Data Dissemination in Wireless Sensor Networks

Similar documents
Mobile and Sensor Systems. Lecture 6: Sensor Network Reprogramming and Mobile Sensors Dr Cecilia Mascolo

Achieving Network Consistency. Octav Chipara

CS649 Sensor Networks IP Lecture 9: Synchronization

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Zippy: On-Demand Network Flooding

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Sensor network: storage and query. Overview. TAG Introduction. Overview. Device Capabilities

BBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks

Evaluation of the 6TiSCH Network Formation

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

INFUSE: A TDMA BASED DATA DISSEMINATION PROTOCOL FOR SENSOR NETWORKS. Sandeep S. Kulkarni and Mahesh Arumugam

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

Wireless Sensor Networks

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Fast and efficient randomized flooding on lattice sensor networks

Wireless in the Real World. Principles

Wireless Sensor Network based Shooter Localization

ARCH: Prac+cal Channel Hopping for Reliable Home- Area Sensor Networks. Chenyang Lu

Papers. Ad Hoc Routing. Outline. Motivation

Scalable Routing Protocols for Mobile Ad Hoc Networks

Probabilistic Coverage in Wireless Sensor Networks

Sensitivity Analysis of EADARP Multicast Protocol

Energy-Efficient Communication Protocol for Wireless Microsensor Networks

Energy-Efficient Data Management for Sensor Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

WirelessHART Modeling and Performance Evaluation

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

Adaptation of MAC Layer for QoS in WSN

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks

Deployment Design of Wireless Sensor Network for Simple Multi-Point Surveillance of a Moving Target

Optimized Asynchronous Multi-channel Neighbor Discovery

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Towards a Unified View of Localization in Wireless Sensor Networks

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua

Performance Analysis of Energy-aware Routing Protocols for Wireless Sensor Networks using Different Radio Models

Low-Power Interoperability for the IPv6 Internet of Things

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013

Location Estimation in Ad-Hoc Networks with Directional Antennas

ATPC: Adaptive Transmission Power Control for Wireless Sensor Networks

Lecture 8 Link-State Routing

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

The Armstrong Project Technical Report

Link-state protocols and Open Shortest Path First (OSPF)

A Concurrent Acknowledgement Scheme for Broadcast Messages in Wireless Networks

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

CS 457 Lecture 16 Routing Continued. Spring 2010

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Configuring OSPF. Information About OSPF CHAPTER

Monte-Carlo Localization for Mobile Wireless Sensor Networks

Mathematical Problems in Networked Embedded Systems

Adaptive Sensor Selection Algorithms for Wireless Sensor Networks. Silvia Santini PhD defense October 12, 2009

Principal component aggregation in wireless sensor networks

The Mote Revolution: Low Power Wireless Sensor Network Devices

Jamming Wireless Networks: Attack and Defense Strategies

Information Theory at the Extremes

SIGNIFICANT advances in hardware technology have led

Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Distance-Vector Routing

Interlayer routing issues for wireless networks

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Clock Synchronization

Grundlagen der Rechnernetze. Introduction

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Cooperative navigation in robotic swarms

FTSP Power Characterization

Secure Ad-Hoc Routing Protocols

Engineering Project Proposals

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks

Panda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS

Investigating a Physically Based Signal Power Model for Robust Low Power Wireless Link Simulation

TSIN01 Information Networks Lecture 9

ActSee: Activity-Aware Radio Duty Cycling for Sensor Networks in Smart Environments

Cricket: Location- Support For Wireless Mobile Networks

Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas

Transcription:

Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI

Sensor Networks Sensor networks are large collections of small, embedded, resource constrained devices Energy is the limiting factor A low bandwidth wireless broadcast is the basic network primitive (not end-to-end IP) Standard TinyOS packet data payload is 29 bytes Long deployment lifetimes (months, years) require retasking Retasking needs to disseminate data (a program, parameters) to every node in a network NSDI, Mar 2004 2

To Every Node in a Network Network membership is not static Loss Transient disconnection Repopulation Limited resources prevent storing complete network population information To ensure dissemination to every node, we must periodically maintain that every node has the data. NSDI, Mar 2004 3

