Routing Protocols: Sensor Networks
Routing Protocols: Sensor Networks
for
Sensor Networks
Agenda
General Properties
Architectures and Requirements
Routing Protocols Classification
10 Suggested Routing Protocols:
LEACH DD
PEGASIS MCF
TEEN TTDD
APTEEN RW
SPIN RR
Acknowledgements
E. Magistretti (U. Bologna Italy)
J. Kulik (MIT; BBN Co.)
R. R. Choudhury, P. Kyasanur & N. Vaidya (UIUC)
P. Desai (UFL)
D. Braginsky and D. Estrin (UCLA)
S. Hazarika, W. Chen, Y. Gong & X. Liu (UMASS)
T. Kwon & Mjnam (SNU Korea)
R. Peterson & D. Rus (Dartmouth C.)
H.C. Chung, K. Ghoshal & J. Krishna (TAMU)
C. Tavoularis (Cornell )
G. Dong (Virginia U.)
WSN
Dartmouth College
Concepts
Application: Military
From UMASS
Environmental
From UMASS
Future Health
Circulatory Net
Agenda
General Properties
Architectures and Requirements
Routing Protocols Classification
10 Suggested Routing Protocols:
LEACH DD
PEGASIS MCF
TEEN TTDD
APTEEN RW
SPIN RR
General Properties (1)
Mainly for Information Collection
Single Owner
Up to Hundreds of Thousands of Nodes
Disposable Nodes
Cheap Nodes
Security Concerns
General Properties (2)
Bounded Directed Stream (from/to Sink)
Somewhat Limited Computation Capability
Sensor Unit
ADC – Analog Digital Converter
CPU – Central Processing Unit
Power Unit
Communication Unit
General Architecture (2)
General Requirements (1)
Varying Network Size
Inexpensive Nodes Equipment
Long Lifetime (Power)
Load-Balancing
Self-Organization
Re-tasking and Querying Capability
General Requirements (2)
Sensible Data Aggregation
Consolidation of Redundant Data
Application Awareness
Tradeoff
Communication for Computation
Possible Mobility
Agenda
General Properties
Architectures and Requirements
Routing Protocols Classification
10 Suggested Routing Protocols:
LEACH DD
PEGASIS MCF
TEEN TTDD
APTEEN RW
SPIN RR
Protocol Classification (1)
Proactive –
First Compute all Routes;
Then Route
Reactive –
Compute Routes On-Demand
Hybrid –
First Compute all Routes;
Then Improve While Routing
Protocol Classification (2)
Direct
–
Node and Sink Communicate Directly
(Fast Drainage; Small Scale)
Flat(Equal) –
Random Indirect Route
(Fast Drainage Around Sink; Medium Scale)
Clustering(Hierarchical) –
Route Thru Distinguished Nodes
Protocol Classification (3)
Location Aware –
Nodes knows where they are
Location-Less –
Nodes location is unimportant
Mobility Aware –
Nodes may move –
Sources; Sinks; All
Protocol Classification (4)
Unicast –
One-to-One Message Passing
Multicast (actually Local Broadcast) –
Node-to-Neighbors Message Passing
Broadcast –
Full-Mesh – Source to Everyone
Protocol Classification (5)
Query Models:
Historical Queries: Analysis of historical data
“What was the watermark 2h ago in the southeast?”
