wsn-networking-classic - Network and Systems Laboratory
Download
Report
Transcript wsn-networking-classic - Network and Systems Laboratory
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Wireless Sensor Networks:
Classic Protocols
Polly Huang
Department of Electrical Engineering
National Taiwan University
http://cc.ee.ntu.edu.tw/~phuang
[email protected]
Polly@NTU
Copyright © 2008
1
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Classic Protocols
Designed for outdoor sensor networks
Directed diffusion
S-MAC
Polly@NTU
Copyright © 2008
2
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Directed Diffusion
Largely based on slides from
Chalermek Intanagonwiwat & Deborah
Estrin
Polly@NTU
Copyright © 2008
3
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
In Short
A data dissemination mechanism fitting into the
data-centric communication paradigm for sensor
networks
Polly@NTU
Copyright © 2008
4
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Sensor Networks
One way
Or another
Polly@NTU
Copyright © 2008
5
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Applications
Scientific: eco-physiology,
biocomplexity mapping
Infrastructure: contaminant
flow monitoring (and modeling)
www.jamesreserve.edu
Engineering: monitoring
(and modeling) structures
Polly@NTU
Copyright © 2008
6
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
The Real Need
Specialized communication in a wild wide space
Specialized: application dependent
Wild: little or no infrastructure
Wide: expensive to build/use communication
infrastructure
Polly@NTU
Copyright © 2008
7
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Applications: A Longer List
Science: monitoring temperature change on a
volcanic island
Engineering: monitoring power use of industrial
district
Infrastructure: monitoring passenger traffic at
MRT stations
Military: tracking enemy migration in a dessert
Disaster: emergency relief after Gozzila taking a
short tour of Tokyo
Polly@NTU
Copyright © 2008
8
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Common Vision
Embed numerous distributed devices to
monitor and interact with physical world
Exploit spatially and temporally dense, in
situation, sensing and actuation
Network these devices so that they can
coordinate to perform higher-level tasks
Requires robust distributed systems of
hundreds or thousands of devices
Polly@NTU
Copyright © 2008
9
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Challenges
Tight coupling to the physical world and embedded
in unattended systems
Different from traditional Internet, PDA, Mobility applications that
interface primarily and directly with human users
But solutions might be applicable to the Internet, PDA, Mobility
applications as well
Untethered, small form-factor, nodes present
stringent energy constraints
Living with small, finite, energy source is different from traditional
fixed but reusable resources such as BW, CPU, Storage
Communications is primary consumer of energy
in this environment
R4 drop off dictates exploiting localized communication and inPolly@NTU
network processing whenever possible
10
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Energy the Bottleneck Resource
Communication VS Computation Cost [Pottie
2000]
E α R4
10 m: 5000 ops/transmitted bit
100 m: 50,000,000 ops/transmitted bit
Avoid communication over long distances
Cannot assume global knowledge, cannot preconfigure networks
Achieve desired global behavior through localized
interactions
Empirically adapt to observed environment
Can leverage data processing/aggregation inside
Polly@NTU
the network
Copyright © 2008
11
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
In-Network Processing
Sensor technology is advancing steadily
Situations detected by the sensors can be
surprisingly rich
For example, all these at once
Detecting a speech
Inferring the location and identity of the speaker
These information can be used to facilitate
efficient dissemination of the recorded speech
Suppressing speech coming from the same speaker
Forwarding towards the likely listeners
Polly@NTU
Copyright © 2008
12
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
New Design Themes
Long-lived systems that can be untethered and
unattended
Energy efficient communication
Self configuring systems that can be deployed ad
hoc
Polly@NTU
Copyright © 2008
13
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Approach
Leverage data processing inside the network
Exploit computation near data to reduce
communication
Achieve desired global behavior with adaptive
localized algorithms (i.e., do not rely on global
interaction or information)
Dynamic, messy (hard to model), environments
preclude pre-configured behavior
Can’t afford to extract dynamic state information
needed for centralized control or even Internet-style
distributed control
Polly@NTU
Copyright © 2008
14
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Why can’t we simply adapt Internet
protocols and “end to end” architecture?