The Real Cost Propagation is costly Virtual programs (Maté, TinyDB): 20-400 bytes Parameters, predicates: 8-20 bytes To every node in a large, multihop network But maintenance is more so For example, one maintenance transmission every minute Maintenance for 15 minutes costs more than 400B of data For 8-20B of data, two minutes are more costly! Maintaining that everyone has the data costs more than propagating the data itself. NSDI, Mar 2004 4

Three Needed Properties Low maintenance overhead Minimize communication when everyone is up to date Rapid propagation When new data appears, it should propagate quickly Scalability Protocol must operate in a wide range of densities Cannot require a priori density information NSDI, Mar 2004 5

Existing Algorithms Are Insufficient Epidemic algorithms End to end, single destination communication, IP overlays Probabilistic broadcasts Discrete effort (terminate): does not handle disconnection Scalable Reliable Multicast Multicast over a wired network, latency-based suppression SPIN (Heinzelman et al.) Propagation protocol, does not address maintenance cost NSDI, Mar 2004 6

Solution: Trickle NSDI, Mar 2004 7

Solution: Trickle Every once in a while, broadcast what data you have, unless you ve heard some other nodes broadcast the same thing recently. NSDI, Mar 2004 8

Solution: Trickle Every once in a while, broadcast what data you have, unless you ve heard some other nodes broadcast the same thing recently. Behavior (simulation and deployment): Maintenance: a few sends per hour Propagation: less than a minute Scalability: thousand-fold density changes NSDI, Mar 2004 9

Solution: Trickle Every once in a while, broadcast what data you have, unless you ve heard some other nodes broadcast the same thing recently. Behavior (simulation and deployment): Maintenance: a few sends per hour Propagation: less than a minute Scalability: thousand-fold density changes Instead of flooding a network, establish a trickle of packets, just enough to stay up to date. NSDI, Mar 2004 10

Outline Data dissemination Trickle algorithm Experimental methodology Maintenance Propagation Conclusion NSDI, Mar 2004 11

Trickle Assumptions Broadcast medium Concise, comparable metadata Given A and B, know if one needs an update Metadata exchange (maintenance) is the significant cost NSDI, Mar 2004 12

Detecting That a Node Needs an Update As long as each node communicates with others, inconsistencies will be found Either reception or transmission is sufficient Define a desired detection latency, τ Choose a redundancy constant k k = (receptions + transmissions) In an interval of length τ Trickle keeps the rate as close to k/ τ as possible NSDI, Mar 2004 13

Trickle Algorithm Time interval of length τ Redundancy constant k (e.g., 1, 2) Maintain a counter c Pick a time t from [0, τ] At time t, transmit metadata if c < k Increment c when you hear identical metadata to your own Transmit updates when you hear older metadata At end of τ, pick a new t NSDI, Mar 2004 14

Example Trickle Execution A c 0 k=1 B 0 C time 0 τ transmission suppressed transmission reception NSDI, Mar 2004 15

Example Trickle Execution A c 0 t A1 k=1 B 0 C time 0 τ transmission suppressed transmission reception NSDI, Mar 2004 16

Example Trickle Execution A c 0 t A1 k=1 B 1 C time 0 τ transmission suppressed transmission reception NSDI, Mar 2004 17

Example Trickle Execution c k=1 A 0 t A1 B 1 C time 0 τ t C1 transmission suppressed transmission reception NSDI, Mar 2004 18

Example Trickle Execution c k=1 A 0 t A1 B 2 C time 0 τ t C1 transmission suppressed transmission reception NSDI, Mar 2004 19

Example Trickle Execution c k=1 A 0 t A1 B 2 t B1 C time 0 τ t C1 transmission suppressed transmission reception NSDI, Mar 2004 20

Example Trickle Execution c k=1 A 0 t A1 B 0 t B1 C time 0 τ t C1 transmission suppressed transmission reception NSDI, Mar 2004 21

Example Trickle Execution c k=1 A 1 t A1 B 0 t B1 t B2 C time 1 τ t C1 transmission suppressed transmission reception NSDI, Mar 2004 22

