UNIT V ROUTING PROTOCOLS FOR WSN

Similar documents
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Routing Protocols for Wireless Sensor Networks

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Routing Techniques in Wireless Sensor Networks: A Survey

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Routing and Transport in Wireless Sensor Networks

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Hybrid Energy Efficient Distributed Protocol for Heterogeneous Wireless Sensor Network

Location Information Services in Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Wireless Sensor Network: Improving the Network Energy Consumption

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Security for Ad Hoc Networks. Hang Zhao

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Routing with OSPF. Introduction

Energy Optimal Routing Protocol for a Wireless Data Network

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

Optimized Load Balancing Mechanism Using Carry Forward Distance

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Some Security Trends over Wireless Sensor Networks

Customer Specific Wireless Network Solutions Based on Standard IEEE

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Technology White Paper Capacity Constrained Smart Grid Design

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Development of cloud computing system based on wireless sensor network protocol and routing

Data Aggregation and Gathering Transmission in Wireless Sensor Networks: A Survey

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

MAXIMIZING THE LIFETIME OF NETWORK SECURITY BY DSDV PROTOCOL USING GAME THEORY TECHNIQUES IN WIRELESS SENSOR NETWORK

TORA : Temporally Ordered Routing Algorithm

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Figure 1. The Example of ZigBee AODV Algorithm

Study of Network Characteristics Incorporating Different Routing Protocols

Routing in packet-switching networks

Scalable Source Routing

Wireless Sensor Networks Chapter 3: Network architecture


DAG based In-Network Aggregation for Sensor Network Monitoring

Survey on different attacks in Wireless Sensor Networks and their prevention system

Dipak Wajgi Dept. of Computer Science and Engineering Ramdeobaba College of Engg. and Management Nagpur, India

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Wireless Sensor Networks Database: Data Management and Implementation

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Chapter 4. Distance Vector Routing Protocols

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

LIST OF FIGURES. Figure No. Caption Page No.

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Security Threats in Mobile Ad Hoc Networks

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

A survey on Spectrum Management in Cognitive Radio Networks

Security in Ad Hoc Network

Isolines: Energy-efficient Mapping in Sensor Networks

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Scalable Routing Protocols for Mobile Ad Hoc Networks

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

About the Authors Preface Acknowledgements List of Acronyms

Introduction to LAN/WAN. Network Layer

Chapter 10 Link-State Routing Protocols

Local Load Balancing for Globally Efficient Routing in Wireless Sensor Networks

Transcription:

UNIT V ROUTING PROTOCOLS FOR WSN Created by : Neha Birla 1

Data Dissemination and Gathering Dissemination = The act of spreading something, spreading, distribution. Gathering = Assemble or collect 2

1. Data Dissemination Process of Distribution of data. Information flow from one sensor node to another. The originator of data is known as Source Node and Receiver of the data is called Sink node or Gateway. The Sink registers its interest to receive the data from source. The Source reports the data information to the Sink. The information thus reported is called event. 3

Process of Data Dissemination The node that is interested in some events, like temperature or air humidity, broadcasts its interests to its neighbors periodically. Interests are then propagated through the whole sensor network. Nodes that have requested data, send back data after receiving the request. Intermediate nodes in the sensor network also keep a cache of received interests and data. 4

Data Dissemination Methods Flooding Gossiping SPIN 5

1.1 Flooding Each node which receives a packet (queries/data) broadcasts it if the maximum hop-count of the packet is not reached and the node itself is not the destination of the packet. Advantage No costly topology maintenance or route discovery Disadvantages Implosion Overlapping Resource Blindness 6

Implosion : This is the situation When duplicate messages are send to the same node. This occurs 7 when a node receives copies of the same messages from many of its neighbors

Overlap : Overlap is another problem which occurs when using flooding. If two nodes share the same observation region both nodes will witness an event at the same time and transmit details of this event. Resource blindness : the flooding protocol does not consider the available energy at the nodes and results in many redundant transmissions. Hence, it reduces the network lifetime. 8

1.2 Gossiping Modified version of flooding The nodes do not broadcast a packet, but send it to a randomly selected neighbor. Avoid the problem of implosion by making one copy of each message at any node It takes a long time for message to propagate throughout the network. The hop count can become quite large due to the protocols random nature 9

1.3 Sensor Protocols for Information via Negotiation SPIN use negotiation and resource adaptation to address the disadvantage of flooding and Use meta-data instead of raw data. Reduce overlap and implosion, and prolong network lifetime. SPIN-1 has three types of messages: ADV, REQ, and DATA. SPIN-2 using an energy threshold to reduce participation. A node may join in the ADV-REQ-DATA handshake only if it has sufficient resource above a threshold. 10

11

2. Data Gathering The objective of the data gathering problem is to transmit the sensed data from each sensor node to a BS. The goal of algorithm which implement data gathering is maximize the lifetime of network Minimum energy should be consumed The transmission occur with minimum delay 12

