Title: Wireless Sensor Networking (Understanding the radio, MAC,
1Wireless Sensor Networking(Understanding the
radio, MAC, routing protocols)
Romit Roy Choudhury
2Sensor Networking Why ??
- Data Collection A basic need
- Will the volcano erupt? Need temperature/gas
signatures - How much Global Warming? Need ocean current data
- How many enemy tanks crossed?
- Human monitoring possible/feasible ?
- Often risky, impenetrable, costly,
- But science has collected data for centuries
- Manual (wired) placement, periodic human visits
- Wireless data transmitters
- Community accepted barriers/defiiencies
3New Opportunities
- Device miniaturization
- Moores law
- Processors envisioned as smart dust
- Innovations in wireless communication
- Low power communication
- Antenna sizes smaller with high frequency
Device RF sensors - A new breakthrough Scatte
red sensor motes self-organize themselves forming
a network. Sensed data aggregated, processed, and
transported to base station. Low risk, low cost,
and heavy penetration
4Plethora of Applications
5Plethora of Challenges
- Devices
- Reducing energy consumption
- Heavy programming constraints (16 KB RAM)
- Wireless Radio Network
- Reliable low power communication
- Medium access control (MAC)
- Network wide energy conservation
- Routing
- Aggregation, compression, suppression
6Todays Talk
- Understanding the wireless channel
- The departure from wireline
- The key challenges
- Medium access control
- Protocol design
- Energy-awareness (coordinated sleeping)
- Routing
- Unicast (Diffusion)
- Broadcast (Gossip)
7 8Many Motivations for Wireless
- Unrestricted mobility / deployability
- Unplugged from power outlet
- Significantly lower cost
- No cable layout, service provision
- Low maintenance
- Ease
- Direct communication with minimum infratructure
9From Links to Networks
- Variety of architectures
- Single hop networks
- Multi-hop networks
10The Wireless Future
11No Free Lunch
- Numerous challenges
- Channel fluctuation
- Lower bandwidth
- Limited Battery power
- Disconnection due to mobility
- Security
-
12Question Is
- Cant we use the rich wireline knowledge ?
- In solving the wireless challenges
13The Answer
- Wireless channel A dispersive medium
- The PHY and MAC layer completely dissimilar
- The whole game changes
14On Our Agenda
- Quick Glimpse
- Medium Access Control
- Wired
- Wireless
- The emergence of 802.11
- Evolution of sensor network MAC protocols
- Energy awareness
15 16The Channel Access Problem
- Multiple nodes share a channel
- Pairwise communication desired
- Simultaneous communication not possible
- MAC Protocols
- Suggests a scheme to schedule communication
- Maximize number of communications
- Ensure fairness among all transmitters
A
C
B
17The Trivial Solution
- Transmit and pray
- Plenty of collisions --gt poor throughput at high
load
A
C
B
18The Simple Fix
Dont transmit
- Transmit and pray
- Plenty of collisions --gt poor throughput at high
load - Listen before you talk
- Carrier sense multiple access (CSMA)
- Defer transmission when signal on channel
A
C
B
Can collisions still occur?
19CSMA collisions
spatial layout of nodes
Collisions can still occur Propagation delay
non-zero between transmitters
When collision Entire packet transmission time
wasted
note Role of distance propagation delay in
determining collision probability
20CSMA/CD (Collision Detection)
- Keep listening to channel
- While transmitting
- If (Transmitted_Signal ! Sensed_Signal)
- ? Sender knows its a Collision
- ? ABORT
212 Observations on CSMA/CD
- Transmitter can send/listen concurrently
- If (Sensed - received null)? Then success
- The signal is identical at Tx and Rx
- Non-dispersive
The transmitter can DETECT if and when collision
occurs
22Unfortunately
- Both observations do not hold for wireless
-
- Leading to
23Wireless Medium Access Control
C
D
A
B
Signal power
SINR threhold
Distance
24Wireless Media Disperse Energy
A cannot send and listen in parallel
C
D
A
B
Signal power
Signal not same at different locations
SINR threhold
Distance
25Collision Detection Difficult
- Signal reception based on SINR
- Transmitter can only hear itself
- Cannot determine signal quality at receiver
26Calculating SINR
B
A
C
27Red lt Blue collision
Red signal gtgt Blue signal
C
D
X
A
B
Signal power
SINR threhold
Distance
28Important C has not heard A, but can interfere
at receiver B
C is the hidden terminal to A
C
D
X
A
B
Signal power
SINR threhold
Distance
29Important X has heard A, but should not defer
transmission to Y
Y
X is the exposed terminal to A
C
D
X
A
B
Signal power
SINR threhold
Distance
30A Project Idea!
