics can significantly extend
network lifetime. Upto 200%.
● Optimal State Transition: Switching to sleep mode is beneficial if Eoverhead < Esaved, depending on time to next
event (if its large) =>
● Research and Medium Access Control: Much research in wireless sensor networks focuses on optimizing
when to turn off node receivers to conserve energy.
● Intel StrongARM:
○ Normal mode: Up to 400 mW.
○ Idle mode: Clocks to CPU stopped, peripherals active. Up to 100 mW.
○ Sleep mode: Only real-time clock active, wakeup via timer interrupt, takes upto 160ms. Up to 50 μW.
● Texas Instruments MSP430:
○ Operational mode: Fully op mode consumes about 1.2 mW(at 1MHz and 3V).
○ 4 sleep modes
○ LPM4 (deepest sleep): Only wakes up on external interrupts. 0.3 μW.
○ LPM3: Clock running for scheduled wakeups. About 6 μW.
● Atmel ATmega 128L:
○ Six modes: Power consumption varies from 6 mW to 15 mW in idle and active modes.
○ Power-down modes: About 75 μW.
● Concept:
○ Adjusts controller speed dynamically to match task deadlines.
○ Reduces power consumption by lowering supply voltage while maintaining correct operation.
● Benefit:
○ Power consumption P depends quadratically on supply voltage and freq
P ∝ f . V2DD
○ Example: Transmeta Crusoe processor scales from 700 MHz at 1.65 V to 200 MHz at 1.1 V, reducing
power consumption significantly.
● Implementation:
○ Requires efficient DC-DC converters.
○ Careful adherence to minimum and maximum clock rates and voltage thresholds specified for each
device.
2.2.3 Memory
Types of Memory
● Transmitter Components:
○ Energy consumption during transmission includes RF signal generation(depends on modulation, target
distance and Ptx) and electronic components (e.g., frequency synthesis, freq conversion, filters, etc).
○ Ptx is a function of system aspects like energy per bit over noise Eb/N0, the bandwidth efficiency ηBW, the
distance d and the path loss coefficient γ.
○ Ptx is gen by amp of tx.
Alpha, beta are const depending on process tech and amp arch.
○ Example: For μAMPS-1 nodes, efficiency (amp eff ηPA = Ptx / Pamp is best at max o/p power) at 1 mW
radiated power is approximately 0.55%.
○ BB processor power PtxElec
● Energy for Transmitting a Packet:
○ Energy Etx(n,Rcode,Pamp) to transmit an n-bit packet includes startup costs (to allow VCO and PLL to settle),
transmission duration (det by nominal bit rate R and coding rate Rcode), and total power consumption
during transmission:
- Doesn't depend on modulation chosen and assumes perfect antenna and assumes coding
overhead only depends on coding rate(so use FEC)
Considerations
● Startup Costs:
○ Significant time and energy are required to turn on a transceiver.
○ Fast startup architectures are preferable for minimizing energy per bit in varying modulation scenarios.
● Energy Efficiency:
○ Transmitting and receiving consume comparable power, particularly for short-range communication.
○ Modulation and coding schemes impact energy efficiency but can be optimized based on application
requirements.
Dynamic Scaling
Conclusion
Cost Disparity:
Design Decisions:
● Wide Diversity:
○ Power consumption of sensors and actuators varies based on type, functionality, and operating
conditions.
○ Passive sensors like light or temperature sensors may have negligible power consumption compared to
other components on a wireless node.
○ Active devices such as sonar sensors can have considerable power requirements, requiring careful
consideration in power source design.
● Specific Examples:
○ Temperature Sensors: Consume 0.6 to 1 mA.
○ Active Devices: Significant power use impacts battery life and performance.
● Application Dependency:
○ Power use depends on application scenarios and sensor types.
○ Assess requirements based on use case and operating conditions.
● Sampling Rate Impact:
○ Higher sampling rates increase sensor power consumption and processing/transmission energy needs.
Interface Considerations
● Sensor/Controller Interfaces:
○ Analog-to-digital (AD) converters are critical interfaces that affect power consumption.
Design Considerations
● Battery Life: Optimize power sources to avoid overstressing batteries and maximize node lifespan.
WSN-Specific Needs:
Requirements:
● Importance: Crucial for WSN nodes to handle data from multiple sources simultaneously.
● Sequential Model: Insufficient due to the risk of missing data or packets during processing.
Process-based Concurrency:
Event-based Programming:
● Concept: System waits for events (e.g., data availability, packet arrival) and handles them with short instruction
sequences(only stores the fact that this event has occurred and stores necessary info).
● In event-based programming [353], illustrated in Figure 2.8, event handlers handle interrupts separately from the
main processing of information. These handlers are lightweight and must run to completion without disrupting
other code. They do not interrupt each other to avoid complex stack handling procedures, executing sequentially
instead.
● Advantages: Reduces overhead, improves performance, and decreases power consumption.
● Performance: Found to improve performance by a factor of 8, reduce instr and data memory requirements by
factor of 2 and 30, and lower power consumption by factor of 12.
● Execution: Differentiates between time-critical event handlers and normal code processing.
● API Requirements: Functional interface, object abstractions, and detailed behavioral semantics.
● Functions: State inquiry, data transmission, hardware access, and policy settings.
● Standards: No clear standard exists; de facto standards are currently in use.
Summary:
● Concurrency: Essential for WSNs; process-based approach has high overhead, event-based is more efficient.
● APIs: Need to provide accessible and versatile interfaces for protocol and application interaction, with current
reliance on de facto standards.
2.3.3 Structure of operating system and protocol stack
Traditional Layered Approach:
● Concept: Protocols are stacked, each using functions of the layer below.
● Benefits: Manages complexity, promotes modularity, and enables reuse.
● WSN Challenges: Strict layering may not be sufficient due to the need for cross-layer information exchange.
● Example: Signal strength information can assist in routing, location estimation, and adaptive protocols.
● Need: Flexibility beyond strict layering is required for efficient WSN operation.
Component Model:
● Concept: Large layers are broken into small, self-contained components or modules, each fulfilling a specific
function (e.g., CRC computation).
● Interactions: Components interact over clear interfaces, not confined to neighboring layers.
● Advantages: Solves structuring issues, fits event-based programming, and allows efficient protocol stack
implementation.
TinyOS Example:
Summary:
● Flexibility: Cross-layer exchange and component models enhance flexibility and efficiency in WSNs.
● Component Model: Facilitates event-based programming and modular design.
● Example: TinyOS demonstrates the benefits and limitations of component-based event handling, with potential
improvements via publish/subscribe systems.
● Involves controlling component states (e.g., sleep states, frequency scaling) to improve energy efficiency.
● Decisions must consider energy and time costs of state transitions.
● Sinha and Chandrakasan analyze policies for transitioning between sleep states based on event probability
distributions.
● They provide probabilistic rules for selecting sleep states to balance energy efficiency and event detection.
● Effective DVS requires a smart scheduler to manage clock rates for task deadlines.
● Some approaches integrate DVS control into the operating system kernel for energy efficiency without user
program modifications.
● In WSNs, tasks can often be computed with varying levels of accuracy, allowing a trade-off between fidelity and
energy use.
● Approaches include designing algorithms to produce incremental results based on available energy, optimizing
for the best approximation if interrupted.
● Examples: Sinha discuss energy-quality trade-offs for signal processing algorithms.
