+ All Categories
Home > Documents > ara-anna-wireless.ppt

ara-anna-wireless.ppt

Date post: 02-Jun-2018
Category:
Upload: jesse-vincent
View: 217 times
Download: 0 times
Share this document with a friend

of 123

Transcript
  • 8/10/2019 ara-anna-wireless.ppt

    1/123

    Ad Hoc and Sensor

    Networks

    Dr.M.ARAMUDHAN

    Associate ProfessorPKIET, Karaikal609 603

  • 8/10/2019 ara-anna-wireless.ppt

    2/123

    Introduction

    Characteristics of Ad Hoc Networks

    Applications

    Routing Table-driven Routing Protocols

    Source-initiated On-demand Routing

    Hybrid Protocols

    Wireless Sensor Networks Flat Routing in Sensor Networks

    Fixed Wireless Sensor Networks

  • 8/10/2019 ara-anna-wireless.ppt

    3/123

    WLAN:- To solve four nagging problems

    - Mobility- Mobility-to-Mobility networking- relocation

    - alternative to locations that are difficult to wire.

    Advantages: - Installation and simplicity- Installation flexibility- Scalability

    - Improved productivity and services- Reduced cost of ownership.

  • 8/10/2019 ara-anna-wireless.ppt

    4/123

    Introduction An ad-hoc network is a local area network (LAN) that is built

    spontaneously as devices connect. Instead of relying on a base stationto coordinate the flow of messages to each node in the network, theindividual network nodes forward packets to and from each other.

    A wireless ad hoc network is a decentralized type of wireless network.The network is ad hoc because it does not rely on a preexistinginfrastructure, such as routers in wired networks or access points inmanaged (infrastructure) wireless networks. Instead, each nodeparticipates in routing by forwarding data for other nodes, and so thedetermination of which nodes forward data is made dynamically basedon the network connectivity.

    A Mobile Ad hoc Network (MANET) is an autonomous system of nodes(MSs) connected by wireless links.

    A MANET does not necessarily need support from any existing networkinfrastructure like an Internet gateway or other fixed stations.

  • 8/10/2019 ara-anna-wireless.ppt

    5/123

    The networks wireless topology may dynamically changein an unpredictable manner since nodes are free to move.

    Information is transmitted in a store-and forward mannerusing multi hop routing.

    Each node is equipped with a wireless transmitter and areceiver with an appropriate antenna.

    We assume that it is not possible to have all nodes withineach others radio range.

    When the nodes are close-by i.e., within radio range, thereare no routing issues to be addressed.

    At a given point in time, wireless connectivity in the form ofa random multi-hop graph exists between the nodes.

  • 8/10/2019 ara-anna-wireless.ppt

    6/123

    A Mobile Ad Hoc Network

    MS3

    MS2

    MS4

    MS1

    MS5

    MS6

    MS2

    MS7Symmetric link

    Asymmetric link

  • 8/10/2019 ara-anna-wireless.ppt

    7/123

    Technologies for Ad Hoc networks:

    - IEEE 802.11 family of protocols

    - High performance LAN ( HiperLAN)2 protocols

    - Bluetooth specifications

  • 8/10/2019 ara-anna-wireless.ppt

    8/123

    802.11 Wireless LAN

    Provides network connectivity over wireless media

    An Access Point (AP) is installed to act as Bridgebetween Wireless and Wired Network

    The AP is connected to wired network and is

    equipped with antennae to provide wireless

    connectivity

    LAN Technologies

    Network

    connectivity

    to thelegacy

    wired LAN

    Desktop

    with PCI 802.11 LAN card

    Laptop

    with PCMCIA 802.11 LAN cardAccess Point

  • 8/10/2019 ara-anna-wireless.ppt

    9/123

    802.11 Wireless LANRange ( Distance between Access Point and WLAN

    client) depends on structural hindrances and RF

    gain of the antenna at the Access Point

    To service larger areas, multiple APs may beinstalled with a 20-30% overlap

    A client is always associated with one AP and when

    the client moves closer to another AP, it associates

    with the new AP (Hand-Off)

    Three flavors:

    802.11b

    802.11a

    802.11g

    LAN Technologies

  • 8/10/2019 ara-anna-wireless.ppt

    10/123

  • 8/10/2019 ara-anna-wireless.ppt

    11/123

    IEEE 802.11 operates either with infrastructure or without infrastructuresupport.

    Infrastructure based network, there is a centralized controller for each cell,referred as access point. It is connected to the wired backbone.

    Infrastructure free network, a group of stations communicate directly with

    each other in an ad hoc fashion, independent of infrastructure or basestations.

    When two or more stations come together to communicate with each otherthey form BSS ( Basic Service Set). BSS is not connected with base stationcalled as IBSS.

    Creating large and complex networks using a number of BSSs leads us tothe next level of hierarchy called ESS.

    Services supported are association, reassociation, disassociation,distribution and integration.

  • 8/10/2019 ara-anna-wireless.ppt

    12/123

    Frame Formats

    MAC Header format differs per Type: Control Frames (several fields are omitted)

    Management Frames

    Data Frames

    FrameControl

    DurationID

    Addr 1 Addr 2 Addr 3 Addr 4SequenceControl

    CRCFrameBody

    2 2 6 6 6 62 0-2312 4

    802.11 MAC Header

    Bytes:

    Protocol

    VersionType SubType

    To

    DSRetry

    Pwr

    Mgt

    More

    DataWEP Rsvd

    Frame Control Field

    Bits: 2 2 4 1 1 1 1 1 1 1 1

    DS

    From More

    Frag

  • 8/10/2019 ara-anna-wireless.ppt

    13/123

    Address Field Description

    Addr. 1 = All stations filter on this address.Addr. 2 = Transmitter Address (TA), Identifies transmitter to addressthe ACK frame to.

    Addr. 3 = Dependent on Toand From DS bits.

    Addr. 4 = Only needed to identify the original source of WDS

    (Wireless Distribution System) frames

    Protocol

    VersionType SubType

    To

    DSRetry

    Pwr

    Mgt

    More

    DataWEP Rsvd

    Frame Control Field

    Bits: 2 2 4 1 1 1 1 1 1 1 1

    DS

    From More

    Frag

    To DS

    0

    0

    1

    1

    From DS

    0

    1

    0

    1

    Address 1

    DA

    DA

    BSSID

    RA

    Address 2

    SA

    BSSID

    SA

    TA

    Address 3

    BSSID

    SA

    DA

    DA

    Address 4

    N/A

    N/A

    N/A

    SA

  • 8/10/2019 ara-anna-wireless.ppt

    14/123

    Type field descriptions

    Type and subtype identify the function of the frame:

    Type=00 Management Frame

    Beacon (Re)Association

    Probe (De)Authentication

    Power Management

    Type=01 Control Frame

    RTS/CTS ACK

    Type=10 Data Frame

    Protocol

    VersionType SubType

    To

    DSRetry

    Pwr

    Mgt

    More

    DataWEP Rsvd

    Frame Control Field

    Bits: 2 2 4 1 1 1 1 1 1 1 1

    DS

    From More

    Frag

  • 8/10/2019 ara-anna-wireless.ppt

    15/123

    Multiple Access with Collision

    Avoidance (MACA)

    Before every data transmission

    Sender sends a Request to Send (RTS) framecontaining the length of the transmission

    Receiver respond with a Clear to Send (CTS) frameSender sends dataReceiver sends an ACK; now another sender cansend data

    When sender doesnt get a CTS back, it assumescollision

    LAN Technologies

    sender receiverother node insenders range

    RTS

    CTS

    ACK

    data

    other node inreceivers range

  • 8/10/2019 ara-anna-wireless.ppt

    16/123

    Characteristics of Ad Hoc Networks

    Dynamic topologies: Network topology maychange dynamically as the nodes are free tomove.

