Professional Documents
Culture Documents
Ian F. Akyildiz
Broadband & Wireless Networking Laboratory
School of Electrical and Computer Engineering
Georgia Institute of Technology
Tel: 404-894-5141; Fax: 404-894-7883
Email: ian@ece.gatech.edu
Web: http://www.ece.gatech.edu/research/labs/bwn
Sink
1.
INTRODUCTION
Internet,
SENSOR
Satellite,
etc
Sink
Several
thousand nodes
Nodes are tens
of feet of each
other
Densities as high
as 20 nodes/m3
NETWORKS ARCHITECTURE
Task
Manager
I.F.Akyildiz,
IFA2004
Mobilizer
Transceiver
Memory
Processor
Sensor ADC
Power Unit
IFA2004
Small
Low power
Low bit rate
High density
Low cost (dispensable)
Autonomous
Adaptive
Power Generator
Processor and
Radio platform
(MPR300CB) is
based on Atmel
ATmega 128L
low power
microcontroller
that runs TinyOs
operating system
from its internal
flash memory.
IFA2004
Berkeley Motes
IFA2004
MPR300CB
Speed
4 MHz
Flash
128K bytes
SRAM
4K bytes
EEPROM
4K bytes
Radio Frequency
916MHz or
433MHz
ISM Band
Data Rate
40 Kbits/Sec
Max
Power
0.75 mW
Radio Range
100 feet
Power
2 x AA batteries
IFA2004
Remarks
Programmable
UCLA: WINS
UC Berkeley:
Smart Dust
Rockwell: WINS
IFA2004
IFA2004
weC Mote
10
Zylogs eZ80
Provides a way to
internet-enabled process
control and monitoring
applications.
Temperature sensor,
water leak detector and
many more applications
Metro IPWorks software
stack embedded
Enables users to access
Webserver data and files
from anywhere in the
world.
IFA2004
11
12
2. Sensor Networks
Applications
IFA2004
Seismic
Low sampling rate magnetic
Thermal
Visual
Infrared
Acoustic
Radar.
13
Sensor Networks
Applications
Sensors can monitor ambient conditions including:
Temperature
Humidity
Vehicular movement
Lightning condition
Pressure
Soil makeup
Noise levels
The presence or absence of certain kinds of objects
Mechanical stress levels on attached objects, and
Current characteristics (speed, direction, size) of
an object
IFA2004
14
Sensor Networks
Applications
Sensors can be used for:
IFA2004
Continuous sensing
Event detection
Event identification
Location sensing
Local control of actuators
15
Sensor Networks
Applications
IFA2004
Military
Environmental
Health
Home
Other commercial
Space exploration
Chemical processing
Disaster relief
16
Sensor Networks
Applications
Military Applications:
Command, control, communications, computing,
intelligence, surveillance, reconnaissance, targeting
(C4SRT)
SensIT:
Sensor Information Technology
SensIT was a program for developing software for distributed
wireless
sensor networks.
SensIT pursued two key thrusts:
* New networking techniques
* Network information processing.
http://www.darpa.mil/DARPATech2000/Speeches/ITOSpeeches/ITOSensIT(Kumar).doc
S. Kumar, D. Shepherd, SensIT: Sensor information technology for the warfighter, 4th
IFA2004on Information Fusion, 2001.
Int. Conference
18
http://www.chinfo.navy.mil/navpalib/cno/proceedings.html
IFA2004
19
hooks
cable
sensor
IFA2004
20
Other Projects
Sea Web.
Smart Web
Sensor Web
IFA2004
21
IFA2004
22
Environmental Applications
Tracking the movements of birds, small animals, and insects
23
densely deployed
Millions of sensor nodes can be deploye
IFA2004
24
Health Applications
Providing interfaces for the disabled
Integrated patient monitoring
Diagnostics
Monitoring the movements and internal
processes of
insects or other small animals
Telemonitoring of human physiological data
Tracking and monitoring doctors and
patients inside a
hospital, and
Drug administration in hospitals
IFA2004
25
IFA2004
26
Home Applications
Types:
Security
Home automation, and
Smart Environment
IFA2004
27
Smart
Environment
Purpose: Allowing users to seamlessly
interact with their environment.
