wireless sensor architecturecomp7860/08r-fall/lecture... · mobile ad hoc networks… 2 ynd tikl t...

28
Wireless Sensor Architecture 1 Wireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK FORM A MEANINGFUL NETWORK

Upload: others

Post on 20-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Wireless Sensor Architecture1

Wireless Sensor Architecture

G E N E R A L P R I N C I P L E S A N D A R C H I T E C T U R E S F O R P U T T I N G S E N S O R N O D E S T O G E T H E R T O

F O R M A M E A N I N G F U L N E T W O R KF O R M A M E A N I N G F U L N E T W O R K

Page 2: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Mobile ad hoc networks…2

N d t lki t h thNodes talking to each otherNodes talking to “some” node in another network (Web server on the Internet e g )server on the Internet, e.g.)

Typically requires some connection to the fixed network

Applications: Traditional data (http ftp or collaborative Applications: Traditional data (http, ftp, or collaborative apps) & multimedia (voice, video); i.e., humans in the loop

Access PointAccess Point

Page 3: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Sources and sinks revisited…3

Sources: Any entity that provides data/measurementsSources: Any entity that provides data/measurementsSinks: Nodes where information is required

Belongs to the sensor network as suchBelongs to the sensor network as suchIs an external entity, e.g., a PDA, but directly connected to the WSN

Main difference: comes and goes, often moves around, …Is part of an external network (e.g., internet), somehow connected to the WSNto the WSN

SourceSourceSource

Sink InternetSinkSink

Page 4: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Single- versus multiple-hops…g p p4

One common problem: limited range of wireless communicationOne common problem: limited range of wireless communicationEssentially due to limited transmission power, path loss, obstacles

Option: multi-hop networksSend packets to an intermediate nodeIntermediate node forwards packet to its destinationStore and forward multi hop networkStore-and-forward multi-hop network

Basic technique applies to both WSN and MANETNote: Store&forward multi-hopping NOT the only possible solutionpp g y p

E.g., collaborative networking, network codingDo not operate on a per-packet basis

SinkSource Obstacle

Page 5: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Hopping in WSNs…pp g5

Page 6: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Sources of mobility…y6

Node mobilityNode mobilityA node participating as source/sink (or destination) or a relay node might move aroundDeliberately self propelled or by external force; targeted or at Deliberately, self-propelled or by external force; targeted or at randomHappens in both WSN and MANET

Sink mobilitySink mobilityIn WSN, a sink that is not part of the WSN might moveMobile requester

Event mobility In WSN, event that is to be observed moves around (or extends, shrinks)Different WSN nodes become “responsible” for surveillance of such an event

Page 7: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Sink mobility…y7

Requestq

Propagationp gof answers

Movementdirection

Page 8: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Event mobility…y8

Page 9: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Challenging goals: QoS…g g g Q9

In MANET: Usual QoS interpretationIn MANET: Usual QoS interpretationThroughput/delay/jitterHigh perceived QoS for multimedia applications

I WSN li dIn WSN, more complicatedEvent detection and/or reporting probabilityEvent classification errorDetection delayProbability of missing a periodic reportApproximation accuracy (e.g., when WSN constructs a temperature Approximation accuracy (e.g., when WSN constructs a temperature map)Tracking accuracy (e.g., difference between true and conjectured position of the pink elephant)p p p

Related goal: robustnessNetwork should withstand failure of some nodes

Page 10: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Challenging goals: Efficiency…g g g y10

E tl i d bitEnergy per correctly received bitCounting all the overheads, in intermediate nodes, etc.

Energy per reported (unique) eventEnergy per reported (unique) eventAfter all, information is important, not payload bits!

Delay/energy tradeoffsDelay/energy tradeoffsNetwork lifetime

Time to first node failureTime to first node failureNetwork half-life (how long until 50% of the nodes died?)Time to partitionTime to loss of coverageTime to failure of first event notification

Page 11: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Challenging goals: Scalability…g g g y11

N t k h ld b ti l dl f b f Network should be operational regardless of number of nodes

At high efficiencyAt high efficiency

Typical node counts difficult to guessMANETs: 10s to 100s WSNs: 10s to 1000s, maybe more (possible?)

