wireless sensor architecturecomp7860/08r-fall/lecture... · mobile ad hoc networks… 2 ynd tikl t...
TRANSCRIPT
Wireless Sensor Architecture1
Wireless Sensor Architecture
G E N E R A L P R I N C I P L E S A N D A R C H I T E C T U R E S F O R P U T T I N G S E N S O R N O D E S T O G E T H E R T O
F O R M A M E A N I N G F U L N E T W O R KF O R M A M E A N I N G F U L N E T W O R K
Mobile ad hoc networks…2
N d t lki t h thNodes talking to each otherNodes talking to “some” node in another network (Web server on the Internet e g )server on the Internet, e.g.)
Typically requires some connection to the fixed network
Applications: Traditional data (http ftp or collaborative Applications: Traditional data (http, ftp, or collaborative apps) & multimedia (voice, video); i.e., humans in the loop
Access PointAccess Point
Sources and sinks revisited…3
Sources: Any entity that provides data/measurementsSources: Any entity that provides data/measurementsSinks: Nodes where information is required
Belongs to the sensor network as suchBelongs to the sensor network as suchIs an external entity, e.g., a PDA, but directly connected to the WSN
Main difference: comes and goes, often moves around, …Is part of an external network (e.g., internet), somehow connected to the WSNto the WSN
SourceSourceSource
Sink InternetSinkSink
Single- versus multiple-hops…g p p4
One common problem: limited range of wireless communicationOne common problem: limited range of wireless communicationEssentially due to limited transmission power, path loss, obstacles
Option: multi-hop networksSend packets to an intermediate nodeIntermediate node forwards packet to its destinationStore and forward multi hop networkStore-and-forward multi-hop network
Basic technique applies to both WSN and MANETNote: Store&forward multi-hopping NOT the only possible solutionpp g y p
E.g., collaborative networking, network codingDo not operate on a per-packet basis
SinkSource Obstacle
Hopping in WSNs…pp g5
Sources of mobility…y6
Node mobilityNode mobilityA node participating as source/sink (or destination) or a relay node might move aroundDeliberately self propelled or by external force; targeted or at Deliberately, self-propelled or by external force; targeted or at randomHappens in both WSN and MANET
Sink mobilitySink mobilityIn WSN, a sink that is not part of the WSN might moveMobile requester
Event mobility In WSN, event that is to be observed moves around (or extends, shrinks)Different WSN nodes become “responsible” for surveillance of such an event
Sink mobility…y7
Requestq
Propagationp gof answers
Movementdirection
Event mobility…y8
Challenging goals: QoS…g g g Q9
In MANET: Usual QoS interpretationIn MANET: Usual QoS interpretationThroughput/delay/jitterHigh perceived QoS for multimedia applications
I WSN li dIn WSN, more complicatedEvent detection and/or reporting probabilityEvent classification errorDetection delayProbability of missing a periodic reportApproximation accuracy (e.g., when WSN constructs a temperature Approximation accuracy (e.g., when WSN constructs a temperature map)Tracking accuracy (e.g., difference between true and conjectured position of the pink elephant)p p p
Related goal: robustnessNetwork should withstand failure of some nodes
Challenging goals: Efficiency…g g g y10
E tl i d bitEnergy per correctly received bitCounting all the overheads, in intermediate nodes, etc.
Energy per reported (unique) eventEnergy per reported (unique) eventAfter all, information is important, not payload bits!
Delay/energy tradeoffsDelay/energy tradeoffsNetwork lifetime
Time to first node failureTime to first node failureNetwork half-life (how long until 50% of the nodes died?)Time to partitionTime to loss of coverageTime to failure of first event notification
Challenging goals: Scalability…g g g y11
N t k h ld b ti l dl f b f Network should be operational regardless of number of nodes
At high efficiencyAt high efficiency
Typical node counts difficult to guessMANETs: 10s to 100s WSNs: 10s to 1000s, maybe more (possible?)