Difference between Data Dissemination and Gathering Data Dissemination 1 Any node can request the data along with base station. Data Gathering All data is transmitted to the base station 2 Data is always transmitted on demand Data can be transmitted periodically 13

Data Gathering Approaches Direct Transmission Power-Efficient Gathering for Sensor Information Systems Binary Scheme 14

2.1 Direct Transmission All sensor nodes transmit their data directly to the BS. It cost expensive when the sensor nodes are very far from the BS. Nodes must take turns while transmitting to the BS to avoid collision, so the media access delay is also large. Hence, this scheme performs poorly with respect to the energy x delay metric. 15

2.2 Power-Efficient Gathering for Sensor Information Systems PEGASIS based on the assumption that all sensor nodes know the location of every other node. Any node has the required transmission range to reach the BS in one hop, when it is selected as a leader. The goal of PEGASIS are as following Minimize the distance over which each node transmit Minimize the broadcasting overhead Minimize the number of messages that need to besent to the BS Distribute the energy consumption equally across all nodes 16

To construct a chain of sensor nodes, starting from the node farthest from the BS. At each step, the nearest neighbor which has not been visited is added to the chain. This algorithm uses greedy algorithm for chain construction. Before first round of communication chain formation is done During formation of chain care must be taken so that nodes already in chain should not revisited It is reconstructed when nodes die out. At every node, data fusion or aggregation is carried out. 17

A node which is designated as the leader finally transmits one message to the BS. 18 Leadership is transferred in sequential order. The delay involved in messages reaching the BS is O(N)

Figure 5 : Data gathering with PEGASIS 19

2.3 Binary Scheme This is a chain-based scheme like PEGASIS, which classifies nodes into different levels. This scheme is possible when nodes communicate using CDMA, so that transmissions of each level can take place simultaneously. The delay is O(log 2 N) 20

Advantages Low delay of only O(log2N), where the N is the amount of nodes. Disadvantages Non equal distribution of energy consumption, nodes that are active on several levels consume more energy than nodes that are only active at the first level. This might lead to the situation where some of sensor nodes die earlier than others. Transmission distances may become long in high levels, which leads to a high power consumption 21

Routing Challenges and Design Issues in WSN The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before efficient communication can be achieved in WSNs. Node deployment Energy considerations Data delivery model 22

Node/link heterogeneity Fault tolerance Scalability Network dynamics Transmission media Connectivity Coverage Data aggregation/converge cast Quality of service 23

Node Deployment Node deployment in WSNs is application dependent and affects the performance of the routing protocol. The deployment can be either deterministic or randomized. In deterministic deployment, the sensors are manually placed and data is routed through pre-determined paths. In random node deployment, the sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner. 24

Energy Considerations Sensor nodes can use up their limited supply of energy performing computations and transmitting information in a wireless environment. Energy conserving forms of communication and computation are essential. In a multi-hop WSN, each node plays a dual role as data sender and data router. The malfunctioning of some sensor nodes due to power failure can cause significant topological changes and might require rerouting of packets and reorganization of the network. 25

Data Delivery Model Time-driven (continuous) Suitable for applications that require periodic data monitoring Event-driven React immediately to sudden and drastic changes Query-driven Respond to a query generated by the BS or another node in the network Hybrid The routing protocol is highly influenced by the data reporting method 26

Node/Link Heterogeneity Depending on the application, a sensor node can have a different role or capability. The existence of a heterogeneous set of sensors raises many technical issues related to data routing. Even data reading and reporting can be generated from these sensors at different rates, subject to diverse QoS constraints, and can follow multiple data reporting models. 27

Fault Tolerance Some sensor nodes may fail or be blocked due to lack of power, physical damage, or environmental interferences It may require actively adjusting transmission powers and signaling rates on the existing links to reduce energy consumption, or rerouting packets through regions of the network where more energy is available 28

Scalability The number of sensor nodes deployed in the sensing area may be on the order of hundreds or thousands, or more. Any routing scheme must be able to work with this huge number of sensor nodes. In addition, sensor network routing protocols should be scalable enough to respond to events in the environment. 29

Network Dynamics Routing messages from or to moving nodes is more challenging since route and topology stability become important issues Moreover, the phenomenon can be mobile (e.g., a target detection/ tracking application). 30

Transmission Media In general, the required bandwidth of sensor data will be low, on the order of 1-100 kb/s. Related to the transmission media is the design of MAC. TDMA (time-division multiple access) CSMA (carrier sense multiple access) 31

Connectivity High node density in sensor networks precludes them from being completely isolated from each other. However, may not prevent the network topology from being variable and the network size from shrinking due to sensor node failures. In addition, connectivity depends on the possibly random distribution of nodes. 32

Coverage In WSNs, each sensor node obtains a certain view of the environment. A given sensor s view of the environment is limited in both range and accuracy. It can only cover a limited physical area of the environment. 33

Data Aggregation/Convergecast Since sensor nodes may generate significant redundant data, similar packets from multiple nodes can be aggregated to reduce the number of transmissions. Data aggregation is the combination of data from different sources according to a certain aggregation function. Converge casting is collecting information upwards from the spanning tree after a broadcast. 34