Two perspectives:
human-centered, or technologycentered
Example: Aware Home project at
Georgia Tech.
IFA2004
28
Smart
Environment
Human-centered:
A smart environment must adapt to
the needs of the users in terms of I/O
capabilities.
Technology-centered
New hardware technologies,
networking solutions and middleware
services must be developed.
IFA2004
29
Smart Environment
(Contd)
Wired or wireless connection
Room 2
Room 1
Computers
with embedded
sensor nodes.
User enters
IFA2004
Server
User enters
30
Commercial
Applications
Building virtual keyboards
Monitoring product quality
Constructing smart office spaces
Interactive toys
Monitor disaster areas
Smart spaces with sensor nodes embedded
inside
Machine diagnosis
Interactive museums
Managing inventory control
Environmental control in office buildings
Detecting, and monitoring car thefts, and
Vehicle tracking and detection.
IFA2004
31
iBadge - UCLA
Investigate behavior of children/patient
Features:
Speech recording/replaying
Position detection
Direction detection/estimation (compass)
Weather data: Temperature, Humidity,
Pressure, Light
IFA2004
33
iBadge - UCLA
IFA2004
34
iButton Applications
Caregivers Assistance
Elder Assistance
IFA2004
35
IFA2004
A. Fault Tolerance
(Reliability)
IFA2004
37
Fault Tolerance
(Reliability) (Ctnd)
R ( t ) exp( t )
k
G. Hoblos, M. Staroswiecki, and A. Aitouche, Optimal Design of Fault Tolerant Sensor Networks,
IEEE International Conference on Control Applications , pp. 467-472, Anchorage, AK, September 2
IFA2004
38
Fault Tolerance
(Reliability) (Ctnd)
EXAMPLE:
Suppose: lambda = 3.5 * 10-3
IFA2004
t=10sec R
t=20sec
t=30sec
t=50sec
= 0.9
0.
R= 0
R= 0
R=0
39
Fault Tolerance
(Reliability) (Ctnd)
R(t ) 1 [1 Rk (t )]
k 1
IFA2004
40
Fault Tolerance
(Reliability) (Ctnd)
EXAMPLE:
How many sensor nodes are needed within a broadcast
radius (range) to have 99% fault tolerated network?
Assuming all sensors within the radio range have same
reliability, prev. equation becomes
R (t ) 1 [1 R(t )]
41
Fault Tolerance
(Reliability) (Ctnd)
REMARK:
1. Protocols and algorithms may be designed to address
the level of fault tolerance required by sensor
networks.
2. If the environment has little interference, then the
requirements can be more relaxed.
IFA2004
42
Fault Tolerance
(Reliability) (Ctnd)
Examples:
1. House to keep track of humidity and temperature
levels the sensors cannot be damaged easily or
interfered
by environments low fault tolerance (reliability)
requirement!!!!
2. Battlefield for surveillance the sensed data are critical
and sensors can be destroyed by enemies high
fault tolerance
(reliability) requirement!!!
Bottomline: Fault Tolerance (Reliability)
IFA2004
depends heavily on applications!!!
43
B. Scalability
The number of sensor nodes may reach millions in
studying
a field/application
IFA2004
44
Scalability (Ctnd)
The Sensor Node Density:
nodes
( R ) ( N R ) / A
2
45
Network Configuration
Sink node
Radio Range R
Sensor nodes
IFA2004
46
Scalability (Ctnd)
Assuming that connection establishment is equally
likely with any node within the radio range R of
the given node, the expected hop distance is:
dhop = 2R/3
e.g., R=20m 13.33m
IFA2004
47
Network Configuration
dnei Expected distance to the nearest neighbor, may or may not be communicating nei
ne
dhop Expected distance to the next hop, i.e., distance to communicating neighbor. d hop>
Sink node
Radio Range R
dne
i
dho
p
IFA2004
Sensor nodes
48
Scalability (Ctnd)
EXAMPLE:
IFA2004
49
Scalability (Contd)
Examples:
1. Machine Diagnosis Application:
less than 300 sensor nodes in a 5 m x 5 m region.
