Wireless Sensor Networks
Download
Report
Transcript Wireless Sensor Networks
Department of Computer and IT Engineering
University of Kurdistan
Computer Networks II
Wireless Networks
By: Dr. Alireza Abdollahpouri
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
2
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
3
Wireless Communications
There is no physical link in wireless networks. Signals are
transmitted on a certain frequency, propagate in the space
and are captured by the receiver tuned to the same
frequency.
Wireless communication is normally broadcast
communication, i.e., all nodes within the transmission range
of a particular node can receive the transmitted packets.
Transmissions in a common neighborhood will interfere
with each other. If the Signal-to-Interference-Noise-Ratio
(SINR) in the receiver is large enough, a packet can be
correctly decoded.
4
Wireless Communications
5
Electromagnetic wave
6
ELECTROMAGNETIC SPECTRUM
7
Wireless Attracts Many Users
I’ve Upgraded
To Wireless
8
Elements of a Wireless Network
wireless hosts
laptop, PDA, IP phone
run applications
may be stationary (nonmobile) or mobile
network
infrastructure
wireless does not
always mean
mobility
9
Elements of a Wireless Network
network
infrastructure
base station
typically connected
to wired network
relay - responsible
for sending packets
between wired
network and wireless
host(s) in its “area”
e.g., cell towers,
802.11 access
points
10
Elements of a Wireless Network
network
infrastructure
wireless link
typically used to
connect mobile(s) to
base station
also used as
backbone link
multiple access
protocol coordinates
link access
various data rates,
transmission
distance
11
Mobility vs. Throughput
12
Wireless Propagation Channel(s)
Outdoor
indoor
Multipath propagation: signals reach the receiver via multiple paths.
13
Shadowing
D
C
B
A
A
B
C
D
14
Radio Propagation
اثربازتابي (Reflection effect) :
اين اثر نيزبه خاطر وجود موانع بزرگ (درمقايسه با طول موج سيگنال تابش شده) است .دراين حالت سيگنال تابش شده پس از برخورد به مانع
بزرگ منعكس مي گردد .اما سيگنال منعكس شده داراي توان كمتري نسبت به سيگنال اصلي است.
اثرپخش ي (Scattering effect) :
اگراندازه مانع درحدود طول موج يا كمترازطول موج سيگنال تابيده شده باشد ،مانع مي تواند باعث پخش شدن موج تابيده شده شود .بنابراين موج
تابيده شده به چند موج ضعيف ترشكسته مي شود.
اثرشکست (Refraction effect) :
اين اثر به دلیل ورود سیگنال ازیک محیط به محیط دیگر به وجود می آید.
15
Distance Sensitivity in Wireless Networks
SNR
25
20
15
10
64QAM
16QAM
5
0
-5
QPSK
Distance
16
Throughput
Robustness
Adaptive Modulation and Coding
AMC
To provide a tradeoff
between throughput and
robustness
17
Antennas
18
Limitations of the Wireless Environment
Limitations of the Wireless Network
limited communication bandwidth
frequent disconnections
heterogeneity of fragmented networks
Limitations Imposed by Mobility
route breakages
lack of mobility awareness by system/applications
Limitations of the Mobile Device
short battery lifetime
limited capacities
19
Wireless Networks
Single-hop wireless networks: cellular network,
wireless LAN.
Multi-hop wireless networks: mobile ad hoc
network, wireless mesh network, wireless
sensor network.
20
Wireless Mesh Networks (WMN)
Mesh nodes
21
Wireless Mesh Networks (WMN)
22
Wireless Sensor Networks (WSN)
Sensor nodes
23
Wireless Sensor Networks (WSN)
24
Wireless Multi-hop (Mesh vs. Sensor)
Wireless Sensor Networks Wireless Mesh Networks
Bandwidth is limited
(tens of kbps)
In most applications,
fixed nodes
Energy efficiency is an
issue
Resource constrained
Most traffic is user-togateway
Bandwidth is generous
(>1Mbps)
Some nodes mobile,
some fixed
Normally not energy
limited
Resources are not an
issue
Most traffic is user-togateway
25
Relaying
Relaying for (a) Throughput enhancement,
and (b) Coverage extension
26
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
27
Applications
Broadband home
networking.
