Top Banner

of 22

Unit 3 - WSN - MAC

Jun 02, 2018

Download

Documents

Rmkumars
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/10/2019 Unit 3 - WSN - MAC

    1/22

  • 8/10/2019 Unit 3 - WSN - MAC

    2/22

    *sing in military +attleeld surveillance and monitoring, guidance systems

    of intelligent missiles, detection of attack by weapons ofmass destruction such as chemical, biological, or nuclear

    *sing in nature $orest re, -ood detection, habitat exploration of animals

    *sing in health onitor the patient/s heart rate or blood pressure, and sent

    regularly to alert the concerned doctor, provide patients agreater freedom of movement

    *sing in home 0smart home1 Sensor node can built into appliances at home, such as

    ovens, refrigerators, and vacuum cleaners, which enable

    them to interact with each other and be remote%controlled

    *sing in o2ce building #ir-ow and temperature of di)erent parts of the building

    can be automatically controlled

    *sing in warehouse 3mprove their inventory control system by installing

    sensors on the products to track their movement

    12.1.2 Comparison with Ad Hoc Wireless Networks

    &i)erent from #d 4oc wireless networks

    he number of nodes in sensor network can be severalorders of magnitude large than the number of nodes in anad hoc network.

    Sensor nodes are more easy to failure and energy drain,and their battery sources are usually not replaceable orrechargeable.

    Sensor nodes may not have uni(ue global identiers 03&1,so uni(ue addressing is not always feasible in sensor

    networks. Sensor networks are data%centric, the (ueries in sensor

    networks are addressed to nodes which have datasatisfying some conditions. #d 4oc networks are address%centric, with (ueries addressed to particular nodesspecied by their uni(ue address.

    &ata fusion'aggregation: the sensor nodes aggregate thelocal information before relaying. he goals are reduce

    2

  • 8/10/2019 Unit 3 - WSN - MAC

    3/22

    bandwidth consumption, media access delay, and powerconsumption for communication.

    12.1.3 Issues and Challenges in esigning a Sensor Network

    3ssues and Challenges Sensor nodes are randomly deployed and hence do not t

    into any regular topology. 5nce deployed, they usually donot re(uire any human intervention. 4ence, the setup andmaintenance of the network should be entirelyautonomous.

    Sensor networks are infrastructure%less. herefore, allrouting and maintenance algorithms need to bedistributed.

    Energy problem

    4ardware and software should be designed to conservepower

    Sensor nodes should be able to synchroni6e with eachother in a completely distributed manner, so that schedules can be imposed.

    # sensor network should also be capable of adapting tochanging connectivity due to the failure of nodes, or newnodes powering up. he routing protocols should be able todynamically include or avoid sensor nodes in their paths.

    "eal%time communication over sensor networks must besupported through provision of guarantees on maximumdelay, minimum bandwidth, or other 7oS parameters.

    Provision must be made for secure communication oversensor networks, especially for military applications whichcarry sensitive data.

    Classification of sensor network protocol

    3

  • 8/10/2019 Unit 3 - WSN - MAC

    4/22

    4

  • 8/10/2019 Unit 3 - WSN - MAC

    5/22

    12.2 Sensor Network Architecture

    he two basic kinds of sensor network architecture

    !ayered #rchitecture

    Clustered #rchitecture

    12.2.1 Layered Architecture

    # layered architecture has a single powerful base station, andthe layers of sensor nodes around it correspond to the nodes thathave the same hop%count to the +S.

    3n the in%building scenario, the +S acts an access point to a wirednetwork, and small nodes form a wireless backbone to provide

    wireless connectivity.

    he advantage of a layered architecture is that each node isinvolved only in short%distance, low%power transmissions tonodes of the

    neighboringlayers.

    Unified Network Protocol Framework (UNPF)

    5

  • 8/10/2019 Unit 3 - WSN - MAC

    6/22

    *8P$ is a set of protocols for complete implementation of alayered architecture for sensor networks

    *8P$ integrates three operations in its protocol structure:

    8etwork initiali6ation and maintenance #C protocol "outing protocol

    Network initialization and maintenance

    he +S broadcasts its 3& using a known C code on thecommon control channel.

    #ll nodes which hear this broadcast then record the +S 3&. heysend a beacon signal with their own 3&s at their low defaultpower levels.

    hose nodes which the +S can hear form layer one +S broadcasts a control packet with all layer one node 3&s. #ll

    nodes send a beacon signal again. he layer one nodes record the 3&s which they hear 0form layer

    two1 and inform the +S of the layer two nodes 3&s. Periodic beaconing updates neighbor information and change the

    layer structure if nodes die out or move out of range.

    MA !rotocol

    &uring the data transmission phase, the distributed

    receiver oriented channel 0&"5C1 assignment #C protocol isused.

    wo steps of &"5C :

    Channel allocation :Each node is assigned a receptionchannel by the +S, and channel reuse is such that collisionsare avoided.