2. Vehicle Tracking Application:
Around 10 sensor nodes per cluster/region.
3. Home Application: 2 dozens or more.
4. Habitat Monitoring Application: Range from 25 to 100
nodes/cluster
5. Personal Applications:
Ranges from 100s to 1000s, e.g., clothing, eye glasses, shoes,
watch, jewelry.
IFA2004
50
C. Production Costs
IFA2004
51
Mobilizer
Transceiver
Memory
Processor
Sensor ADC
Power Unit
IFA2004
Small
Low power
Low bit rate
High density
Low cost (dispensab
Autonomous
Adaptive
Power Generator
52
Several thousand
nodes
Nodes are tens of
feet of each other
Densities as high as
20 nodes/m3
Internet,
Satellite
, etc
Sink
Sink
Task
Manager
IFA2004
53
IFA2004
54
IFA2004
IFA2004
56
position
reachability (due to jamming, noise, moving
obstacles, etc.)
available energy
malfunctioning
IFA2004
57
F. Operating Environment
Sensor networks may work
in busy intersections
IFA2004
58
G. TRANSMISSION MEDIA
IFA2004
59
Transmission Media
In a Multihop sensor network nodes are linked by Wireless medium
Radio Frequency (RF)
Most of the current sensor node HW is based on it
Do not need Line of Sight
Can hide these sensors
Infrared (IR)
License free
Robust to interference
Cheaper and easier to build
Require line of sight
Short Range Solution
Optical Media
Require Line of sight
IFA2004
60
H. POWER CONSUMPTION
61
Communication
Data Processing
Sensing
IFA2004
62
63
Pte/re
P0
IFA2004
64
65
Ton = L / R
IFA2004
66
IFA2004
67
68
IFA2004
69
Pp C V
dd
Where
C is the total switching capacitance; Vdd is the voltage swing;
F is the switching frequency
The second term indicates the power loss due to leakage currents.
IFA2004
70
71
ENERGY MODEL
IFA2004
72
IFA2004
73
74
Depends on
Application
Nature of sensing: Sporadic or Constant
Detection complexity
Ambient noise levels
IFA2004
75
Sensor Networks
Communication Architecture
Sensor Node
Internet,
Satellite,
etc
Task
Manager
IFA2004
Sink
Sensor Field
Collect data
Route data back to the sink
76
Transport Layer
Network Layer
IFA2004
Mobility Management
Plane
Power Management
Plane
Application Layer
77
78
5. APPLICATON LAYER
FRAMEWORK
IFA2004
79
Users
sensor node
gateway (gnode)
Internet,
Satellite,
etc
Server
Task
Manager
(Database)
wireless link
IFA2004
80
APPLICATON LAYER
APPLICATON LAYER
(Query Processing)
Users can request data from the network-> Efficient Query
Processing
User Query Types:
1. HISTORICAL QUERIES:
Used for analysis of historical data stored in a storage area
(PC),
e.g., what was the temperature 2 hours back in the NW
quadrant.
2. ONE TIME QUERIES:
Gives a snapshot of the network, e.g., what is the current
temperature in the NW quadrant.
3. PERSISTANT QUERIES:
IFA2004
Used
to monitor the network over a time interval with 82
QUERYING
Continuous
Event Driven
The sensors report information only when the event of interest occurs.
Sensors only report their results in response to an explicit request from the
observer.