Community networking.
28
Applications - Biomedical
29
Habitat Monitoring on Great Duck Island
http://www.greatduckisland.net/
Intel Research Laboratory at Berkeley initiated a
collaboration with the College of the Atlantic in Bar
Harbor and the University of California at Berkeley to
deploy wireless sensor networks on Great Duck
Island, Maine (in 2002)
Monitor the microclimates in and around nesting
burrows used by the Leach's Storm Petrel
Goal : habitat monitoring kit for researchers
worldwide
30
Applications - Habitat monitoring
31
FireBug
Wildfire Instrumentation System Using Networked Sensors
Allows predictive analysis of evolving fire behavior
Firebugs: GPS-enabled, wireless thermal sensor motes based on TinyOS that
self-organize into networks for collecting real time data in wild fire
environments
Software architecture: Several interacting layers (Sensors, Processing of
sensor data, Command center)
A project by University of California, Berkeley CA.
32
Applications
Metropolitan
area networks
Transportation systems
33
Applications
Emergency Response
Source: www.meshdynamics.com
34
Many Other Applications
Remote monitoring
and control
Public transportation
Internet access
Multimedia home
networking
Source: www.meshnetworks.com
(now www.motorola.com).
35
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
36
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
37
Advanced Physical Layer Techniques
Combination of different modulation and
coding rates
Using OFDM and UWB for high speed
transmission
Using Multi-antenna systems like: MIMO,
Smart antenna
Multiple-antenna systems
Software Antenna: Programmable RF
bands, Channel access modes and
channel modulation
38
PHY - Modulation
Existing modulations work well (OFDM, DSSS,
FSK, etc.).
UWB may be an interesting alternative for short
distances (480 Mbps up to 1.6 Gbps at
distances up to a few meters)
Spread spectrum solutions are preferred as
they tend to have better reliability in the face of
Fading (very important for mobile applications)
Interference (more of a factor than in any other
wireless system)
39
PHY – Smart Antennas
Background
Implemented as an array of
omnidirectional antennas
By changing the phase,
beamforming can be
achieved
The result is a software
steered directional antenna
Omnidirectional
antenna
Variable
delay
Signal to
transmit
Direction
changed by
the delays
Radiation Pattern
40
PHY-Smart Antennas Advantages
Low power transmissions
Battery not a big
concern in many
applications
Enables better spatial
reuse and, hence,
increased network
capacity
41
PHY-Smart Antennas Advantages (cont.)
Punch-through links
Better delays
Less packet loss
Better data rates
Less power
42
PHY-Smart Antennas Advantages (cont.)
Better SNR
Better data rates
Better delays
Better error rates
43
PHY-Smart Antennas Disadvantages
Specialized hardware
Specialized MAC (difficult
to design)
Difficult to track mobile
users
44
PHY – Transmission Power Control
GW
GW
Too low
Too high
GW
Just right
Transmission power can control network
topology
45
PHY – Transmission Power Control
(cont.)
Optimization Criteria
Network capacity
Delay
Error rates
Power consumption
The ideal solution will depend on
Network topology
Traffic load
46
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
47
MAC: A Simple Classification
Wireless
MAC
Centralized
Distributed
On Demand MACs, Polling
Guaranteed
or
controlled
access
Random
access
Aloha, CSMA/CA
SDMA, FDMA, TDMA
48
MAC – Multichannel
What?
c
f
Channels can be
implemented by:
c
t
f
TDMA (difficult due to lack
of synchronization)
FDMA
CDMA (code assignment is
an issue)
SDMA (with directional
antennas)
Combinations of the above
t
c
c
f
t
c
t
s1
f
s2
t
f
c
t
s3
f
c
f
t
49
MAC – Multichannel
Why?
