Wireless Sensor Networks
Wireless Sensor Networks
Ian F. Akyildiz
Several thousand
Sink
Internet, nodes
Satellite, Nodes are tens of
etc feet of each other
Densities as high as
Sink 20 nodes/m3
Task
Manager
•[Link],
[Link], Y. Sankarasubramaniam, E. Cayirci,
“Wireless Sensor Networks: A Survey”, Computer Networks (Elsevier) Journal, March 2002.
IFA’2004 2
Key technologies that enable
sensor networks:
Micro electro-mechanical systems
(MEMS)
Wireless communications
Digital electronics
IFA’2004 3
Sensor Network Concept
IFA’2004 4
SENSOR NODE HARDWARE
IFA’2004 5
Example: MICA Motes
BWN Lab @ GaTech
Processor and
Radio platform
(MPR300CB) is
based on Atmel
ATmega 128L
low power
microcontroller
that runs TinyOs
operating system
from its internal
flash memory.
IFA’2004 6
Berkeley Motes
IFA’2004 7
Specifications of the Mote
Speed 4 MHz
Flash 128K bytes
SRAM 4K bytes
EEPROM 4K bytes
Radio Frequency 916MHz or 433MHz ISM Band
Data Rate 40 Kbits/Sec Max
Power 0.75 mW
Radio Range 100 feet Programmable
Power 2 x AA batteries
IFA’2004 8
Examples for Sensor Nodes
UCLA: WINS
UC Berkeley:
UC Berkeley: COTS Dust Smart Dust
Rockwell: WINS
IFA’2004 9
Examples for Sensor Nodes
Rene Mote
Dot Mote
IFA’2004 10
Zylog’s eZ80
Provides a way to internet-
enabled process control
and monitoring
applications.
Temperature sensor, water
leak detector and many
more applications
Metro IPWorks™ software
stack embedded
Enables users to access
Webserver data and files
from anywhere in the
world.
IFA’2004 11
Systronix STEP board
A first tool to support
hardware development and
prototyping with the new
Dallas TINI Java Module.
Embedding the internet
with TINI java
A complete Java Virtual
Machine, TCP/IP stack,
ethernet hardware,
control area network,
iButton network and dual
RS232 all on SIMM72
module
IFA’2004 12
2. Sensor Networks Applications
IFA’2004 13
Sensor Networks Applications
Sensors can monitor ambient conditions including:
Temperature
Humidity
Vehicular movement
Lightning condition
Pressure
Soil makeup
Noise levels
The presence or absence of certain kinds of objects
Mechanical stress levels on attached objects, and
Current characteristics (speed, direction, size) of an object
IFA’2004 14
Sensor Networks Applications
Continuous sensing
Event detection
Event identification
Location sensing
Local control of actuators
IFA’2004 15
Sensor Networks Applications
Military
Environmental
Health
Home
Other commercial
Space exploration
Chemical processing
Disaster relief
IFA’2004 16
Sensor Networks Applications
Military Applications:
Command, control, communications, computing, intelligence, surveillance,
reconnaissance, targeting (C4SRT)
Monitoring friendly forces, equipment and ammunition
Battlefield surveillance
Reconnaissance of opposing forces and terrain
Targeting
Battle damage assessment
Nuclear, biological and chemical (NBC) attack detection and
reconnaissance
IFA’2004 17
SensIT:
Sensor Information Technology
“SensIT was a program for developing software for distributed wireless
sensor networks.”
SensIT pursued two key thrusts:
* New networking techniques
* Network information processing.
[Link]
S. Kumar, D. Shepherd, “SensIT: Sensor information technology for the warfighter,” 4th
Int. Conference on Information Fusion, 2001.
IFA’2004 18
ForceNet (US Navy)
ForceNet binds together Sea Strike, Sea Shield, and Sea Basing.
[Link]
IFA’2004 19
SAD: SEAL Attack Detection &
Anti-Submarine Warfare
antenna
led
hooks
cable
sensor
IFA’2004 20
Other Projects
Sea Web.
Smart Web
Sensor Web
IFA’2004 21
Other Military Applications
IFA’2004 22
Environmental Applications
planetary exploration
Chemical/biological detection
Biological, Earth, and environmental monitoring in marine, soil, and
atmospheric contexts
Meteorological or geophysical research
Pollution study, Precision agriculture
Biocomplexity mapping of the environment
Flood detection, and Forest fire detection.
IFA’2004 23
Forest Fire Detection
IFA’2004 24
Health Applications
hospital, and
Drug administration in hospitals
IFA’2004 25
Drug Administration in Hospitals
Purpose: Minimize prescribing the wrong medication to patients.
IFA’2004 26
Home Applications
Types:
Security
Home automation, and
Smart Environment
IFA’2004 27
Smart Environment
Georgia Tech.