    Bandwidth-constrained, variable capacity links:

    Realized throughput of wireless communicationis less than the radios maximum transmissionrate. Collision occurs frequently.

    Energy-constrained operation: Some nodes in

    the ad hoc network may rely on batteries orother exhaustible means for their energy. Limited physical security:More prone to physical

    security threats than fixed cable networks.

  • 8/10/2019 ara-anna-wireless.ppt

    17/123

    High Performance LAN

    To produce WLAN that would beindistinguishable in performancefrom wired LAN.

    To carry multimedia data andprovide QoS as it basic data

    transport functions. ETSI (European

    Telecommunications StandardsInstitute)

    Developing HiperLAN standardsas part of an effort called BRAN(Broadband Radio AccessNetwork)

    HiperLANs have four types

    DLC

    PHY(5 GHz)

    20 + Mb/sec

    MAC

    PHY(5 GHz)

    20 + Mb/sec

    HIPERLAN

    Type 1Wireless LAN

    HIPERLAN

    Type 2Wireless ATMIndoor access

    DLC

    PHY(17 GHz)

    150 + Mb/sec

    HIPERLAN

    Type 4Wireless ATMInterconnect

    PHY(5 GHz)

    20 + Mb/sec

    DLC

    HIPERLAN

    Type 3Wireless ATM

    Remote Access

  • 8/10/2019 ara-anna-wireless.ppt

    18/123

    HIPERLAN 1 HIPERLAN 2 HIPERLAN 3 HIPERLAN 4

    Application wireless LAN access to ATMfixed networks

    wireless localloop

    point-to-pointwireless ATMconnections

    Frequency 5.1-5.3GHz 17.2-17.3GHz

    Topology decentralized ad-

    hoc/infrastructure

    cellular,

    centralized

    point-to-

    multipoint

    point-to-point

    Antenna omni-directional directional

    Range 50 m 50-100 m 5000 m 150 m

    QoS statistical ATM traffic classes (VBR, CBR, ABR, UBR)

    Mobility 20 Mbit/s 155 Mbit/s

    Powerconservation

    yes not necessary

  • 8/10/2019 ara-anna-wireless.ppt

    19/123

    Characteristics

    Data transmission point-to-point, point-to-multipoint, connectionless

    23.5 Mbit/s, 1 W power, 2383 byte max. packet size

    Services

    asynchronous and time-bounded services with hierarchicalpriorities

    compatible with ISO MAC

    Topology infrastructure or ad-hoc networks

    transmission range can be larger then coverage of a single node(forwarding integrated in mobile terminals)

    Further mechanisms power saving, encryption, checksums

  • 8/10/2019 ara-anna-wireless.ppt

    20/123

    HIPERLAN - reference model

    Medium Access Control

    (MAC) Sublayer

    Channel Access Control

    (CAC) Sublayer

    Physical (PHY) Layer

    Application Layer

    Presentation Layer

    Session Layer

    Transport Layer

    etwork Layer

    Data Link Layer

    Physical Layer

    higher layer protocols

    OSI

    Reference Model

    HIPERLAN

    Reference Model

  • 8/10/2019 ara-anna-wireless.ppt

    21/123

    HIPERLAN 1 - Physical layer

    Scope

    modulation, demodulation, bit and frame synchronization

    forward error correction mechanisms

    measurements of signal strength

    channel sensing

    Channels 3 mandatory and 2 optional channels (with their carrier frequencies)

    mandatory

    channel 0: 5.1764680 GHz

    channel 1: 5.1999974 GHz

    channel 2: 5.2235268 GHz optional

    channel 3: 5.2470562 GHz

    channel 4: 5.2705856 GHz

  • 8/10/2019 ara-anna-wireless.ppt

    22/123

    HIPERLAN 1 - Physical layer frames Maintaining a high data-rate (23.5 Mbit/s) is power consuming - problematic

    for mobile terminals

    packet header with low bit-rate comprising receiver information only receiver(s) address by a packet continue receiving

    Frame structure

    LBR (Low Bit-Rate) header with 1.4 Mbit/s

    450 bit synchronization

    minimum 1, maximum 47 frames with 496 bit each for higher velocities of the mobile terminal (> 1.4 m/s) the maximum

    number of frames has to be reduced

    LBR synchronization data0 data1 datam-1. . .

    HBR

    ModulationGMSK for high bit-rate, FSK for LBR header

    HIPERLAN 1 EY NPMA I

  • 8/10/2019 ara-anna-wireless.ppt

    23/123

    prioritization

    HIPERLAN 1 - EY-NPMA I

    EY-NPMA (Elimination Yield Non-preemptive Priority Multiple Access)

    3 phases: priority resolution, contention resolution, transmission

    finding the highest priority

    every priority corresponds to a time-slot to send in the firstphase, the higher the priority the earlier the time-slot to send

    higher priorities can not be preempted

    if an earlier time-slot for a higher priority remains empty, stationswith the next lower priority might send

    after this first phase the highest current priority has beendetermined

    contention transmissiontransmission

    synchronization

    priorityd

    etection

    prioritya

    ssertion

    t

    user

    data

    eliminationburst

    eliminationsurvival

    verificatio

    n

    yieldlistening

    IYSIPS IPA IES IESV

  • 8/10/2019 ara-anna-wireless.ppt

    24/123

    HIPERLAN 1 - EY-NPMA II

    Several terminals can now have the same priority and wish to send

    contention phase

    Elimination Burst: all remaining terminals send a burst to eliminatecontenders (11111010100010011100000110010110, high bit- rate)

    Elimination Survival Verification: contenders now sense thechannel, if the channel is free they can continue, otherwise theyhave been eliminated

    Yield Listening: contenders again listen in slots with a nonzeroprobability, if the terminal senses its slot idle it is free to transmit atthe end of the contention phase

    the important part is now to set the parameters for burst durationand channel sensing (slot-based, exponentially distributed)

    data transmission

    the winner can now send its data (however, a small chance ofcollision remains)

    if the channel was idle for a longer time (min. for a duration of 1700

    bit) a terminal can send at once without using EY-NPMA synchronization using the last data transmission

  • 8/10/2019 ara-anna-wireless.ppt

    25/123

    HIPERLAN 1 - MAC layer

    Compatible to ISO MAC

    Supports time-bounded services via a priority scheme

    Packet forwarding

    support of directed (point-to-point) forwarding and broadcast forwarding(if no path information is available)

    support of QoS while forwarding

    Encryption mechanisms

    mechanisms integrated, but without key management

    Power conservation mechanisms

    mobile terminals can agree upon awake patterns (e.g., periodic wake-ups to receive data)

    additionally, some nodes in the networks must be able to buffer data forsleeping terminals and to forward them at the right time (so calledstores)

  • 8/10/2019 ara-anna-wireless.ppt

    26/123

    Piconet

    Collection of devices connected in anad hoc fashion

    One unit acts as master and the othersas slaves for the lifetime of the piconet

    Master determines hopping pattern,slaves have to synchronize

    Each piconet has a unique hoppingpattern

    Participation in a piconet =synchronization to hopping sequence

    Each piconet has one masterand up to7 simultaneous slaves (> 200 could beparked)