Internet routes data using IP Addresses in Packets
and Lookup tables in routers
Humans get data by “naming data” to a search engine
Many levels of indirection between name and IP address
Works well for the Internet, and for support of Person-
to-Person communication
Embedded, energy-constrained (un-tethered,
small-form-factor), unattended systems can’t
tolerate communication overhead of indirection
Polly@NTU
Copyright © 2008
15
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Therefore, Directed Diffusion
Features
Operations
Evaluations
Polly@NTU
Copyright © 2008
16
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Directed Diffusion Paradigm
Data-centric communication
Supported with distributed algorithms using
localized interactions
Application-specific in-network processing
Polly@NTU
Copyright © 2008
17
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
IP Communication
Organize system based on named nodes
Per-node forwarding state
Senders need to push data to the node address of sink
To Bob
To Bob
To Bob
My name is Alice.
My name is Alice.
My name is Alice.
I am a 19-yr old
I am a 19-yr old
I am a 19-yr old
I
am
Bob
I
am
Bob
I
am
Bob
I am Bob
girl…
girl…
girl…
Alice
Bob there
Polly@NTU
Chris
Bob
Bob there
Copyright © 2008
18
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Data-Centric Communication
Organize system based on named data
Per-data diffusion state
Sinks need to be specific about what data they’d pull
Here’s a 19-yr old Tell me Here’s a 19-yr old
Here’s a 19-yr old Tell meTell me
Tell me
girl…
about girls
about girls
about girls girl…
girl…
about girls
Girl info goes there
Polly@NTU
Girl info goes there
Copyright © 2008
19
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Directed Diffusion Paradigm
Data-centric communication
Supported with distributed algorithms
using localized interactions
Application-specific in-network processing
Polly@NTU
Copyright © 2008
20
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Localized Interaction
Diffuse requests/interest across network
Set up gradients to guide responses/data
Diffuse responses/data based on the gradients
(Pretty much the same as in the IP routing)
a 19-yr old Tell me Here’s a 19-yr old
me
Here’s a 19-yr old Tell meTell Here’s
Tell me
about girls
aboutgirl…
girls
about girls girl…
girl…
about girls
Girl info goes there
Polly@NTU
Girl info goes there
Copyright © 2008
21
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Directed Diffusion Paradigm
Data-centric communication
Supported with distributed algorithms using
localized interactions
Application-specific in-network processing
Polly@NTU
Copyright © 2008
22
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Without In-Network Processing
Data are simply passed on
Here’s a 19-yr old
Tell me
girl…
about girls
Girl info goes there
Here’s a 20-yr old
girl…
Here’s a 20-yr old
girl…
Here’s a 19-yr old Tell me Here’s a 19-yr old
Tell meTell me
girl…
about girls
about girls
about girls girl…
Here’s a 20-yr old
Tell me
girl…
about girls
Girl info goes there
Girl info goes there
Polly@NTU
Copyright © 2008
23
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
With In-Network Processing
Data are aggregated and then passed on
Here’s a 19-yr old
girl…
Girl info goes there
Here’s a 20-yr old
girl…
Here’re two 19+
yr old girls…
Girl info goes there
Application-specific
Aggregation Here!
Girl info goes there
Polly@NTU
Here’re two 19+
yr old girls…
Copyright © 2008
24
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Directed Diffusion Paradigm
Data-centric communication
Supported with distributed algorithms using
localized interactions
Application-specific in-network processing
Polly@NTU
Copyright © 2008
25
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Example: Remote Surveillance
Interrogation:
e.g., “Give me periodic reports about animal location in region A
every t seconds”
Interrogation is propagated to sensor nodes in region A
Sensor nodes in region A are tasked to collect data
Data are sent back to the users every t seconds
Polly@NTU
Copyright © 2008
26
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Basic Directed Diffusion
Setting up gradients
Source
Sink
Interest = Interrogation
Gradient = Who is interested
Polly@NTU
Copyright © 2008
27
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Basic Directed Diffusion
Sending data and Reinforcing the best path
Source
Sink
Low rate event
Polly@NTU
Reinforcement = Increased interest
Copyright © 2008
28
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Directed Diffusion and Dynamics
Source
Sink
Recovering
from node failure
Low rate event
High rate event
Polly@NTU
Copyright © 2008
Reinforcement
29
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Directed Diffusion and Dynamics
Source
Sink
Stable path
Low rate event
High rate event
Polly@NTU
Copyright © 2008
30
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Local Behavior Choices
For propagating interests
For data transmission
In this example, flood
Multi-path delivery with
More sophisticated
selective quality along
different paths
probabilistic forwarding
single-path delivery, etc.
behaviors possible: e.g.
based on cached
information, GPS
•
For setting up gradients
•
•
Polly@NTU
data-rate gradients are set
up towards neighbors who
send an interest.
Others possible:
probabilistic gradients,
energy gradients, etc.