IFA’2004 28
Smart Environment
Human-centered:
A smart environment must adapt to the needs of
the users in terms of I/O capabilities.
Technology-centered
New hardware technologies, networking solutions
and middleware services must be developed.
IFA’2004 29
Smart Environment (Cont’d)
Wired or wireless connection
Server
Room 1 Room 2
IFA’2004 30
Commercial Applications
Building virtual keyboards
Monitoring product quality
Constructing smart office spaces
Interactive toys
Monitor disaster areas
Smart spaces with sensor nodes embedded inside
Machine diagnosis
Interactive museums
Managing inventory control
Environmental control in office buildings
Detecting, and monitoring car thefts, and
Vehicle tracking and detection.
IFA’2004 31
Vehicle Tracking and Detection
IFA’2004 33
iBadge - UCLA
IFA’2004 34
iButton Applications
Caregivers Assistance
– Do not need to keep a bunch of keys. Only
one iButton will do the work
Elder Assistance
– They do not need to enter all their personal
information again and again. Only one touch
of iButton is sufficient
– They can enter their ATM card information
and PIN with iButton
– Vending Machine Operation Assistance
IFA’2004 35
3. Factors Influencing Sensor
Network Design
A. Fault Tolerance (Reliability)
B. Scalability
C. Production Costs
D. Hardware Constraints
E. Sensor Network Topology
F. Operating Environment
G. Transmission Media
H. Power Consumption
IFA’2004 36
A. Fault Tolerance
(Reliability)
Sensor nodes may fail or be blocked due to lack of power
have physical damage, or environmental interference.
IFA’2004 37
Fault Tolerance
(Reliability) (Ctn’d)
Reliability (Fault Tolerance) of a sensor node is modeled:
R ( t ) exp( t )
k k
G. Hoblos, M. Staroswiecki, and A. Aitouche, “Optimal Design of Fault Tolerant Sensor Networks,”
IEEE International Conference on Control Applications , pp. 467-472, Anchorage, AK, September 2000.
IFA’2004 38
Fault Tolerance
(Reliability) (Ctn’d)
EXAMPLE:
Suppose: lambda = 3.5 * 10-3 t=10sec R = 0.97
t=20sec R= 0.93
t=30sec R= 0.9
t=50sec R=0.84
IFA’2004 39
Fault Tolerance
(Reliability) (Ctn’d)
Reliability (Fault Tolerance) of a broadcast range with
N sensor nodes is calculated from:
N
R(t ) 1 [1 Rk (t )]
k 1
IFA’2004 40
Fault Tolerance
(Reliability) (Ctn’d)
EXAMPLE:
How many sensor nodes are needed within a broadcast
IFA’2004 42
Fault Tolerance
(Reliability) (Ctn’d)
Examples:
1. House to keep track of humidity and temperature
levels the sensors cannot be damaged easily or interfered
by environments low fault tolerance (reliability) requirement!!!!
2. Battlefield for surveillance the sensed data are critical and sensors
can be destroyed by enemies high fault tolerance
(reliability) requirement!!!
IFA’2004 43
B. Scalability
IFA’2004 44
Scalability (Ctn’d)
The Sensor Node Density: i.e., the number of expected nodes
within the radio range R:
( R ) ( N R ) / A2
Sink node
Radio Range R
Sensor nodes
IFA’2004 46
Scalability (Ctn’d)
dhop = 2R/3
IFA’2004 47
Network Configuration
dnei Expected distance to the nearest neighbor, may or may not be communicating neighbor.
dhop Expected distance to the next hop, i.e., distance to communicating neighbor. d hop>=dnei
Sink node
Radio Range R
dnei
dhop
Sensor nodes
IFA’2004 48
Scalability (Ctn’d)
EXAMPLE:
Assume sensor nodes are evenly distributed in the sensor
field, determine the node density if 200 sensor nodes
are deployed in a 50x50 m2 region where each sensor
node has a broadcast radius of 5 m.
IFA’2004 49
Scalability (Cont’d)
Examples:
1. Machine Diagnosis Application:
less than 300 sensor nodes in a 5 m x 5 m region.
5. Personal Applications:
Ranges from 100s to 1000s, e.g., clothing, eye glasses, shoes, watch, jewelry.
IFA’2004 50
C. Production Costs
Cost of sensors must be low so that the
sensor networks can be justified!!!
PicoNode: less than $1
Bluetooth system: around $10,-
THE OBJECTIVE FOR SENSOR COSTS
must be lower than $1!!!!!!!
Currently: COTS Dust Motes
ranges from $25 to $172
(STILL VERY EXPENSIVE!!!!)