Example Trickle Execution c k=1 A 1 t A1 B 0 t B1 t B2 C time 1 τ t C1 t C2 transmission suppressed transmission reception NSDI, Mar 2004 23

Example Trickle Execution c k=1 A 1 t A1 t A2 B 0 t B1 t B2 C time 1 τ t C1 t C2 transmission suppressed transmission reception NSDI, Mar 2004 24

Outline Data dissemination Trickle algorithm Experimental methodology Maintenance Propagation Future Work NSDI, Mar 2004 25

Experimental Methodology High-level, algorithmic simulator Single-hop network with a uniform loss rate TOSSIM, simulates TinyOS implementations Multi-hop networks with empirically derived loss rates Real world deployment in an indoor setting In experiments (unless said otherwise), k =1 NSDI, Mar 2004 26

Outline Data dissemination Trickle algorithm Experimental methodology Maintenance Propagation Future Work NSDI, Mar 2004 27

Maintenance Evaluation Start with idealized assumptions, relax each Lossless cell Perfect interval synchronization Single hop network Ideal: Lossless, synchronized single hop network k transmissions per interval First k nodes to transmit suppress all others Communication rate is independent of density First step: introducing loss NSDI, Mar 2004 28

Loss (algorithmic simulator) 12 Transmissions/Interval 10 8 6 4 2 60% 40% 20% 0% 0 1 2 4 8 16 32 64 128 256 Motes NSDI, Mar 2004 29

Logarithmic Behavior of Loss Transmission increase is due to the probability that one node has not heard n transmissions Example: 10% loss 1 in 10 nodes will not hear one transmission 1 in 100 nodes will not hear two transmissions 1 in 1000 nodes will not hear three, etc. Fundamental bound to maintaining a per-node communication rate NSDI, Mar 2004 30

Synchronization (algorithmic simulator) 14 Transmissions/Interval 12 10 8 6 4 2 Not Synchronized Synchronized 0 1 2 4 8 16 32 63 128 256 Motes NSDI, Mar 2004 31

Short Listen Effect Lack of synchronization leads to the short listen effect For example, B transmits three times: A B C D τ Time NSDI, Mar 2004 32

Short Listen Effect Prevention Add a listening period: t from [0.5τ, τ] Listen-only period NSDI, Mar 2004 33

Effect of Listen Period (algorithmic simulator) 14 Transmissions/Interval 12 10 8 6 4 2 Not Synchronized Synchronized Listening 0 1 2 4 8 16 32 63 128 256 Motes NSDI, Mar 2004 34

Multihop Network (TOSSIM) Redundancy: Nodes uniformly distributed in 50 x50 area Logarithmic scaling holds (transmissions + receptions) intervals Redundancy over Density in TOSSIM - k Redundancy 4 3.5 3 2.5 2 1.5 1 0.5 0 1 2 4 8 16 32 64 128 256 512 1024 Motes No Collisions Collisions NSDI, Mar 2004 35

Empirical Validation (TOSSIM and deployment) 1-64 motes on a table, low transmit power NSDI, Mar 2004 36

Maintenance Overview Trickle maintains a per-node communication rate Scales logarithmically with density, to meet the pernode rate for the worst case node Communication rate is really a number of transmissions over space NSDI, Mar 2004 37

Outline Data dissemination Trickle algorithm Experimental methodology Maintenance Propagation Future Work NSDI, Mar 2004 38

Interval Size Tradeoff Large interval τ Lower transmission rate (lower maintenance cost) Higher latency to discovery (slower propagation) Small interval τ Higher transmission rate (higher maintenace cost) Lower latency to discovery (faster propagation) Examples (k=1) At τ = 10 seconds: 6 transmits/min, discovery of 5 sec/hop At τ = 1 hour: 1 transmit/hour, discovery of 30 min/hop NSDI, Mar 2004 39

Speeding Propagation Adjust τ: τ l, τ h When τ expires, double τ up to τ h When you hear newer metadata, set τ to τ l When you hear newer data, set τ to τ l When you hear older metadata, send data NSDI, Mar 2004 40