    M=MasterS=Slave P=ParkedSB=Standby

    M

    S

    P

    SB

    S

    S

    P

    P

    SB

  • 8/10/2019 ara-anna-wireless.ppt

    27/123

    Characteristics

    2.4 GHz ISM band, 79 (23) RF channels, 1 MHz carrier spacing

    Channel 0: 2402 MHz channel 78: 2480 MHz

    G-FSK modulation, 1-100 mW transmit power

    FHSS and TDD

    Frequency hopping with 1600 hops/s

    Hopping sequence in a pseudo random fashion, determined by a master Time division duplex for send/receive separation

    Voice linkSCO (Synchronous Connection Oriented)

    FEC (forward error correction), no retransmission, 64 kbit/s duplex, point-to-point, circuit switched

    Data linkACL (Asynchronous ConnectionLess)

    Asynchronous, fast acknowledge, point-to-multipoint, up to 433.9 kbit/ssymmetric or 723.2/57.6 kbit/s asymmetric, packet switched

    Topology

    Overlapping piconets (stars) forming a scatternet

    Forming a piconet

  • 8/10/2019 ara-anna-wireless.ppt

    28/123

    Forming a piconet

    All devices in a piconet hop together

    Master gives slaves its clock and device ID

    Hopping pattern: determined by device ID (48 bit, unique worldwide) Phase in hopping pattern determined by clock

    Addressing

    Active Member Address (AMA, 3 bit)

    Parked Member Address (PMA, 8 bit)

    SB

    SB

    SB

    SB

    SB

    SB

    SB

    SB

    SB

    M

    S

    P

    SB

    S

    S

    P

    P

    SB

  • 8/10/2019 ara-anna-wireless.ppt

    29/123

    Scatternet Linking of multiple co-located piconets through the sharing of common master or

    slave devices

    Devices can be slave in one piconet and master of another

    Communication between piconets

    Devices jumping back and forth between the piconets

    M=MasterS=SlaveP=ParkedSB=Standby

    M

    S

    P

    SB

    S

    S

    P

    P

    SB

    M

    S

    S

    P

    SB

    Piconets(each with acapacity of

    < 1 Mbit/s)

  • 8/10/2019 ara-anna-wireless.ppt

    30/123

    Bluetooth protocol stack

    Radio

    Baseband

    Link Manager

    Control

    HostControllerInterface

    Logical Link Control and Adaptation Protocol (L2CAP)Audio

    TCS BIN SDP

    OBEX

    vCal/vCard

    IP

    NW apps.

    TCP/UDP

    BNEP

    RFCOMM (serial line interface)

    AT modemcommands

    telephony apps.audio apps. mgmnt. apps.

    AT: attention sequenceOBEX: object exchangeTCS BIN: telephony control protocol specificationbinaryBNEP: Bluetooth network encapsulation protocol

    SDP: service discovery protocolRFCOMM: radio frequency comm.

    PPP

  • 8/10/2019 ara-anna-wireless.ppt

    31/123

    Five main protocols : Bluetooth radio, base band, Link manager protocol,Logical link control and adaptation protocol and service discovery protocol.

    Bluetooth radio is responsible for the electrical interference to thecommunication media, coding/decoding and modulation/demodulation ofdata transmission.

    Base band layer and link controller control physical links via radio layer byassembling packets, controlling frequency hopping and performing errorchecking and correction.

    LMP is responsible for connection setup and maintenance.

    L2CAP performs management and data flow control. Connection oriented

    and connection less links , QoS, protocol multiplexing, segmentation andreassembly and group management.

    Identity the device, establish connection and data transmission.

  • 8/10/2019 ara-anna-wireless.ppt

    32/123

    Routing in MANETS - Goals

    Provide the maximum possible reliability - use alternative routes ifan intermediate node fails.

    Choose a route with the least cost metric. Give the nodes the best possible response time and throughput. Route computation must be distributed. Centralized routing in a

    dynamic network is usually very expensive. Routing computation should not involve the maintenance of globalstate.

    Every node must have quick access to routes on demand. Each node must be only concerned about the routes to its

    destination.

    Broadcasts should be avoided (highly unreliable) It is desirable to have a backup route when the primary route has

    become stale.

  • 8/10/2019 ara-anna-wireless.ppt

    33/123

    Routing Classification

    The existing routing protocols can be classified as,

    Proactive: when a packet needs to be forwarded,the route is already known.

    Reactive: Determine a route only when there is datato send.

    Routing protocols may also be categorized as ,

    Table Driven protocols

    Source Initiated (on demand) protocols

  • 8/10/2019 ara-anna-wireless.ppt

    34/123

    Table Driven Routing Protocols

    Each node maintains routing informationto all other nodes in the network

    When the topology changes, updates arepropagated throughout the network.

    Examples are: Destination Sequenced Distance Vector

    routing (DSDV)

    Cluster-head Gateway Switch routing (CGSR) Wireless Routing Protocol (WRP)

  • 8/10/2019 ara-anna-wireless.ppt

    35/123

    Destination Sequenced DistanceVector Routing (DSDV)

    Each mobile node maintains a routing table in terms of number ofhops to each destination.

    Routing table updates are periodically transmitted.

    Each entry in the table is marked by a sequence number which helpsto distinguish stale routes from new ones, and thereby avoiding loops.

    To minimize the routing updates, variable sized update packets areused depending on the number of topological changes.

    Nodes periodically transmit routing tables throughout the network to

    maintain table consistency. Updates contain destination, number of hops to reach destination,

    destination sequence number, sequence number that identifies theupdates

  • 8/10/2019 ara-anna-wireless.ppt

    36/123

    Route Update done based on recent sequence number. Node A, sequence number is increased for destination

    when A detects that the route to D has broken. If so A

    advertised the route to D with infinite hop count and asequence number that is larger than the present one.

  • 8/10/2019 ara-anna-wireless.ppt

    37/123

    Cluster-head Gateway Switch Routing(CGSR)

    CGSR is a clustered multi-hop mobile wireless network with severalheuristic routing schemes.

    A distributed cluster-head (CH) selection algorithm is used to elect anode as the cluster head.

    It modifies DSDV by using a hierarchical CH to route traffic.

    Gateway nodes serve as bridge nodesbetween two or moreclusters. A packet sent by a node is first routed to its CH and then the packet

    is routed from the CH to a gateway of another cluster and then tothe CH and so on, until the destination cluster head is reached.

    Frequent changes in the CH may affect the performance of therouting protocol.

  • 8/10/2019 ara-anna-wireless.ppt

    38/123

    1

    3

    2

    4 710

    5

    6

    8

    9

    11

    12

    Cluster Head

    Internal Node

    Gateway Node

    Routing in CGSR from node 1 to node 8

    CGSR (Contd)

    The Wireless Routing Protocol

  • 8/10/2019 ara-anna-wireless.ppt

    39/123

    The Wireless Routing Protocol(WRP)

    It is a path finding algorithm that calculate shortest pathusing length and second-to-last hop of the path to eachdestination.