IFA’2004 51
D. Sensor Node Hardware
A Sensor Node
Location Finding System Mobilizer
Small
SENSING UNIT PROCESSING UNIT Low power
Low bit rate
Processor
High density
Sensor ADC Transceiver
Low cost (dispensable
Memory Autonomous
Adaptive
IFA’2004 52
E. Sensor Network Topology
Task
Manager
IFA’2004 53
Sensor Network Topology (Ctn’d)
IFA’2004 54
Sensor Network Topology (Ctn’d)
IFA’2004 55
Sensor Network Topology (Ctn’d)
IFA’2004 56
Sensor Network Topology (Ctn’d)
POST-DEPLOYMENT PHASE
After deployment, topology changes are due to change in
sensor nodes’
position
reachability (due to jamming, noise, moving obstacles,
etc.)
available energy
malfunctioning
IFA’2004 57
F. Operating Environment
Sensor networks may work
in busy intersections
in the interior of a large machinery
at the bottom of an ocean
inside a twister
at the surface of an ocean
in a biologically or chemically contaminated field in a battlefield
beyond the enemy lines
in a house or a large building
in a large warehouse
attached to animals
attached to fast moving vehicles
in a drain or river moving with current
IFA’2004 …………………… 58
G. TRANSMISSION MEDIA
IFA’2004 60
H. POWER CONSUMPTION
Sensor node has limited power source (~1.2V).
Sensor node LIFETIME depends on battery
lifetime
Sensors can be a DATA ORIGINATOR or a
DATA ROUTER.
Power conservation and power management
are important POWER AWARE PROTOCOLS
must be developed.
IFA’2004 61
Power Consumption (Ctn’d)
• Power consumption in a sensor network can be divided
into three domains
Communication
Data Processing
Sensing
IFA’2004 62
Power Consumption (Ctn’d)
Communication
A sensor expends maximum energy in data
communication (both for transmission and
reception).
NOTE:
For short range communication with low radiation power (~0 dbm),
transmission and reception power costs are approximately the same,
(e.g., modern low power short range transceivers consume between
15 and 300 milliwatts of power when sending and receiving).
Transceiver circuitry has both active and start-up
power consumption
IFA’2004 63
Power Consumption (Ctn’d)
Power consumption for data communication (Pc)
Pc = Pte + Pre + P0
IFA’2004 64
Power Consumption in Data Communication
(PC) (Detailed Formula)
IFA’2004 65
Power Consumption in Communication (Ctn’d)
Ton = L / R
where L is the packet size and R is the data rate.
IFA’2004 66
Power Consumption in Communication (Ctn’d)
size is reduced
It is inefficient to turn the transceiver ON and OFF
IFA’2004 69
Power Consumption in Data Processing (Pp)
Pp C V 2
dd f Vdd I o exp{Vdd / n'VT }
Where
C is the total switching capacitance; Vdd is the voltage swing;
F is the switching frequency
The second term indicates the power loss due to leakage currents.
IFA’2004 70
Power Consumption (Ctn’d)
(Another Simple Energy Model)
E_{elec} = 50 nJ/bit
Energy for radio transmission:
IFA’2004 72
Power Consumption (Ctn’d)
(Another Simple Energy Model)
IFA’2004 73
Power Consumption (Ctn’d)
(Another Simple Energy Model)
Depends on
Application
Nature of sensing: Sporadic or Constant
Detection complexity
Ambient noise levels
IFA’2004 75
Sensor Networks
Communication Architecture
Sensor Node
A
B Sensor Field
Sink E C
Internet, F
D
Satellite,
etc
IFA’2004 76
Sensor Networks Communication
Architecture
Application Layer
Combines power and routing awareness
Transport Layer Integrates data with networking protocols
Communicates power efficiently through
Network Layer
wireless medium and
Data Link Layer Promotes cooperative efforts.
Physical Layer
IFA’2004 77
WHY CAN’T AD-HOC NETWORK
PROTOCOLS BE USED HERE?
Number of sensor nodes can be several orders of
magnitude higher
Sensor nodes are densely deployed and are prone to
failures
The topology of a sensor network changes very
frequently due to node mobility and node failure
Sensor nodes are limited in power, computational
capacities, and memory
May not have global ID like IP address.
Need tight integration with sensing tasks.
IFA’2004 78
5. APPLICATON LAYER
FRAMEWORK
IFA’2004 79
Sensor Network Topology
Internet,
Satellite,
etc
Users
Task
sensor node Manager
Server
gateway (gnode) (Database)
wireless link
IFA’2004 80
APPLICATON LAYER
SMP: Sensor Managament Protocol
System Administrators interact with Sensors using SMP.