    Channel scheduling :he node schedules transmissionslots for all its neighbors and broadcasts the schedule. his

    enables collision%free transmission and saves energy, asnodes can turn o) when they are not involved on asend'receive operation.

    6

  • 8/10/2019 Unit 3 - WSN - MAC

    7/22

    "outin# !rotocol

    &ownlink from the +S is by direct broadcast on the controlchannel. *plink from the sensor nodes to +S is by multi%hop data

    forwarding.

    he node to which a packet is to be forwarded is selectedconsidering the remaining energy of the nodes. his achieves ahigher network lifetime.

    UNPF$"

    5ptimi6e the network performance by make the sensor nodesadaptively vary their transmission range.

    +ecause while a very small transmission range cause network

    partitioning, a very large transmission range reduce the spatialreuse of fre(uencies.

    he optimal range 0"1 is determined by simulated annealing

    5b9ective function :Nn

    dRf

    !" =

    8 : the total number of sensors n : the number of nodes in layer one : the energy consumption per packet d : the average packet delay

    3f no packet is received by the +S from any sensor node for

    some interval of time, the transmission range increase by. 5therwise, the transmission range is either decrease bywith probability .; x 0 n ' 8 1, or increase by withprobability < = > .; x 0 n ' 8 1 ?.

    3f , then the transmission range "/ is adopt.5therwise, " is modied to "/ with probability

    : the temperature parameter

    he advantage of the *8P$%" : inimi6e the energy x delay aximi6e the number of nodes which can connect to

    the +S

    #

  • 8/10/2019 Unit 3 - WSN - MAC

    8/22

    12.2.2 Clustered Architecture

    # clustered architecture organi6es the sensor nodes into clusters,each governed by a cluster%head. he nodes in each cluster are

    involved in message exchanges with their cluster%heads, andthese heads send message to a +S.

    Clustered architecture is useful for sensor networks because ofits inherent suitability for data fusion. he data gathered by allmember of the cluster can be fused at the cluster%head, and onlythe resulting information needs to be communicated to the +S.

    he cluster formation and election of cluster%heads must be anautonomous, distributed process.

    Low$%ner#y Ada!ti&e lu'terin# ierarchy (L%A)

    $

  • 8/10/2019 Unit 3 - WSN - MAC

    9/22

    !E#C4 is a clustering%based protocol that minimi6es energydissipation in sensor networks. he operation of !E#C4 is spiltinto two phases : setup and steady.

    Setup phase : each sensor node chooses a randomnumber between and =. 3f this is lower than the threshold

    for node n, 0n1, the sensor node becomes a cluster%head.he threshold 0n1 is calculated as

    P : the percentage of nodes which are cluster%heads r : the current round @ : the set of nodes that has not been cluster%heads

    in the past ='P rounds

    #fter selection, the cluster%heads advertise their selection to allnodes. #ll nodes choose their nearest cluster%head by signal strength0"SS31. he cluster%heads then assign a schedule for their clustermembers.

    Steady phase :data transmission takes place based onthe schedule, and the cluster%heads perform dataaggregation'fusion.

    #fter a certain period of time in the steady phase, cluster%heads areselected again through the setup phase.

    12.3 ata issemination

    &ata dissemination is the process by which (ueries or data arerouted in the sensor network. he data collected by sensor nodeshas to be communicated to the node which interested in thedata.

    he node that generates data is call source and the informationto be reported is called an event. # node which interested in an

    event is called sink. Data dissemination consist of a two-step process :interest

    propagation and data propagation. Interest propagation : for every event that a sink is

    interested in, it broadcasts its interest to is neighbor, andacross the network.

    Data dissemination : Ahen an event is detected, itreported to the interested nodes 0sink1.

    %

  • 8/10/2019 Unit 3 - WSN - MAC

    10/22

    12..1 Floodin#

    Each node which receives a packet 0(ueries'data1 broadcasts it ifthe maximum hop%count of the packet is not reached and thenode itself is not the destination of the packet.

    &isadvantages :

    Implosion:this is the situation when duplicate messagesare send to the same node. his occurs when a nodereceives copies of the same messages from many of itsneighbors.

    Overlap: the same event may be sensed by more thanone node due to overlapping regions of coverage. hisresults in their neighbors receiving duplicate reports of thesame event.

    Resource blindness: the -ooding protocol does notconsider the available energy at the nodes and results inmany redundant transmissions. 4ence, it reduces thenetwork lifetime.

    12..2 *o''i!in#

    odied version of -ooding

    he nodes do not broadcast a packet, but send it to a randomlyselected neighbor.

    #void the problem of implosion

    3t takes a long time for message to propagate throughout thenetwork.

    3t does not guarantee that all nodes of network will receive themessage.