Overall, DPM, DVS, and fidelity-energy trade-offs are crucial for optimizing energy use in WSNs, requiring advanced
policies and algorithm designs.
3.1 Sensor network scenarios
Multihop: Data packets relayed through intermediate nodes (sensor nodes) to extend communication range. It can
improve energy efficiency in certain scenarios by reducing radio signal attenuation effects.
● However, the assumption that multihopping always saves energy is contested; it depends on various factors
including distance and node-specific parameters.
● Store-and-forward multihop networks are common, where nodes must receive and then forward packets.
●
● Multihop networks use relay stations to transmit data packets from source to sink.
● Sensor nodes act as relay nodes, reducing the need for additional equipment.
● Multihopping addresses challenges like large distances and obstacles.
● It's claimed to improve energy efficiency due to reduced radio signal attenuation(no direct comm).
● Energy efficiency depends on factors like device and environment specifics.
● When targeting for a constant SNR at all receivers (assuming for simplicity negligible error rates at this SNR), the
radiated energy required for direct communication over a distance d is cdα (c some constant, α ≥ 2 the path loss
coefficient); using a relay at distance d/2 reduces this energy(radiated energy, not consumed energy of intermediate relay
node) to 2c(d/2)α.
● Direct communication may be more energy-efficient for short distances.
● Multihopping's energy-saving benefits are often overstated.
● Multihop networks typically operate in a store and forward fashion.
● Cooperative relaying techniques that exploit erroneous packet reception(node reconstruct full packet by rx
multiple packets from diff nodes) are not discussed here.
3.1.3 Multiple sinks and sources
In addition to single-source single-sink networks, multiple sources and/or multiple sinks are common in many scenarios.
This complexity arises when multiple sources need to transmit information to multiple sinks, where the data may need to
reach all or some of the sinks. Figure 3.3 illustrates these various combinations.
1. Node mobility: Sensor nodes themselves can be mobile, depending on the application. For instance, in livestock
surveillance, nodes attached to animals move regularly. The network must adapt to frequent node reorganization
to maintain functionality, balancing energy consumption with node movement speed.
2. Sink mobility: Information sinks, such as human users accessing data via PDAs in intelligent buildings, can be
mobile (Figure 3.4). The network must accommodate interactions with mobile requesters, ensuring requested
data reaches them despite their movement. This can involve protocols that allow data retrieval from remote
network parts.
3. Event mobility: In event detection and tracking applications, the objects causing events can be mobile. Sensors
need to dynamically wake up and observe the moving object, known as the "frisbee model." Nodes in the vicinity
of the event source increase activity to observe it, then revert to lower power states when not actively detecting.
This model ensures continuous event coverage across the network (Figure 3.5).
Communication protocols for wireless sensor networks need to support these mobility types, with particular focus on
event mobility, which requires specialized handling compared to other forms of mobile or wireless networks.
3.2 Optimization goals and figures of merit
In various scenarios and applications of wireless sensor networks, optimizing network performance and comparing
solutions is crucial. The challenge lies in determining how to best support specific applications and translating broad
optimization goals into measurable metrics. While a universal answer is elusive due to the diversity of applications, some
key considerations include:
Importance of High-level QoS: Critical for multimedia applications due to subjective user experience.
● Event Detection/Reporting Probability: Refers to the likelihood that an actual event will be detected and
reported to an information sink interested in such events. For example, ensuring a fire alarm is promptly reported
to a surveillance station.
● Event Classification Error: In scenarios where events need to be not only detected but also categorized
correctly, minimizing the error in classification is essential.
● Event Detection Delay: Time interval between detecting an event and reporting it to relevant sinks or nodes
within the network. Minimizing this delay is crucial for real-time applications.
● Missing Reports: In applications requiring periodic reporting (e.g., environmental monitoring), minimizing the
probability of undelivered reports is vital to ensure data integrity and reliability.
● Approximation Accuracy: In applications involving function approximation (e.g., estimating temperature based
on location data), accuracy metrics such as average or maximum error with respect to the actual function are
critical.
● Tracking Accuracy: For tracking applications (e.g., monitoring moving objects), ensuring accurate reporting of
object positions with minimal error is essential. Additionally, sensitivity to sensing gaps and continuity in tracking
are important aspects to consider for effective network performance.
These metrics are application-specific and guide the optimization of WSNs for different use cases.
● Energy per correctly received bit: Measures the average energy consumed to transport one bit from source to
destination, accounting for all energy expenditures across intermediate hops. Useful metric for periodic
monitoring application.
● Energy per reported (unique) event: Calculates the average energy spent to report a unique event,
disregarding redundant reports of already known events from various sources.
● Delay/energy trade-offs: Balances energy consumption against the urgency of event reporting(urgent events),
determining when increased energy investment for faster reporting is justified.
● Network lifetime: Defines the operational duration of the network based on available energy. Metrics include:
○ Time to first node death: When the first node exhausts its energy and stops functioning.
○ Network half-life: When 50% of nodes have depleted their energy.
○ Time to partition: When the network divides into disconnected parts for the first time as early due to
pivotal node failures or it may occur later if the network's topology is robust.
○ Time to loss of coverage:
■ Redundant Deployment: Multiple sensor nodes observe each point in the deployment region.
■ Figure of Merit: Time when any spot in the region is first not covered by any sensor node's
observation.
■ Redundancy Requirement (k): For tracking applications, loss of coverage is defined as the time
when any spot is no longer covered by at least k different sensor nodes.
○ Time to failure of first event notification: Marks the inability to deliver an event due to sensor failure or
network partition.
■ A network partition may not be considered critical if the unreachable part of the network does not
need to report events.
■ Application-specifically, partition may be interpreted as the inability to deliver an event
notification.
■ Causes include a sensor being non-functional or a partition between the event source and the
receiving sink.
Simulating network lifetimes is a complex statistical challenge. Longer lifetimes generally suggest better network
performance. Metrics like node lifetime distributions (probability of node survival) and relative survival times (percentage
of operational nodes over time) are used. Some WSN protocols prioritize improving short lifetimes over longer ones to
enhance performance (Figure 3.6). These metrics rely on assumptions about node energy consumption, network load
(event timing and locations), and radio channel behavior for accurate assessment.
3.2.3 Scalability
● Scalability - Maintaining performance regardless of network size.
● Minimizing global state constructs like addresses or routing tables due to memory limits.
● Extreme scalability requirements often lead to performance or complexity penalties in small networks.
● Architectures and protocols should prioritize appropriate scalability support rather than maximizing scalability.
● Smaller networks may benefit from more efficient solutions.
3.2.4 Robustness
● Definition: In addition to QoS and scalability, ensure continued operation despite node failures or environmental
changes disrupting radio links - Robustness
● Failure Mitigation: Failures due to node energy depletion or severed radio links should ideally be compensated
by finding alternative routes.
● Evaluation Challenges: Precisely evaluating robustness is complex and depends heavily on failure models for
nodes and communication links.
3.5 Gateway concepts
● Energy Efficiency: Conservation of energy is crucial due to limited battery capacities in sensor nodes. Many
classic protocols like ALOHA and CSMA do not inherently optimize for energy efficiency.
● Fairness and Throughput: These are less critical in WSNs compared to traditional networks. Nodes in WSNs
typically collaborate towards common goals rather than compete for bandwidth so fairness not important.
Throughput not an issue either.
● Delay: Access and transmission delay performance are traded off against energy conservation.