TASKS:
Moving the sensor nodes
Turning sensors on and off
Querying the sensor network configuration and the status of
nodes and re-configuring the sensor network
Authentication, key distribution and security in data
communication
Time-synchronization of the sensor nodes
Exchanging data related to the location finding algorithms
Introducing the rules related to data aggregation,
attribute-based naming and clustering to the sensor nodes
IFA’2004 81
APPLICATON LAYER
(Query Processing)
Users can request data from the network-> Efficient Query Processing
User Query Types:
1. HISTORICAL QUERIES:
Used for analysis of historical data stored in a storage area (PC),
e.g., what was the temperature 2 hours back in the NW quadrant.
2. ONE TIME QUERIES:
Gives a snapshot of the network, e.g., what is the current temperature in the
NW quadrant.
3. PERSISTANT QUERIES:
Used to monitor the network over a time interval with respect to some
parameters, e.g., report the temperature for the next 2 hours.
IFA’2004 82
QUERYING
– Continuous
Sensors communicate their data continuously at a prespecified rate.
– Event Driven
The sensors report information only when the event of interest occurs.
Aggregate queries
Complex queries
– Hybrid
IFA’2004 83
APPLICATON LAYER
IFA’2004 85
Simple Abtract Querying Example
IFA’2004 86
Data Centric Query
Attribute-based
naming architecture
Data centric
protocol
Observer sends a
query and gets the
response from valid
sensor node
No global ID
IFA’2004 87
APPLICATON LAYER
Task Assignment and Data Advertisement Protocol
INTEREST DISSEMINATION
* Users send their interest to a sensor node,
a subset of the nodes or the entire network.
* This interest may be about a certain attribute
of the sensor field or a triggering event.
ADVERTISEMENT OF AVAILABLE DATA
* Sensor nodes advertise the available data to
the users and the users query the data which
they are interested in.
IFA’2004 88
APPLICATON LAYER
Sensor Query and Data Dissemination Protocol
Interest dissemination is performed to assign the sensing tasks to the sensor nodes.
Either sinks broadcast the interest or sensor nodes broadcast an advertisement for
the available data and wait for a request from the sinks.
71
75
68 67
Sink 66
71
71
68 71
69
Query:
Sensor nodes that read >70oF temperature
IFA’2004 90
Data Aggregation (Data Fusion)
The sink asks the sensor nodes to report certain conditions.
Data coming from multiple sensor nodes are aggregated.
71
75
68 67
Sink 66
71
71
68 71
69
Query:
Sensor nodes that read >70oF temperature
IFA’2004 91
Location Awareness
(Attribute Based Naming)
75
68 67
Sink 66
71
71
68 71
Region C
69
Region B
Query:
Temperatures read by the nodes in Important for broadcasting,
Region A multicasting, geocasting and anycasting
IFA’2004 92
APPLICATON LAYER RESEARCH
NEEDS
IFA’2004 93
NETWORK LAYER
(ROUTING BASIC KNOWLEDGE)
The constraints to calculate the routes:
1. Additive Metrics:
Delay, hop count, distance, assigned costs (sysadmin preference),
average queue length...
2. Bottleneck Metrics:
Bandwidth, residual capacity and other bandwidth related metrics.
REMARK:
All routing algorithms are based on the same principle used as in Dijkstra's,
which is used to find the minimum cost path from source to destination.
Dikstra and Bellman solve the SHORTEST PATH PROBLEM…
RIP (Distant Vector Algorithm) -> Bellman/Ford Algorithm
OSPF (Open Shortest Path Algorithm) Dikstra Algorithm
IFA’2004 94
Routing Algorithms Constraints Regarding
Power Efficiency (Energy Efficient Routing)
3. Address reuse
4. Query mapping.
IFA’2004 97
NETWORK LAYER
(ROUTING for SENSOR NETWORKS)
Important considerations:
Sensor networks are mostly data centric
An ideal sensor network has attribute based
addressing and location awareness
Data aggregation is useful unless it does not hinder
collaborative effort
Power efficiency is always a key factor
IFA’2004 98
Some Concepts
Data-Centric
– Node doesn't need an identity
What is the temp at node #27 ?
– Data is named by attributes
Where are the nodes whose temp recently exceeded 30
degrees ?
How many pedestrians do you observe in region X?
Tell me in what direction that vehicle in region Y is moving?
Application-Specific
– Nodes can perform application specific data
aggregation, caching and forwarding
IFA’2004 99
Attribute Based Naming
Data-Centric Routing
Interest dissemination is performed to assign the sensing tasks to the sensor nodes.
Either sinks broadcast the interest or sensor nodes broadcast an advertisement for
the available data and wait for a request from the sinks.