    Each node maintains 4 tables:

    -- Distance table

    -- Routing table

    -- Link cost table

    -- Message Retransmission List table (MRL)

    MRL contains the sequence number of the updatemessage, a retransmission counter and a list ofupdates sent in the update message

  • 8/10/2019 ara-anna-wireless.ppt

    40/123

    Wireless Routing Protocol (Contd)

    Nodes inform each other of link changes using

    update messages. Nodes send update messages after processing

    updates from their neighbors or after detecting achange in the link.

    If a node is not sending messages, it must send aHELLO message within a specified time to ensureconnectivity.

    If the node receives a HELLO message from a new

    node, that node is added to the table. It avoids the count to infinity problem.

  • 8/10/2019 ara-anna-wireless.ppt

    41/123

    Source-Initiated On-Demand Routing

    Ad hoc On-Demand Distance Vector(AODV).

    Dynamic Source Routing (DSR)

    Temporary Ordered Routing Algorithm(TORA)

    Associativity Based Routing (ABR)

    Signal Stability Routing (SSR)

  • 8/10/2019 ara-anna-wireless.ppt

    42/123

    Ad hoc On-Demand Distance vector

    AODV is an improvement over DSDV, based on the concept of

    next-hop routing model, which minimizes the number of requiredbroadcasts by creating routes on demand.

    .Host keeps routing table that indicates the next host to be used as

    the immediate relay to reach destination.

    Each node receives the data, checks the routing table and if avalid route for the destination of the data exists, it forwards the

    packet to the next node

    .Route discovery-route selection: A source node initiates a path

    discovery process to locate the other intermediate nodes (and thedestination), by broadcasting a Route Request (RREQ) packet to

    its neighbors

  • 8/10/2019 ara-anna-wireless.ppt

    43/123

    Node waits for a route reply. If the reply is not received withincertain time, the node rebroadcast RREQ.

    Ensure that all routes are loop-free and up-to-date. Each nodemaintains its own sequence number as well as broadcast ID.

    Node received RREQ, it checks already available by notingsource and broad cast ID pair. If so, it discards the message.

    ROUTE MAINTAINCE: Each node peridically transmit abroadcast message called HELLO and updates the informationassociated with neighbour.

  • 8/10/2019 ara-anna-wireless.ppt

    44/123

    Route Discovery in AODV Protocol

    SourceDestination

    13

    2

    5

    7

    46

    8

    (a) Propagation of Route Request (RREQ) Packet

    SourceDestination

    (b) Path Taken by the Route Reply (RREP) Packet

    1

    3

    2

    5

    7

    46

    8

    Hop1 Hop2 Hop3

  • 8/10/2019 ara-anna-wireless.ppt

    45/123

    Dynamic Source Routing

    The protocol consists of two major phases: RouteDiscovery, Route Maintenance.

    When a mobile node has a packet to send to some

    destination, it first consults its route cache to check

    whether it has a route to that destination.

    If it is an un-expired route, it will use this route.

    If the node does not have a route, it initiates route

    discovery by broadcasting a Route Request packet.

    This Route Request contains the address of the

    destination, along with the source address.

  • 8/10/2019 ara-anna-wireless.ppt

    46/123

    Dynamic Source Request (Contd)

    Each node receiving the packet checks to see whether it

    has a route to the destination. If it does not, it adds its own

    address to the route record of the packet and forwards it.

    A route reply is generated when the request reaches either

    the destination itself or an intermediate node that contains

    in its route cache an un-expired route to that destination.

    If the node generating the route reply is the destination, it

    places the the route record contained in the route request

    into the route reply.

  • 8/10/2019 ara-anna-wireless.ppt

    47/123

    Hop1 Hop2 Hop4Hop3

    1

    4

    7

    5

    3

    SourceDestination

    (a) Building Record Route During Route Discovery

    4

    1

    46

    8

    7

    2

    3

    Source

    Destination

    (b) Propagation of Route Reply with the Route Record

    1

    2

    3

    5

    6

    7

    8

    Creation of Route Record in DSR

    Temporarily Ordered Routing

  • 8/10/2019 ara-anna-wireless.ppt

    48/123

    Temporarily Ordered RoutingAlgorithm (TORA)

    . TORA is a highly adaptive loop-free distributedrouting algorithm based on the concept of linkreversal.

    TORA decouples the generation of potentially far-

    reaching control messages from the rate oftopological changes.

    The height metric is used to model the routing stateof the network.

    The protocol performs three basic functions: routecreation, route maintenance, route erasure.

  • 8/10/2019 ara-anna-wireless.ppt

    49/123

    Source

    Destination

    H = 0

    H = 1

    H = 2

    H = 3

    Illustration of Tora height metric

    TORA (Contd)

  • 8/10/2019 ara-anna-wireless.ppt

    50/123

    TORA (Contd)

    During the route creation and maintenance phasesnodes use a height metric to establish a Directed

    Acyclic Graph (DAG) rooted at the destination.

    Thereafter links are assigned a direction based onthe relative heights

  • 8/10/2019 ara-anna-wireless.ppt

    51/123

    1

    2

    3

    4

    5

    6

    7

    8

    (-,-)

    (-,-)

    (-,-)

    (-,-)

    (-,-)

    (-,-)

    (-,-)

    (0,0)

    1

    2

    3

    4

    5

    6

    7

    8

    (0,3)

    (0,1)

    (0,1)

    (0,2)

    (0,2)

    (0,3)

    (0,3)

    (0,0)

    Source Destination

    DestinationSource

    Figure 13.6(a)Propagation of the query message

    Nodes height updated as a result of the update message

    TORA (Contd)

    Associativity Based Routing (ABR)

  • 8/10/2019 ara-anna-wireless.ppt

    52/123

    Associativity Based Routing (ABR)

    The three phases of ABR are: route discovery, routereconstruction, route deletion.

    In ABR a route is selected based on the degree of stabilityassociated with mobile nodes.

    Association stability is defined by connection stability of onenode with respect to another node over time and space.

    Each node generates a beacon to signify its existence.

    When received by neighboring nodes, the beacon causes theirassociatively tables to be updated.

    The route discovery is accomplished by a Broadcast Query-Reply (BQ-REPLY) cycle.

    When a discovered route is no longer desired, the source nodeinitiates a Route Delete broadcast so that all the nodes along theroute update their routing tables.

    Si l St bilit R ti (SSR)

  • 8/10/2019 ara-anna-wireless.ppt

    53/123

    Signal Stability Routing (SSR)

    SSR selects a route based on the signal strength

    between nodes and a nodes location stability. This route selection criteria has the effect of choosing

    routes that have a better link connectivity.

    Node maintains two tables signal stability table and

    routing table. Two phases route discovery and route maintenance.

  • 8/10/2019 ara-anna-wireless.ppt

    54/123

    Hybrid protocols

    Zone Routing Protocol(ZRP): a node proactivelymaintains routes to destinations within a localneighborhood. The construction of a routing zonerequires a node to first know who its neighbor,which is implemented through a MAC layerNeighbor Discovery Protocol.

    Fisheye State Routing(FSR): There are multi-

    level fisheye scopes to reduce routing updateoverhead in large networks. It helps to make arouting protocol scalable by gathering data on thetopology, which may be needed soon.

    Landmark Routing (LANMAR): Uses a landmark

    (C )

  • 8/10/2019 ara-anna-wireless.ppt

    55/123

    Hybrid protocols (Contd)

    Distance Routing Effect Algorithm for

    Mobility(DREAM): It is based on the distanceeffect and a nodes mobility rate. Each node can

    optimize the frequency at which it sends updatesto the networks and correspondingly reduce thebandwidth and energy used.