Aggregate queries
Complex queries
Queries for replicated data
Hybrid
IFA2004
83
APPLICATON LAYER
Sensor Query and Tasking Language (SQTL):
(C-C Shen, et.al., Sensor Information Networking Architecture and Applications,
IEEE Personal Communications Magazine, pp. 52-59, August 2001.)
IFA2004
84
APPLICATON LAYER
Sensor Query and Tasking Language (SQTL):
IFA2004
86
87
APPLICATON LAYER
INTEREST DISSEMINATION
* Users send their interest to a sensor
node,
a subset of the nodes or the entire
network.
* This interest may be about a certain
attribute
of the sensor field or a triggering even
APPLICATON LAYER
to issue
queries, respond to queries and collect
incoming
replies.
These
Interest Dissemination
Interest dissemination is performed to assign the sensing tasks
to the sensor nodes.
Either sinks broadcast the interest or sensor nodes broadcast
71
an advertisement for
the available data and wait for a request from the sinks.
75
68
Sink
67
66
71
71
68
71
69
Query:
Sensor nodes that read >70oF
temperature
IFA2004
90
68
Sink
67
66
71
71
68
71
69
Query:
Sensor nodes that read >70oF
temperature
IFA2004
91
Location Awareness
(Attribute Based Naming)
Query an Attribute
of the sensor field
Region A
71
75
68
Sink
67
66
71
71
Region C
69
Query:
Temperatures read by the nodes
in Region A
IFA2004
71
68
Important
Region B
for broadcasting,
multicasting, geocasting and
anycasting
92
IFA2004
93
NETWORK LAYER
(ROUTING BASIC KNOWLEDGE)
The constraints to calculate the routes:
1. Additive Metrics:
Delay, hop count, distance, assigned costs (sysadmin
preference),
average queue length...
2. Bottleneck Metrics:
Bandwidth, residual capacity and other bandwidth
related metrics.
REMARK:
All routing algorithms are based on the same principle used as in
Dijkstra's,
which is used to find the minimum cost path from source to
destination.
Dikstra and Bellman solve the SHORTEST PATH PROBLEM
IFA2004
RIP (Distant Vector Algorithm) -> Bellman/Ford Algorithm 94
E (PA=1) F (PA=4)
95
IFA2004
97
NETWORK LAYER
(ROUTING for SENSOR NETWORKS)
Important considerations:
IFA2004
98
Some Concepts
Data-Centric
Application-Specific
IFA2004
99
75
68
Sink
67
66
71
71
68
Query:
Nodes that read >70oF
temperature
IFA2004
71
69
10
10
75
68
Sink
66
67
71
71
68
Query:
Nodes that read >70oF
temperature
IFA2004
71
69
10
Data Aggregation
Categorization of Data Aggregation Schemes:
1. Temporal or spatial aggregation
2. Snapshot or periodical aggregation
3. Centralized or distributed aggregation
4. Early or late aggregation
IFA2004
10
68
Sink
67
66
71
71
Region C
69
Query:
Temperatures read by the nodes
in Region A
IFA2004
71
68
Region B
Important
for broadcasting,
multicasting, geocasting
and anycasting
10
Taxonomy of
for Sensor
Routing Protocols
Networks
2. Hierarchical
3. Location Based
10
Conventional Approach
FLOODING
Broadcast data to all neighbor nodes
A
C
B
D
E
F
G
IFA2004
10
ROUTING ALGORITHMS
Gossiping
GOSSIPING:
Sends data to one randomly selected neighbor.