Requiring to scale to large node numbers has seriousconsequences for network architecture

Might not result in the most efficient solutions for small networks!C f ll id h l li i d b f l ki f Carefully consider the actual application needs before looking for many solutions!

Page 12: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Design principles…g p p12

Distributed organizationDistributed organizationIn-network processing

AggregationAggregationDistributed source coding and distributed compressionDistributed and collaborative signal processingM bil d / t t kiMobile code/agent networking

Adaptive fidelityData centricityData centricity

Address data, not nodesImplementation options

Overlay networks and distributed hash tablesPublish/subscribeDatabases

Page 13: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Design principles…2g p p13

E l itExploit:Location informationActivity patternsActivity patternsHeterogeneity

Component-based protocol stacks and cross-layer p p yoptimizationService interfacesGateway concepts

Page 14: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Distributed organization…g14

P ti i t h ld t i i i th t kParticipants should cooperate in organizing the networkE.g., with respect to medium access, routing, …Centralistic approach as alternative usually not feasible—hinders Centralistic approach as alternative usually not feasible hinders scalability, robustness

Potential shortcomingsNot clear whether distributed or centralistic organization achieves better energy efficiency (when all “overheads” considered)

O ti “li it d t li d” l tiOption: “limited centralized” solutionElect nodes for local coordination/controlPerhaps rotate this function over timePerhaps rotate this function over time

Page 15: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

In-network processing…p g15

MANET d t d li bit f d t th MANETs are supposed to deliver bits from one end to the otherWSNs however are expected to provide information not WSNs, however, are expected to provide information, not necessarily original bits

Additional optionspE.g., manipulate or process the data in the network

Main example: aggregation Apply composable aggregation functions to a converge cast tree in a network Typical functions: minimum maximum average sum Typical functions: minimum, maximum, average, sum, … Not amenable functions: median

Page 16: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

In-network processing: Aggregation…p g gg g16

R d b f t itt d bit / k t b l i Reduce number of transmitted bits/packets by applying an aggregation function in the network

1 1

1

31

31

6

11

1

1 1

Page 17: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

In-network processing: Distributed…p g17

Depending on application more sophisticated processing of data Depending on application, more sophisticated processing of data can take place within the network

Example edge detection: locally exchange raw data with neighboring d t d l i t d d i ti t f nodes, compute edges, only communicate edge description to far away

data sinksExample tracking/angle detection of signal source: Conceive of sensor nodes as a distributed microphone array use it to compute the angle of a nodes as a distributed microphone array, use it to compute the angle of a single source, only communicate this angle, not all the raw data

Exploit temporal and spatial correlationObserved signals might vary only slowly in time ! no need to transmit all data at full rate all the timeSignals of neighboring nodes are often quite similar ! only try to transmit differences (details a bit complicated, see later)

Seek other programming paradigms: mobile code, swarm intelligenceg

Page 18: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Adaptive fidelity…p y18

Ad t th ff t ith hi h d t i h d t th Adapt the effort with which data is exchanged to the currently required accuracy/fidelityExample: event detectionExample: event detection

When there is no event, only very rarely send short “all is well” messagesWhen event occurs, increase rate of message exchanges

Example: temperatureWhen temperature is in acceptable range, only send temperature values at low resolutionWhen temperature becomes high increase resolution and thus When temperature becomes high, increase resolution and thus message length

Page 19: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Data-centric networking…g19

I t i l t k (i l di d h t k ) t k In typical networks (including ad hoc networks), network transactions are addressed to the identities of specific nodesnodes

A “node-centric” or “address-centric” networking paradigm

In a redundantly deployed sensor networks, specific source y p y , pof an event, alarm, etc. might not be important

Redundancy: e.g., several nodes can observe the same area

Thus: focus networking transactions on the data directly instead of their senders and transmitters ! data-centric

t ki networking Principal design change

Page 20: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Implementation options…p p20

O l t k & di t ib t d h h t bl (DHT)Overlay networks & distributed hash tables (DHT)Hash table: content-addressable memoryRetrieve data from an unknown source like in peer-to-peer Retrieve data from an unknown source, like in peer to peer networking—with efficient implementationSome disparities remain