Different clusters use different CDMA codes
Code chosen in random
2 - PEGASIS (1)
Token-Passing Chain-Based
Protocol Highlights
2 - PEGASIS (2)
Stationary Nodes
Main Drawbacks
Global Information
Limited Scale:
Information travels many nodes
Assumes any node can communicate
with sink
Power-Efficient Gathering in Sensor Information Systems
2 - PEGASIS (3)
Greedy Algorithm Construct Chain –
Main Procedures
2 - PEGASIS (4)
Illustrations
Power-Efficient Gathering in Sensor Information Systems
2 - PEGASIS (5)
Illustrations
3 - TEEN (1)
LEACH based Clustering
Protocol Highlights
3 - TEEN (2)
“Hot Spot” Problem
Main Drawbacks
3 - TEEN (3)
LEACH Proactive Clustering
Main Procedures
3 - TEEN (4)
Illustrations
Adaptive Periodic Threshold-sensitive Energy Efficient Sensor Network
4 - APTEEN (1)
Improved (Adaptive - Hybrid) TEEN
Protocol Highlights
4 - APTEEN (2)
LEACH problems…
Main Drawbacks
Complex logic
Adaptive Periodic Threshold-sensitive Energy Efficient Sensor Network
4 - APTEEN (3)
LEACH Proactive Clustering
Main Procedures
4 - APTEEN (4)
Illustrations
Power Consumption:
As could be expected –
APTEEN is better the LEACH
but not as good as TEEN
Sensor Protocol for Information via Negotiation
5 - SPIN (1)
Network-wide Broadcast Limited by
Protocol Highlights
5 - SPIN (2)
Broadcast - Limited Scale –
Main Drawbacks
5 - SPIN (3)
SPIN-PP (Point-to-Point Communication)
Main Procedures
5 - SPIN (4)
SPIN-BC (Local Broadcast Communication)
Main Procedures
5 - SPIN (5)
Node with data
Illustrations
ADV
5 - SPIN (5)
Node with data
Illustrations
REQ
5 - SPIN (5)
Node with data
Illustrations
DATA
5 - SPIN (5)
Node with data
Illustrations
ADV
5 - SPIN (5)
Node with data
Illustrations
Already
has data
(or dead)
REQ
5 - SPIN (5)
Node with data
Illustrations
DATA
(sink)
Query Reaches Relevant Sensor Sources
This Sets-Up Exploratory Gradients
Once Data is Available in a Source
it is Sent Back via Reinforced Path
Failing Links / Nodes are being Gradually
Bypassed
Directed Diffusion
6 - DD (4) CLASS_KEY IS INTEREST_CLASS
LONGITUDE_KEY GE 10
LONGITUDE_KEY LE 50
LATITUDE_KEY GE 100
Illustrations
LATITUDE_KEY LE 120
SENSOR EQ MOVEMENT
Source INTENSITY GE 0.6
CONFIDENCE GE 0.7
INTERVAL IS 10
EXPIRE_TIME IS 100
Sink
Interest = Interrogation
SENSOR EQ MOVEMENT
INTENSITY GE 0.7
Source 3. addFilter (FilAttrVec, FilterCallback)
InterestAttrVec
CLASS_KEY EQ INTEREST_CLASS
LONGITUDE_KEY IS 35
LATITUDE_KEY IS 110
SENSOR IS MOVEMENT Sink
Interest = Interrogation
Source
Sink
Interest = Interrogation
Gradient = Who is interested
Directed Diffusion
6 - DD (4)
Sending data …
Illustrations
Source
4. h = publish (SensedAttrVec)
5. send (h, SensedAttrVec)
SensedAttrVec Sink
CLASS_KEY IS DATA_CLASS
LONGITUDE_KEY IS 35
LATITUDE_KEY IS 110
SENSOR IS MOVEMENT
INTENSITY IS 0.8
CONFIDENCE IS 0.7
Low rate event
Directed Diffusion
6 - DD (4)
Illustrations
Sink
CLASS_KEY IS INTEREST_CLASS
LONGITUDE_KEY GE 10
LONGITUDE_KEY LE 50
LATITUDE_KEY GE 100
Source LATITUDE_KEY LE 120
SENSOR EQ MOVEMENT
INTENSITY GE 0.6