Example:
IFA2004
10
Problems of
Flooding and Gossiping
PROBLEMS:
Although these techniques are simple and
reactive, they have some disadvantages
including:
* Implosion
(NOTE: Gossiping avoids this by selecting only one node; but this
causes delays to
propagate the data through the network)
* Overlap
* Resource Blindness
* Power (Energy) Inefficient
IFA2004
10
Problems
Implosion
(a)
B
(a)
(a)
C
D
Data Overlap
q
s
B
(a)
(q,r)
(r,s)
Resource Blindness
No knowledge about the available power of resources
IFA2004
10
Gossiping
Uses randomization to save energy
Avoids implosions
Distributes information slowly
Energy dissipates slowly
IFA2004
11
Shortest-path routes
Avoids overlap
D
Minimum energy
Need global topology information
IFA2004
A
C
B
E
F
G
11
Ideal Dissemination
No implosion and
no overlap
Disseminate in
shortest possible
time
IFA2004
11
11
SPIN
Uses three types of messages: ADV, REQ, and
DATA.
When a sensor node has something new, it broadcasts
an advertisement (ADV) packet that contains the new
data, i.e., the meta data.
- Interested nodes send a request (REQ) packet.
Data is sent to the nodes that request by DATA
packets.
This will be repeated until all nodes will get a copy.
-
IFA2004
11
SPIN
Good for disseminating information to all sensor nodes.
SPIN is based on data-centric routing where the sensors
broadcast an
advertisement for the available data and wait for a request from
interested sinks
1.
2.
1. ADV
2. REQ
3. DATA
3.
IFA2004
11
SPIN
Meta-Data <=> Data Naming
ADV
B
REQ
DATA
A
IFA2004
B
11
SPIN
ADV
REQ
DATA
IFA2004
ADV
DATA
REQ
11
EXAMPLE
Sensor A sends meta-data to neighbor
V
AD
IFA2004
11
IFA2004
REQ
11
A
DAT
IFA2004
12
AD
V
V
AD
IFA2004
ADV
AD
V
ADV
AD
V
12
REQ
REQ
REQ
IFA2004
RE
Q
REQ
12
DATA
DAT
A
IFA2004
TA
DA
TA
A
D
DA
TA
12
SPIN-1 Protocol
SPIN-1
Disadvantages
IFA2004
12
SPIN-2
Spin-2
IFA2004
12
SPIN-2
Adds a simple energy conservation heuristic
When energy is plentiful, SPIN-2 behaves
like SPIN-1
When energy approaches a low-energy
threshold, SPIN-2 node reduces its
participation in the protocol (DORMANT)
participate in a stage of protocol only if the node
believes that it can complete all the remaining stages
IFA2004
12
Zzz...
IFA2004
12
CONCLUSIONS
Flooding converges first
No delays
SPIN-1
SPIN-2 distributes
10% more data per unit energy than
SPIN-1
60% more data per unit energy than
flooding
IFA2004
12
ROUTING ALGORITHM
(DIRECTED DIFFUSION)
(C. Intanagonwiwat, R. Gowindan and D. Estrin, Directed Diffusion: A Scalable and Robus
Communication Paradigm for Sensor Networks, Proc. ACM MobiCom00, pp. 56-67, 2000
Data Centric
Data-Centric
Sensor node does not need an identity
What is the temp at node #27 ?
Application-Specific
Nodes can perform application specific data
aggregation, caching and forwarding
IFA2004
13
DIRECTED DIFFUSION
IFA2004
13
DIRECTED DIFFUSION
IFA2004
13
DIRECTED DIFFUSION
Example:
* The users query is transformed into an interest that is diffused towards nodes in
regions X or Y.
* When a node in that region receives an interest it activates its sensors which begin
collecting information about pedestrians.
* When the sensors report the presence of pedestrians this returns along the
reverse path of interest propagation.
* Intermediate nodes might aggregate the data, e.g., more accurately pinpoint the
pedestrians location by combining reports from several sensors.
