wireless sensor architecturecomp7860/08r-fall/lecture... · mobile ad hoc networks… 2 ynd tikl t...

Post on 20-Jul-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Wireless Sensor Architecture1

Wireless Sensor Architecture

G E N E R A L P R I N C I P L E S A N D A R C H I T E C T U R E S F O R P U T T I N G S E N S O R N O D E S T O G E T H E R T O

F O R M A M E A N I N G F U L N E T W O R KF O R M A M E A N I N G F U L N E T W O R K

Mobile ad hoc networks…2

N d t lki t h thNodes talking to each otherNodes talking to “some” node in another network (Web server on the Internet e g )server on the Internet, e.g.)

Typically requires some connection to the fixed network

Applications: Traditional data (http ftp or collaborative Applications: Traditional data (http, ftp, or collaborative apps) & multimedia (voice, video); i.e., humans in the loop

Access PointAccess Point

Sources and sinks revisited…3

Sources: Any entity that provides data/measurementsSources: Any entity that provides data/measurementsSinks: Nodes where information is required

Belongs to the sensor network as suchBelongs to the sensor network as suchIs an external entity, e.g., a PDA, but directly connected to the WSN

Main difference: comes and goes, often moves around, …Is part of an external network (e.g., internet), somehow connected to the WSNto the WSN

SourceSourceSource

Sink InternetSinkSink

Single- versus multiple-hops…g p p4

One common problem: limited range of wireless communicationOne common problem: limited range of wireless communicationEssentially due to limited transmission power, path loss, obstacles

Option: multi-hop networksSend packets to an intermediate nodeIntermediate node forwards packet to its destinationStore and forward multi hop networkStore-and-forward multi-hop network

Basic technique applies to both WSN and MANETNote: Store&forward multi-hopping NOT the only possible solutionpp g y p

E.g., collaborative networking, network codingDo not operate on a per-packet basis

SinkSource Obstacle

Hopping in WSNs…pp g5

Sources of mobility…y6

Node mobilityNode mobilityA node participating as source/sink (or destination) or a relay node might move aroundDeliberately self propelled or by external force; targeted or at Deliberately, self-propelled or by external force; targeted or at randomHappens in both WSN and MANET

Sink mobilitySink mobilityIn WSN, a sink that is not part of the WSN might moveMobile requester

Event mobility In WSN, event that is to be observed moves around (or extends, shrinks)Different WSN nodes become “responsible” for surveillance of such an event

Sink mobility…y7

Requestq

Propagationp gof answers

Movementdirection

Event mobility…y8

Challenging goals: QoS…g g g Q9

In MANET: Usual QoS interpretationIn MANET: Usual QoS interpretationThroughput/delay/jitterHigh perceived QoS for multimedia applications

I WSN li dIn WSN, more complicatedEvent detection and/or reporting probabilityEvent classification errorDetection delayProbability of missing a periodic reportApproximation accuracy (e.g., when WSN constructs a temperature Approximation accuracy (e.g., when WSN constructs a temperature map)Tracking accuracy (e.g., difference between true and conjectured position of the pink elephant)p p p

Related goal: robustnessNetwork should withstand failure of some nodes

Challenging goals: Efficiency…g g g y10

E tl i d bitEnergy per correctly received bitCounting all the overheads, in intermediate nodes, etc.

Energy per reported (unique) eventEnergy per reported (unique) eventAfter all, information is important, not payload bits!

Delay/energy tradeoffsDelay/energy tradeoffsNetwork lifetime

Time to first node failureTime to first node failureNetwork half-life (how long until 50% of the nodes died?)Time to partitionTime to loss of coverageTime to failure of first event notification

Challenging goals: Scalability…g g g y11

N t k h ld b ti l dl f b f Network should be operational regardless of number of nodes

At high efficiencyAt high efficiency

Typical node counts difficult to guessMANETs: 10s to 100s WSNs: 10s to 1000s, maybe more (possible?)