● Important requirements: Scalability and Robustness against frequent topology changes due to factors like
nodes powering down, mobility, new node deployment, or node failure. This is particularly important in dense
sensor networks with many nodes in close proximity.
● A node's transceiver is a major energy consumer, operating in four states: transmitting, receiving, idling, and
sleeping. Transmitting and receiving have similar high energy costs, idling can be nearly as expensive as
receiving, and sleeping is very low-cost but leaves the node "deaf." Applying these lessons to MAC protocols, we
identify key energy problems and design goals.
● Collisions: Collisions lead to wasted energy due to retransmissions and unnecessary reception at unintended
nodes. Avoiding collisions through protocol design (fixed assignment/TDMA or demand assignment protocols) or
collision avoidance mechanisms (e.g., CSMA protocols) is essential. For WSN, load is low, collisions not a
problem.
● Overhearing: Overhearing occurs when nodes in proximity receive packets not intended for them on a broadcast
medium, leading to energy wastage. Avoiding overhearing can save significant energy in dense networks,
although it can be beneficial for tasks like collecting neighborhood information or estimating traffic load for
management purposes.
● Protocol Overhead: Control frames like RTS, CTS, request packets and per-packet overhead(packet headers
and trailers) contribute to protocol overhead, impacting overall energy efficiency.
● Idle Listening: Nodes in idle state consume energy while waiting for transmissions, even during low network
activity. Switching off transceivers saves energy, but frequent mode changes also consume power. TDMA-based
protocols offer a solution by allowing nodes to switch off transceivers during non-assigned time slots.
Design Considerations:
● Low Complexity: WSN nodes are resource-constrained in terms of processing power, memory, and energy.
MAC protocols should avoid complex operations and scheduling algorithms to maintain low node complexity.
● Time Synchronization: Tight time synchronization, as required by TDMA, can consume significant energy for
frequent resynchronization. This constraint should be considered in protocol design.
● Hardware Constraints: Sensor nodes use simple and inexpensive components, limiting capabilities such as
clock precision and synchronization capabilities.
● Energy-Efficient Protocols: Various MAC protocols for WSNs aim to reduce energy consumption by targeting
specific energy problems such as idle listening, overhearing, and collisions.(Periodic Sleeping or Wakeup Radio
Protocols)
● Contention-Based Protocols: These protocols allow multiple nodes to contend for access to the medium,
employing mechanisms to reduce collision probabilities.
● Schedule-Based Protocols: Protocols allocate specific time slots to nodes (TDMA-like), reducing idle listening
and avoiding collisions by design.
A common method is the cycled receiver approach, where nodes sleep most of the time and periodically wake up to
check for incoming packets.
Cycled Receiver Approach:
● Operation: Nodes spend most time in sleep mode and periodically wake up during listen periods. Transmitters
must know these periods to send packets, achieved through:
○ Beacons transmitted by the receiver(node A) at beginning of listen period.
○ Frequent requests by the transmitter(node B) until acknowledged by A.
○ Either way A only receives packets during listen period.
● Wakeup period = sleep period + listen period
● Duty Cycle: The ratio of listen period length to wakeup period length.
○ Energy Savings: Small duty cycles -> transceiver in sleep mode most of time -> avoid idle listening ->
conserve energy
○ Traffic: Small duty cycles -> traffic concentrates on small time window(listen periods) -> can cause
congestion and competition during heavy load situations.
○ Latency: Longer sleep periods(induce per-hop latency) increase end-to end latency, especially in
multihop networks.
○ Efficiency: Sleep phases shouldnt be too short else startup cost outweigh benefits.
S-MAC: S-MAC synchronizes nodes' wakeup phases, allowing both transmission and reception without the need for out-
of-phase communication.
● STEM protocol addresses idle listening issues in WSN, especially in event-driven scenarios like wildlife
monitoring.
● STEM operates with two states: a monitor state with minimal activity and a transfer state with active sensing and
communication.
● The protocol aims to eliminate idle listening during the monitor state and ensure quick transitions to the transfer
state.
● In the transfer state, different MAC protocols can be used.
● STEM addresses changes in network topology as nodes enter and leave sleep mode, emphasizing the need to
maintain network connectivity even if some nodes are asleep.
STEM Operation:
● STEM-B:
○ Transmitters periodically send beacons on the wakeup channel without carrier sensing.
○ Beacons contain the MAC addresses of the transmitter and intended receiver.
○ Upon receiving a beacon, the receiver acknowledges(tx stops beacon txn) and switches to the data
channel for further communication(reg MAC protocol).
○ Beacons are sent for at least one full wakeup period to ensure they hit the receiver's listen period.
● STEM-T:
○ Transmitters emit a busy tone on the wakeup channel for a duration long enough to intersect the
receiver’s listen period.
○ The busy tone lacks address information, prompting all nearby nodes to switch to the data channel
without sending ACK.
○ Nodes not involved in the data transfer return to sleep after deducing the ongoing packet exchange.
○ Busy tones are simpler and more energy-efficient than data transceivers but require precise frequency
synchronization.
The Sensor-MAC (S-MAC) protocol addresses idle listening, collisions, and overhearing without requiring two channels.
Operation of S-MAC:
● Periodic Wakeup Scheme: Nodes alternate between fixed-length listening and sleeping periods according to a
schedule. Unlike STEM, S-MAC's listen period allows for both receiving and transmitting packets.
● Coordinated Schedules: Neighboring nodes synchronize their listen periods to wake up simultaneously, forming
virtual clusters.
1. SYNCH Phase:
○ Nodes exchange SYNCH packets to share schedules.
○ Neighbors contend using CSMA with backoff to avoid collisions.
○ Node x accepts SYNCH packets from neighbors.
○ Neighbors describe their schedules, which x stores in the schedule table.
○ SYNCH phase is divided into time slots; neighbors use CSMA with additional backoff.
○ Neighbor y picks a slot randomly to transmit if no signal was received in previous slots; otherwise, y goes
to sleep and waits for the next wakeup.
○ x, knowing y's schedule, wakes up at appropriate times to send its SYNCH packet to y in broadcast
mode.
○ x should periodically send SYNCH packets for time synchronization and to allow new nodes to learn the
network topology.
○ Synchronization Period: Defined period for sending SYNCH packets.
2. RTS Phase:
○ Node x listen for RTS packets from neighbors.
○ RTS/CTS handshake helps reduce collisions ue to hidden terminals.
○ Interested neighbors contend in this phase according to a CSMA with additional backoff.
3. CTS Phase:
○ Node x sends CTS packets in response to received RTS packets.
○ Data exchange may extend into the node's sleep period.
RTS/CTS Handshake: When nodes want to communicate, they use a method called RTS/CTS to avoid interfering with
each other. They use a NAV (Network Allocation Vector) to know when to stay silent and not overhear other
communications.
Broadcast Mode: For broadcast messages like SYNCH packets, nodes use a simpler method (CSMA with backoff) and
don't use RTS/CTS.
Synchronized Schedules: If a node (x) and its neighbors have synchronized schedules, they all wake up at the same
time. This allows node x to send a SYNCH packet to all its neighbors at once.
Virtual Clusters: S-MAC protocol helps neighboring nodes agree on the same schedule, creating clusters for schedule
exchange. These clusters don't affect data packet transfer.
Cluster Formation:
● A new node (x) listens for a certain period.
● If it hears a SYNCH packet, it adopts and broadcasts that schedule.
● If it doesn't hear a SYNCH packet, it creates and broadcasts its own schedule.