*
An important feature of directed diffusion is that interest and data propagation and
aggregation are determined by localized interactions (message changes between
neighbors or nodes within some vicinity)
IFA2004
13
DIRECTED DIFFUSION
Data is named using attribute-value pairs, e.g.,
Example: (Animal Tracking Task)
Type = four legged animal (detect animal location)
Interval = 20 ms (send back events every 20 ms)
Duration = 10 seconds (.. for the next 10 seconds)
Rec = [-100,100,200,00] (from sensors within the rectangle)
IFA2004
13
DIRECTED DIFFUSION
IFA2004
13
Directed Diffusion
Source
Sink
Data
Delivery
Gradient
Setup
Interest
Propagation
IFA2004
13
DIRECTED DIFFUSION
13
DIRECTED DIFFUSION
* For each active task, SINK periodically broadcasts an interest
message
to each of its neighbors.
* This initial interest contains the specified rect and duration
attributes,
but contains a much larger interval attribute.
13
DIRECTED DIFFUSION
An ENTRY in the interest cache has several fields:
* A TIMESTAMP field (timestamp of the last received matching
interest) and several GRADIENT fields up to one per neighbor.
* A GRADIENT is a relay link to a neighbor from which the interest
was received.
-*
-
DIRECTED DIFFUSION
When a node receives an interest it checks to see of the interest
exists
in the cache.
If no matching exists, the node creates a new entry.
If there exists an entry, but no gradient for the sender of the interes
the node adds a gradient with the specified value.
It also updates the entrys timestamp and duration fields.
Finally, if both an entry and gradient exist, the node simply
updates
IFA2004the timestamp and duration fields.
14
Directed Diffusion
Features
source
source
sink
Interest Propagation
source
sink
Gradient Setup
sink
Data Delivery
Drawbacks
Cannot change interest unless a new interest is broadcast.
IFA2004
14
LEACH
Low Energy Adaptive Clustering Hierarchy
(LEACH)
(W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-Efficient
Communication Protocol for Wireless Microsensor Networks,'' IEEE
Proceedings of the Hawaii International Conference on System Sciences, pp.
1-10, January, 2000.)
LEACH
Two Phases: Set-up Phase and Steady-Phase
In Set-up Phase:
* Sensors may elect themselves to be a local cluster head at an
time with
a certain probability. (Reason: to balance the energy
dissipation)
* A sensor node chooses a random number between 0 and 1.
* If this random number is less than the threshold T(n), the sens
node
becomes a cluster-head.
T(n) = P / {1 P[r mod (1/P)]} if n is element of G
Dynamic Clusters
IFA2004
14
LEACH
Once the nodes receive the advertisement, they determine
the cluster
that they want to belong based on the signal strength of
the advertisement
from the cluster heads to the sensor nodes.
The nodes inform the appropriate cluster heads that they
will be a member
of the cluster.
Afterwards the cluster heads assign the time on which the
sensor nodes can
send
data to them.
IFA2004
14
LEACH
STEADY STATE PHASE:
Sensors begin to sense and transmit data to the cluster
heads which
aggregate data from the nodes in their clusters.
After a certain period of time spent on the steady state,
the network goes into start-up phase again and enters
another round of
selecting cluster heads.
IFA2004
14
LEACH
Optimum Number of Clusters ---????????
IFA2004
14
LEACH
Achieves over a factor of 7 reduction in energy dissipation
compared to direct communication.
The nodes die randomly and dynamic clustering increases
lifetime of the system.
It is completely distributed and requires no global
knowledge of the network.
It uses single hop routing where each node can transmit
directly to the cluster head and the sink.
It is not applicable to networks deployed in large regions.
Furthermore, the idea of dynamic clustering brings extra
overhead, e.g., head changes, advertisements etc. which
may diminish the gain in energy consumption.
IFA2004
15
Other Protocols
1. Energy Aware Routing
R. Shah, J. Rabaey, Energy Aware Routing for Low Energy Ad Hoc Sensor
Networks, IEEE WCNC02, Orlando, March 2002.
2. Rumor Routing
D. Braginsky, D. Estrin, Rumor Routing Algorithm for Sensor Networks,
ACM WSNA02, Atlanta, October 2002.