Static key in DHT, dynamic changes in WSNDHTs typically ignore issues like hop count or distance between nodes when performing a lookup operation

Page 21: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Implementation options…2p p21

P bli h/ b ibPublish/subscribeDifferent interaction paradigmNodes can publish data can subscribe to any particular kind of Nodes can publish data, can subscribe to any particular kind of dataOnce data of a certain type has been published, it is delivered to all

b ibsubscribesSubscription and publication are decoupled in time; subscriber and published are agnostic of each other (decoupled in identity)p g ( p y)

DatabasesMatches with the idea of using a data-centric organization of the networking protocols

Interested in certain aspects of data == formulating queries for a database

Page 22: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Other design principles…g p p22

Exploit location informationExploit location informationRequired anyways for many applications; can considerably increase performance

Exploit activity patternsExploit activity patternsWatch for “event shower” effect

Exploit heterogeneityp g yBy construction: nodes of different types in the networkBy evolution: some nodes had to perform more tasks and have less energy left; some nodes received more solar energy than others; … gy gy

Cross-layer optimization of protocol stacks for WSNGoes against grain of standard networking; but promises big performance gainsperformance gainsAlso applicable to other networks like ad hoc; usually at least worthwhile to consider for most wireless networks

Page 23: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Service interfaces…23

The world’s all-purpose network interface: socketsThe world s all-purpose network interface: socketsGood for transmitting data from one sender to one receiverNot well matched to WSN needs (ok for ad hoc networks)

E ibilit i tExpressibility requirementsSupport for simple request/response interactionsSupport for asynchronous event notificationDifferent ways for identifying addressee of data

By location, by observed values, implicitly by some other form of group membership, by some semantically meaningful form—“room 123”

E ibilit f i t k i f tiEasy accessibility of in-network processing functionsFormulate complex events—events defined only by several nodes

Allow to specify accuracy & timeliness requirementsA d / k i f i ( b l l)Access node/network status information (e.g., battery level)Security, management functionality, …

Page 24: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Gateway concepts in WSNs…y p24

N t th I t t f t t WSNNecessary to the Internet for remote access to WSNsSame is true for ad hoc networks; additional complications due to mobility (change route to the gateway; use different gateways)y ( g g y; g y )WSN: Additionally bridge the gap between different interaction semantics (data vs. address-centric networking) in the gateway

d f diff di / lGateway needs support for different radios/protocols, …

Internet

Gatewaynode

Page 25: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

WSN to Internet communication…25

Example: Deliver an alarm message to an Internet hostExample: Deliver an alarm message to an Internet hostIssues

Need to find a gateway (integrates routing & service discovery)h “b ” if l il blChoose “best” gateway if several are available

How to find Alice or Alice’s IP?

Ali ‘ d kAlert Alice Alice‘s desktopAlert Alice

GatewayInternet

Gatewaynodes

Alice‘s PDA

Page 26: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Internet to WSN communication…26

IIssues:How to find the right WSN to answer a need? How to translate from IP protocols to WSN protocols, semantics? How to translate from IP protocols to WSN protocols, semantics?

Remote requester

GatewayInternet GatewayGateway

nodesy

Page 27: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

WSN tunneling…g27

U th I t t t “t l” WSN k t b t t Use the Internet to “tunnel” WSN packets between two remote WSNs

Internet

Gatewaynodes

Gateway

Page 28: Wireless Sensor Architecturecomp7860/08R-Fall/Lecture... · Mobile ad hoc networks… 2 yNd tikl t h htNodes talking to each other yNodes talking to “some” node in another network

Summary…y28

N t k hit t f d h t k i Network architectures for ad hoc networks are—in principle—relatively straightforward and similar to standard networksstandard networks

Mobility is compensated for by appropriate protocols, but interaction paradigms don’t change too much

WSNs, on the other hand, look quite different on many levels

D i di h d d h ibili i l Data-centric paradigm, the need and the possibility to manipulate data as it travels through the network opens new possibilities for protocol design

Next, we will look at how these ideas are realized by actual protocols