71
75
68 67
Sink 66
71
71
68 71
69
Query:
Nodes that read >70oF temperature
IFA’2004 10
0
Data Centric Routing
Attribute-based
naming architecture
Data centric
protocol
Observer sends a
query and gets the
response from valid
sensor node
No global ID
IFA’2004 10
1
Data Aggregation (Data Fusion)
75
68 67
Sink 66
71
71
68 71
69
Query:
Nodes that read >70oF temperature
IFA’2004 10
2
Data Aggregation
IFA’2004 10
3
Polygonal (Spatial) Addressing
Location Awareness
Region A
71
75
68 67
Sink 66
71
71
68 71
Region C
69
Region B
Query:
Temperatures read by the nodes in Important for broadcasting,
Region A multicasting, geocasting and
IFA’2004 anycasting 10
4
Taxonomy of Routing Protocols
for Sensor Networks
Categorization of Routing Protocols for Wireless Sensor Networks:
(K. Akkaya, M. Younis, “A Survey on Routing Protocols for Wireless Sensor Networks,” Elsevier AdHoc Networks, 2004)
2. Hierarchical
LEACH, TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol),
APTEEN, PEGASIS, Energy Aware Scheme
3. Location Based
MECN, SMECN (Small Minimum Energy Com Netw), GAF
(Geographic Adaptive Fidelity), GEAR
IFA’2004 10
5
Conventional Approach
FLOODING
Broadcast data to all neighbor nodes
A
C
B
D E
F
G
IFA’2004 10
6
ROUTING ALGORITHMS
Gossiping
GOSSIPING:
Sends data to one randomly selected neighbor.
Example:
IFA’2004 10
7
Problems of
Flooding and Gossiping
PROBLEMS:
Although these techniques are simple and reactive, they have some
disadvantages including:
* Implosion
(NOTE: Gossiping avoids this by selecting only one node; but this causes delays to
propagate the data through the network)
* Overlap
* Resource Blindness
* Power (Energy) Inefficient
IFA’2004 10
8
Problems
Implosion Data Overlap
q r s
(a) A (a)
B C A B
(a) D (a)
(q,r) C (r,s)
Resource Blindness
No knowledge about the available power of resources
IFA’2004 10
9
Gossiping
IFA’2004 11
0
The Optimum Protocol
A
“Ideal” C
– Shortest-path routes B
– Avoids overlap D E
– Minimum energy F
– Need global topology information G
IFA’2004 11
1
Ideal Dissemination
No implosion and
no overlap
Disseminate in
shortest possible
time
IFA’2004 11
2
SPIN: Sensor Protocol for
Information via Negotiation
(W.R. Heinzelman, J. Kulik, and H. Balakrishan, “Adaptive Protocols for Information
Dissemination in Wireless Sensor Networks”,
Proc. ACM MobiCom’99, pp. 174-185, 1999 )
IFA’2004 11
4
SPIN
Good for disseminating information to all sensor nodes.
SPIN is based on data-centric routing where the sensors broadcast an
advertisement for the available data and wait for a request from
interested sinks
1. 1. ADV
2. REQ
2. 3. DATA
3.
IFA’2004 11
5
SPIN
ADV
A B
ADV- advertise/name data
REQ REQ- request specific data
A B DATA- requested data
DATA
A B
IFA’2004 11
6
SPIN
ADV
DATA
REQ
ADV
REQ
DATA
IFA’2004 11
7
EXAMPLE
Sensor A sends meta-data to neighbor
A
V
AD
IFA’2004 11
8
Sensor B requests data from Sensor A
B REQ
IFA’2004 11
9
Sensor A sends data to Sensor B
DA
TA A
IFA’2004 12
0
Sensor B aggregates data and sends meta-data fo
A and B to neighbors
ADV
AD
V
AD
V B ADV
AD
V
V
AD
IFA’2004 12
1
All but 1 neighbor request data
REQ
REQ
B RE
Q
REQ
REQ
IFA’2004 12
2
Sensor B sends requested data to neighbors
DATA
A
TA
TA B DA
DA
A
DA
DAT
T A
IFA’2004 12
3
SPIN-1 Protocol
SPIN-1
– 3-stage handshake protocol
– Advantages
Simple
Implosion avoidance
Disadvantages
* Cannot isolate the nodes that do not want to receive the
information.
* Consume unnecessary power.
IFA’2004 12
4
SPIN-2
Spin-2
– SPIN-1 + low-energy threshold
– Modifies behavior based on current
energy resources
IFA’2004 12
5
SPIN-2
IFA’2004 12
6
SPIN Algorithm Variants
Flooding -- Each node floods new data to
all of its neighbors.
Zzz...