C
D
X
A
B
Signal power
SINR threhold
Sensitivity threshold
Distance
31A Project Idea!
Do not transmit in this region
Will this solve the wireless MAC problem?
C
D
X
A
B
Signal power
SINR threhold
T
Sensitivity threshold
Distance
32The Emergence of 802.11
- Wireless MAC proved to be non-trivial
- 1992 - research by Karn (MACA)
- 1994 - research by Bhargavan (MACAW)
- Led to IEEE 802.11 committee
- The standard was ratified in 1999
33IEEE 802.11 with Omni Antenna
M
Y
S
RTS
D
CTS
K
34IEEE 802.11 with Omni Antenna
silenced
M
Y
silenced
S
Data
D
ACK
silenced
X
K
silenced
35 36RTS/CTS
- Does it solve hidden terminals ?
- Assuming carrier sensing zone communication
zone
E
F
C
A
B
D
E does not receive CTS successfully ? Can later
initiate transmission to D. Hidden terminal
problem remains.
37Hidden Terminal Problem
- How about increasing carrier sense range ??
- E will defer on sensing carrier ? no collision
!!!
RTS
E
F
CTS
C
B
D
A
Data
38Hidden Terminal Problem
- But what if barriers/obstructions ??
- E doesnt hear C ? Carrier sensing does not help
RTS
E
F
CTS
C
B
D
A
Data
39Exposed Terminal
- B should be able to transmit to A
- RTS prevents this
E
RTS
CTS
C
A
B
D
40Exposed Terminal
- B should be able to transmit to A
- Carrier sensing makes the situation worse
E
RTS
CTS
C
A
B
D
41Thoughts !
- 802.11 does not solve HT/ET completely
- Only alleviates the problem through RTS/CTS and
recommends larger CS zone - Large CS zone aggravates exposed terminals
- Spatial reuse reduces ? A tradeoff
- RTS/CTS packets also consume bandwidth
- Moreover, backing off mechanism is also wasteful
- The search for the best MAC protocol is still on.
However, 802.11 is being optimized too. - Thus, wireless MAC research still alive
42 43Energy-Awareness
- 802.11 optimizes for throughput/latency
- Energy savings is second priority
- Unattended sensor networks
- Operate on AA batteries
- Yet, expected to last for months or years
- Energy-awareness is the key
- Throughput and latency is secondary
44An Energy-Efficient MAC Protocol for Wireless
Sensor Networks (S-MAC)
- Wei Ye, John Heidemann, Deborah Estrin
45Major source of energy waste
- Collision
- Overhearing
- Control Overhead
- Idle Listening
- Listening to possible traffic that is not sent
- 50-100 energy drain compared with receiving
46Avenues to Reduce Energy Consumption
- (1) Periodic listen and sleep
- (2) Collision avoidance
- (3) Overhearing avoidance
- (4) Message passing
47(1) Periodic Listen and Sleep
- The main idea
- Put nodes to sleep periodically
- Called Duty Cycles
- However, ensure that sleep/wake-up is synchronous
48Listen/Sleep Schedule Assignment
- Synchronizer
- Listen for a mount of time
- If hear no SYNC, select its own SYNC
- Broadcasts its SYNC immediately
Listen
A
Sleep
Go to sleep after time t
Listen for SYNC
Broadcasts
- Follower
- Listen for a mount of time
- Hear SYNC from A, follow As SYNC
- Rebroadcasts SYNC after random delay td
Listen
Sleep
Go to sleep after time t- td
td
Broadcasts
49Listen/Sleep Schedule Assignment
- B receives As schedule and rebroadcast it.
- 2. Hear different SYNC from C
- 3. Adapt both schedules
Listen
Sleep
Go to sleep after time t1
Listen for SYNC
Broadcasts
Listen
B
Sleep
td
Broadcasts
Only need to broadcast once
Nodes only rarely adopt multiple schedules
Listen
C
Sleep
Go to sleep after time t2
Listen for SYNC
50Keeping Clocks in SYNC
- SYNC packets must not collide
- Reserve separate time window for SYNC
transmission
51(2) Collision Avoidance
- Identical to 802.11
- RTS/CTS
- Virtual carrier sense (NAV)
- Physical carrier sense
52(3) Overhearing Avoidance
Neighbors go to sleepon overhearing RTS/CTS
- A is talking to B
- D receives CTS from B -gt sleep
- Ds transmission will collide Bs
- C receives RTS from A -gt sleep
- C cannot receive CTS/DATA from E
- All immediate neighbours of transmitting node
sleep - How long should they sleep?
