Wireless Sensor Networks Mixalis Ombashis ECE-654 Advanced Networks Instructor: Dr. Christos Panayiotou Outline • Introduction • Design Factors Fault Tolerance Scalability Production Cost Hardware Constrains … • Protocol Stack Physical Layer Data link Layer … • Cross layer Protocols For WSN – XCP – XLM What Is A Sensor ? • A sensor (also called detector) is a converter that measures a physical quantity and converts it into a signal which can be read by an observer or by an (today mostly electronic) instrument. • Area Monitoring • Environmental Sensing • Military Applications • Health • Fire Detection • Home Automation Applications Introduction • Sensor Node Components Introduction • Sensor Position – Need to be engineered or predetermined – Random Deployment in inaccessible terrains – Disaster Relief Operations • Self organizing Capabilities – Protocols – Algorithms • Local Computation – Transmit Only Required Partially Processed Data • Centralized Approach where all sensors readings are gathered at a sink (Directed Diffusion) • Stationary Sink – Pre determined Position Implementation of Sensor Field - Sink - User Two-Tier Data Dissemination Model For Large Scale WSN • Locations are known through the use of GPS and localization algorithms • Homogeneous Sensor nodes • Short Range Radio • Multiple Hops for long distances • Sinks query the network • Two level Flooding Design Factors • Fault Tolerance – Nodes May Fail, Blocked or Physical Damaged – Ability to sustain functionalities without any interruption due to sensor node failures • Source of Faults in WSN Applications • Node Faults • Network Faults • Sink Faults • Failure Classification • Crash or Omission • Timing • Value • Arbitrary Design Factors • Fault detection techniques – Self-Diagnosis – Group Detection: Only if a reference value is available – Hierarchical Detection: Trees • Fault recovery techniques – Active replication 1. Multipath routing 2. Sensor value aggregation 3. Ignore values from faulty nodes – Passive replication 1. Node selection a) Self-election : Probabilistic Algorithms b) Group election: Clusters With Cluster Heads c) Hierarchical election 2. Service Distribution a) Pre-Copy: Make The Code of All nodes available on all nodes before deployment b) Code distribution c) Remote Execution Design Factors • Scalability – Number of Deployed nodes vary from hundreds to thousands or millions depending on the applications – Density has to be utilized: • N is the number of scattered nodes • R is the ratio transmission range • μ(R) gives the number of nodes within the transmission radius of each node in region A • Production Cost – Obviously has to be low Design Factors • Hardware Constrains – May need to fit into a matchbox-sized module – Consume Extremely Low Power • Environment – Unattended in Remote geographic areas – Bottom of an ocean – Battlefield Design Factors • Transmission Media – Wireless Medium: Radio, Infrared • Power Consumption – Limited Power Source – May be Impossible to Replenish Power Source – The malfunctioning of few nodes can cause significant topological changes and might require rerouting of packets and reorganization of the network Protocol Stack Management Planes Protocol Stack • Management Planes – Power Management Plane: • Manage how a sensor node uses its power – Mobility Management Plane: • Detects and registers the movement of sensor nodes, so a route back to the user is always maintained and the sensor nodes can keep track of who their neighbour sensors are – Task Management Plane: • Sensor can work together in a power efficient way, route data in a mobile sensor network, and share resources between sensor nodes Protocol Stack • The Physical Layer – Responsible for • • • • • Frequency selection Carrier frequency generation Signal detection Modulation Data encryption The Physical Layer • Requirements – The radio must be containable in a small device, since the sensor nodes are small – The radios must be cheap, since the sensors will be used in large numbers in redundant fashion – The radio technology must work with higher layers in the protocol stack to consume very low power levels The Physical Layer • Signal propagation effects – Power required to transmit a signal is Proportional to dn , ( 2 ≤ 𝒏 < 4 ) – n closer to 4 for low-lying antennas and near ground channels, due to signal cancellation by a ground-reflected ray. – Multihop communication in a sensor network can effectively overcome shadowing and path loss effects, if the node density is high enough Protocol Stack • The Data Link Layer – Responsible for • • • • Multiplexing of data streams Data frame detection Medium Access Control Error Control Medium Access Control (MAC) • Two Goals: 1. 2. Creation of the network infrastructure Share communication resources between sensor nodes • Collision avoidance • Energy efficiency • Scalability in node density • Why existing MAC protocols can’t be used? – The primary goal of the existing MAC protocol is the provision of high QoS and bandwidth efficiency – Energy is not taken into account • MAC protocols for sensor network must have – Built-in power conservation – Mobility management – Failure recovery strategies Medium Access Control (MAC) Need To Turn Off The RADIO!! Medium Access Control (MAC) • Major sources of energy waste – Long idle time when no sensing event happens – Collisions – Overhearing – Control overhead MAC Protocols Proposed For Sensor Networks • The SMACS protocol - Self-Organizing Medium Access Control For Sensor Networks – Achieves network start-up and link-layer organization • CSMA - Carrier Sense Multiple Access based MAC • Hybrid TDMA/FDMA based SMACS protocol • Major components of SMAC – Periodic listen and sleep – Collision avoidance – Overhearing avoidance • Neighboring nodes are synchronized together – Periodic updating using a SYNC packet Sender Node ID Next-Sleep Time • Listen interval divided into two parts – Each part further divided into time slots • RTS/CTS Similar to IEEE 802.11 – Interfering nodes go to sleep after they hear the RTS or CTS packet • Power conservation is achieved by using a random wake-up schedule during the connection phase and by turning the radio off during idle time slots. CSMA Based Mac Protocol • Two important components – The listening mechanism – The back off scheme. • As reported and based on simulations – Constant listen periods are energy efficient – The introduction of random delay provides robustness against repeated collisions CSMA Based Mac Protocol • Adaptive Transmission Rate Control