Sleeping -- Same as negotiating, except
that nodes stop sending messages when
energy is low. SPIN-2
IFA’2004 12
7
CONCLUSIONS
Flooding converges first
– No delays
SPIN-1
– Reduces energy by 70%
– No redundant DATA messages
SPIN-2 distributes
– 10% more data per unit energy than SPIN-
1
– 60% more data per unit energy than
flooding
IFA’2004 12
8
ROUTING ALGORITHM
(DIRECTED DIFFUSION)
(C. Intanagonwiwat, R. Gowindan and D. Estrin, “Directed Diffusion: A Scalable and Robust
Communication Paradigm for Sensor Networks”, Proc. ACM MobiCom’00, pp. 56-67, 2000.)
IFA’2004 12
9
Data Centric
Data-Centric
– Sensor node does not need an identity
What is the temp at node #27 ?
– Data is named by attributes
Where are the nodes whose temp recently exceeded 30
degrees ?
How many pedestrians do you observe in region X?
Tell me in what direction that vehicle in region Y is
moving?
Application-Specific
– Nodes can perform application specific data
aggregation, caching and forwarding
IFA’2004 13
0
DIRECTED DIFFUSION
IFA’2004 13
1
DIRECTED DIFFUSION
IFA’2004 13
2
DIRECTED DIFFUSION
Example:
* The users query is transformed into an interest that is diffused towards nodes in
regions X or Y.
* When a node in that region receives an interest it activates its sensors which begin
collecting information about pedestrians.
* When the sensors report the presence of pedestrians this returns along the
reverse path of interest propagation.
* Intermediate nodes might aggregate the data, e.g., more accurately pinpoint the
pedestrians location by combining reports from several sensors.
* An important feature of directed diffusion is that interest and data propagation and
aggregation are determined by localized interactions (message changes between
neighbors or nodes within some vicinity)
IFA’2004 13
3
DIRECTED DIFFUSION
The task description specifies an interest for data matching for attributes
called INTEREST.
IFA’2004 13
4
DIRECTED DIFFUSION
IFA’2004 13
5
Directed Diffusion
Source Sink
Data Delivery
Gradient
Interest Setup
Propagation
IFA’2004 13
6
DIRECTED DIFFUSION
INTERESTS and GRADIENTS
The named task description constitutes an INTEREST.
An interest is injected into the network at some (arbitrary) node in the network.
Suppose it is SINK.
* This initial interest contains the specified rect and duration attributes,
but contains a much larger interval attribute.
IFA’2004 13
8
DIRECTED DIFFUSION
An ENTRY in the interest cache has several fields:
If there exists an entry, but no gradient for the sender of the interest,
the node adds a gradient with the specified value.
IFA’2004 14
4
LEACH
Two Phases: Set-up Phase and Steady-Phase
In Set-up Phase:
* Sensors may elect themselves to be a local cluster head at any time with
a certain probability. (Reason: to balance the energy dissipation)
* A sensor node chooses a random number between 0 and 1.
* If this random number is less than the threshold T(n), the sensor node
becomes a cluster-head.
T(n) = P / {1 – P[r mod (1/P)]} if n is element of G
IFA’2004 14
6
LEACH
Once the nodes receive the advertisement, they determine the cluster
that they want to belong based on the signal strength of the advertisement
from the cluster heads to the sensor nodes.
The nodes inform the appropriate cluster heads that they will be a member
of the cluster.
Afterwards the cluster heads assign the time on which the sensor nodes can
send data to them.
IFA’2004 14
7
LEACH
Sensors begin to sense and transmit data to the cluster heads which
aggregate data from the nodes in their clusters.
IFA’2004 14
8
LEACH
Optimum Number of Clusters ---????????
IFA’2004 14
9
LEACH
Achieves over a factor of 7 reduction in energy dissipation
compared to direct communication.
The nodes die randomly and dynamic clustering increases
lifetime of the system.
IFA’2004 15
2
Open Research Issues
• Store and Forward Technique
that combines data fusion and aggregation.
• Priority Routing
Design routing techniques that allow different priority
of data to be aggregated, fused, and relayed.
• 3D Routing
IFA’2004 15
3
TRANSPORT LAYER
(PRIOR KNOWLEDGE)
IFA’2004 15
4
Transport Layer
End-to-end
Sink communication
Internet, between a sensor
Satellite, node and user
etc End to end reliable
event transfer
Sink
User
IFA’2004 15
5
TRANSPORT LAYER
Related Work
RMST (Reliable Multisegment Transport)
F. Stann and J. Heidemann, “RMST: Reliable Data Transport in Sensor Networks,”
In Proc. IEEE SNPA’03, May 2003, Anchorage, Alaska, USA
IFA’2004 15
6
Reliable Multi-Segment Transport
(RMST)
IFA’2004 15
7
Related Work
PSFQ - Pump Slowly Fetch Quickly
C. Y. Wan, A. T. Campbell and L. Krishnamurthy, “PSFQ: A Reliable Transport Protocol for Wireless
Sensor Networks,” In Proc. ACM WSNA’02, September 2002, Atlanta, GA
IFA’2004 15
8
Pump Slowly Fetch Quickly
(PSFQ)
PSFQ comprises three functions:
* Message Relaying (PUMP operation),
* Relay initiated error recovery (FETCH operation) and
* Selective status reporting (REPORT operation).