- C and D update their NAV
- Keeping sleeping until NAV count down to zero
53(4) Message Passing
- How to transmit long message?
- Transmitting one long message is inefficient
- Many small packets with RTS/CTS/ACK for each
- S-MAC Divide into fragments, transmit in burst
- RTS/CTS reserve medium for the entire sequence
- Fragment-errors recovery with ACK
- no control packets for fragments
54Acknowledgment to Pro. Jun Yang
Neighbors can sleep for whole message
55Message Passing
- Advantages
- Energy saving
- Neighbors go to sleep when sense transmissions
- Reduces control overhead by sending multiple ACK
- Disadvantage
- Node-to-node fairness reduces
- However, message-level latency reduces
56Experiment
Listen time 300ms Sleeping time 1s SYNC every
13s (10 listen/sleep period) A, B, C use the same
schedule
57Energy save due to periodic sleep
802.11
Energy save due to avoiding overhearing by using
message passing
OA
SMAC
Heavy Traffic
Light Traffic
58OA In light traffic status, nodes keep listening
for quite a long time
59SYNC overhead
Overhearing avoidance still benefit
Heavy Traffic
Light Traffic
60 61- Studied MAC protocols till now
- Another important challenge
- How does a packet get transported end to end
- i.e., How do you perform Routing
62The Problem
- A region requires event-monitoring (harmful gas,
vehicle motion, seismic vibration, temperature,
etc.) - Deploy sensors forming a distributed network
- On event, sensed and/or processed information
delivered to the inquiring destination
A sensor field
Event
Sensor sources
Sensor sink
63 64The Proposal
- Proposes an application-aware paradigm to
facilitate efficient aggregation, and delivery of
sensed data to inquiring destination - Challenges
- Scalability
- Energy efficiency
- Robustness / Fault tolerance in outdoor areas
- Efficient routing (multiple source destination
pairs)
65IP or not to IP
- IP is the pivot of wired/wireless networks
- All networking protocol over and below IP
- Should we stick to this model?
- Comments ?
66Directed Diffusion
- Typical IP based networks
- Requires unique host ID addressing
- Application is end-to-end, routers unaware
- Directed diffusion uses publish/subscribe
- Inquirer expresses an interest, I, using
attribute values - Sensor sources that can service I, reply with data
67Data Naming
- Expressing an Interest
- Using attribute-value pairs
- E.g.,
- Other interest-expressing schemes possible
- E.g., hierarchical (different problem)
68Gradient Set Up
- Inquirer (sink) broadcasts exploratory interest,
i1 - Intended to discover routes between source and
sink - Neighbors update interest-cache and forwards i1
- Gradient for i1 set up to upstream neighbor
- No source routes
- Gradient a weighted reverse link
- Low gradient ? Few packets per unit time needed
69Exploratory Gradient
Exploratory Request Gradient
Event
Bidirectional gradients established on all links
through flooding
70Event-data propagation
- Event e1 occurs, matches i1 in sensor cache
- e1 identified based on waveform pattern matching
- Interest reply diffused down gradient (unicast)
- Diffusion initially exploratory (low packet-rate)
- Cache filters suppress previously seen data
- Problem of bidirectional gradient avoided
71Reinforcement
- From exploratory gradients, reinforce optimal
path for high-rate data download ? Unicast - By requesting higher-rate-i1 on the optimal path
- Exploratory gradients still exist useful for
faults
Event
A sensor field
Sink
72Path Failure / Recovery
- Link failure detected by reduced rate, data loss
- Choose next best link (i.e., compare links based
on infrequent exploratory downloads) - Negatively reinforce lossy link
- Either send i1 with base (exploratory) data rate
- Or, allow neighbors cache to expire over time
Link A-M lossy A reinforces B B reinforces C D
need not A () reinforces M M () reinforces D
Event
D
M
Src
A
C
Sink
B
73Loop Elimination
- M gets same data from both D and P, but P always
delivers late due to looping - M negatively-reinforces (nr) P, P nr Q, Q nr M
- Loop M ? Q ? P eliminated
- Conservative nr useful for fault resilience
Q
P
A
D
M
74Simulation Setup Metrics
- ns2, 50 nodes in 160x160 sqm., range 40m
- Node density maintained, 802.11 MAC
- Random 5 sources in 70x70, random 5 sinks
- Average Dissipated Energy
- Per node energy dissipation / events seen by
sinks - Average Delay
- Latency of event transmission to reception at
sink - Distinct event delivery ratio
- Ratio of events sent to events received by
sink
75Average Dissipated Energy
-
- In-network aggregation reduces DD redundancy
- Flooding poor because of multiple paths from