● If node x later hears a different schedule, it might switch to it depending on whether its current neighbors are
using the same schedule.
● Periodically, node x checks for SYNCH packets to stay updated on its neighbors' schedules.
Network Partitioning: This process creates "islands" of synchronized schedules in a large network.
Border Nodes: Nodes on the edge of these islands follow multiple schedules and use more energy than nodes within a
single schedule area.
Adaptive Listening:
● S-MAC uses message-passing for larger data items, breaking them into smaller fragments.
● Only one RTS/CTS exchange is needed for the entire series of fragments.
● The receiving node B sends an acknowledgment after each fragment.
● All packets have a duration field that tells neighboring nodes how long the communication will last.
● If a fragment needs retransmission, the duration is extended to cover the extra time(length of data + ack packet)
and medium is reserved for this prolonged time.
● Problem: If a nonparticipating node hears only the initial RTS or CTS packets, it only knows the initially reserved
duration.
1. IEEE 802.11:
○ RTS/CTS Frames: Reserve the channel only for the first fragment.
○ Subsequent Fragments: Each fragment reserves the channel only for the next fragment.
○ Retransmission: Must recontend for the channel if retransmission is needed.
2. S-MAC:
○ RTS/CTS Frames: Reserve the channel for the entire message exchange.
○ Single RTS/CTS Exchange: Only one exchange needed for all fragments.
○ Acknowledgment Packets: Sent after each fragment.
○ Medium Reservation: Duration field indicates the total time for the whole transaction, including
fragments and acknowledgments.
○ Retransmission Handling: Extends the remaining duration if a fragment needs retransmission.
● S-MAC Advantage: Reduces latency by preventing interruptions during the entire message exchange.
● S-MAC Disadvantage: Can monopolize the channel, blocking other nodes, which is less critical in sensor
networks.
Drawback of S-MAC:
● Fixed Wakeup and Listen Periods: Difficult to adapt to varying network load conditions.
Introduction of T-MAC:
● Periodic Wakeup: Nodes wake up, transmit a query beacon, and stay awake for a short time to receive packets.
If no packet received during the window, nodes goes to sleep.
● Dynamic Synchronization: When a node wants to transmit, it uses an MD to synchronize with the receiver
without staying awake to detect destination query beacon.
a. MD Role: Always active(coz of full duty cycle) and listens to query beacons from all nodes, learning their wakeup
periods.
b. Transmission Process:
● Node A wants to send a packet to Node B.
● Node A sends periodic RTS packets instead of query beacons to MD.
● MD waits for Node B's query beacon and then sends a response with Node A's address and timing offset.
● Node B sends a CTS packet to A, which then transmits its data packet followed by an acknowledgment
from B.
● After the transaction, both nodes return to their periodic wakeup cycles.
Advantages:
● Collision Issues: Query beacons may collide(if tx didnt check for ongoing txns) if nodes have overlapping
wakeup periods.
○ If wakeup periods - randomized, node density - low, collision probability - low
○ If high node density, unwanted synchronization, collision probability - high
○ To mitigate this: The MD can send a reschedule control frame, prompting nodes to randomize their
wakeup periods from a interval mentioned in the frame. If collisions persist, MD enlages the interval.
● Energy and Coverage: The MD being energy unconstrained and needing sufficient MDs to cover all nodes can
be problematic.
○ Distributed MD Protocol: Nodes randomly act as MDs for a set time before returning to their wakeup
cycles. This probabilistic approach aims to ensure coverage without permanent MDs.
Distributed MD Protocol:
● Temporary MDs: Nodes take turns acting as MDs for a period at least as long as the maximum wakeup period of
neighbors + query beacon length
● Collision Avoidance: Proper randomization of MD service times reduces the likelihood of multiple MDs causing
response collisions.
1. Parallel Data Channels: Several channels are used, either by frequency (FDMA) or code (CDMA).
2. Carrier-Sensing: A node wishing to transmit performs carrier-sensing on a randomly chosen channel. If busy, it
selects another channel. After several unsuccessful attempts, it backs off for random time and starts again.
3. Wakeup Signal: If the channel is idle, the node sends a wakeup signal to the intended receiver, specifying the
receiver's ID and the channel to use.
4. Data Transmission: The receiver activates its data transceiver, tunes to the indicated channel, and the data
transmission proceeds. Post-transmission, the receiver returns to sleep mode.
Advantages:
● Energy Efficiency: Only the low-power wakeup transceiver is continuously active, while the high energy
consuming data transceiver activates only for data transmissions.
● Traffic Adaptiveness: The MAC protocol becomes more active with increased traffic load.
Challenges:
1. Hardware Availability: Currently, there is no real hardware for an ultra-low power wakeup transceiver.
2. Range Consistency: The wakeup radio's range must match the data radio's range to ensure all neighboring
nodes can be woken up.
3. Addressing Schemes: Local addressing can be problematic if the wakeup radio's range differs significantly from
the data radio's range.
4. Information Transmission: The wakeup channel must transport node addresses and channel IDs, necessitating
handling of collisions and errors. Without this, all neighbors are woken, causing overhearing.
● Nodes may prepend data packets with a short filter packet indicating the destination address. Nodes not
addressed go back to sleep after reading the filter packet.
These protocols and techniques aim to reduce energy consumption and latency while ensuring efficient communication in
WSNs.
The IEEE 802.15.4 standard was finalized in October 2003 and addresses the physical and MAC layers of low-rate
Wireless Personal Area Networks (WPANs). It's important not to confuse IEEE 802.15.4 with ZigBee, although ZigBee
builds upon the IEEE 802.15.4 standard by adding network construction, security, application services, and more.
Targeted Applications
Physical Layer
The MAC protocol, however, uses only one of these 27 channels at a time.
The IEEE 802.15.4 MAC protocol combines schedule-based and contention-based schemes. It's asymmetric, meaning
different node types have different roles.
Types/Roles of Nodes
Network Structure:
● Devices: Must be associated with a coordinator (which is always an FFD) and communicate only with it, forming
a star network.
● Coordinators: Can communicate with devices and other coordinators, enabling peer-to-peer interactions and
forming a Personal Area Network (PAN - identified by 16 bit PAN ID and one of the coordinator is PAN
coordinator).
Coordinator Responsibilities
1. Managing Devices:
○ Keep a list of associated devices.
○ Handle explicit association and disassociation using specific signaling packets.
2. Address Allocation:
○ Assign short 16-bit addresses to devices (each device has a unique 64-bit address but can use a shorter
one for communication). Assigned address is indicated in association response packet issued by
coordinator.
3. Beacon Transmission:
○ In beaconed mode, regularly send frame beacon packets that announce the PAN identifier, list
outstanding frames, and other network parameters.
○ Process requests to reserve fixed time slots for nodes, allocations are indicated in the beacon.
4. Data Exchange:
○ Facilitate data exchange with devices and peer coordinators.
Superframe Basics
Superframe Components
1. Inactive Period:
○ Purpose: Allows nodes, including the coordinator, to switch off their transceivers and go into sleep mode
to save energy.
○ Duration: The inactive period can be configured and may even be void (i.e., nonexistent).
○ Wake-Up: Nodes must wake up before the inactive period ends to receive the next beacon.
2. Active Period:
○ Subdivision: The active period is divided into 16 time slots.
■ First Time Slot: Occupied by the beacon frame.
■ Remaining Time Slots: Split into a Contention Access Period (CAP) and up to seven contiguous
Guaranteed Time Slots (GTSs).