Every intermediate node maintains a data cache.
A node that receives a packet checks its content against its local
decremented.
If the TTL field is higher than 0 after being decremented, and there
Sensor nodes
ESRT is the first scheme that focuses on the end-to-end reliable event transfer
The end-to-end event transfer reliability is controlled based on the reporting
frequencies of sensor nodes.
b
a c
Sink
d
IFA’2004 16
2
End-to-end Reliable Event Transfer
event region
sensor coverage b
r sensor range
a
c
Sink
d
r
IFA’2004 16
3
Event-to-Sink Reliability
Sink decides about event features every time units (decision intervals)
DEFINITION 1: Observed Event Reliability
ri is the number of data packets received in decision interval i at sink
DEFINITION 2: Desired Event Reliability
R is the number of packets required for reliable event detection (application specific and is known a-priori at the sink)
(If ri > R, then the event is reliably detected. Else, appropriate
actions must be taken to achieve R.)
DEFINITION 3: Reporting Rate
f is the frequency of packet transmissions at a source node
IFA’2004 16
4
r vs f relationship
IFA’2004 16
5
ESRT: Event-to-Sink
Reliable Transport
OBJECTIVE:
Achieve reliable event detection with minimum energy expenditure
and congestion resolution.
SALIENT FEATURES:
– Self-configuration – Adapts to random, dynamic network
topology
– Collective identification – Does not require individual node IDs
– Biased implementation – Graceful transfer of complexity to the
sink
Sensor nodes need only two additional functions
– Implement a congestion detection mechanism
– Listen to sink broadcasts for frequency updates
IFA’2004 16
6
ESRT: Protocol Overview
IFA’2004 16
7
ESRT: Network States
b
Mark Congestion Notification (CN ) field in packet if congested, i.e.,
bk + b > B (the node infers that it will experience congestion in the next reporting interval)
Event CN Time
ID Destination Stamp Payload FEC
(1 bit)
IFA’2004 16
9
ESRT: Frequency Update
S0 = (NC,LR) S0 = (NC,HR)
IFA’2004 17
1
ESRT Performance
S0 = (C,HR) S0 = (C,LR)
IFA’2004 17
2
Conclusions
Sensor network paradigm necessitates the notion of
event-to-sink reliability
Existing end-to-end guaranteed reliability solutions lead
to over-utilization of scarce sensor resources
ESRT is a novel solution propose exclusively for reliable
event transport in sensor networks
– Tailored for sensor environments
– Biased implementation
– Energy conservation
– Collective identification, self-configuration
– ESRT can also address concurrent multiple events
IFA’2004 17
3
Open Research Issues
Extend ESRT to address reliable transport of concurrent
multiple events in the sensor field.
Explore possible other reliability metrics
– Total expected mean square distortion
– Minimum mean squared error estimation
Develop unified transport layer protocols for sink-to-
sensors and bi-directional reliable transport in WSN
Research to integrate WSN domain into NGWI (Next
Generation Wireless Internet)
– Adaptive Transport Protocols for WSN-Ad Hoc
environments
IFA’2004 17
4
Medium Access Control (MAC)
IFA’2004 17
5
Medium Access Control (MAC)
(Prior Knowledge)
ALOHA
Slotted ALOHA
Reserved ALOHA
CSMA (nonpersistant, p-persistant,1-persistant)
TDMA
FDMA
CDMA
IFA’2004 17
6
Aloha/Slotted Aloha
Aloha
collision
sender A
sender B
sender C
t
Slotted Aloha collision
sender A
sender B
sender C
t
IFA’2004 17
7
FDMA (Frequency Division
Multiple Access)
Frequency
User n
…
User 2
User 1
Time
IFA’2004 17
8
FDMA Bandwidth Structure
1 2 3 4 … n
Frequency
Total bandwidth
IFA’2004 17
9
FDMA Channel Allocation
Frequency 1
User 1
Frequency 2
User 2
… …
Frequency n
User n
IFA’2004 18
0
TDMA (Time Division Multiple
Access)
Frequency
User n
User 1
User 2 …
Time
IFA’2004 18
1
TDMA Frame Structure
1 2 3 4 … n
Time
Frame
IFA’2004 18
2
TDMA Frame Allocation
Time
User 1 1
Time
User 2 2
… …
…
Time n
User n
IFA’2004 18
3
CDMA (Code Division Multiple
Access )
Frequency
User 1
User 2
...