source to sink
flooding
Multicast
Diffusion
76Delay
-
- DD finds least delay paths, as OM encouraging
- Flooding incurs latency due to high MAC
contention, collision
flooding
Diffusion
Multicast
77Event Delivery Ratio under node failures
- Delivery ratio degrades with higher node
failures - Graceful degradation indicates efficient negative
reinforcement
0
10
20
78Conclusion
- Directed diffusion, a paradigm proposed for event
monitoring sensor networks - Energy efficiency achievable
- Diffusion mechanism resilient to fault tolerance
- Conservative negative reinforcements proves
useful - A careful MAC protocol, designed for such
specifics, can yield further performance gains
79- Rumor Routing
- LEACH
- SPIN
- Some other proposals for sensor routing
80Rumor Routing
81LEACH
- Proposes clustering of sensors cluster leaders
- Can aggregate data in single (local) cluster
- Rotating cluster head balances energy consumption
- Cluster formation distributed and energy efficient
Cluster-head always awake
Member nodes can sleep when not Txing
82LEACH The Protocol
- Time is divided into rounds
- A node self-elects itself as the cluster head
- Higher residual energy, higher probability to be
head - Close-by sensors join this cluster-head
- Cluster head does TDMA scheduling and gathers
data - Gathered data compressed based on spatial
correlation - Transmits data to Base Station (_at_ higher power)
- In the next round, another cluster head elected
- Probabilistic load balancing
- Network lifetime can increase manifolds
83SPIN Information Via Negotiation
- Flooding ? many sensors transmit same data
- Redundant
- Make sensors disseminate spatially/temporally
disjoint data sets - Name data with meta-data to define space/time
property - Sensors compare overheard data with self-sensed
data - Combine data to minimize overlap
- Make sensors resource-adaptive
- When low battery ? perform minimum activities
84The SPIN 3-Step Protocol
A
B
85The SPIN 3-Step Protocol
A
B
Notice the color of the data packets sent by node
B
86The SPIN 3-Step Protocol
A
B
SPIN effective when DATA sizes are large REQ,
ADV overhead gets amortized
87SmartGossip A Reliable Broadcast Service for
Wireless Sensor Networks
Romit Roy Choudhury Dept. of ECE, Duke
University Joint work with Pradeep Kyasanur
(Google) Indranil Gupta (UIUC)
88Problem
- Broadcast in Sensor Networks
- A widely used service
- Network layer functions heavily depend on it
- Examples
- Directed Diffusion
- Unicast or multicast routing
- Instruction / code dissemination
- Query propagation
89Approaches
- Several approaches evolved over time
90Recent Past
- Gossiping Probabilistic flooding
- Nodes forward with probability, p
Source
91Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Source
Heads
92Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Source
Heads
93Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Source
Heads
Heads
94Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Source
Heads
Heads
95Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Tails
Source
Heads
Heads
Heads
Tails
96Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Tails
Source
Heads
Heads
Heads
Tails
97Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Tails
Tails
Source
Heads
Heads
Heads
Heads
Tails
98Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Tails
Tails
Source
Heads
Heads
Heads
Heads
Tails
99Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Tails
Tails
Source
Heads
Heads
Heads
Heads
Heads
Tails
Tails
100Recent Past
- Gossip based broadcast
- Nodes forward with probability, p
Tails
Tails
Tails
Source
Heads
Heads
Heads
Heads
Heads
Tails
For carefully chosen p the message reaches all
nodes in minimal transmissions
1. Simple, 2. Fault tolerant 3. Load-balanced
Tails
101We Ask
- Given some topology deployment
- How do we choose a suitable value of p ?
One option is to simulate the gossip offline,
and determine p
But, for this example, simulation result will
be p 1
102We Ask
- Given some topology deployment
- How do we choose a suitable value of p ?
- Even if topology is homogeneous
- It may change over time due to failure and
mobility
103We Ask
- Given some topology deployment
- How do we choose a suitable value of p ?
- Even if topology is homogeneous
- It may change over time due to failure and
mobility
Say computed p 0.85
104We Ask
- Given some topology deployment
- How do we choose a suitable value of p ?
- Even if topology is homogeneous
- It may change over time due to failure and
mobility
Fails
Say computed p 0.85
105We Ask
- Given some topology deployment
- How do we choose a suitable value of p ?