    Relative Distance Micro-discovery Ad Hoc

    Routing(RDMAR): This is based on thecalculated relative distance between twoterminals. The query flood is localized to alimited region centered at the source node.

    Power Aware Routin : ower-aware metrics

  • 8/10/2019 ara-anna-wireless.ppt

    56/123

    Protocol Characteristics (1/2)

    RoutingProtocol

    RouteAcquisition

    Flood for RouteDiscovery

    Delay for RouteDiscovery

    MultipathCapability

    Effect of Route Failure

    DSDV Computed apriori

    No No No Updates the routing tables of allnodes

    WRP Computed apriori

    No No No Ultimately, updates the routingtables of all nodes by

    exchanging MRL betweenneighbors

    DSR On-demand,only whenneeded

    Yes. Aggressiveuse of cachingmay reduce flood

    Yes Not explicitly.The techniqueof salvagingmay quicklyrestore a route

    Route error propagated up tothe source to erase invalid path

  • 8/10/2019 ara-anna-wireless.ppt

    57/123

    Protocol Characteristics (2/2)

    RoutingProtocol

    RouteAcquisition

    Flood for RouteDiscovery

    Delay for RouteDiscovery

    MultipathCapability

    Effect of Route Failure

    AODV On-demand,only whenneeded

    Yes. Controlleduse of cache toreduce flood

    Yes No, althoughrecent researchindicate viability

    Route error propagated upto the source to eraseinvalid path

    TORA On-demand,only when

    needed

    Basically one forinitial route

    discovery

    Yes. Once the DAG isconstructed, multiple

    paths are found

    Yes Error is recovered locally

    LAR On-demand,only whenneeded

    Reduced byusing locationinformation

    Yes No Route error propagated upto the source

    ZRP Hybrid Only outside asource's zone

    Only if the destinationis outside thesource's zone

    No Hybrid of updating nodes'tables within a zone andpropagating route error tothe source

  • 8/10/2019 ara-anna-wireless.ppt

    58/123

    Sensor Networks

    Sensor networks are highly distributed networks of small, lightweightwireless node, deployed in large numbers to monitor theenvironment or system.

    Each node of the sensor networks consist of three subsystem: Sensor subsystem: senses the environment Processing subsystem: performs local computations on the

    sensed data Communication subsystem: responsible for message exchange

    with neighboring sensor nodes

    The features of sensor nodes Limited sensing region, processing power, energy

  • 8/10/2019 ara-anna-wireless.ppt

    59/123

    The advantage of sensor networks Robust : a large number of sensors

    Reliable :

    Accurate : sensor networks covering a wider region

    Fault-tolerant : many nodes are sensing the same event

    Two important operations in a sensor networks Data dissemination : the propagation of data/queries throughout

    the network

    Data gathering : the collection of observed data from the

    individual sensor nodes to a sink The different types of sensors

    Seismic, thermal, visual, infrared

  • 8/10/2019 ara-anna-wireless.ppt

    60/123

  • 8/10/2019 ara-anna-wireless.ppt

    61/123

    Real-time communication over sensor networks must besupported through provision of guarantees on maximum delay,minimum bandwidth, or other QoS parameters.

    Provision must be made for secure communication over sensornetworks, especially for military applications which carrysensitive data.

  • 8/10/2019 ara-anna-wireless.ppt

    62/123

    Sensor networks - Node architecture 62

    Sensor node architecture

    Main components of a WSN node

    Controller

    Communication device(s)

    Sensors/actuators

    Memory Power supply Memory

    ControllerSensor(s)/actuator(s)

    Communicationdevice

    Power supply

  • 8/10/2019 ara-anna-wireless.ppt

    63/123

    Sensor networks - Node architecture 63

    Controller Main options:

    Microcontrollergeneral purpose processor, optimized for embeddedapplications, low power consumption

    DSPsoptimized for signal processing tasks, not suitable here

    FPGAsmay be good for testing

    ASICsonly when peak performance is needed, no flexibility

    Example microcontrollers

    Texas Instruments MSP430

    16-bit RISC core, up to 4 MHz, versions with 2-10 kbytes RAM,

    several DACs, RT clock, prices start at 0.49 US$ Atmel ATMega

    8-bit controller, larger memory than MSP430, slower

  • 8/10/2019 ara-anna-wireless.ppt

    64/123

    Sensor networks - Node architecture 64

    Communication device Which transmission medium?

    Electromagnetic at radio frequencies?

    Electromagnetic, light?

    Ultrasound?

    Radio transceivers transmit a bit- or byte stream as radio wave

    Receive it, convert it back into bit-/byte stream

  • 8/10/2019 ara-anna-wireless.ppt

    65/123

    Sensor networks - Node architecture 65

    Transceiver characteristics Capabilities

    Interface: bit, byte, packet level?

    Supported frequency range?

    Typically, somewhere in 433MHz2.4 GHz, ISM band

    Multiple channels?

    Data rates? Range?

    Energy characteristics

    Power consumption tosend/receive data?

    Time and energy consumption tochange between different states?

    Transmission power control?

    Power efficiency (whichpercentage of consumed power isradiated?)

    Radio performance Modulation? (ASK, FSK, ?)

    Noise figure? NF = SNRI/SNRO

    Gain? (signal amplification)

    Receiver sensitivity? (minimum S toachieve a given Eb/N0)

    Blocking performance (achieved BERin presence of frequency-offsetinterferer)

    Out of band emissions

    Carrier sensing & RSSI characteristics

    Frequency stability (e.g., towardstemperature changes)

    Voltage range

  • 8/10/2019 ara-anna-wireless.ppt

    66/123

    Sensor networks - Node architecture 66

    Transceiver states Transceivers can be put into different operational states, typically:

    Transmit

    Receive

    Idleready to receive, but not doing so

    Some functions in hardware can be switched off, reducing energy

    consumption a little Sleepsignificant parts of the transceiver are switched off

    Not able to immediately receive something

    Recovery t ime and star tup energyto leave sleep state can besignificant

    Research issue: Wakeup receiverscan be woken via radio when in sleepstate (seeming contradiction!)

  • 8/10/2019 ara-anna-wireless.ppt

    67/123

    Sensor networks - Node architecture 67

    Example radio transceivers Almost boundless variety available Some examples

    RFM TR1000 family

    916 or 868 MHz

    400 kHz bandwidth

    Up to 115,2 kbps On/off keying or ASK

    Dynamically tuneable outputpower

    Maximum power about 1.4 mW

    Low power consumption

    Chipcon CC1000 Range 300 to 1000 MHz,

    programmable in 250 Hz steps

    FSK modulation

    Provides RSSI

    Chipcon CC 2400 Implements 802.15.4

    2.4 GHz, DSSS modem

    250 kbps

    Higher powerconsumption than abovetransceivers

    Infineon TDA 525x family

    E.g., 5250: 868 MHz

    ASK or FSK modulation

    RSSI, highly efficient

    power amplifier Intelligent power down,

    self-polling mechanism

    Excellent blockingperformance

  • 8/10/2019 ara-anna-wireless.ppt

    68/123

    Sensor networks - Node architecture 68

    Wakeup receivers Major energy problem: RECEIVING

    Idling and being ready to receive consumes considerable amounts ofpower

    When to switch on a receiver is not clear

    Contention-based MAC protocols: Receiver is always on TDMA-based MAC protocols: Synchronization overhead, inflexible

    Desirable: Receiver that can (only) check for incoming messages

    When signal detected, wake up main receiver for actual reception

    Ideally: Wakeup receiver can already process simple addresses

    Not clear whether they can be actually built, however

  • 8/10/2019 ara-anna-wireless.ppt

    69/123

    Sensor networks - Node architecture 69

    Sensors as such Main categories

    Any energy radiated? Passive vs. active sensors

    Sense of direction? Omidirectional?