Requiring to scale to large node numbers has seriousconsequences for network architecture

Might not result in the most efficient solutions for small networks!C f ll id h l li i d b f l ki f Carefully consider the actual application needs before looking for many solutions!

Design principles…g p p12

Distributed organizationDistributed organizationIn-network processing

AggregationAggregationDistributed source coding and distributed compressionDistributed and collaborative signal processingM bil d / t t kiMobile code/agent networking

Adaptive fidelityData centricityData centricity

Address data, not nodesImplementation options

Overlay networks and distributed hash tablesPublish/subscribeDatabases

Design principles…2g p p13

E l itExploit:Location informationActivity patternsActivity patternsHeterogeneity

Component-based protocol stacks and cross-layer p p yoptimizationService interfacesGateway concepts

Distributed organization…g14

P ti i t h ld t i i i th t kParticipants should cooperate in organizing the networkE.g., with respect to medium access, routing, …Centralistic approach as alternative usually not feasible—hinders Centralistic approach as alternative usually not feasible hinders scalability, robustness

Potential shortcomingsNot clear whether distributed or centralistic organization achieves better energy efficiency (when all “overheads” considered)

O ti “li it d t li d” l tiOption: “limited centralized” solutionElect nodes for local coordination/controlPerhaps rotate this function over timePerhaps rotate this function over time

In-network processing…p g15

MANET d t d li bit f d t th MANETs are supposed to deliver bits from one end to the otherWSNs however are expected to provide information not WSNs, however, are expected to provide information, not necessarily original bits

Additional optionspE.g., manipulate or process the data in the network

Main example: aggregation Apply composable aggregation functions to a converge cast tree in a network Typical functions: minimum maximum average sum Typical functions: minimum, maximum, average, sum, … Not amenable functions: median

In-network processing: Aggregation…p g gg g16

R d b f t itt d bit / k t b l i Reduce number of transmitted bits/packets by applying an aggregation function in the network

1 1

1

31

31

6

11

1

1 1

In-network processing: Distributed…p g17

Depending on application more sophisticated processing of data Depending on application, more sophisticated processing of data can take place within the network

Example edge detection: locally exchange raw data with neighboring d t d l i t d d i ti t f nodes, compute edges, only communicate edge description to far away

data sinksExample tracking/angle detection of signal source: Conceive of sensor nodes as a distributed microphone array use it to compute the angle of a nodes as a distributed microphone array, use it to compute the angle of a single source, only communicate this angle, not all the raw data

Exploit temporal and spatial correlationObserved signals might vary only slowly in time ! no need to transmit all data at full rate all the timeSignals of neighboring nodes are often quite similar ! only try to transmit differences (details a bit complicated, see later)

Seek other programming paradigms: mobile code, swarm intelligenceg

Adaptive fidelity…p y18

Ad t th ff t ith hi h d t i h d t th Adapt the effort with which data is exchanged to the currently required accuracy/fidelityExample: event detectionExample: event detection

When there is no event, only very rarely send short “all is well” messagesWhen event occurs, increase rate of message exchanges

Example: temperatureWhen temperature is in acceptable range, only send temperature values at low resolutionWhen temperature becomes high increase resolution and thus When temperature becomes high, increase resolution and thus message length

Data-centric networking…g19

I t i l t k (i l di d h t k ) t k In typical networks (including ad hoc networks), network transactions are addressed to the identities of specific nodesnodes

A “node-centric” or “address-centric” networking paradigm

In a redundantly deployed sensor networks, specific source y p y , pof an event, alarm, etc. might not be important

Redundancy: e.g., several nodes can observe the same area

Thus: focus networking transactions on the data directly instead of their senders and transmitters ! data-centric

t ki networking Principal design change

Implementation options…p p20

O l t k & di t ib t d h h t bl (DHT)Overlay networks & distributed hash tables (DHT)Hash table: content-addressable memoryRetrieve data from an unknown source like in peer-to-peer Retrieve data from an unknown source, like in peer to peer networking—with efficient implementationSome disparities remain