- Even if topology is homogeneous
- It may change over time due to failure and
mobility
Say computed p 0.85
106We Ask
- Given some topology deployment
- How do we choose a suitable value of p ?
- Even if topology is homogeneous
- It may change over time due to failure and
mobility - Finally, what if topology is not known a priori ?
- How can you choose p ?
107We Argue
- A broadcast service necessary
- that customizes itself to the underlying topology
- and
- repairs itself with failures and mobility
108Smart Gossip
- Intuition
- Identify which of YOUR friends get to know
gossips earlier than you do - Request those friends to gossip more
- Friends who get to know gossips later than you
will request you to gossip more - You choose your gossip probability as
- MAX value of all requests from YOUR friends
109For Example
- When H spreads a gossip
- F gets gossip only from G
- F asks G to always gossip
- Thus, pG 1.0
- B receives gossip from A,C,D,E,F
- B also observes that A,C,D,E received gossip from
F - Indicates that B must depend only on F (parent)
- A,C,D,E and B are independent (siblings)
- B asks F to always gossip, thus pF 1.0
110For Example
- B asks F to always gossip,
- thus pF 1.0
- B does not require siblings
- A,C,D,E to gossip at all
- Thus pA 0, pC 0, pD 0, pE 0
Observe that only 2 transmissions (from G and F)
are sufficient for broadcast
111Protocol Details
- For first gossip pkt, nodes transmit with p1
- Enables nodes to deduce neighbor dependences
- Transmitters piggyback pkt with parent-id from
which it received the pkt - Nodes record transmitter-id, and its parent-id,
and deduce parent, child, sibling relationships - see next slide
112Deducing Relationships
S
A
B
C
E
113Deducing Relationships
S
A
B
C
E
114Deducing Relationships
S
A
B
C
E
115Deducing Relationships
Sibling E
S
A
B
C
E
116Choosing Probabilities
- Each node calculates number of parents ( k )
- Assume 99 assurance necessary for gossip
- Node suggests each parent to gossip using p
- 0.99 ( 1 (1 - p)k )
- Each node receives multiple requests of p
- Uses Max pi as its own gossip probability
S
A
B
C
ParentB,E
E
117Choosing Probabilities
- Each node calculates number of parents ( k )
- Assume 99 assurance necessary for gossip
- Node suggests each parent to gossip using p
- 0.99 ( 1 (1 - p)k )
- Each node receives multiple requests of p
- Uses Max pi as its own gossip probability
p 1.0
p 1.0
p 0.9
S
A
B
C
p 0.9
p 1.0
E
118Choosing Probabilities
- Each node calculates number of parents ( k )
- Assume 99 assurance necessary for gossip
- Node suggests each parent to gossip using p
- 0.99 ( 1 (1 - p)k )
- Each node receives multiple requests of p
- Uses Max pi as its own gossip probability
p 0
p 0.9
p 1.0
p 1.0
S
A
B
C
E
p 0.9
119The Bigger Picture
Src
120Reliability (Details in paper)
- Node Failures
- Node failures affect broadcast
- Source node flags packet periodically (p1)
- Allows for updating dependences
- Link Losses
- Node requests upstream nodes to retransmit
- We require each node to buffer few packets
- Children overhear this request
- Children do not request retransmissions themselves
121Evaluation
- Qualnet Simulator, ver 3.7
- (Currently implementing on Moteiv tmotes
TinyOS) - Metrics used
- Average Reception Percentage
- Average Forwarding Percentage
- Resilience to link/node failures
122Percolation
Smart Gossip
Adaptive Overhead
Adaptive Neighbor
123Forwarding Overhead
124Adaption to Node Failures
Nodes gossip more to compensate for other failing
nodes
125Conclusion
- Broadcast is an important problem
- Gossip is good but not practical for sensor
nets - Need to adapt gossip based on topology / failures
- Smart Gossip
- Form dependence graphs using distributed protocol
- Dependence relations suggest suitable probability
- Results
- Overheads are low, and yet good percolation
- Robust to node and link failures
126 127Percolation
128Wireless Routing
- Link instability causes many routing issues
- Shortest hop routing often worst choice
- Scarce bandwidth makes overhead conspicuous
- Battery power a concern
- Security and misbehavior
- If thats not bad enough
- Add node mobility
- Note Routes may break, and reconnect later
129Routing in wireless Mobile Networks
- Imagine hundreds of hosts moving
- Routing algorithm needs to cope up with varying
wireless channel and node mobility
Wheres RED guy