    12.. "umor "outin#

    #gent%based path creation algorithm

    #gent is a long%lived packet created at random by nodes, and itwill die after visit k hops.

    3t circulated in the network to establish shortest paths to eventsthat they encounter.

    1&

  • 8/10/2019 Unit 3 - WSN - MAC

    11/22

    Ahen an agent nds a node whose path to an event is longerthan its own, it updates the node/s routing table.

    11

  • 8/10/2019 Unit 3 - WSN - MAC

    12/22

    12..+ ,e-uential A''i#nment "outin# (,A")

    he se(uential assignment routing 0S#"1 algorithm createsmultiple trees, where the root of each tree is a one%hop neighborof the sink.

    o avoid nodes with low throughput or high delay.

    Each sensor node records two parameters about each paththough it: available energy resources on the path and an additive7oS metric such as delay.

    4igher priority packets take lower delay paths, and lowerpriority packets have to use the paths of greater delay, sothat the priority x delay 7oS metric is maintained.

    S#" minimi6es the average weighted 7oS metric over thelifetime of the network.

    12.. irected iffusion

    12

  • 8/10/2019 Unit 3 - WSN - MAC

    13/22

  • 8/10/2019 Unit 3 - WSN - MAC

    14/22

    SP38 has three types of messages: #&J, "E7, and #.

    SP38%H using an energy threshold to reduce participation. # nodemay 9oin in the #&J%"E7%# handshake only if it has su2cientresource above a threshold.

    12.. Cost!"ieldApproach

    he cost%eld approach considers the problem of setting uppaths to a sink. he rst phase being to set up the cost eld,based on metrics such as delay. he second phase being datadissemination using the costs.

    # sink broadcasts an #&J packet with its own cost as .

    Ahen a node 8 hears an #&J message from node , it sets itsown path cost to min 0!8,!KC81, where !8 is the total pathcost from node 8 to the sink, ! is the cost of node to the sink,C8 is the cost from 8 to .

    3f !8 updated, the new cost is broadcast though another #&J.

    14

  • 8/10/2019 Unit 3 - WSN - MAC

    15/22

    he back%o) time make a node defer its #&J instead ofimmediately broadcast it. he back%o) time is r x C8, where r isa parameter of algorithm.

    12.. #eographic Hash $a%le H$'

    @4 hashes keys into geographic coordinates and stores a 0key,value1 pair at the sensor node nearest to the hash value.

    Stored data is replicated to ensure redundancy in case of nodefailures.

    he data is distributed among nodes such that it is scalable andthe storage load is balanced.

    he routing protocol used is greedy perimeter stateless routing0@PS"1, which again uses geographic information to route thedata and (ueries.

    15

  • 8/10/2019 Unit 3 - WSN - MAC

    16/22

    12..3 Small (inimum )nerg* Communication Network

    3f the entire sensor network is represented by @, the subgraph @/

    is constructed such that the energy usage of the network isminimi6ed. he number of edges in @/ is less than @, and the connectivity

    between any two nodes is not disrupted by @/. he power re(uired to transmit data between u and v is modeled

    as

    t : constant n : loss exponent indicating the loss of power with distance

    from transmitter d0u,v1 : the distance between u and v

    3t would be more economical to transmit data by smaller hops

    Suppose the path between u 0i.e. u1 and v 0i.e. uk1 isrepresented by r D 0u, u=, L uk1, each 0ui, uiK=1 is edge in @/

    he total power consumed for the transmission is

    C

    : the power needed to receive the data

    he path r is the minimum energy path if C0r1 M C0r/1 for allpath/s r/ between u and v in @.

    SEC8 uses only the E paths from @/ for data transmission, sothat the overall energy consumed is minimi6ed.

    12.+ ata #athering

    he ob9ective of the data gathering problem is to transmit thesensed data from each sensor node to a +S.

    he goal of algorithm which implement data gathering is maximi6e the lifetime of network inimum energy should be consumed

    16

  • 8/10/2019 Unit 3 - WSN - MAC

    17/22

    he transmission occur with minimum delay

    he energy x delay metric is used to compare algorithm

    12.+.1 4irect 5ran'mi''ion

    #ll sensor nodes transmit their data directly to the +S.

    3t cost expensive when the sensor nodes are very far from the+S.

    8odes must take turns while transmitting to the +S to avoidcollision, so the media access delay is also large. 4ence, thisscheme performs poorly with respect to the energy x delaymetric.

    12.+.2 Power$%fficient *atherin# for ,en'or 0nformation ,y'tem'

    PE@#S3S based on the assumption that all sensor nodes know thelocation of every other node.

