Ad hoc and Sensor Networks Chapter 3: Network architecture

Similar documents
Wireless Sensor Networks Chapter 3: Network architecture

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

A Transport Protocol for Multimedia Wireless Sensor Networks

Outline. Application examples. Infrastructure-based limits? Infrastructure-based wireless networks. Possible applications

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

ProCurve Networking IPv6 The Next Generation of Networking

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Final for ECE374 05/06/13 Solution!!

Energy Optimal Routing Protocol for a Wireless Data Network

Advanced Transportation Management Systems

CSE 3461 / 5461: Computer Networking & Internet Technologies

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Transport Layer Protocols

Objectives of Lecture. Network Architecture. Protocols. Contents

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

First Midterm for ECE374 03/09/12 Solution!!

PART III. OPS-based wide area networks

Network Edge Services

Administrative Distance

6LoWPAN Technical Overview

Multihopping for OFDM based Wireless Networks

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

SBSCET, Firozpur (Punjab), India

Event Processing Middleware for Wireless Sensor Networks

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

Level 2 Routing: LAN Bridges and Switches

8 Conclusion and Future Work

Tranzeo s EnRoute500 Performance Analysis and Prediction

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Introduction to IP v6

Internet Control Protocols Reading: Chapter 3

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

JoramMQ, a distributed MQTT broker for the Internet of Things

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Isolines: Energy-efficient Mapping in Sensor Networks

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Fast Re-Route in IP/MPLS networks using Ericsson s IP Operating System

VPN. Date: 4/15/2004 By: Heena Patel

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

Tactical Service Bus: The flexibility of service oriented architectures in constrained theater environments

Implementing Intercluster Lookup Service

Variable length subnetting

Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A networking framework for spontaneous interactions in MANETs

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Exam 1 Review Questions

Communication Networks. MAP-TELE 2011/12 José Ruela

Introduction to Metropolitan Area Networks and Wide Area Networks

CME: A Middleware Architecture for Network-Aware Adaptive Applications

(Refer Slide Time: 01:38 01:37)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Internet, Part 2. 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support. 3) Mobility aspects (terminal vs. personal mobility)

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

CHAPTER 18 THE PUBLIC TELEPHONE NETWORK # DEFINITIONS TERMS

CS 91: Cloud Systems & Datacenter Networks Networks Background

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

How A V3 Appliance Employs Superior VDI Architecture to Reduce Latency and Increase Performance

SIP Forum Fax Over IP Task Group Problem Statement Version 1.0

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Protocols and Architecture. Protocol Architecture.

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Location Information Services in Mobile Ad Hoc Networks

STRUCTURAL HEALTH MONITORING AT ROME UNDERGROUND, ROMA, ITALY

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Software Defined Wireless Networks (SDWN): Unbridling SDNs

DETECTING MALICIOUS PACKET DROPPING AND SECURE TRACE OUT IN WIRELESS AD-HOC NETWORK

Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008)

Introduction to IPv6 and Benefits of IPv6

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Security for Ad Hoc Networks. Hang Zhao

Network Security. Mobin Javed. October 5, 2011

Internet Protocol (IP)/Intelligent Network (IN) Integration

Figure 1. The Example of ZigBee AODV Algorithm

Introduction to Computer Networks and Data Communications

CS268 Exam Solutions. 1) End-to-End (20 pts)

Transcription:

Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn

Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put these nodes together to form a meaningful network We will look at design approaches to both the more conventional ad hoc networks and the non-standard WSNs SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 2

Outline Network scenarios Optimization goals Design principles Service interface Gateway concepts SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 3

Basic scenarios: Ad hoc networks (Mobile) ad hoc scenarios Nodes talking to each other Nodes talking to some node in another network (Web server on the Internet, e.g.) Typically requires some connection to the fixed network Applications: Traditional data (http, ftp, collaborative apps, ) & multimedia (voice, video)! humans in the loop ad hoc Access Point J. Schiller SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 4

Basic scenarios: sensor networks Sensor network scenarios Sources: Any entity that provides data/measurements Sinks: Nodes where information is required Belongs to the sensor network as such Is an external entity, e.g., a PDA, but directly connected to the WSN Main difference: comes and goes, often moves around, Is part of an external network (e.g., internet), somehow connected to the WSN Source Source Source Inter Sink Sink Sink net Applications: Usually, machine to machine, often limited amounts of data, different notions of importance SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 5