Simulated Propagation New data (20 bytes) at lower lea corner Time To Reprogram, Tau, 10 Foot Spacing (seconds) 16 hop network Time to reception in seconds Set τ l = 1 sec Set τ h = 1 min 20s for 16 hops 18-20 16-18 14-16 12-14 10-12 8-10 6-8 4-6 2-4 0-2 Wave of activity Time NSDI, Mar 2004 41

Empirical Propagation Deployed 19 nodes in office setting Instrumented nodes for accurate installation times 40 test runs NSDI, Mar 2004 42

Network Layout (about 4 hops) NSDI, Mar 2004 43

Empirical Results k=1, τ l =1 second, τ h =1 minute Mote Propagation Distribution 35% 30% 25% 20% 15% 10% 5% 0% 0 5 10 15 20 25 30 35 40 45+ Time (seconds) NSDI, Mar 2004 44

Empirical Results k=1, τ l =1 second, τ h =1 minute Mote Propagation Distribution 35% 30% 25% 20% 15% 10% 5% 0% 0 5 10 15 20 25 30 35 40 45+ Time (seconds) NSDI, Mar 2004 45

Network Layout (about 4 hops) NSDI, Mar 2004 46

Network Layout (about 4 hops) NSDI, Mar 2004 47

Empirical Results k=1, τ l =1 second, τ h =1 minute Mote Propagation Distribution 35% 30% 25% 20% 15% 10% 5% 0% 0 5 10 15 20 25 30 35 40 45+ Time (seconds) A single, lossy link can cause a few stragglers NSDI, Mar 2004 48

Changing th to 20 minutes Mote Distribution, τh=20m, k=1 Mote Distribution, τh=20m, k=2 30% 25% 20% 15% 10% 5% 0% 0 5 10 15 20 25 30 35 40 45+ Time (seconds) 30% 25% 20% 15% 10% 5% 0% 0 5 10 15 20 25 30 35 40 45+ Time (seconds) Reducing maintenance twenty-fold degrades propagation rate slightly Increasing redundancy ameliorates this NSDI, Mar 2004 49

Outline Data dissemination Trickle algorithm Experimental methodology Maintenance Propagation Future Work and Conclusion NSDI, Mar 2004 50

Extended and Future Work Further examination of τ l, τ h and k needed Reducing idle listening cost Interaction between routing and dissemination Dissemination must be slow to avoid the broadcast storm Routing can be fast NSDI, Mar 2004 51

Conclusions Trickle scales logarithmically with density Can obtain rapid propagation with low maintenance In example deployment, maintenance of a few sends/hour, propagation of 30 seconds Controls a transmission rate over space Coupling between network and the physical world Trickle is a nameless protocol Uses wireless connectivity as an implicit naming scheme No name management, neighbor lists Stateless operation (well, eleven bytes) NSDI, Mar 2004 52

Questions NSDI, Mar 2004 53

Sensor Network Behavior NSDI, Mar 2004 54

Energy Conservation Snooping can limit energy conservation Operate over a logical time broken into many periods of physical time (duty cycling) Low transmission rates can exploit the transmit/ receive energy tradeoff NSDI, Mar 2004 55

Use an Epidemic Algorithm? Epidemics can scalably disseminate data But end to end connectivity is the primitive (IP) Overlays, DHTs, etc. Sensor nets have a local wireless broadcast NSDI, Mar 2004 56

Use a Broadcast? Density-aware operation (e.g., pbcast) Avoid the broadcast storm problem Broadcasting is a discrete phenomenon Imposes a static reachable node set Loss, disconnection and repopulation We could periodically rebroadcast When to stop? NSDI, Mar 2004 57

Rate Change Illustration τ h Time NSDI, Mar 2004 58

Rate Change Illustration Hear Newer Metadata τ h Time NSDI, Mar 2004 59

Rate Change Illustration Hear Newer Metadata τ h τ l Time NSDI, Mar 2004 60

Rate Change Illustration Hear Newer Metadata 2τ l τ h τ l Time NSDI, Mar 2004 61

Rate Change Illustration Hear Newer Metadata 2τ l τ h τ l τ h 2 τ h Time NSDI, Mar 2004 62