CONFIDENCE GE 0.7
INTERVAL IS 1
EXPIRE_TIME IS 90
Sink
Source
Sink
Recovering
from node failure
Low rate event
Reinforcement
High rate event
Directed Diffusion
6 - DD (5)
Illustrations
Source
Sink
Stable path
Low rate event
High rate event
Directed Diffusion
6 - DD (6)
Illustrations
Source
Sink
Recovering
from link failure
Low rate event
Reinforcement
High rate event
Directed Diffusion
6 - DD (6)
Illustrations
Source
Sink
Stable path
7 - MCF (1)
Cost-Field min Cost from Node to Sink on
Protocol Highlights
Optimal Path
Slop-Down the Cost-Fields to Get to Sink
Minimize Multiple Transmissions using
Back-Off Algorithm Based on Node Cost
Localized Communication
Minimum Cost Forwarding
7 - MCF (2)
High Time Complexity (due to back-off)
Main Drawbacks
7 - MCF (3)
Broadcast ADV msg. and get Answers from
Main Procedures
all Sinks Create Cost-Fields
Calculate Back-Off Timer Proportional to
Cost per each Sink
Needed Information Sent thru Slop
If no ACK until Timer Expires – Resend ADV
Minimum Cost Forwarding
7 - MCF (4)
Illustrations
Cost
A
B
C
Timeline
Minimum Cost Forwarding
7 - MCF (5)
Illustrations
A=150
110
S = 200 B = 120
C = 90
130 50
100
60
90
Sink = 0
Two-Tier Data Dissemination
8 - TTDD (1)
Grid Structure Clustering
Protocol Highlights
8 - TTDD (2)
No Mobile Sensors
Main Drawbacks
8 - TTDD (3)
Grid Build using Greedy Algorithm and
Main Procedures
Location Awerness
Node Floods Messages to Dissemination
Nodes
Dissemination Nodes Forward to Sink
If a Node Fails – Grid is Fixed
Two-Tier Data Dissemination
8 - TTDD (4)
Illustrations
Dissemination Node
Data Announcement
Source
Data
Sink
Immediate Query
Dissemination
Node
TTDD Basics
Two-Tier Data Dissemination
8 - TTDD (5)
Illustrations
Dissemination Node
Trajectory
Data Announcement Forwarding
Source
Data Immediate
Dissemination
Node
Sink
Immediate
Dissemination Trajectory
Node Forwarding
8 - TTDD (6)
Illustrations
Dissemination Node
Trajectory
Data Announcement Forwarding
Source
Data Immediate
Dissemination
Node
9 - RW (1)
Finding a Random Walk over a Grid
Protocol Highlights
9 - RW (2)
Topology may not be Practical
Main Drawbacks
9 - RW (3) - RSG
Regular Static Graphs
Main Procedures
9 - RW (4) - ISG
Irregular Static Graphs (Some dead nodes)
Main Procedures
9 - RW (5) - DG
Dynamic Graphs (Nodes may sleep and wake)
Main Procedures
9 - RW (6) - RSG
…...
Illustrations
0 1 2 N-1
0 S
de[3,2]=2
1 u4
P4
2 u3 P3 v P1 u1
[3,2]
P2
...
u2
N-1 R
Random Walks
0 1 2 3 0 1 2 3
0 1/2 2/3 3/4 1/2
1,20 1,10 1,4 1,1 0 1,7 1,3 0,0 0,1
1/2
1/3
1/4
1/2
1
1
1/3 1/2 1/3 1/3 1 1/2
1 1,10 2,6 3,3 4,1 1 1,4 2,3 2,3 2,1
2/3
1/2
2/3
2/3
1/2
1
1
1/4 2/3 1/2 1/2
2 1,4 3,3 6,2 10,1
2 1,1 0,0 2,2 4,1
3/4
1/3
1/2
1/2
1
1
1 1 1 1 1 1
3 1,1 4,1 10,1 20,1
3 1,1 1,1 3,1 7,1
ISG ISG
Random Walks
10 - RR (1)
Observation: for many application any
Protocol Highlights
10 - RR (2)
Attractive only when the ratio between
Main Drawbacks
10 - RR (3)
Movement on the net is done by several
Main Procedures
agents, trying (randomly) to walk straight.