Single-hop vs. multi-hop networks One common problem: limited range of wireless communication Essentially due to limited transmission power, path loss, obstacles Option: multi-hop networks Send packets to an intermediate node Intermediate node forwards packet to its destination Store-and-forward multi-hop network Basic technique applies to both WSN and MANET Note: Store&forward multihopping NOT the only possible solution E.g., collaborative networking, network coding Do not operate on a perpacket basis Source Obstacle Sink SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 6

Energy efficiency of multi-hopping? Obvious idea: Multi-hopping is more energy-efficient than direct communication Because of path loss α > 2, energy for distance d is reduced from cd α to 2c(d/2) α c some constant However: This is usually wrong, or at least very oversimplified Need to take constant offsets for powering transmitter, receiver into account Details see exercise, chapter 2! Multi-hopping for energy savings needs careful choice SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 7

WSN: Multiple sinks, multiple sources SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 8

Different sources of mobility Node mobility A node participating as source/sink (or destination) or a relay node might move around Deliberately, self-propelled or by external force; targeted or at random Happens in both WSN and MANET Sink mobility In WSN, a sink that is not part of the WSN might move Mobile requester Event mobility In WSN, event that is to be observed moves around (or extends, shrinks) Different WSN nodes become responsible for surveillance of such an event SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 9

WSN sink mobility Request Propagation of answers Movement direction SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 10

WSN event mobility: Track the pink elephant Here: Frisbee model as example SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 11

Outline Network scenarios Optimization goals Design principles Service interface Gateway concepts SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 12

Optimization goal: Quality of Service In MANET: Usual QoS interpretation Throughput/delay/jitter High perceived QoS for multimedia applications In WSN, more complicated Event detection/reporting probability Event classification error, detection delay Probability of missing a periodic report Approximation accuracy (e.g, when WSN constructs a temperature map) Tracking accuracy (e.g., difference between true and conjectured position of the pink elephant) Related goal: robustness Network should withstand failure of some nodes SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 13

Optimization goal: Energy efficiency Umbrella term! Energy per correctly received bit Counting all the overheads, in intermediate nodes, etc. Energy per reported (unique) event After all, information is important, not payload bits! Typical for WSN Delay/energy tradeoffs Network lifetime Time to first node failure Network half-life (how long until 50% of the nodes died?) Time to partition Time to loss of coverage Time to failure of first event notification SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 14

Optimization goal: Scalability Network should be operational regardless of number of nodes At high efficiency Typical node numbers difficult to guess MANETs: 10s to 100s WSNs: 10s to 1000s, maybe more (although few people have seen such a network before ) Requiring to scale to large node numbers has serious consequences for network architecture Might not result in the most efficient solutions for small networks! Carefully consider actual application needs before looking for n! 1 solutions! SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 15

Outline Network scenarios Optimization goals Design principles Service interface Gateway concepts SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 16

Distributed organization Participants in a MANET/WSN should cooperate in organizing the network E.g., with respect to medium access, routing, Centralistic approach as alternative usually not feasible hinders scalability, robustness Potential shortcomings Not clear whether distributed or centralistic organization achieves better energy efficiency (when taking all overheads into account) Option: limited centralized solution Elect nodes for local coordination/control Perhaps rotate this function over time SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 17

In-network processing MANETs are supposed to deliver bits from one end to the other WSNs, on the other end, are expected to provide information, not necessarily original bits Gives addition options E.g., manipulate or process the data in the network Main example: aggregation Apply composable aggregation functions to a convergecast tree in a network Typical functions: minimum, maximum, average, sum, Not amenable functions: median SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 18

In-network processing: Aggregation example Reduce number of transmitted bits/packets by applying an aggregation function in the network 1 1 1 6 3 1 1 1 1 1 1 1 SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 19

In-network processing: signal processing Depending on application, more sophisticated processing of data can take place within the network Example edge detection: locally exchange raw data with neighboring nodes, compute edges, only communicate edge description to far away data sinks Example tracking/angle detection of signal source: Conceive of sensor nodes as a distributed microphone array, use it to compute the angle of a single source, only communicate this angle, not all the raw data Exploit temporal and spatial correlation Observed signals might vary only slowly in time! no need to transmit all data at full rate all the time Signals of neighboring nodes are often quite similar! only try to transmit differences (details a bit complicated, see later) SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 20