Configurability
● Adjustable Parameters:
○ Lengths of the active and inactive periods.
○ Length of a single time slot.
○ Usage of GTS slots.
● Coordinator:
○ Stays active throughout the entire active period.
○ Performs more tasks, managing the network and ensuring synchronization.
● Devices:
○ Active only during their allocated GTS slots.
○ Can conserve energy by sleeping during unallocated GTS slots and parts of the CAP when not active.
Asymmetric Protocol
● Energy Efficiency:
○ The protocol is designed to optimize energy usage, especially for energy-constrained sensor nodes.
○ Energy-constrained sensors are often connected to energy-unconstrained nodes (like the coordinator),
allowing them to conserve energy by minimizing their active time.
1. Requesting GTS:
○ Request Packet: Devices send a request packet to the coordinator during the Contention Access Period
(CAP).
○ Flags and Fields:
■ Transmit/Receive Flag: Indicates whether the requested time slot is for transmitting data to the
coordinator or receiving data from it.
■ Number of Time Slots: Specifies the desired number of contiguous time slots in the GTS phase.
2. Coordinator's Response:
○ Immediate Acknowledgment: The coordinator sends an acknowledgment packet to confirm receipt of
the request packet. This acknowledgment does not indicate whether the request will be granted.
○ Tracking Beacons: The requesting device must track the coordinator’s beacons for a specified time
(aGTSDescPersistenceTime) to determine if the GTS has been allocated.
3. Granting GTS:
○ GTS Descriptor: If the coordinator has sufficient resources, it includes a GTS descriptor in one of its next
beacon frames. This descriptor contains:
■ Short Address: The address of the requesting device.
■ Number and Position of Time Slots: Specifies the number and position of the allocated time
slots in the GTS phase.
○ Invalid Request: If resources are insufficient, the coordinator sends a GTS descriptor for time slot zero,
indicating available resources in descriptors length field. The device may then try to renegotiate.
4. Failed Request:
○ No Descriptor Received: If the device does not receive a GTS descriptor within the
aGTSDescPersistenceTime period, it concludes that the request has failed.
1. Regular Usage:
○ Continued Allocation: Once allocated, a GTS is assigned to a device on a regular basis until explicitly
deallocated.
○ Beacon Announcements: The device uses its allocated slots as announced by the coordinator in
subsequent beacons.
2. Deallocation:
○ Device-Initiated Deallocation: A device can request deallocation by sending a special control frame to
the coordinator. After this, the device should not use the allocated slots.
○ Coordinator-Initiated Deallocation:
■ Monitoring Usage: The coordinator monitors the usage of the allocated slots. If a slot is not used
at least once within a certain number of superframes, it is deallocated.
■ Deallocation Signal: The coordinator signals deallocation to the device by generating a GTS
descriptor with start slot zero.
Summary
● Requesting GTS: Devices send requests during the CAP, specifying transmit/receive and number of slots.
● Coordinator Response: Immediate acknowledgment followed by beacon updates.
● Using GTS: Devices track beacons to use allocated slots.
● Deallocation: Initiated by devices or the coordinator based on usage, with notifications sent through GTS
descriptors.
This mechanism ensures efficient and fair allocation of time slots, balancing the needs of various devices while
conserving energy and managing network resources effectively.
Summary
● Device to Coordinator:
○ Using GTS: Immediate transmission without collision
avoidance if within the allocated slots.
○ Using CAP: Slotted CSMA protocol with immediate
acknowledgment if no GTS or if the transaction doesn’t
fit.
● Coordinator to Device:
○ Using GTS: Direct transmission with acknowledgment
if within allocated slots.
○ Using CAP: Pending address announcement, followed
by a data request packet from the device,
acknowledgment, and then data packet transmission.
Protocol Operation:
1. Backoff Periods:
○ The CAP time slots are divided into smaller units known as backoff periods.
○ Each backoff period has a fixed length corresponding to 20 channel symbol times.
2. Initialization:
○ When a device has a packet to transmit, it initializes three variables:
■ NB (Number of Backoffs): Initialized to 0.
■ CW (Congestion Window): Starts at 2.
■ BE (Backoff Exponent): Initialized to macMinBE, a protocol parameter.
3. Random Backoff:
○ The device waits for the next backoff period boundary and randomly selects an integer r from the interval
[0, 2BE - 1].
○ It waits for r backoff periods before performing a Clear Channel Assessment (CCA) to sense if the
medium is idle.
4. Carrier-Sense (CCA):
○ If the channel is idle after the random backoff, the device decrements CW and waits for the next backoff
period boundary to perform CCA again.
○ If the channel is still idle, the device assumes it has won contention and starts transmitting its data
packet.
5. Collision Handling:
○ If CCA detects a busy medium during any backoff period:
■ Increment NB (Number of Backoffs).
■ Increment BE (Backoff Exponent).
■ Reset CW (Congestion Window) to 2.
○ If NB exceeds a threshold (maximum number of backoffs allowed), the device drops the frame and
declares a transmission failure.
○ Otherwise, repeat the random backoff process.
6. Repeat Process:
○ The device continues to repeat the process of selecting random backoff periods, performing CCA, and
attempting to transmit until successful or until the maximum number of backoffs is reached.
Summary
The Slotted CSMA-CA protocol in IEEE 802.15.4 networks helps nodes efficiently access the channel during the CAP by
using random backoff periods to reduce collisions. It doesn't employ RTS/CTS handshakes, making it simpler but still
effective in avoiding immediate collisions and managing medium access in a distributed manner. This protocol is suitable
for low-power, low-rate wireless sensor networks where energy efficiency and reliable data transmission are critical
considerations.
Summary
The nonbeaconed mode simplifies communication by eliminating beacon frames and the GTS mechanism, reducing
overhead. Devices use an unslotted CSMA-CA protocol for flexible channel access, optimizing energy use by allowing
them to sleep when not actively communicating. Coordination relies on continuous operation of coordinators to manage
incoming transmissions effectively.
These readings offer valuable insights into optimizing IEEE 802.15.4 networks for performance, energy efficiency, and
synchronization strategies under different operational conditions.
MAC Addresses
MAC addresses are essential for enabling protocols to avoid overhearing and to maximize the sleep times of nodes.
However, unlike traditional networks where MAC addresses are globally unique, in WSNs, MAC addresses only need to
be locally unique within a two-hop neighborhood. This requirement ensures that no two neighbors of a node share the
same MAC address, facilitating efficient communication and reducing the complexity of address management.
Key Points:
● Locally Unique Addresses: Addresses need to be unique only within a two-hop neighborhood.
● Shorter Addresses: Locally unique addresses can potentially be shorter, which can save energy and reduce
packet size.
● Address Assignment Protocol: A protocol is necessary to manage the assignment of these locally unique
addresses.
Higher-layer addresses, such as those used at the network layer, traditionally need to be globally unique to support
routing protocols. However, this requirement poses significant challenges in WSNs and may not be necessary.
● Complex Assignment: Assigning and maintaining globally unique addresses in a dynamic and often large-scale
WSN is complex and resource-intensive.
● Not User-Centric: Unlike traditional networks, where the network is composed of nodes belonging to individual
users, WSN nodes collaborate to process environmental data. Users are more interested in the data itself than in
the specific nodes.
Data-Centric Networking:
● Focus on Data: Since the primary goal is to gather and process data from the environment, addressing can be
based on data rather than individual nodes.