    Passive, omnidirectional

    Examples: light, thermometer, microphones, hygrometer,

    Passive, narrow-beam

    Example: Camera

    Active sensors

    Example: Radar

    Important parameter: Area of coverage

    Which region is adequately covered by a given sensor?

    Energy supply of mobile/sensor nodes

  • 8/10/2019 ara-anna-wireless.ppt

    70/123

    Sensor networks - Node architecture 70

    Goal: provide as much energy as possible at smallestcost/volume/weight/recharge time/longevity

    In WSN, recharging may or may not be an option Options

    Primary batteriesnot rechargeable

    Secondary batteriesrechargeable, only makes sense in combinationwith some form of energy harvesting

    Requirements include Low self-discharge

    Long shelf live

    Capacity under load

    Efficient recharging at low current

    Good relaxation properties (seeming self-recharging) Voltage stability (to avoid DC-DC conversion)

  • 8/10/2019 ara-anna-wireless.ppt

    71/123

    Sensor networks - Node architecture 71

    Energy scavenging How to recharge a battery?

    A laptop: easy, plug into wall socket in the evening

    A sensor node?Try to scavengeenergy from environment

    Ambient energy sources

    Light ! solar cellsbetween 10 W/cm2and 15 mW/cm2

    Temperature gradients80 W/cm2@ 1 V from 5K difference

    Vibrationsbetween 0.1 and 10000 W/cm3

    Pressure variation (piezo-electric)330 W/cm2from the heel of ashoe

    Air/liquid flow

    (MEMS gas turbines)

  • 8/10/2019 ara-anna-wireless.ppt

    72/123

    Sensor networks - Node architecture 72

    Energy consumption A back of the envelope estimation

    Number of instructions

    Energy per instruction: 1 nJ

    Small battery (smart dust): 1 J = 1 Ws

    Corresponds: 109instructions!

    Lifetime

    Or: Require a single day operational lifetime = 246060 =86400 s

    1 Ws / 86400s 11.5 Was max. sustained power consumption!

    Not feasible!

    Multiple power consumption

  • 8/10/2019 ara-anna-wireless.ppt

    73/123

    Sensor networks - Node architecture 73

    p p pmodes

    Way out: Do not run sensor node at full operation all the time If nothing to do, switch to pow er safe mode

    Question: When to throttle down? How to wake up again?

    Typical modes

    Controller: Active, idle, sleep

    Radio mode: Turn on/off transmitter/receiver, both

    Multiple modes possible, deeper sleep modes

    Strongly depends on hardware

    TI MSP 430, e.g.: four different sleep modes

    Atmel ATMega: six different modes

    Operating system challenges in

  • 8/10/2019 ara-anna-wireless.ppt

    74/123

    Sensor networks - Node architecture 74

    p g y gWSN

    Usual operating system goals Make access to device resources abstract (virtualization)

    Protect resources from concurrent access

    Usual means

    Protected operation modes of the CPUhardware access onlyin these modes

    Process with separate address spaces

    Support by a memory management unit

    Problem: These are not available in microcontrollers

    No separate protection modes, no memory management unit

    Would make devices more expensive, more power-hungry

    ! ???

    Operating system challenges in

  • 8/10/2019 ara-anna-wireless.ppt

    75/123

    Sensor networks - Node architecture 75

    p g y gWSN

    Possible options Try to implement as close to an operating system on WSN nodes

    In particular, try to provide a known programming interface

    Namely: support for processes!

    Sacrifice protection of different processes from each other

    ! Possible, but relatively high overhead

    Do (more or less) away with operating system

    After all, there is only a single application running on a WSN node

    No need to protect malicious software parts from each other

    Direct hardware control by application might improve efficiency

    Currently popular verdict: no OS, just a simple run-time environment

    Enough to abstract away hardware access details

    Biggest impact: Unusual programming model

    Main issue: How to support

  • 8/10/2019 ara-anna-wireless.ppt

    76/123

    Sensor networks - Node architecture 76

    ppconcurrency

    Simplest option: No concurrency, sequentialprocessing of tasks

    Not satisfactory: Risk of missing data (e.g.,from transceiver) when processing data, etc.

    ! Interrupts/asynchronous operation has to be

    supported

    Why concurrency is needed

    Sensor nodes CPU has to service the radio

    modem, the actual sensors, performcomputation for application, executecommunication protocol software, etc.

    Poll sensor

    Processsensor

    data

    Poll transceiver

    Process

    receivedpacket

    Traditional concurrency:

  • 8/10/2019 ara-anna-wireless.ppt

    77/123

    Sensor networks - Node architecture 77

    yProcesses

    Traditional OS: processes/threads Based on interrupts, context

    switching

    But: not availablememoryoverhead, execution overhead

    But: concurrency mismatch One process per protocol

    entails too many contextswitches

    Many tasks in WSN small withrespect to context switchingoverhead

    And: protection between processesnot needed in WSN

    Only one application anyway

    Handle sensorprocess

    Handle packetprocess

    OS-mediatedprocess switching

    Event-based concurrencyAlt ti S it h t

  • 8/10/2019 ara-anna-wireless.ppt

    78/123

    Sensor networks - Node architecture 78

    Alternative: Switch to event-based p rogramm ing model

    Perform regular processing or be idle

    React to events when they happen immediately

    Basically: interrupt handler

    Problem: must not remain in interrupt handler too long

    Danger of loosing events

    Only save data, post information that event has happened, then

    return! Run-to-complet ionprinciple

    Two contexts: one for handlers, one for regular execution

    Idle / Regularprocessing

    Radioevent

    Radio event handler

    Sensorevent

    Sensor eventhandler

    Components instead of

  • 8/10/2019 ara-anna-wireless.ppt

    79/123

    Sensor networks - Node architecture 79

    pprocesses

    Need an abstraction to group functionality Replacing processes for this purpose

    E.g.: individual functions of a networking protocol

    One option: Components Here: In the sense of TinyOS

    Typically fulfill only a single, well-defined function

    Main difference to processes:

    Component does not have an execution

    Components access same address space, no protectionagainst each other

    NOT to be confused with component-based programming!

    API to an event-based protocol

  • 8/10/2019 ara-anna-wireless.ppt

    80/123

    Sensor networks - Node architecture 80

    pstack

    Usual networking API: sockets Issue: blocking calls to receive data

    Ill-matched to event-based OS

    Also: networking semantics in WSNs not necessarily well matched to/bysocket semantics

    API is therefore also event-based

    E.g.: Tell some component that some other component wants to beinformed if and when data has arrived

    Component will be posted an event once this condition is met

    Details: see TinyOS example discussion below

  • 8/10/2019 ara-anna-wireless.ppt

    81/123

    12.1.2 Comparison with Ad Hoc Wireless Networks

    Different from Ad Hoc wireless networks

    The number of nodes in sensor network can be several orders ofmagnitude large than the number of nodes in an ad hoc network.