User n
Time
Code
IFA’2004 18
4
Medium Access Control (MAC)
IFA’2004 18
5
Medium Access Control (MAC)
for Sensor Networks
IFA’2004 18
6
Medium Access Control (MAC)
SMACS and EAR
Available bandwidth is far greater than the maximum data rate of sensors
Neighbor discovery and channel assignment combined
Random wake up during the connection phase
In EAR mobile nodes are given full control of the connection process
Mobile nodes keep a record of neighbor nodes
EAR is transparent to SMACS
Shortcomings
W. Ye, J. Heidemann and D. Estrin, “An Energy Efficient MAC Protocol for Wireless
Sensor Networks,” In Proc. ACM MOBICOM ’01, pp. 221–235, Rome, Italy 2001
IFA’2004 18
7
CSMA Based
IFA’2004 18
8
Motivation for Our Work
WSN are characterized by dense deployment of sensor nodes
MAC Layer Challenges
– Limited power resources
– Need for a self-configurable, distributed protocol
– Data centric approach rather than per-node fairness
IFA’2004 19
0
Definitions
Correlation region of node ni
– Region of radius r centered around node ni
Correlation neighbors of node ni
– Nodes inside the correlation region of node ni
IFA’2004 19
1
Collaborative MAC Protocol
IFA’2004 19
2
Collaborative MAC Protocol
IFA’2004 19
3
Event MAC (E-MAC)
IFA’2004 19
5
Performance
IFA’2004 19
7
MEDIUM ACCESS CONTROL (MAC)
FURTHER RESEARCH NEEDS
IFA’2004 19
8
Error Control
Some sensor network applications like mobile tracking
require high data precision
Determining the optimal packet size for sensor networks is necessary to operate at high energy efficiencies .
The multihop wireless channel and energy consumption characteristics are the two most important factors that
influence choice of packet size.
IFA’2004 20
1
PHYSICAL LAYER
New Channel Models (I/O/Underwater/Deep Space)
Explore Antennae Techniques
(e.g., Smart Antennaes)
Software Radios??
New Modulation Schemes
SYNCH Schemes
FEC Schemes on the Bit Level
New Data Encryption
Investigate UWB
IFA’2004 20
2
FINAL REMARKS
IFA’2004 20
3
Basic Research Needs
• An Analytical Framework for Sensor Networks
Find a Basic Generic Architecture and Protocol
Development which can be tailored to specific
applications.
SECURITY ISSUES
IFA’2004 20
5
Some Applications
• Clear Demonstration of Testbeds and Realistic Applications
• Standardization???
IFA’2004 20
7
Commercial Viability
of WSN Applications
Within the next few years, distributed sensing and
computing will be everywhere, i.e., homes, offices,
factories, automobiles, shopping centers, super-
markets, farms, forests, rivers and lakes.
Some of the immediate commercial applications of
wireless sensor networks are
– Industrial automation (process control)
– Defense (unattended sensors, real-time monitoring)
– Utilities (automated meter reading),
– Weather prediction
– Security (environment, building etc.)
– Building automation (HVAC controllers).
– Disaster relief operations
– Medical and health monitoring and instrumentation
IFA’2004 20
8
Commercial Viability
of WSN Applications
XSILOGY Solutions is a company which provides wireless sensor network
solutions for various commercial applications such as tank inventory
management, stream distribution systems, commercial buildings,
environmental monitoring, homeland defense etc.
[Link]
IFA’2004 20
9
Commercial Viability
of WSN Applications
H900 Wireless SensorNet System(TM), the first commercially available
end-to-end, low-power, bi-directional, wireless mesh networking
system for commercial sensors and controls is developed by the
company called Sensicast Systems. The company targets wide range of
commercial applications from energy to homeland security.
[Link]
IFA’2004 21
0
Commercial Viability
of WSN Applications
The Crossbow wireless sensor products and its environmental monitoring
and other related industrial applications of such as surveillance, bridges,
structures, air quality/food quality, industrial automation, process control
are introduced.
[Link]
Japan's Omron Corp has two wireless sensor projects in the US that it
hopes to commercialize in the near future. Omron's Hagoromo Wireless
Web Sensor project consists of wireless nodes equipped with various
sensing abilities for providing security for major cargo-shipping ports
around the world.
[Link]
IFA’2004 21
1
Commercial Viability
of WSN Applications
Millennial Net builds wireless networks combining sensor interface
endpoints and routers with gateways for industrial and building
automation, security, and telemetry
[Link]
Dust Inc. develops the next-generation hardware and software for wireless
sensor networks
[Link]
IFA’2004 21
2
Commercial Viability
of WSN Applications
Melexis produces advanced integrated semiconductors, sensor ICs, and
programmable sensor IC systems.
[Link]
IFA’2004 21
3