Requiring to scale to large node numbers has seriousconsequences for network architecture
Might not result in the most efficient solutions for small networks!C f ll id h l li i d b f l ki f Carefully consider the actual application needs before looking for many solutions!
Design principles…g p p12
Distributed organizationDistributed organizationIn-network processing
AggregationAggregationDistributed source coding and distributed compressionDistributed and collaborative signal processingM bil d / t t kiMobile code/agent networking
Adaptive fidelityData centricityData centricity
Address data, not nodesImplementation options
Overlay networks and distributed hash tablesPublish/subscribeDatabases
Design principles…2g p p13
E l itExploit:Location informationActivity patternsActivity patternsHeterogeneity
Component-based protocol stacks and cross-layer p p yoptimizationService interfacesGateway concepts
Distributed organization…g14
P ti i t h ld t i i i th t kParticipants should cooperate in organizing the networkE.g., with respect to medium access, routing, …Centralistic approach as alternative usually not feasible—hinders Centralistic approach as alternative usually not feasible hinders scalability, robustness
Potential shortcomingsNot clear whether distributed or centralistic organization achieves better energy efficiency (when all “overheads” considered)
O ti “li it d t li d” l tiOption: “limited centralized” solutionElect nodes for local coordination/controlPerhaps rotate this function over timePerhaps rotate this function over time
In-network processing…p g15
MANET d t d li bit f d t th MANETs are supposed to deliver bits from one end to the otherWSNs however are expected to provide information not WSNs, however, are expected to provide information, not necessarily original bits
Additional optionspE.g., manipulate or process the data in the network
Main example: aggregation Apply composable aggregation functions to a converge cast tree in a network Typical functions: minimum maximum average sum Typical functions: minimum, maximum, average, sum, … Not amenable functions: median
In-network processing: Aggregation…p g gg g16
R d b f t itt d bit / k t b l i Reduce number of transmitted bits/packets by applying an aggregation function in the network
1 1
1
31
31
6
11
1
1 1
In-network processing: Distributed…p g17
Depending on application more sophisticated processing of data Depending on application, more sophisticated processing of data can take place within the network
Example edge detection: locally exchange raw data with neighboring d t d l i t d d i ti t f nodes, compute edges, only communicate edge description to far away
data sinksExample tracking/angle detection of signal source: Conceive of sensor nodes as a distributed microphone array use it to compute the angle of a nodes as a distributed microphone array, use it to compute the angle of a single source, only communicate this angle, not all the raw data
Exploit temporal and spatial correlationObserved signals might vary only slowly in time ! no need to transmit all data at full rate all the timeSignals of neighboring nodes are often quite similar ! only try to transmit differences (details a bit complicated, see later)
Seek other programming paradigms: mobile code, swarm intelligenceg
Adaptive fidelity…p y18
Ad t th ff t ith hi h d t i h d t th Adapt the effort with which data is exchanged to the currently required accuracy/fidelityExample: event detectionExample: event detection
When there is no event, only very rarely send short “all is well” messagesWhen event occurs, increase rate of message exchanges
Example: temperatureWhen temperature is in acceptable range, only send temperature values at low resolutionWhen temperature becomes high increase resolution and thus When temperature becomes high, increase resolution and thus message length
Data-centric networking…g19
I t i l t k (i l di d h t k ) t k In typical networks (including ad hoc networks), network transactions are addressed to the identities of specific nodesnodes
A “node-centric” or “address-centric” networking paradigm
In a redundantly deployed sensor networks, specific source y p y , pof an event, alarm, etc. might not be important
Redundancy: e.g., several nodes can observe the same area
Thus: focus networking transactions on the data directly instead of their senders and transmitters ! data-centric
t ki networking Principal design change
Implementation options…p p20