Static key in DHT, dynamic changes in WSNDHTs typically ignore issues like hop count or distance between nodes when performing a lookup operation

Implementation options…2p p21

P bli h/ b ibPublish/subscribeDifferent interaction paradigmNodes can publish data can subscribe to any particular kind of Nodes can publish data, can subscribe to any particular kind of dataOnce data of a certain type has been published, it is delivered to all

b ibsubscribesSubscription and publication are decoupled in time; subscriber and published are agnostic of each other (decoupled in identity)p g ( p y)

DatabasesMatches with the idea of using a data-centric organization of the networking protocols

Interested in certain aspects of data == formulating queries for a database

Other design principles…g p p22

Exploit location informationExploit location informationRequired anyways for many applications; can considerably increase performance

Exploit activity patternsExploit activity patternsWatch for “event shower” effect

Exploit heterogeneityp g yBy construction: nodes of different types in the networkBy evolution: some nodes had to perform more tasks and have less energy left; some nodes received more solar energy than others; … gy gy

Cross-layer optimization of protocol stacks for WSNGoes against grain of standard networking; but promises big performance gainsperformance gainsAlso applicable to other networks like ad hoc; usually at least worthwhile to consider for most wireless networks

Service interfaces…23

The world’s all-purpose network interface: socketsThe world s all-purpose network interface: socketsGood for transmitting data from one sender to one receiverNot well matched to WSN needs (ok for ad hoc networks)

E ibilit i tExpressibility requirementsSupport for simple request/response interactionsSupport for asynchronous event notificationDifferent ways for identifying addressee of data

By location, by observed values, implicitly by some other form of group membership, by some semantically meaningful form—“room 123”

E ibilit f i t k i f tiEasy accessibility of in-network processing functionsFormulate complex events—events defined only by several nodes

Allow to specify accuracy & timeliness requirementsA d / k i f i ( b l l)Access node/network status information (e.g., battery level)Security, management functionality, …

Gateway concepts in WSNs…y p24

N t th I t t f t t WSNNecessary to the Internet for remote access to WSNsSame is true for ad hoc networks; additional complications due to mobility (change route to the gateway; use different gateways)y ( g g y; g y )WSN: Additionally bridge the gap between different interaction semantics (data vs. address-centric networking) in the gateway

d f diff di / lGateway needs support for different radios/protocols, …

Internet

Gatewaynode

WSN to Internet communication…25

Example: Deliver an alarm message to an Internet hostExample: Deliver an alarm message to an Internet hostIssues

Need to find a gateway (integrates routing & service discovery)h “b ” if l il blChoose “best” gateway if several are available

How to find Alice or Alice’s IP?

Ali ‘ d kAlert Alice Alice‘s desktopAlert Alice

GatewayInternet

Gatewaynodes

Alice‘s PDA

Internet to WSN communication…26

IIssues:How to find the right WSN to answer a need? How to translate from IP protocols to WSN protocols, semantics? How to translate from IP protocols to WSN protocols, semantics?

Remote requester

GatewayInternet GatewayGateway

nodesy

WSN tunneling…g27

U th I t t t “t l” WSN k t b t t Use the Internet to “tunnel” WSN packets between two remote WSNs

Internet

Gatewaynodes

Gateway

Summary…y28

N t k hit t f d h t k i Network architectures for ad hoc networks are—in principle—relatively straightforward and similar to standard networksstandard networks

Mobility is compensated for by appropriate protocols, but interaction paradigms don’t change too much

WSNs, on the other hand, look quite different on many levels

D i di h d d h ibili i l Data-centric paradigm, the need and the possibility to manipulate data as it travels through the network opens new possibilities for protocol design

Next, we will look at how these ideas are realized by actual protocols

top related