    #ny node has the re(uired transmission range to reach the +S inone hop, when it is selected as a leader.

    he goal of PE@#S3S are as following inimi6e the distance over which each node transmit inimi6e the broadcasting overhead inimi6e the number of messages that need to be sent to

    the +S

    &istribute the energy consumption e(ually across all nodes o construct a chain of sensor nodes, starting from the node

    farthest from the +S. #t each step, the nearest neighbor whichhas not been visited is added to the chain.

    3t is reconstructed when nodes die out. #t every node, data fusion or aggregation is carried out.

    # node which is designated as the leader nally transmits onemessage to the +S.

    !eadership is transferred in se(uential order.

    he delay involved in messages reaching the +S is 5081

    1#

  • 8/10/2019 Unit 3 - WSN - MAC

    18/22

    Figure12.8 Datagathering with PEGASIS

    12.+. 6inary ,cheme

    his is a chain%based scheme like PE@#S3S, which classiesnodes into di)erent levels.

    his scheme is possible when nodes communicate using C,so that transmissions of each level can take placesimultaneously.

    he delay is 50log81

    1$

  • 8/10/2019 Unit 3 - WSN - MAC

    19/22

    12.+.+ hain$6a'ed 5hree$Le&el ,cheme

    $or non%C sensor nodes he chain is divided into a number of groups to space out

    simultaneous transmissions in order to minimi6e interference.

    Aithin a group, nodes transmit data to the group leader, and theleader fusion the data, and become the member to the nextlevel.

    3n the second level, all nodes are divided into two groups. 3n the third level, consists of a message exchange between one

    node from each group of the second level. $inally, the leader transmit a single message to the +S.

    12., (AC -rotocols for Sensor Networks

    he challenges posed by sensor network #C protocol 8o single controlling authority, so global synchroni6ation is

    di2cult

    1%

  • 8/10/2019 Unit 3 - WSN - MAC

    20/22

    Power e2ciency issue $re(uent topology changes due to mobility and failure

    here are three kinds of #C protocols used in sensor network: $ixed%allocation

    &emand%based Contention%based

    $ixed%allocation #C protocol Share the common medium through a predetermined

    assignment. 3t is suitable for sensor network that continuously monitor

    and generate deterministic data tra2c Provide a bounded delay for each node

    4owever, in the case of bursty tra2c, where the channel

    re(uirements of each node may vary over time, it may leadto ine2cient usage of the channel.

    &emand%based #C protocol *sed in such cases, where the channel is allocated

    according to the demand of the node Jariable rate tra2c can be e2ciently transmitted

    "e(uire the additional overhead of a reservation process

    Contention%based #C protocol

    "andom%access%based contention for the channel whenpackets need to be transmitted

    Suitable for bursty tra2c

    Collisions and no delay guarantees, are not suitable fordelay%sensitive or real%time tra2c

    12..1 ,elf$7r#anizin# MA for ,en'or Network' and %a&e'dro! and"e#i'ter

    Self%5rgani6ing #C for sensor 0S#CS1 networks and eavesdropand register 0E#"1 are two protocols which handle networkinitiali6ation and mobility support, respectively.

    3n S#CS

    2&

  • 8/10/2019 Unit 3 - WSN - MAC

    21/22

    neighbor discovery and channel assignment take placesimultaneously in a completely distributed manner.

    # communication link between two nodes consists of a pairof time slots, at xed fre(uency.

    his scheme re(uires synchroni6ation only between

    communicating neighbors, in order to dene the slots to beused for their communication. Power is conserved by turning o) the transceiver during

    idle slots.

    3n E#" protocol Enable seamless connection of nodes under mobile and

    stationary conditions. his protocol make use of certain mobile nodes, besides

    the existing stationary sensor nodes, to o)er service tomaintain connections.

    obile nodes eavesdrop on the control signals andmaintain neighbor information.

    12..2 y8rid 54MA9F4MA

    # pure scheme minimi6e the time for which a node has tobe kept on, but the associated time synchroni6ation cost are veryhigh.

    # pure $ scheme allots the minimum re(uired bandwidth foreach connection

    3f the transmitter consumes more power, a scheme is

    favored, since it can be switch o) in idle slots to save power. 3f the receiver consumes greater power, a $ scheme is

    favored, because the receiver need not expend power for timesynchroni6ation.

    12.. ,MA$6a'e MA Protocol'

    CS#%based schemes are suitable for point%to%point randomlydistributed tra2c -ows.

    he sensing periods of CS# are constant for energy e2ciency,while the back%o) is random to avoid repeated collisions.

    +inary exponential back%o) is used to maintain fairness in thenetwork.

    *se an adaptive transmission rate control 0#"C1 to balanceoriginating tra2c and route%through tra2c in nodes. his ensuresthat nodes closer to the +S are not favored over farther nodes.

    CS#%based #C protocol are contention%based and aredesigned mainly to increase energy e2ciency and maintainfairness.

    21

  • 8/10/2019 Unit 3 - WSN - MAC

    22/22