Increases network capacity
1
2
Ch-1
1
Ch-1
2
3
2
3
4
Ch-1
3
4
1
Ch-2
User bandwidth = B/2
User bandwidth = B
Chain bandwidth = B
B = bandwidth of a channel
50
Multi-Hop Networks with Single Radio
Source
Mesh Router
Destination
With a single radio, a node can not transmit and
receive simultaneously.
51
Multi-Hop Networks with Multiple Radios
Source
Mesh Router
Destination
With two radios tuned to non-interfering
channels, a node can transmit and receive
simultaneously.
52
MAC – Research challenges
The scalability issue in multi-hop ad hoc networks
has not been fully solved yet.
A MAC protocol for WNs must consider both
scalability and heterogeneity between different network
nodes.
Advanced bridging functions must be developed in
the MAC layer
Development of MAC protocols with multiple QoS
metrics such as delay, packet loss ratios and jitter
MAC/Physical Cross-layer design
53
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
54
Routing
Finds and maintains
routes for data flows
The entire
performance of the
WN depends on the
routing protocol
55
Routing
An optimal routing protocol must capture the
following features:
Multiple performance metrics
Scalability
Robustness (to link failure and congestion)
56
Routing – different routing protocols
Routing protocols with various performance metrics
example : LQSR
Multi-radio routing (using WCETT)
example: MR-LQSR
Multi-path routing for load balancing and fault
tolerance
Hierarchical routing
Geographic routing
57
Existing Routing Protocols
Internet routing
protocols (e.g., OSPF,
BGP, RIPv2)
Ad-hoc routing
protocols (e.g., DSR,
AODV, OLSR, TBRPF)
Well known and trusted
Designed on the
assumption of seldom
link changes
Without significant
modifications are
unsuitable for WNs in
particular or for ad hoc
networks in general.
Newcomers by
comparison with the
Internet protocols
Designed for high rates
of link changes; hence
perform well on WNs
May be further
optimized to account for
WNs’ particularities
58
Routing Protocols
Proactive protocols (OLSR , TBRPF)
Determine routes independent of traffic pattern
Traditional link-state and distance-vector routing
protocols are proactive
Reactive protocols (DSR , AODV)
Maintain routes only if needed
Hybrid protocols
59
Power-Aware Routing
Define optimization criteria as a function of
energy consumption.
Minimize energy consumed per packet
Maximize duration before a node fails due
to energy depletion
Example: LEACH Algorithm
60
Routing – Hierarchical Routing
Organizes the mobile
nodes into clusters
Each cluster is
governed by a clusterhead
Only heads send
messages to a BS
Suitable for data fusion
Self-organizing
61
Routing – Geographic Routing
It is assumed that every node knows it own and its
network neighbors positions.
Compared to topology-based routing schemes,
geographic routing schemes forward packets by only
using the position information of nodes in the vicinity and
the destination node.
Topology change has less impact on the geographic
routing than other routing protocols.