Scheme - ARC – Achieves medium access fairness by balancing the rates of originating and route-through traffic – The ARC controls the data origination rate of a node in order to allow the route-through traffic to propagate. – Route-through traffic is preferred over the originating traffic • Since dropping route-through traffic is costlier ,the associated penalty is lesser Hybrid TDMA/FDMA based Protocol • Centrally controlled MAC scheme • The system is made up of energy constrained sensor nodes that communicate to a single, nearby, high powered base station (<10 m). • While a pure TDMA scheme dedicates the full bandwidth to a single sensor node, a pure FDMA scheme allocates minimum signal bandwidth per node. • Optimum number of channels found to depend on the ratio of power consumption between transmitter and receiver – If transmitter consumes more power TDMA scheme is preferred – If receiver consumes more power FDMA scheme is preferred The Data Link Layer • Power saving modes of operation • Turn the transceiver off when it is not required. – Not exactly – Dominance of Start-up Energy Power saving modes of operation • Dynamic Power Management Scheme – An event occurs when a sensor node picks up a signal with power above a predetermined threshold. – Probability assumed to be Exponential <e-λt> The Data Link Layer • Error Control – Two important modes of error control • Forward error correction (FEC) – Higher Decoding Complexity – If the associated processing power is greater than the coding gain, then the whole process in energy inefficiency and the system is better off without coding. • Automatic repeat request (ARQ) – Limited by the additional retransmission energy cost and overhead. Cross layer Protocols For WSN • Performance limitations in the layered architecture – It doesn’t consider dependencies between different layers. • Two kinds of cross-layer architecture – Packet-based interaction scheme • Each layer puts all information that used for cross-layer approaches into packet header and other layers catch interesting information by inspecting the each packet. – Direct interaction scheme • Allows any two layers to communicate directly with one another via new APIs • Both schemes, existing system software may need to be modified to support new packet structures or APIs XCP (eXtensible Cross-layer design Platform) • Enables the exchange of information between different layers for performance optimization CPL (Communication Protocol Layer), MRL (Mutual Reference across Layer) PO (Performance Optimization) component XCP (eXtensible Cross-layer design Platform) • Procedures of process of the XCP 1. In initialization, each cross-layer module in the PO component requests the interesting information to the MRL component using REQUEST_INFORMATION() 2. If a cross-layer module need not more any information, it can release the requested information using RELEASE_INFORMATION() 3. The bus arbiter thread pops a data from information queues and informs it to requested cross layer modules 4. When the requested information is stored at information base in the each cross-layer module, it performs optimization 5. Then the results of optimization by each cross-layer module are applied to information set using APPLY_INFORMATION() Cross-layer module (XLM) • Complete unified cross-layering • Incorporates – Initiative determination – Received based contention – Local congestion control – Distributed duty cycle operation Cross-layer module (XLM) • Communication in XLM is built on initiative concept – Provides freedom for each node to decide on participating in communication – The next-hop in each communication is not determined in advance Cross-layer module (XLM) • Initiative determination procedure – A node initiates transmission by broadcasting an RTS packet to indicate its neighbors that it has a packet to send – Upon receiving an RTS packet, each neighbor of node i decides to participate in the communication or not – This decision is given through initiative determination – The initiative determination is a binary operation where a node decides to participate in communication if its initiative is 1. – Denoting the initiative as I, it is determined as follows: a) b) c) d) RTS signals requires that the received signal to noise ratio (SNR) of an RTS packet,, is above some threshold Prevents congestion by limiting the traffic a node can relay Ensures that the node does not experience any buffer overflow Ensures that the remaining energy of a node stays above a minimum value Cross-layer module (XLM) • Distributed duty cycle operation – Each node is implemented with a sleep frame with length TS sec. As a result, a node is active for δ × TS sec and sleeps for (1 − δ) × TS sec. • Transmission Initiation – Listens to the channel for a specific period of time – Checks if its information is correlated with the transmitting source nodes – If the channel is occupied, the node performs back off based on its contention window – When the channel is idle, the node broadcasts an RTS packet, which contains the location of the sensor node i and the location of the sink – When a node receives an RTS packet, it first checks the source and destination locations • Receiver Contention – After an RTS packet is received, if a node has initiative to participate in the communication, it performs receiver contention to forward the packet References • G.Hoblos, M. Staroswiecki, and A. Aitouche, “Optimal Design of Fault Tolerantt Sensor Networks”, IEEE Int’l. Conf. Cont. Apps., Anchorage, AK, Sept. 2000, pp. 467-72 • Bulusu et al., “Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems”, ISCTA 2001, Ambleside, U.K., July 2001 • E.Shih et al., “Physical Layer Driven Protocol aand Algorithm Design for Energy-Efficient Wireless Sensor Networks”, Proc. ACM MobiCom ’01, Rome, Italy, July 2001, pp 272-86 • A.Sinha and A. Chandrakasan, “Dynamic Power Management in Wireless Sensor Networks”, IEEE Design Test Comp., Mar./April. 2001 • M.-S. Pan, C.-H. Tsai, and Y.-C. Tseng, Implementation of an Emergency Guiding and Monitoring System in Indoor 3D Environments by Wireless Sensor Networks, Technical Report of CS/NCTU 2006. • T. Melodia, M. C. Vuran, D. Pompili, “The State of the Art in Cross layer Design for Wireless Sensor Networks,” to appear in Springer Lecture Notes in Computer Science (LNCS), 2006. • Byounghoon Kim and Sungwoo Tak, “A Communication Framework Supporting Cross-Layer Design for Wireless Networks”, IEEE Int’l Symposium On Ubiquitous Multimedia Computing, Hobart, Australia, Oct. 2008