    Sensor nodes are more easy to failure and energy drain, and theirbattery sources are usually not replaceable or rechargeable.

    Sensor nodes may not have unique global identifiers (ID), so uniqueaddressing is not always feasible in sensor networks.

    Sensor networks are data-centric, the queries in sensor networks areaddressed to nodes which have data satisfying some conditions. AdHoc networks are address-centric, with queries addressed to particularnodes specified by their unique address.

    Data fusion/aggregation: the sensor nodes aggregate the localinformation before relaying. The goals are reduce bandwidthconsumption, media access delay, and power consumption forcommunication.

    S

  • 8/10/2019 ara-anna-wireless.ppt

    82/123

    12.2 Sensor Network Architecture

    The two basic kinds of sensor network architecture

    Layered Architecture

    Clustered Architecture

  • 8/10/2019 ara-anna-wireless.ppt

    83/123

    12.2.1 Layered Architecture

    A layered architecture has a single powerful base station, and thelayers of sensor nodes around it correspond to the nodes that havethe same hop-count to the BS.

    In the in-building scenario, the BS acts an access point to a wired

    network, and small nodes form a wireless backbone to providewireless connectivity.

    The advantage of a layered architecture is that each node isinvolved only in short-distance, low-power transmissions to nodes ofthe neighboring layers.

  • 8/10/2019 ara-anna-wireless.ppt

    84/123

    Figure 12.2 Layered architecture

    "Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004

  • 8/10/2019 ara-anna-wireless.ppt

    85/123

    Unified Network Protocol Framework (UNPF)

    UNPF is a set of protocols for complete implementation of a layeredarchitecture for sensor networks

    UNPF integrates three operations in its protocol structure:

    Network initialization and maintenance

    MAC protocol

    Routing protocol

  • 8/10/2019 ara-anna-wireless.ppt

    86/123

    Network initialization and maintenance

    The BS broadcasts its ID using a known CDMA code on thecommon control channel.

    All node which hear this broadcast then record the BS ID. They senda beacon signal with their own IDs at their low default power levels.

    Those nodes which the BS can hear form layer one

    BS broadcasts a control packet with all layer one node IDs. Allnodes send a beacon signal again.

    The layer one nodes record the IDs which they hear (form layer two)and inform the BS of the layer two nodes IDs.

    Periodic beaconing updates neighbor information and change thelayer structure if nodes die out or move out of range.

    MAC t l

  • 8/10/2019 ara-anna-wireless.ppt

    87/123

    MAC protocol

    During the data transmission phase, the distributed TDMA receiveroriented channel (DTROC) assignment MAC protocol is used.

    Two steps of DTROC :

    Channel allocation : Each node is assigned a reception channel by theBS, and channel reuse is such that collisions are avoided.

    Channel scheduling : The node schedules transmission slots for all itsneighbors and broadcasts the schedule. This enables collision-free

    transmission and saves energy, as nodes can turn off when they are notinvolved on a send/receive operation.

  • 8/10/2019 ara-anna-wireless.ppt

    88/123

    12 2 2 Cl t d A hit t

  • 8/10/2019 ara-anna-wireless.ppt

    89/123

    12.2.2 Clustered Architecture

    A clustered architecture organizes the sensor nodes into clusters,each governed by a cluster-head. The nodes in each cluster areinvolved in message exchanges with their cluster-heads, and theseheads send message to a BS.

    Clustered architecture is useful for sensor networks because of itsinherent suitability for data fusion. The data gathered by all memberof the cluster can be fused at the cluster-head, and only the resultinginformation needs to be communicated to the BS.

    The cluster formation and election of cluster-heads must be anautonomous, distributed process.

    12 3 C

  • 8/10/2019 ara-anna-wireless.ppt

    90/123

    Figure 12.3 Clustered architecture

    "Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004

    L E Ad ti Cl t i Hi h (LEACH)

  • 8/10/2019 ara-anna-wireless.ppt

    91/123

    Low-Energy Adaptive Clustering Hierarchy (LEACH)

    LEACH is a clustering-based protocol that minimizes energy dissipation insensor networks. The operation of LEACH is spilt into two phases : setupand steady.

    Setup phase : each sensor node chooses a random number between 0 and 1. Ifthis is lower than the threshold for node n, T(n), the sensor node becomes acluster-head. The threshold T(n) is calculated as

    P : the percentage of nodes which are cluster-heads

    r : the current round

    G : the set of nodes that has not been cluster-heads in the past 1/P rounds

    After selection, the cluster-heads advertise their selection to all nodes. All nodeschoose their nearest cluster-head by signal strength (RSSI). The cluster-headsthen assign a TDMA schedule for their cluster members.

  • 8/10/2019 ara-anna-wireless.ppt

    92/123

    Steady phase : data transmission takes place based on the TDMAschedule, and the cluster-heads perform data aggregation/fusion.

    After a certain period of time in the steady phase, cluster-heads areselected again through the setup phase.

    Classification of SensorN t k

  • 8/10/2019 ara-anna-wireless.ppt

    93/123

    Networks

    Proactive Networks

    The nodes in the network periodically switch on theirsensors and transmitters, sense the environment andtransmit the data of interest.

    Reactive Networks

    In this scheme the nodes react immediately to suddenand drastic changes in the value of the sensed attribute.

    Fundamentals of MAC Protocol forWi l S N t k

  • 8/10/2019 ara-anna-wireless.ppt

    94/123

    Wireless Sensor Networks

    Static Channel Allocation In this category of protocols, if there are N nodes, the

    bandwidth is divided into N equal portions either infrequency (FDMA), in time (TDMA), in code (CDMA),

    in space (SDMA: Space Division Multiple Access) orOFDM (Orthogonal Frequency Division Multiplexing)

    Dynamic Channel Allocation

    In this category of protocols, there is no fixedassignment of bandwidth.

    Routing Issues in Sensor

  • 8/10/2019 ara-anna-wireless.ppt

    95/123

    Routing Issues in SensorNetworks

    In traditional wired networks each node is identified by a uniqueaddress, which is used for routing. Sensor networks, being datacentric do not, in general, require routing between specific nodes.

    Adjacent nodes may have similar data. So it is desirable toaggregate this data and send it.

    The requirements of the network change with application, hence itis application specific.

    Routing in Sensor NetworksFlatRouting

  • 8/10/2019 ara-anna-wireless.ppt

    96/123

    Routing Directed Diffusion

    The query is flooded throughout the network.

    Events start from some specific points and move outwards toreach the requesting node

    This type of data collection does not fully exploit the featureof sensor networks that adjacent nodes have similar data.

    Sensor Protocols for Information via Negotiation(SPIN)

    Disseminates the information at each node to every node inthe network.

    Cougar

    This is a warehousing approach. The data is extracted in apre-defined manner and stored in a central database (BS).Query processing takes place on the BS. Cougar is a uniquemodel for query representation in sensor networks.

    Hierarchical Routing in SensorNetworks

  • 8/10/2019 ara-anna-wireless.ppt

    97/123

    Networks

    Hierarchical clustering schemes are the most suitable for wirelesssensor networks.

    The network consists of a Base Station (BS), away from the nodes,through which the end user can access data from the sensor

    network.

    BS can transmit with high power.

    Nodes cannot reply directly to the BS due to their low powerconstraints, resulting in asymmetric communication.