62
Routing – metrics
Existing Routing Metrics are Inadequate
2 Mbps
18 Mbps
18 Mbps
Destination
Mesh Router
Source
11 Mbps
11 Mbps
Shortest path: 2 Mbps
Path with fastest links: 9 Mbps
Best path: 11 Mbps
63
Link Metric: Expected Transmission
Time (ETT)
Link loss rate = p
Expected number of transmissions
ETX
1
1- p
Packet size = S, Link bandwidth = B
Each transmission lasts for S/B
S
ETT * ETX
B
Lower ETT implies better link
64
ETT: Illustration
11 Mbps
5% loss
Source
18 Mbps
10% loss
50%
Destination
1000 Byte Packet
ETT : 0.77 ms
ETT
ETT :: 0.89
0.40ms
ms
65
Combining Link Metric into Path Metric
Add ETTs of all links on the path
Use the sum as path metric
SETT = Sum of ETTs of links on path
(Lower SETT implies better path)
Pro: Favors short paths
Con: Does not favor channel diversity
66
SETT does not favor channel diversity
6 Mbps
No Loss
6 Mbps
No Loss
1.33ms
1.33ms
Mesh Router
Source
Destination
1.33ms
1.33ms
6 Mbps
No Loss
6 Mbps
No Loss
Path
Throughput
SETT
Red-Blue
6 Mbps
2.66 ms
Red-Red
3 Mbps
2.66 ms
67
Impact of Interference
Interference reduces throughput
Throughput of a path is lower if many links are
on the same channel
Path metric should be worse for non-diverse paths
Assumption: All links that are on the same
channel interfere with one another
Pessimistic for long paths
68
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
69
Impact of Transmission Errors
TCP can’t distinguish between packet losses
due to congestion and transmission errors
Unnecessarily reduces congestion window
Throughput suffers
70
TCP Problems
Causes for missing ACKs or loss packets in Wireless
Networks:
Wireless transmission error
Broken routes due to mobility (both users and wireless
routers)
Delays due to MAC contention
71
Impact of Multi-Hop Wireless Paths
[Holland99]
Connections over
multiple hops are at
a disadvantage
compared to shorter
connections,
because they have to
contend for wireless
access at each hop
1600
1400
1200
1000
800
600
400
200
0
TCP
Throughtput
(Kbps)
1 2 3 4 5 6 7 8 9 10
Number of hops
TCP Throughput using 2 Mbps 802.11 MAC
72
TCP
Efficiency Solutions
Focus on eliminating the
confusion between
congestion loss and all other
reasons
Many approaches developed
for single-hop wireless
systems
Snoop
I-TCP
M-TCP
End to end
SACK
Explicit error notification
Explicit congestion notification
(e.g. RED)
Several solutions for multi-hop
A-TCP
Freeze-TCP
73
Split Connection Approach
Connection between wireless host MH and
fixed host FH goes through base station BS
FH-MH = FH-BS
FH
Fixed Host
BS
Base Station
+
BS-MH
MH
Mobile Host
74
Split Connection Approach
Split connection results in independent flow
control for the two parts
Flow/error control protocols, packet size, timeouts, may be different for each part
Examples : I-TCP and M-TCP
75
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
76
Application Layer
Improve existing Internet applications in order
to work under the architecture of WNs.
Propose new application-layer protocols for
distributed information sharing.
Develop Innovative applications for WNs.
77
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
78
Security
Authentication
Prevent theft of service
Prevent intrusion by
malicious users
Reliability – protect:
Routing data
Management data
Monitoring data
Prevent denials of service
Privacy - user data is at
risk while on transit in
the WN due to:
Wireless medium
Multi-hop
79
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
80
Network Management
Monitor the “health” of
the network
Determine when is time
to upgrade
Either hardware
New gateway
Detect problems
Equipment failures (often
hidden by the self-repair
feature of the network)
Intruders
Source: www.meshdynamics.com
Manage the system
81
Overview of Research Topics
Physical Layer
Security
MAC Layer
Network Management
Network Layer
Cross-layer design
Transport Layer
Application Layer
82
Cross-layer Design
In order to provide
satisfactory performance of a
wireless network, MAC,
routing, and transport
protocols have to work
together with the physical
layer.
83
Cross-layer Design
Cross-layer design can be performed in two ways:
1 - To improve the performance of a protocol layer by considering
parameters in other protocol layers.
Example1: the packet loss rate in the MAC layer can be reported to
the transport layer so that a TCP protocol is able to differentiate
congestion from packet loss.
Example2: the physical layer can report the link quality to a routing
protocol as an additional performance metric for the routing
algorithms.
2- To merge several protocols into one component.
Example: in ad hoc networks, MAC and routing protocols can be
combined into one protocol in order to closely consider their
interactions.
84
Questions!