15
Other Protocols
5. Power Efficient Gathering in Sensor Information Systems
(PEGASIS)
S. Lindsey, C.S. Raghavendra, PEGASIS: Power Efficient Gathering in Sensor
Information Systems, IEEE Aerospace Conference, Montana, March 2002.
15
15
TRANSPORT LAYER
(PRIOR KNOWLEDGE)
IFA2004
15
Transport Layer
End-to-end
communication
between a sensor
node and user
End to end reliable
event transfer
Internet,
Satellite,
etc
Sink
Sink
User
IFA2004
15
TRANSPORT LAYER
Related Work
IFA2004
15
Sink
RMST Node
Source Node
IFA2004
Related Work
IFA2004
15
Related Work
Wireless TCP variants are NOT suitable for
sensor networks
Different notion of end-to-end reliability
Huge buffering requirements
ACKing is energy draining
BOTTOMLINE: Traditional end-to-end
guaranteed reliability (TCP solutions)
cannot be applied here.
16
Event-to-Sink Reliability
(ESRT)
Sink
Sensor nodes
16
b
a
Sink
d
IFA2004
16
sensor range
b
a
Sink
r
IFA2004
16
Event-to-Sink
Reliability
Sink decides about event features every time units (decision intervals)
DEFINITION 1: Observed Event Reliability
ri is the number of data packets received in decision interval i at sink
DEFINITION 2: Desired Event Reliability
R is the number of packets required for reliable event detection (application specific and is known a-priori at the
sink)
(If ri > R, then the event is reliably detected. Else, appropriate
IFA2004
16
r vs f relationship
IFA2004
16
ESRT: Event-to-Sink
Reliable Transport
OBJECTIVE:
Achieve reliable event detection with minimum
energy expenditure and congestion resolution.
SALIENT FEATURES:
Self-configuration Adapts to random, dynamic
network topology
Collective identification Does not require
individual node IDs
Biased implementation Graceful transfer of
complexity to the sink
Sensor nodes need only two additional functions
Implement a congestion detection mechanism
Listen to sink broadcasts for frequency updates
IFA2004
16
Sink:
Measures the observed event reliability ri at the end of
decision interval i
Normalized reliability i = ri / R
Performs congestion decision based on the feedback from
the sources nodes (to determine f >< fmax).
Update f based on i and f >< fmax (congestion) to achieve
desired event reliability R
IFA2004
16
ESRT: Network
States
State
Description
(NC,LR)
(NC,HR)
(C,HR)
(C,LR)
OOR
Optimal Operating Region
IFA2004
Condition
16
ESRT:
: Buffer size
: reporting frequency
f
bk
bk-1
b k + b > B ( the node infers that it will experience congestion in the next
Event
Time
CN
reporting interval)
Destinatio
Payload
FEC
ID
IFA2004
(1 bit)
Stamp
16
ESRT: Frequency
Update
State
(NC,LR)
Frequency Update
fi+1 = fi / i
Comments
Multiplicative increase, achieve desired
reliability asap
fi+1 = fi (i + 1) / 2i
(C,HR)
fi+1 = fi / i
(C,LR)
fi+1 = fi i
(NC,HR)
OOR
fi+1 = fi
IFA2004
17
ESRT Performance
S0 = (NC,LR)
IFA2004
S0 = (NC,HR)
17
ESRT Performance
S0 = (C,HR)
IFA2004
S0 = (C,LR)
17
Conclusions
Sensor network paradigm necessitates the
notion of event-to-sink reliability
Existing end-to-end guaranteed reliability
solutions lead to over-utilization of scarce sensor
resources
ESRT is a novel solution propose exclusively for
reliable event transport in sensor networks
Tailored for sensor environments
Biased implementation
Energy conservation
Collective identification, self-configuration
ESRT can also address concurrent multiple
events
IFA2004
17
Open Research
Issues
Extend ESRT to address reliable transport of
concurrent multiple events in the sensor field.