Quality of Service In many applications, conservation of energy, which is directly related to network lifetime. As energy is depleted, the network may be required to reduce the quality of results in order to reduce energy dissipation in the nodes and hence lengthen the total network lifetime. 35

Routing Protocols in WSNs: A taxonomy Routing protocols in WSNs Network Structure Flat routing SPIN Directed Diffusion (DD) Hierarchical routing LEACH PEGASIS TTDD Location based routing GEAR GPSR Protocol Operation Negotiation based routing SPIN Multi-path network routing DD Query based routing DD, Data centric routing QoS based routing TBP, SPEED Coherent based routing DD Aggregation Data Mules, CTCCAP 36

Routing Strategies in WSN 37

Routing Strategies Aim to make communication more efficient Trade-off between routing overhead and data transmission cost Strategies incur differing levels of communication and storage overhead Hybrid approaches are possible 38

Proactive and Reactive Routing Proactive routing Routes created and maintained in advance E.g : LEACH protocol Does not scale to large networks Reactive routing Routes created and cached as required E.g : TEEN protocol Dynamic delays 39

Geographic and Energy Aware Routing Motivation: Reduce overhead of interest and low rate data flooding in directed diffusion Basic ideas: Leverage geographical information to restrict flooding, and recursively disseminate data inside the target region. Extend overall network lifetime using local techniques to balance energy usage Reuse routing information across multiple user queries. 40

Geographic and Energy Aware Routing Forward the packets towards the target region: Greedy mode: minimizing cost function (f=mix function of distance and energy) Route around communication holes with energy aware neighbor estimation Disseminate the packet within the target region: Geographic Recursive Forwarding recursively re-send packets to subregions of the original geographic region 41

Geographic and Energy Aware Routing Each node has a learned cost (historical cost) and an estimated cost (present state cost) to decide the next forwarding node Learned cost h( N, R) h( N, R) C( N, N ) min min Estimated cost c( N, R) d( N, R) (1 ) e( N ) i i i 42

Geographic Routing G P S R : G R E E D Y P E R I M E T E R S T A T E L E S S R O U T I N G F O R W I R E L E S S N E T W O R K S 43

Motivation A sensor net consists of hundreds or thousands of nodes Scalability is the issue Existing ad hoc net protocols, e.g., DSR, AODV, ZRP, require nodes to cache e2e route information Dynamic topology changes Mobility Reduce caching overhead Hierarchical routing is usually based on well defined, rarely changing administrative boundaries Geographic routing Use location for routing 44

Scalability metrics Routing protocol msg cost How many control packets sent? Per node state How much storage per node is required? E2E packet delivery success rate 45

Assumptions Every node knows its location Positioning devices like GPS Localization A source can get the location of the destination 802.11 MAC Link bidirectionality 46

Geographic Routing: Greedy Routing Closest to D S A D - Find neighbors who are the closer to the destination - Forward the packet to the neighbor closest to the destination 47

Benefits of GF A node only needs to remember the location info of one-hop neighbors Routing decisions can be dynamically made 48

Greedy Forwarding does NOT always work GF fails If the network is dense enough that each interior node has a neighbor in every 2 /3 angular sector, GF will always succeed 49

Energy-Aware Routing Maximise network lifetime (no accepted definition) Communication is the most expensive activity Possible goals include: Shortest-hop (fewest nodes involved) Lowest energy route Route via highest available energy Distribute energy burden evenly Lowest routing overhead Distributed algorithms cost energy Changing component state costs energy NOTE: Read Routing Strategies PPT s after this 50

Energy-Aware Routing A destination-initiated reactive protocol It maintains a set of paths Choosing paths by means of certain probability depending on how low the energy consumption is 51

Energy-Aware Routing Setup Phase Directional flooding Local Rule Sensor p 1 = 0.75 10 nj Controller p 2 = 0.25 30 nj 52

Energy-Aware Routing Data Communication Phase Each node makes a local decision 0.3 Sensor Controller 0.6 0.7 1.0 1.0 0.4 53

Attribute-based routing Data-centric approach: Not interested in routing to a particular node or a particular location Nodes desiring some information need to find nodes that have that information Attribute-value event record, and associated query type animal instance horse location 35,57 time 1:07:13 type animal instance horse location 0,100,100,200 54

Directed diffusion Sinks: nodes requesting information Sources: nodes generating information Interests: records indicating A desire for certain types of information Frequency with which information desired Key assumption: Persistence of interests Approach: Learn good paths between sources and sinks Amortize the cost of finding the paths over period of use [IGE00] 55

Diffusion of interests and gradients Interests diffuse from the sinks through the sensor network Nodes track unexpired interests Each node maintains an interest cache Each cache entry has a gradient Derived from the frequency with which a sink requests repeated data about an interest Sink can modify gradients (increase or decrease) depending on response from neighbors 56

Directed Diffusion Rumor Routing Geographic hash table Attribute based Routing 57