Adaptive fidelity Adapt the effort with which data is exchanged to the currently required accuracy/fidelity Example event detection When there is no event, only very rarely send short all is well messages When event occurs, increase rate of message exchanges Example temperature When temperature is in acceptable range, only send temperature values at low resolution When temperature becomes high, increase resolution and thus message length SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 21

Data centric networking In typical networks (including ad hoc networks), network transactions are addressed to the identities of specific nodes A node-centric or address-centric networking paradigm In a redundantly deployed sensor networks, specific source of an event, alarm, etc. might not be important Redundancy: e.g., several nodes can observe the same area Thus: focus networking transactions on the data directly instead of their senders and transmitters! data-centric networking Principal design change SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 22

Implementation options for data-centric networking Overlay networks & distributed hash tables (DHT) Hash table: content-addressable memory Retrieve data from an unknown source, like in peer-to-peer networking with efficient implementation Some disparities remain Static key in DHT, dynamic changes in WSN DHTs typically ignore issues like hop count or distance between nodes when performing a lookup operation Publish/subscribe Different interaction paradigm Nodes can publish data, can subscribe to any particular kind of data Once data of a certain type has been published, it is delivered to all subscribes Subscription and publication are decoupled in time; subscriber and published are agnostic of each other (decoupled in identity) Databases SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 23

Further design principles Exploit location information Required anyways for many applications; can considerably increase performance Exploit activity patterns Exploit heterogeneity By construction: nodes of different types in the network By evolution: some nodes had to perform more tasks and have less energy left; some nodes received more solar energy than others; Cross-layer optimization of protocol stacks for WSN Goes against grain of standard networking; but promises big performance gains Also applicable to other networks like ad hoc; usually at least worthwhile to consider for most wireless networks SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 24

Outline Network scenarios Optimization goals Design principles Service interface Gateway concepts SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 25

Interfaces to protocol stacks The world s all-purpose network interface: sockets Good for transmitting data from one sender to one receiver Not well matched to WSN needs (ok for ad hoc networks) Expressibility requirements Support for simple request/response interactions Support for asynchronous event notification Different ways for identifying addressee of data By location, by observed values, implicitly by some other form of group membership By some semantically meaningful form room 123 Easy accessibility of in-network processing functions Formulate complex events events defined only by several nodes Allow to specify accuracy & timeliness requirements Access node/network status information (e.g., battery level) Security, management functionality, No clear standard has emerged yet many competing, unclear proposals SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 26

Outline Network scenarios Optimization goals Design principles Service interface Gateway concepts SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 27

Gateway concepts for WSN/MANET Gateways are necessary to the Internet for remote access to/from the WSN Same is true for ad hoc networks; additional complications due to mobility (change route to the gateway; use different gateways) WSN: Additionally bridge the gap between different interaction semantics (data vs. address-centric networking) in the gateway Gateway needs support for different radios/protocols, Gateway node Internet Remote users Wireless sensor network SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 28

WSN to Internet communication Example: Deliver an alarm message to an Internet host Issues Need to find a gateway (integrates routing & service discovery) Choose best gateway if several are available How to find Alice or Alice s IP? Alert Alice Alice s desktop Gateway nodes Internet Alice s PDA SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 29

Internet to WSN communication How to find the right WSN to answer a need? How to translate from IP protocols to WSN protocols, semantics? Remote requester Gateway nodes Internet Gateway SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 30

WSN tunneling Use the Internet to tunnel WSN packets between two remote WSNs Internet Gateway nodes Gateway SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 31

Summary Network architectures for ad hoc networks are in principle relatively straightforward and similar to standard networks Mobility is compensated for by appropriate protocols, but interaction paradigms don t change too much WSNs, on the other hand, look quite different on many levels Data-centric paradigm, the need and the possibility to manipulate data as it travels through the network opens new possibilities for protocol design The following chapters will look at how these ideas are realized by actual protocols SS 05 Ad hoc & sensor networs - Ch 3: Network architecture 32