Explore possible other reliability metrics
Total expected mean square distortion
Minimum mean squared error estimation
17
IFA2004
17
ALOHA
Slotted ALOHA
Reserved ALOHA
CSMA (nonpersistant, p-persistant,1-persistant)
TDMA
FDMA
CDMA
IFA2004
17
Aloha/Slotted Aloha
Aloha
collision
sender A
sender B
sender C
Slotted Aloha
t
collision
sender A
sender B
sender C
t
IFA2004
17
FDMA (Frequency
Division Multiple Access)
Frequency
User n
User 2
User 1
IFA2004
Time
17
FDMA Bandwidth
Structure
Frequency
Total bandwidth
IFA2004
17
FDMA Channel
Allocation
User 1
User 2
User n
Mobile
Stations
IFA2004
Frequency 1
Frequency 2
Frequency n
Base Station
18
User n
User 2
User 1
Frequency
Time
IFA2004
18
TDMA Frame
Structure
Time
Frame
IFA2004
18
TDMA Frame
Allocation
Time
1
User 2
User n
Mobile Stations
IFA2004
Time 2
User 1
Time n
Base Station
18
User 1
...
User 2
User n
Frequency
Time
Code
IFA2004
18
IFA2004
18
IFA2004
18
Shortcomings
IFA2004
18
CSMA Based
IFA2004
18
18
19
Definitions
Correlation region of node ni
Region of radius r centered around node ni
IFA2004
19
Collaborative MAC
Protocol
If a node ni transmits data then
all its correlation neighbors
have redundant information
Route-thru data has higher
priority over generated data
Filter out transmission of
redundant data and prioritize
filtered data through the network!
IFA2004
19
Collaborative MAC
Protocol
19
19
19
Performance
Conclusions
Spatial correlation in sensor networks is exploited in
the MAC layer
MAC protocol collaboratively regulates medium access
such that redundant transmissions is suppressed
Event MAC (E-MAC) filters out correlation whereas
Network MAC (N-MAC) prioritizes the route-thru packets
Number of transmissions are reduced instead of number
of transmitted bits
Collaborative Medium Access achieves low energy
consumption as well as improving event detection
latency
IFA2004
19
19
Error Control
Some sensor network applications like mobile
tracking
require high data precision
ERROR CONTROL
RESEARCH NEEDS
Design of suitable FEC codes with minimal
encoding
and relatively higher decoding complexities
IFA2004
20
Extension
to Rayleigh/Rician fading conditions
Determining the optimal packet size for sensor networks is necessary to operate at high energy
efficiencies.
efficiencies.
The multihop wireless channel and energy consumption characteristics are the two most important
factors that influence choice of packet size.
IFA2004
20
PHYSICAL LAYER
New Channel Models (I/O/Underwater/Deep
Space)
Software Radios??
SYNCH Schemes
Investigate UWB
IFA2004
20
FINAL REMARKS
IFA2004
20
Basic Research
Needs
20
SECURITY ISSUES
IFA2004
20
Some Applications
Clear Demonstration of Testbeds and Realistic
Applications
Not only data or audio but also video as well as
integrated
traffic.
SOME OF OUR EFFORTS IN BWN LAB @ GaTech
20
FURTHER CHALLENGES
Protocol Stack
Follow the TCP/IP Stack, i.e., keep the
20
Commercial
Viability of WSN
Within
the next few years, distributed sensing and
Applications
computing will be everywhere, i.e., homes, offices,
factories, automobiles, shopping centers, supermarkets, farms, forests, rivers and lakes.
Some of the immediate commercial applications of
wireless sensor networks are
IFA2004
20
Commercial
Viability of WSN
Applications
IFA2004
20
Commercial
Viability of WSN
Applications
IFA2004
21
Commercial
Viability of WSN
Applications
IFA2004
21
Commercial
Viability of WSN
Applications
IFA2004
21
Commercial
Viability of WSN
Applications
IFA2004
21