    Hierarchical Routing (Contd)

  • 8/10/2019 ara-anna-wireless.ppt

    98/123

    Base Station

    3

    3.1 3.2

    3.32

    2.12.2

    2.3

    11.0.11.0.2

    1.0.3

    1.2

    1.2.5 1.2.4

    1.2.3

    1.2.2

    1.2.11.11.1.3

    1.1.4

    1.1.51.1.1

    1.1.2

    Simple sensor nodeFirst Level Cluster Head

    Second Level Cluster Head

    g ( )

    Cluster Based Routing Protocol

  • 8/10/2019 ara-anna-wireless.ppt

    99/123

    g

    Cluster Based Routing Protocol (CBRP)

    Here the cluster members just send the data to thecluster head (CH).

    The CH routes the data to the destination.

    Not suitable for a highly mobile environment, as a lotof HELLO messages are sent to maintain the cluster.

    Reactive Network Protocol:TEEN

  • 8/10/2019 ara-anna-wireless.ppt

    100/123

    TEEN(Threshold-sensitive Energy Efficient sensor Networkprotocol)

    It is targeted at reactive networks and is the first protocoldeveloped for such networks.

    In this scheme at every cluster change time, the CH broadcaststhe following to its members:

    Hard Threshold (HT):This is a threshold value for the sensedattribute.

    Soft Threshold (ST):This is a small change in the value ofthe sensed attribute which triggers the node to switch on itstransmitter and transmit.

    Reactive Network Protocol:TEEN

  • 8/10/2019 ara-anna-wireless.ppt

    101/123

    Cluster Formation

    Cluster Change Time

    Parameters

    Cluster Head Receives Message

    Attribute > Threshold

    Time Line for TEEN

    Reactive Network Protocol:TEEN

    TEEN (Contd)

  • 8/10/2019 ara-anna-wireless.ppt

    102/123

    The nodes sense their environment continuously.

    The first time a parameter from the attribute set reaches its hardthreshold value, the node switches on its transmitter and sendsthe sensed data.

    The sensed value is stored in an internal variable, called SensedValue (SV).

    The nodes will transmit data in the current cluster period onlywhen the following conditions are true:

    -- The current value of the sensed attribute is greater than thehard threshold.

    -- The current value of the sensed attribute differs from SV by anamount equal to or greater than the soft threshold.

    TEEN

  • 8/10/2019 ara-anna-wireless.ppt

    103/123

    Important features: Suited for time critical sensing applications.

    Message transmission consumes more energy thandata sensing. So the energy consumption in this

    scheme is less than the proactive networks. The soft threshold can be varied.

    At every cluster change time, the parameters arebroadcast afresh and so, the user can change them as

    required. The main drawback is that if the thresholds are not

    reached, then the nodes will never communicate.

    Adaptive Periodic Threshold-sensitiveE Effi i t N t k t l

  • 8/10/2019 ara-anna-wireless.ppt

    104/123

    Energy Efficient sensor Network protocol(APTEEN)

    Functioning:The cluster heads broadcasts the following parameters:

    Attributes (A):This is a set of physical parameters whichthe user is interested in obtaining data about.

    Thresholds: This parameter consists of a HardThreshold (HT) and a Soft Threshold (ST).

    Schedule:This is a TDMA schedule, assigning a slot toeach node.

    Count Time (CT):It is the maximum time period betweentwo successive reports sent by a node.

    Adaptive Periodic Threshold-sensitive Energy Efficient

    sensor Network protocol (APTEEN)

  • 8/10/2019 ara-anna-wireless.ppt

    105/123

    Frame TimeCluster Formation

    Cluster Change Time

    TDMA Schedule andParametersSlot for Node i

    Time line for APTEEN

    APTEEN (Contd)

  • 8/10/2019 ara-anna-wireless.ppt

    106/123

    The node senses the environment continuously.

    Only those nodes which sense a data value at or beyondthe hard threshold transmit.

    Once a node senses a value beyond HT, it nexttransmits data only when the value of that attribute

    changes by an amount equal to or greater than the ST.

    If a node does not send data for a time period equal tothe count time, it is forced to sense and retransmit thedata.

    A TDMA schedule is used and each node in the clusteris assigned a transmission slot.

    APTEEN (Contd)

  • 8/10/2019 ara-anna-wireless.ppt

    107/123

    ( )

    Main features of the scheme: It combines both proactive and reactive policies.

    It offers a lot of flexibility by allowing the user to set thecount-time interval (CT) and the threshold values for

    the attributes. Energy consumption can be controlled by changing

    the count time as well as the threshold values.

    The main drawback of the scheme is the additional

    complexity required to implement the thresholdfunctions and the count time.

    Hi hi l V Fl t t l i

  • 8/10/2019 ara-anna-wireless.ppt

    108/123

    Hierarchical Vs Flat topologiesHierarchical Flat

    Reservation-based scheduling Contention-based scheduling

    Collisions avoided Collision overhead present

    Reduced duty cycle due to periodic sleeping Variable duty cycle by controlling sleep time of nodes

    Data aggregation by cluster headNode on multi-hop path aggregates incoming data fromneighbors

    Simple but non-optimal routing Routing is complex but optimal

    Requires global and local synchronization Links formed on the fly, without synchronization

    Overhead of cluster formation throughout thenetwork

    Routes formed only in regions that have data fortransmission

    Lower latency as multi-hop network formed bycluster-heads is always available

    Latency in waking up intermediate nodes and setting upthe multi-hop path

    Energy dissipation is uniform Energy dissipation depends on traffic patterns

    Energy dissipation can not be controlled Energy dissipation adapts to traffic pattern

    Fair channel allocation Fairness not guaranteed

    Adapting to the Inherent DynamicNature of Wireless Sensor Networks

  • 8/10/2019 ara-anna-wireless.ppt

    109/123

    Nature of Wireless Sensor Networks

    Certain objectives that need to be achieved are:

    Exploit spatial diversity and density of sensors.

    Build an adaptive node sleep schedule.

    Explore the tradeoff between data redundancy and bandwidthconsumption.

    The nodes on deployment should create and assemble a network, adapt

    to device failure and degradation, manage mobility of sensor nodes andreact to changes in task and sensor requirements.

    Adaptability to traffic changes. Certain nodes may detect an event thatcould trigger a number of updates and at other times very little trafficmay be present.

    Allowing finer control over an algorithm rather than simply turning it onand off.

  • 8/10/2019 ara-anna-wireless.ppt

    110/123

  • 8/10/2019 ara-anna-wireless.ppt

    111/123

  • 8/10/2019 ara-anna-wireless.ppt

    112/123

  • 8/10/2019 ara-anna-wireless.ppt

    113/123

  • 8/10/2019 ara-anna-wireless.ppt

    114/123

  • 8/10/2019 ara-anna-wireless.ppt

    115/123

  • 8/10/2019 ara-anna-wireless.ppt

    116/123

  • 8/10/2019 ara-anna-wireless.ppt

    117/123

  • 8/10/2019 ara-anna-wireless.ppt

    118/123

  • 8/10/2019 ara-anna-wireless.ppt

    119/123

  • 8/10/2019 ara-anna-wireless.ppt

    120/123

  • 8/10/2019 ara-anna-wireless.ppt

    121/123

  • 8/10/2019 ara-anna-wireless.ppt

    122/123

  • 8/10/2019 ara-anna-wireless.ppt

    123/123


Recommended