● Content-Based Addressing: This approach, known as data-centric or content-based networking, is more
suitable for WSNs. In this paradigm, data itself influences the operation of protocols, and addressing schemes
focus on the content or type of data rather than the source.
Summary
In summary, while MAC addresses in WSNs need only be locally unique to facilitate efficient communication, traditional
globally unique network layer addresses may not be necessary. Instead, data-centric networking, which prioritizes data
over individual node addresses, offers a more suitable approach for WSNs. This shift in focus simplifies address
management and aligns with the primary objective of WSNs to collect and process environmental data collaboratively.
● Perkins et al. propose a protocol where nodes select temporary and proposed fixed addresses, seeking validation
from nodes with matching fixed addresses.
● Nesargi and Prakash suggest a distributed agreement approach, resembling a two-phase commit protocol, but it
incurs significant overhead in sensor networks.
● Ensuring networkwide uniqueness poses a distributed consensus problem, leading to substantial communication
overhead, particularly in flooding scenarios or with proactive routing protocols.
● Proactive routing protocols maintain tables of used addresses, while on-demand protocols are preferred in sensor
networks due to reduced overhead.
In wireless sensor networks (WSNs), the assignment of MAC addresses is crucial for ensuring efficient communication
while minimizing conflicts. Unlike traditional networks where globally unique MAC addresses are common, WSNs often
utilize dynamically assigned addresses due to their scalability and energy efficiency requirements.
One straightforward approach is random address assignment, where each node independently selects an address from a
predefined range, hoping it remains unique within the network. For instance, with an address space represented by mmm
bits (allowing for n=2m addresses), nodes choose addresses uniformly at random. However, this method is prone to
collisions, especially as the number of nodes kkk increases. The probability of conflict P(n,k) increases rapidly, as
demonstrated by the "birthday problem" analogy, where even with a relatively small number of nodes, the likelihood of
address overlap becomes significant.
To address conflicts arising from random assignment, various protocols and strategies have been proposed:
1. Address Autoconfiguration Protocols: Inspired by approaches used in Mobile Ad-hoc Networks (MANETs),
nodes may attempt multiple address configurations until finding an unoccupied address. This involves sending
address request packets to neighboring nodes and waiting for acknowledgment or conflict notifications. If no
response is received, nodes assume the address is unique and proceed.
2. Distributed Agreement Protocols: These protocols treat address assignment as a distributed consensus
problem, where nodes negotiate with each other to ensure address uniqueness. One node acts as an initiator,
proposing addresses and collecting acceptance or rejection responses from others. This process continues until a
unique address is agreed upon or all possibilities are exhausted.
3. Hierarchical Addressing: Some protocols introduce hierarchical structures where nodes are grouped into
subnets, each managed by a leader node. This leader assigns addresses within its subnet, coordinating with
other leaders to prevent conflicts across different subnets. This approach helps reduce the scope of address
conflicts within smaller domains, easing the burden of global uniqueness.
Practical Considerations
Address assignment in WSNs must balance the need for uniqueness with the constraints of energy efficiency and
scalability. While random assignment is simple, it often necessitates additional mechanisms for conflict detection and
resolution. Protocols that minimize communication overhead and computational complexity are favored in WSNs, where
resources are typically limited.
In summary, while achieving networkwide unique MAC addresses in WSNs poses challenges, various dynamic and
distributed approaches offer viable solutions to manage address assignment efficiently while supporting the network's
operational requirements.
11.3.1 Overview
In wireless sensor networks (WSNs), energy-efficient unicast routing aims to minimize energy consumption while
ensuring reliable data delivery. Unlike traditional routing metrics such as hop count or shortest path, which may not
directly correlate with energy efficiency, WSNs require specialized routing algorithms that consider the limited battery
capacities of sensor nodes. Here’s an explanation of various approaches and considerations in energy-efficient unicast
routing:
Key Concepts and Approaches
● Objective Trade-offs: Different metrics (energy per packet, network lifetime, battery-based routing) may conflict
in real-world scenarios, requiring trade-offs and compromises depending on specific application requirements.
● Implementation Complexity: Designing distributed routing protocols that effectively balance the overhead of
collecting routing information with the benefits of energy-efficient routing decisions is non-trivial.
● Performance Evaluation: Directly comparing the performance of these routing strategies is challenging due to
their diverse objectives and the complex interactions within network dynamics, including traffic patterns and node
behaviors.
Each protocol aims to optimize different aspects of energy efficiency in unicast routing, using various algorithms and
heuristics tailored to specific network conditions and objectives.
Unicast routing protocols traditionally focus on finding a single energy-efficient path between a sink and receiver.
However, multipath routing explores multiple paths to balance energy consumption and increase robustness against
failures.
● Sequential Assignment Routing (SAR):
○ Objective: Reduce overhead associated with k-disjoint path computation near data sinks where node
failures are more likely.
○ Approach: Construct trees from each sink neighbor, ensuring paths use different neighbors.
○ Selection: Source selects paths based on battery resources and performance metrics like delay.
● Constructing Energy-Efficient Secondary Paths:
○ Concern: Efficiency of secondary paths compared to optimal primary path.
○ Solution: Use braided paths that deviate minimally from the primary path, maintaining efficiency while
providing redundancy.
○ Implementation: Centralized and distributed methods discussed in reference [276].
● Simultaneous Transmissions Over Multiple Paths:
○ Advantage: Improve failover times and packet delivery ratios compared to single-path solutions.
○ Approach: Send packet replicas over disjoint paths or split packets with Forward Error Correction (FEC)
over multiple paths.
○ Studies: De et al. [195] and Dulmann et al. [214] compare performance of these schemes.
● Randomly Choosing Paths:
○ Concept: Nodes maintain energy cost estimates for neighbors and forward packets randomly
proportional to path energy consumption.
○ Extension: Willig et al. [877] introduce altruistic nodes that perform extra work, enhancing routing
efficiency.
● Trade-Off Analysis:
○ Consideration: Balancing robustness (path availability after failures) and energy efficiency (overhead
and non-optimal routing decisions).
○ Studies: Krishnamachari et al. [440] explore Pareto optimality between redundancy and transmission
power, highlighting single-path dominance in some scenarios.
This overview illustrates the diverse approaches and trade-offs in multipath unicast routing, aiming to enhance reliability
and efficiency in wireless sensor networks and other ad hoc environments.
Summary
Multipath routing protocols in wireless sensor networks improve reliability and efficiency by providing multiple routes for
data transmission. These protocols incorporate factors such as QoS, energy optimization, and probability-based route
selection to enhance performance and prolong network lifetime. Key protocols like SAR focus on QoS metrics, while
others like Maximum Lifetime Routing and Energy Aware Routing prioritize energy conservation. M-MPR provides
flexibility with its two operation modes, ensuring robust and efficient data delivery.
● Addressing Physical Locations: Geographic routing protocols address applications where routing decisions are
based on physical locations, such as sending data to any node in a specific region or finding the node closest to a
given point.
● Utilizing Node Positions: When the positions of source, destination, and intermediate nodes are known, this
information can simplify the routing process by using geographic coordinates (latitude, longitude, etc.) or other
position-based identifiers.
Advantages
● Simplified Routing Protocols: Geographic routing reduces the complexity of routing protocols by leveraging
physical location information. This can lead to smaller or even nonexistent routing tables, as nodes use local
knowledge to determine packet forwarding decisions.