O l t k & di t ib t d h h t bl (DHT)Overlay networks & distributed hash tables (DHT)Hash table: content-addressable memoryRetrieve data from an unknown source like in peer-to-peer Retrieve data from an unknown source, like in peer to peer networking—with efficient implementationSome disparities remain
Static key in DHT, dynamic changes in WSNDHTs typically ignore issues like hop count or distance between nodes when performing a lookup operation
Implementation options…2p p21
P bli h/ b ibPublish/subscribeDifferent interaction paradigmNodes can publish data can subscribe to any particular kind of Nodes can publish data, can subscribe to any particular kind of dataOnce data of a certain type has been published, it is delivered to all
b ibsubscribesSubscription and publication are decoupled in time; subscriber and published are agnostic of each other (decoupled in identity)p g ( p y)
DatabasesMatches with the idea of using a data-centric organization of the networking protocols
Interested in certain aspects of data == formulating queries for a database
Other design principles…g p p22
Exploit location informationExploit location informationRequired anyways for many applications; can considerably increase performance
Exploit activity patternsExploit activity patternsWatch for “event shower” effect
Exploit heterogeneityp g yBy construction: nodes of different types in the networkBy evolution: some nodes had to perform more tasks and have less energy left; some nodes received more solar energy than others; … gy gy
Cross-layer optimization of protocol stacks for WSNGoes against grain of standard networking; but promises big performance gainsperformance gainsAlso applicable to other networks like ad hoc; usually at least worthwhile to consider for most wireless networks
Service interfaces…23
The world’s all-purpose network interface: socketsThe world s all-purpose network interface: socketsGood for transmitting data from one sender to one receiverNot well matched to WSN needs (ok for ad hoc networks)
E ibilit i tExpressibility requirementsSupport for simple request/response interactionsSupport for asynchronous event notificationDifferent ways for identifying addressee of data
By location, by observed values, implicitly by some other form of group membership, by some semantically meaningful form—“room 123”
E ibilit f i t k i f tiEasy accessibility of in-network processing functionsFormulate complex events—events defined only by several nodes
Allow to specify accuracy & timeliness requirementsA d / k i f i ( b l l)Access node/network status information (e.g., battery level)Security, management functionality, …
Gateway concepts in WSNs…y p24
N t th I t t f t t WSNNecessary to the Internet for remote access to WSNsSame is true for ad hoc networks; additional complications due to mobility (change route to the gateway; use different gateways)y ( g g y; g y )WSN: Additionally bridge the gap between different interaction semantics (data vs. address-centric networking) in the gateway
d f diff di / lGateway needs support for different radios/protocols, …
Internet
Gatewaynode
WSN to Internet communication…25
Example: Deliver an alarm message to an Internet hostExample: Deliver an alarm message to an Internet hostIssues
Need to find a gateway (integrates routing & service discovery)h “b ” if l il blChoose “best” gateway if several are available
How to find Alice or Alice’s IP?
Ali ‘ d kAlert Alice Alice‘s desktopAlert Alice
GatewayInternet
Gatewaynodes
Alice‘s PDA
Internet to WSN communication…26
IIssues:How to find the right WSN to answer a need? How to translate from IP protocols to WSN protocols, semantics? How to translate from IP protocols to WSN protocols, semantics?
Remote requester
GatewayInternet GatewayGateway
nodesy
WSN tunneling…g27
U th I t t t “t l” WSN k t b t t Use the Internet to “tunnel” WSN packets between two remote WSNs
Internet
Gatewaynodes
Gateway
Summary…y28
N t k hit t f d h t k i Network architectures for ad hoc networks are—in principle—relatively straightforward and similar to standard networksstandard networks
Mobility is compensated for by appropriate protocols, but interaction paradigms don’t change too much
WSNs, on the other hand, look quite different on many levels
D i di h d d h ibili i l Data-centric paradigm, the need and the possibility to manipulate data as it travels through the network opens new possibilities for protocol design
Next, we will look at how these ideas are realized by actual protocols