q No 5 Iot 1 Ass
q No 5 Iot 1 Ass
called a sink.
Traffic models have been developed for sensor
networks such as the data collection
and data
dissemination (diffusion) models. In the data collectio
model, the source sends the data it collects
to a collection
entity such as the BS. This could be
periodic or on demand.
The data is processed in the central collection
entity.
Data diffusion, on, the other hand,
consists of
two-step process of interest propagation and data
propagation. An interest is a descriptor for a
particular
kind of data or event that a
node is interested in, such as
temperature, intrusion, or presence
ofbio-agents.
For every event that a
sink is interested in,
broadcasts its interest to
its neighbors
refreshes its interest. and periodically
The interest is
network, and every propagated across the
node maintains an
eventsto be reported. interest cache of all
This is similar to a
the sink. When multicasttree
an event is formation, rooted at
interested nodes detected, it is
after referring reported to the
Intermediate to the
nodes maintain interest cache
aggregatethe data or
a
a data cache and can
The paths modify the rate
used for data of reporting
pro data
preferring the propagation
shortestpaths are modified
longer paths. and by
are sent to
: disadvantages:
Implosion This is the situation when
duplicate
the samne node. This 0ccurs whenmessages
a node
receives copies of the same
message from many of its.
neighbors.
Overlap: The same event may be sensed
by more than
one node due to overlapping regions
of coverage. This
same event.
Resource Blindness
many redundant
:
resultsin their neighbors receiving
duplicate reports of the
transmissions.
nodes and results in
Hence, it reduces the
network lifetime.
:
Gossiping Gossiping is a modified version of flooding.
where the nodes do not broadcast a packet, but send it to
a
randomly selected neighbor. This avoids the problem of
iimplosion. but it takes a long time- for a
message to
propagate throughout the network. Though gossiping has
considerably lower overhead than flooding, it does not
guarantee that all nodes of the network will receive the
message. It reies on the random neighbor selection to
eventuallypropagate thê message throughout the network.
Rumor Routing:Rumor an agent-based path
routing is
creation algorithm. Agents, or "ants," are long-lived
entities created at random by nodes.. These are
basically
packets which are circulated in the network to establish
shortest paths to events that they encounter.
shown in Figure.
When a query is generated at a sink, it is sent on
random walk with the hope that it will find a path
(preestablished by an agent) leading to the required event
This is based on the high
probability of two straight lines
intersecting on a planar graph, assuming the
network
topology is like a planar graph, and the paths establishe
can be approximated by straight lines owing to high
density of the nodes.
If a query does not find an event path, the sink
times
out and uses flooding as a last resort to
propagate the
query,suppose a query
for event Elis generated by
P. node
Through a random walk, it
reaches A, where it finds th
previously
established path to El. Hence, the
directed to El query 18
through node B, asindicated by A's
table.
INTERNET OF THINGS (A.17]
šink,
priority 5
(higher pority) will follow th xhrter pat
along tree A, so that the priority x delay s metric
maintained. SAR minimizes the average weighted QoS
metric over the lifetime of the network. The sink
periodically triggers metric update to reflect the changes in
available energy resource aftersome transmissions.
Directed Diffusion : The directed diffuaion protocol i
useful in scenarios where the sensor nodes themselvee
generate requests/queries for data sensed by other nodes
instead of all queries arising only from a BS. Hence. the
sink for the query could be a BS or a sensor node. The
directed diffusion routing protocol improves on data
diffusion using interest gradients.
Each sensor node names its data with one or more
attributes, and other nodes express their interest
depending on these attributes. Attribute-value pairs can be
used to describe an interest in intrusion data as follows
where an interest is nothing but a set of descriptors for the
data in which the querying node is interested.
type =vehicle detect vehicle location "/
interval = 1s I* report every 1 second "/
rec {0, 0,600, 80 -/* query addressed to sensors within
this
rectangle'/
Timestamp'= 02:30:00 when the interest originated!
when the sink retains this data
expiresAt- 03:00:00 "/till