● Geocasting: Involves sending data to any node within a specified geographic region. Originally introduced in an
Internet context, geocasting supports applications where data dissemination is required within a defined physical
area.
● Position-Based Routing: Combines geographic routing with a location service, enabling nodes to forward
packets based on the positions of source, destination, and intermediate nodes. This approach was first explored
by Finn [258] as "Cartesian routing" and has since evolved.
● Focus on Geocasting: In wireless sensor networks (WSNs), where nodes are often homogeneous and identified
primarily by their physical locations, geocasting is particularly relevant. It allows for efficient data dissemination
across sensor fields without the need for additional location services.
where ∣ud∣ is the distance between nodes u and d, and N(v) is the set of neighbors of v. This method is loop-free.
● Figure 11.11 demonstrates this scheme's main limitation: it doesn't always find the shortest path in hop count due
to its lack of topology information. This trade-off between simplicity and efficiency is generally unavoidable.
● Selects the nearest neighbor that makes some progress toward the destination.
● Aims to reduce collision rates and maximize expected progress per hop.
● Interaction with the MAC layer is unclear.
Directional Routing:
Restricted flooding
● Even extended greedy forwarding strategies, like geographically restricted flooding where a source forwards to
nodes closer to the destination, cannot find detours around obstacles.
● Suited for compensating destination mobility.
● Requires knowing destination speed (v) and distance from the transmitting node; uses trigonometry to determine
an angle (α) to increase the probability of reaching the destination.
● Inspired by the right-hand rule used to escape mazes, protocols like Greedy Perimeter Stateless Routing (GPSR)
combine greedy forwarding with perimeter routing.
● GPSR initially attempts greedy forwarding; if stuck (e.g., in a dead end), it switches to perimeter routing by
navigating around obstacles using a right-hand rule approach.
● Packet carries entry point information to navigate faces; may revert to greedy forwarding upon distance reduction.
● Illustrated in Figure 11.13: Packet routed from node A to Z via nodes D, B, F, G, E, I, H, K, J, L, and Z.
● Limited to planar graphs; requires planar subgraph construction (e.g., Gabriel graph or Relative Neighborhood
Graph) for non-planar wireless networks.
● This method ensures eventual progress towards the destination, even in complex network topologies.
● Algorithms like Greedy and (Other Adaptive) Face Routing (GOAFR)+ provide worst-case optimal performance
guarantees.
● These algorithms seamlessly switch between greedy and face routing strategies based on network conditions,
ensuring efficient packet delivery while handling obstacles and dead ends.
●
● Combines face routing (to navigate obstacles) and greedy routing (for direct progress to destination).
● Challenge: Optimally switch to greedy mode once obstacles are cleared, not trivial due to varying scenarios.
● Simple heuristic, switching to greedy mode when a closer node is found, isn't worst-case optimal [452].
● First provably worst-case optimal algorithm described in, but quick switches back to greedy mode were not used.
● Performance bound: Face routing reaches destination in O(c2) steps, where c is optimal path cost [452].
● Improved with GOAFR+ algorithm: worst-case optimal and efficient in average case.
● Techniques:
○ Maintains bounding circle around destination to guide face routing.
○ Uses counters p and q: p counts closer nodes, q counts farther; switches to greedy if p > σ q.
● Reference shows algorithm's worst-case optimality and efficiency via simulations against GPSR.
● Algorithm's effectiveness highlighted during network phase transitions from sparse to dense connections.
● Purely position-based routing near the destination node can be problematic due to mobility or inaccurate location
data.
● Identity-based routing resolves these issues smoothly but struggles with maintaining state over long distances.
● Hybrid approach: Use position information for initial forwarding toward the destination vicinity, then switch to
identity-based protocol like "Terminodes".
● Scenario: Nodes uniformly distributed on a plane, each with position and ability to turn on/off.
● Goal: Transmit message to known destination amidst changing topology.
● Approach: Receiver-initiated forwarding where node S broadcasts message without specifying forwarder.
● Position-informed randomization: Nodes contend for forwarding based on proximity annuli around S and T.
● Larger N improves proximity approximation but increases forwarding latency.
● Feasible with N = 3 achieving close to optimal average hops to destination.
● Detailed analysis covers multihop, energy, and latency performance metrics.
● Contrasted with GAF, GeRaF achieves reduced average hops without restricting node range artificially.
Geographic Routing without Positions - GEM
Virtual Polar Coordinate System (GEM):
● GEM introduces a virtual coordinate system based on polar coordinates rather than physical locations.
● Nodes are assigned virtual polar coordinates using a distributed algorithm, facilitating routing without relying on
accurate physical positions.
● Routing in GEM involves navigating a tree structure defined by virtual coordinates, optimizing packet delivery
even in networks with imprecise or unavailable geographic information.
● Choose a central node and construct a spanning tree with it as the root.
● Nodes' radius is defined by hop count from the root.
● Angle assignment: Nodes in subtrees are assigned angular ranges based on subtree sizes.
● Angular information determined using hop counts between nodes in the network and three reference nodes.
● Center of mass of each subtree computed to enhance accuracy of virtual coordinates.
● Resulting tree embedded in the original graph, known as Graph EMbedding (GEM).
● Routing: Traverse tree upwards until a common parent is found, then downwards to destination.
● Inefficiency addressed by Virtual Polar Coordinate Routing (VPCR):
● Considers circular links to exploit shortcuts between physical neighbors in different subtrees.
● Simple once virtual coordinates are set; adaptable to network changes.
● Suitable for scenarios with imprecise or unavailable geographic information.
● Facilitates data-centric routing and storage.
11.5.2 Geocasting
Geocasting involves sending data to nodes within a specified region, akin to multicasting. Position information of the
designated region and intermediate nodes can enhance efficiency. Geocasting protocols can be broadly classified into
two types:
These protocols optimize data delivery efficiency by leveraging geographic information of nodes and target regions.
These protocols and techniques demonstrate different approaches to address the challenges of geocasting in wireless ad
hoc and sensor networks. Each protocol has its advantages and is suited for different network conditions, mobility
patterns, and application requirements. Researchers continue to explore and refine these techniques to improve
efficiency, scalability, and reliability in geocasting scenarios.
Summary
Geographical routing protocols enhance routing efficiency by leveraging location information. Greedy algorithms and GAF
are two main techniques that use this information to improve packet forwarding and network performance. Greedy
algorithms focus on forwarding packets to the nearest node towards the destination, while GAF optimizes energy
consumption by identifying and rotating equivalent nodes. Geocasting and geographic-based rendezvous mechanisms
also benefit from this approach, making routing in wireless sensor networks more efficient and reliable.
Geographical Routing leverages the location information of nodes to efficiently route packets in a network, particularly
suitable for sensor networks. Here's a breakdown of the key points:
Summary
Geographical routing is well-suited for sensor networks due to its efficiency, support for data aggregation, and minimal
overhead. It shifts the focus from node identity to data content, enabling effective data-centric querying and aggregation.
By leveraging location information, geographical routing reduces the need for comprehensive topology knowledge and
frequent updates, resulting in lower control overhead and better scalability in large, resource-constrained networks.
UNIT 4 - INFRASTRUCTURE ESTABLISHMENT
Chapter 8: Time Synchronization
8.1 Introduction
● Challenges:
○ Increased latency due to multi-hop communication.
○ Potential for cumulative synchronization errors.
● Solutions:
○ TPSN and FTSP: Address multi-hop synchronization through hierarchical or flooding-based approaches.