Copyright © 2008
•
For reinforcement
•
•
reinforce paths, or parts
thereof, based on observed
delays, losses, variances
etc.
other variants: inhibit
certain paths because
resource levels are low
31
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Simulation Study
Key metric
Average Dissipated Energy per event delivered
indicates energy efficiency and network lifetime
Compare diffusion to
flooding
centrally computed tree (omniscient multicast)
Polly@NTU
Copyright © 2008
32
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Diffusion Simulation Details
Simulator: ns-2
Network Size: 50-250 Nodes
Transmission Range: 40m
Constant Density: 1.95x10-3 nodes/m2 (9.8 nodes in radius)
MAC: Modified Contention-based MAC
Energy Model: Mimic a realistic sensor radio [Pottie 2000]
660 mW in transmission, 395 mW in reception, and 35 mw in idle
Polly@NTU
Copyright © 2008
33
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Diffusion Simulation
Surveillance application
5 sources are randomly selected within a 70m x 70m
corner in the field
5 sinks are randomly selected across the field
High data rate is 2 events/sec
Low data rate is 0.02 events/sec
Event size: 64 bytes
Interest size: 36 bytes
All sources send the same location estimate for base
experiments
Polly@NTU
Copyright © 2008
34
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Average Dissipated Energy
Average Dissipated Energy
(Joules/Node/Received Event)
0.018
0.016
Flooding
0.014
0.012
0.01
0.008
Omniscient Multicast
0.006
0.004
Diffusion
0.002
0
0
50
100
150
200
250
300
Network Size
Diffusion can outperform flooding and even omniscient multicast.
WHY ?
Polly@NTU
Copyright © 2008
35
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Average Dissipated Energy
(Joules/Node/Received Event)
In-network Processing
0.025
Diffusion Without
Suppression
0.02
0.015
0.01
Diffusion With
Suppression
0.005
0
0
50
100
150
200
250
300
Network Size
Application-level suppression allows diffusion to reduce traffic
and to surpass omniscient multicast.
Polly@NTU
Copyright © 2008
36
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Average Dissipated Energy
(Joules/Node/Received Event)
Negative Reinforcement
0.012
0.01
Diffusion Without
Negative Reinforcement
0.008
0.006
0.004
Diffusion With Negative
Reinforcement
0.002
0
0
50
100
150
200
250
300
Network Size
Reducing high-rate paths in steady state is critical
Polly@NTU
Copyright © 2008
37
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Summary of Diffusion Results
Under the investigated scenarios, diffusion
outperformed omniscient multicast and flooding
Application-level data dissemination has the
potential to improve energy efficiency
significantly
Duplicate suppression is only one simple example out
of many possible ways.
Aggregation (next)
All layers have to be carefully designed
Not only network layer but also MAC and application
level
Polly@NTU
Copyright © 2008
38
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Standard 802.11 energy
model)
Average Dissipated Energy
(Joules/Node/Received Event)
0.14
Diffusion
0.12
Flooding
Omniscient Multicast
0.1
0.08
0.06
0.04
0.02
0
0
50
100
150
200
250
300
Network Size
Standard 802.11 is dominated by idle energy
Polly@NTU
Copyright © 2008
39
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
802.11
Contention-based protocol
RTS-CTS-DATA-ACK
Sender
DATA
RTS
Receiver
CTS
ACK
[Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specification, IEEE Std. 802.11-1999 edition]
Polly@NTU
Copyright © 2008
40
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
S-MAC
listen
sleep
listen
sleep
Contention-based protocol
RTS-CTS-DATA-ACK
Listen interval
Send packets
Receive packets
[W. Ye et al., “An energy-efficient MAC protocol for wireless sensor
networks”, in INFOCOM 2002]
Polly@NTU
Copyright © 2008
41
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Schedule synchronization
Node 1
Node 2
listen
sleep
listen
listen
sleep
sleep
listen
sleep
Schedules can differ
Neighboring nodes have same schedule
Border nodes:
two schedules
Schedule 2
broadcast twice
Schedule 1
Polly@NTU
Copyright © 2008
(Borrowed from S-MAC)
42
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Scheduling in S-MAC
Unknown neighbors
the same schedule
1
3
Collision
Unicast
Schedule 1
Schedule 2
2
4
Broadcast
Polly@NTU
Copyright © 2008
43
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Questions?
Polly@NTU
Copyright © 2008
44
Network and Systems Laboratory
nslab.ee.ntu.edu.tw
Questions?
Polly@NTU
Copyright © 2008
45