Every node maintains lists of neighbors and
events (how to get to the reporting node).
An agent coming from and event is
updating nodes it visits.
An agent coming from a query is searching
for ways to the reporting nodes.
High probability the lines will intersect.
Rumor Routing
10 - RR (4)
Illustrations
10 - RR (5)
Illustrations
Event
Source
Query
Source
Agenda
General Properties
Architectures and Requirements
Routing Protocols Classification
10 Suggested Routing Protocols:
LEACH DD
PEGASIS MCF
TEEN TTDD
APTEEN RW
SPIN RR
Conclusions
WSN will spread to many applications
Properties and Requirements are both
Unique and Diversified
Routing Protocol choice
is and probably will continue to be
Application Driven
More Analysis, Simulations and new
Ideas are needed for every category
References (1)
Q. Jiang, D. Manivannan, Routing Protocols for Sensor Networks,
IEEE Consumer Communications and Networking Conference
(CCNC'04), 2004.
R. Jurdak, C. V. Lopes, P. Baldiy, A Framework for Modeling Sensor
Networks, 19th Annual ACM Conference on Object-Oriented
Programming, Systems, Languages, and Applications (OOPSLA'04),
2004.
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-
Efficient Communication Protocol for Wireless Microsensor
Networks, IEEE Proceedings of the IEEE International Conference
on System Sciences, 2000.
S. Lindsey, C. S. Raghavendra, PEGASIS: Power Efficient GAthering
in Sensor Information Systems, IEEE Aerospace Conference, 2002.
References (2)
A. Manjeshwar and D. P. Agrawal, TEEN: A Protocol for Enhanced
Efficiency in Wireless Sensor Networks, Proceedings of the 1st
International Workshop on Parallel and Distributed Computing
Issues in Wireless Networks and Mobile Computing (with
IPDPS'01), 2001.
A. Manjeshwar and D. P. Agrawal, APTEEN: a hybrid protocol for
efficient routing and comprehensive information retrieval in
wireless sensor networks, Proceedings of the International Parallel
and Distributed Processing Symposium (IPDPS'02), 2002.
J. Kulik, W. Heinzelman, and H. Balakrishnan, Negotiation-Based
Protocols for Disseminating Information in Wireless Sensor
Networks, Wireless Networks, Vol. 8, pp. 169-185, 2002.
C. Intanagonwiwat, R. Govindan, D. Estrin, J. S. Heidemann, and
F. Silva, Directed Diffusion for Wireless Sensor Networking,
IEEE/ACM Transactions on Networking, vol. 11, no. 1, pp. 2-16,
2003.
References (3)
F. Ye, A. Chen, S. Lu, L. Zhang, A Scalable Solution to Minimum
Cost Forwarding in Large Sensor Networks, Proceedings of the
10th IEEE International Conference on Computer Communications
and Networks (ICCCN'01), 2001.
F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, A Two-Tier Data
Dissemination Model for Large-scale Wireless Sensor Networks,
ACM International Conference on Mobile Computing and
Networking (MOBICOM'02), 2002.
S. D. Servetto, G. Barrenechea, Constrained Random Walks on
Random Graphs: Routing Algorithms for Large Scale Wireless
Sensor Networks, In the Proceedings of the 1st ACM International
Workshop on Wireless Sensor Networks and Applications
(WSNA'02), 2002.
D. Braginsky, D. Estrin, Rumor Routing Algorithm For Sensor
Networks, In the Proceedings of the 1st ACM International
Workshop on Wireless Sensor Networks and Applications
(WSNA'02), 2002.
SenseYour
Network
Dude
Karl
Friedrich
Hieronymus
Baron of
Munchausen
(1720-1797)