● Example:
○ TPSN constructs a hierarchical structure where nodes synchronize pairwise.
○ FTSP uses periodic flooding to propagate time information across multiple hops, ensuring network-wide
synchronization.
● S-MAC (Sensor-MAC):
○ An energy-efficient MAC protocol that incorporates time synchronization.
○ Nodes periodically synchronize their clocks to coordinate sleep/wake schedules.
○ Mechanism: Nodes listen for SYNC packets during synchronization periods to adjust their clocks and
align their schedules.
8.6 Conclusion
● Summary:
○ Synchronization is vital for various WSN operations, including coordinated sensing, communication, and
data processing.
○ The choice of synchronization protocol depends on network size, topology, and required precision.
○ Protocols like RBS, TPSN, and FTSP offer different trade-offs in terms of accuracy, complexity, and
energy efficiency.
● Future Directions:
○ Development of more energy-efficient synchronization protocols.
○ Integration of synchronization with other network functions for holistic optimization.
○ Addressing the challenges of dynamic and heterogeneous WSN environments.
These detailed notes provide comprehensive coverage of Chapter 8, highlighting the key protocols and concepts related
to time synchronization in wireless sensor networks.
● Factors affecting synchronization accuracy: message delay, clock drift, and network topology.
● Techniques to improve synchronization: compensation for message delays, multiple message exchanges.
● Centroid Localization:
○ Nodes estimate their position as the centroid of the positions of neighboring anchor nodes.
● DV-Hop Localization:
○ Nodes use hop count and average hop distance to estimate their position.
● APIT (Approximate Point-in-Triangulation Test):
○ Nodes determine their position based on the intersection of triangles formed by anchor nodes.
● Factors affecting localization accuracy: environmental conditions, node density, and anchor placement.
● Techniques to improve localization: hybrid methods combining range-based and range-free techniques.
9.6 Advanced Topics
● Factors affecting topology control: node density, mobility, and traffic patterns.
● Techniques to improve topology control: adaptive algorithms, combining multiple protocols.
Which sensor nodes to activate and what information to transmit is a critical issue. Classical algorithms are not suitable
for WSN :
The following are the various steps connected with design strategy for sensor tasking and control:
● The important objects in the environment to be sensed
● The relevant parameters of these objects
● The relations among these objects critical to high level information to be known
● The best sensor to acquire a particular parameter
● The sensing and communication operations needed to accomplish the task
● The co-ordination given by the models of different sensors
● The level to communicate information in a spectrum from a
signal to symbol
● Information-based sensor tasking is to query sensors such that information utility is maximized while minimizing
communication and resource usage.
● For localization or tracking problem, knowledge about the target state such as position and velocity is required.
This requirement is represented as a probability distribution over the state space in the probabilistic framework.
1. Sensor Selection:
● The routing has to maximize information gain along the path. A path toward the high information region may be
more preferable than the shortest path.
● Fig 16 Routing from a Query proxy to exit node.
UNIT 5
Secure Charging and Rewarding Scheme
This section discusses a secure charging and rewarding scheme designed to handle nodes that misbehave by
denying charges for services received in a multihop cellular network. The scheme ensures that nodes
participating in forwarding data packets are authenticated and rewarded appropriately, while nodes refusing to
pay are charged preemptively.
Key Concepts
● Upstream Route: The path from the initiating node (A) to its base station (BSA).
● Downstream Route: The path from the base station of the destination node (BSB) to the destination
node (B).
● Forwarding Nodes: Nodes that relay data packets between the source and destination through the
respective base stations. These nodes are either upstream or downstream forwarding nodes
depending on their position in the route.
The CRS involves several steps to authenticate nodes, charge and reward them as necessary, and ensure
secure communication.
Establishing a Session
Node A initiates the session by transmitting a setup request (AReq) to BSA in the following format:
● AReq0: Contains AReqID (request ID), oldASID (previous session ID, if any), ARoute (route from A to
BSA), TrafficInfo, and a MAC generated using A's secret key (KA).
Upstream forwarding nodes check the traffic information and, if they decide to forward the packets, compute a
new MAC on the received request and forward it. Each node adds its own MAC, so BSA receives a request
containing all the MACs from the upstream nodes.
BSA authenticates all upstream nodes and verifies the freshness of AReqID. If successful, it sends the request
to BSB, which then forwards it to node B.
Downstream nodes similarly check the traffic information and forward the request with their own MACs added.
Node B, upon receiving the request, replies with a BReq containing BReqID and a MAC. This response is
forwarded back through the downstream route to BSB and then to BSA.
BSA and BSB then generate and send confirmation messages (AConf and BConf) to A and B respectively.
The session is established once all nodes verify and store the session identifiers.
Packet Delivery
● Source S (either A or B) sends packets containing the session ID (SSID or BSID), sequence number
(η), payload, and a MAC.
● Upstream nodes encrypt the packet body using a PAD (generated via a stream cipher) and forward it.
● BSS verifies the packet integrity and forwards it to BSD, which decrypts the packet for downstream
nodes.
● Downstream nodes decrypt and forward the packet until it reaches the destination D.
Acknowledging Delivery
The destination node D acknowledges packet receipt by sending a batch acknowledgment (DAck) when the
session is considered closed. The acknowledgment includes DSID, a batch value (computed by XORing
MACs of received packets), the sequence number of the last received packet, and a list of lost packet
sequence numbers.
Terminating a Session
Nodes involved in the session start a timer upon session initiation, resetting it with each forwarded packet. The
session is terminated and related state information is deleted if:
Summary
The secure charging and rewarding scheme ensures authenticated and fair participation of nodes in a
multihop cellular network. It prevents misbehavior regarding charging by preemptively charging the initiator,
rewarding forwarding nodes upon successful packet delivery, and handling session establishment, packet
delivery, acknowledgment, and termination efficiently.
Key Idea: A sensor's reading should correlate with events detected by nearby sensors. Discrepancies
between a sensor's reading and its neighbors' readings indicate potential faults.
1. Readings Comparison:
○ Let xi denote the reading of sensor Si.
○ Let {xi1,xi2,...,xik} denote readings of sensors in N(Si), the neighborhood of Si.
○ Compute the difference di between xi and the median medi of {xi1,xi2,...,xik}:
di = xi − medi
○ The median is used instead of the mean to filter out extreme values.
2. Fault Detection:
○ Select N∗(Si), a larger neighborhood around Si.
Key Idea: Nodes at the event boundary will have significant differences in readings between subareas inside
and outside the event region.
1. Faulty Nodes Set: Construct the set of faulty nodes Ω1 from Stage 1.
2. Boundary Detection:
○ For each sensor Si not in Ω1:
1. Partition N(Si) into sectors.
2. Calculate the difference dij for each sector j.
3. Assign the largest dij as the new di.
4. Recalculate μ, σ, and yi for N∗(Si) minus 1 and the new di.
5. If ∣yi∣≥θ2, add Si to the set of boundary nodes Ω2.
Key Idea: Some nodes identified as faulty may actually be boundary nodes, and some boundary nodes might
not be correctly identified.
Parameters:
● θ and θ2: Threshold values for detecting faulty and boundary nodes, respectively.
● c: Distance parameter for boundary node verification.
Conclusion
This multi-stage process ensures accurate detection of event boundaries in sensor networks, even in the
presence of faulty or malicious nodes, by leveraging collaborative filtering and robust statistical methods.