deploying a wsn on an active volcano Clay McLeod September 29, 2015 - - PowerPoint PPT Presentation

deploying a wsn on an active volcano
SMART_READER_LITE
LIVE PREVIEW

deploying a wsn on an active volcano Clay McLeod September 29, 2015 - - PowerPoint PPT Presentation

deploying a wsn on an active volcano Clay McLeod September 29, 2015 1 references Paper Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., & Welsh, M. (2006). Deploying a wireless sensor network on an active


slide-1
SLIDE 1

deploying a wsn on an active volcano

Clay McLeod September 29, 2015

1

slide-2
SLIDE 2

references

Paper Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., & Welsh, M. (2006). Deploying a wireless sensor network on an active volcano. Internet Computing, IEEE, 10(2), 18-25. Viewable at http://bit.ly/wsn-volcano

2

slide-3
SLIDE 3
  • verview
  • 1. Discuss objectives of paper
  • 2. Why is a WSN suitable for this task?
  • 3. Potential roadblocks
  • 4. Solutions implemented
  • 5. Results

3

slide-4
SLIDE 4
  • bjectives

4

slide-5
SLIDE 5
  • bjectives
  • 1. Deploy 16 low-power wireless sensor nodes on an active

volcano.

  • 2. Monitor seismic activity through accelerometer data.
  • 3. Discuss the feasibility of this approach in this harsh

environment.

  • 4. Examine benefjts and detriments.

5

slide-6
SLIDE 6

why a wsn?

6

slide-7
SLIDE 7

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-8
SLIDE 8

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-9
SLIDE 9

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-10
SLIDE 10

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-11
SLIDE 11

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-12
SLIDE 12

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-13
SLIDE 13

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-14
SLIDE 14

why a wsn?

Why install into Volcano?

  • Monitor seismic activity to predict earthquakes.
  • Volcanic tomography (using signal processing to map the

volcano’s edifjce).

  • Resolve debates over the physical processes at work within a

volcano’s interior. Benefits of WSN

  • Lightweight
  • Consume less power
  • Eliminate need for large local storage
  • Fast deployment

7

slide-15
SLIDE 15

potential roadblocks

8

slide-16
SLIDE 16

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-17
SLIDE 17

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-18
SLIDE 18

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-19
SLIDE 19

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-20
SLIDE 20

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-21
SLIDE 21

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-22
SLIDE 22

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-23
SLIDE 23

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-24
SLIDE 24

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-25
SLIDE 25

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-26
SLIDE 26

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-27
SLIDE 27

potential roadblocks

  • Nodes must provide accurate data
  • Even a single corrupted sample can invalidate an entire dataset
  • Data is limited, therefore, it is valuable
  • Discrete signal analysis
  • High availability necessary when recording data
  • Time synchronization crucial for accurate results
  • Low radio bandwidth
  • Limits the amount of signal we can send
  • Not suited to long term analysis, authors focus on event driven

data

  • Network Topology
  • Nodes must have large internode distance to capture diverse

data

  • Node failure poses serious threat to communication

9

slide-28
SLIDE 28

hardware

10

slide-29
SLIDE 29

hardware

Each sensor was equipped with the following:

  • 8-dBi 2.4 GHz external omnidirectional antenna
  • 2.4-GHz Chipcon CC2420 IEEE 802.15.4 radio
  • Geospace Industrial GS-11 single axis seismometer
  • Microphone
  • Custom hardware interface board
  • Runs TinyOS

11

slide-30
SLIDE 30
  • vercoming high data rates

12

slide-31
SLIDE 31

problem

Explanation IEEE 802.15.4 radios, such as the Chipcon CC2420, have raw data rates of 30 Kbytes per second. However,

  • verheads caused by packet framing, medium access

control (MAC), and multihop routing reduce the achievable data rate to less than 10 Kbytes per second, even in a single-hop network. Problem

  • Nodes can acquire data faster than they can transmit it.
  • Long-term local storage infeasible, as fmash memory (1 Mbyte)

fjlls up in roughly 20 minutes during normal use cases.

13

slide-32
SLIDE 32

problem

Explanation IEEE 802.15.4 radios, such as the Chipcon CC2420, have raw data rates of 30 Kbytes per second. However,

  • verheads caused by packet framing, medium access

control (MAC), and multihop routing reduce the achievable data rate to less than 10 Kbytes per second, even in a single-hop network. Problem

  • Nodes can acquire data faster than they can transmit it.
  • Long-term local storage infeasible, as fmash memory (1 Mbyte)

fjlls up in roughly 20 minutes during normal use cases.

13

slide-33
SLIDE 33

solution

Event Driven I/O instead of stream based.

  • 1. Each node runs an “event detection” program that uses a

short-term average/long-term average threshold detector.

  • 2. Upon triggering, the nodes sends a small message to the

base-station laptop.

  • 3. If enough nodes contact base station, laptop initiates round

robin data collection from nodes.

  • Note that since most volcanic events last only 60 seconds, we

should be able to keep this data stored long enough to retrieve.

14

slide-34
SLIDE 34

solution

Event Driven I/O instead of stream based.

  • 1. Each node runs an “event detection” program that uses a

short-term average/long-term average threshold detector.

  • 2. Upon triggering, the nodes sends a small message to the

base-station laptop.

  • 3. If enough nodes contact base station, laptop initiates round

robin data collection from nodes.

  • Note that since most volcanic events last only 60 seconds, we

should be able to keep this data stored long enough to retrieve.

14

slide-35
SLIDE 35

solution

Event Driven I/O instead of stream based.

  • 1. Each node runs an “event detection” program that uses a

short-term average/long-term average threshold detector.

  • 2. Upon triggering, the nodes sends a small message to the

base-station laptop.

  • 3. If enough nodes contact base station, laptop initiates round

robin data collection from nodes.

  • Note that since most volcanic events last only 60 seconds, we

should be able to keep this data stored long enough to retrieve.

14

slide-36
SLIDE 36

solution

Event Driven I/O instead of stream based.

  • 1. Each node runs an “event detection” program that uses a

short-term average/long-term average threshold detector.

  • 2. Upon triggering, the nodes sends a small message to the

base-station laptop.

  • 3. If enough nodes contact base station, laptop initiates round

robin data collection from nodes.

  • Note that since most volcanic events last only 60 seconds, we

should be able to keep this data stored long enough to retrieve.

14

slide-37
SLIDE 37

reliable data transmission

15

slide-38
SLIDE 38

problem

Problem Radio links are lossy and frequently asymmetrical.

16

slide-39
SLIDE 39

solution

The authors developed a reliable data-collection protocol, which they called Fetch. Protocol

  • 1. The sensor node breaks it’s data down into 256 bytes, then

tags these blocks with timestamps and sequence numbers.

  • 2. The laptop then sends packets out to the target node ID

identifying which sequence numbers it is missing from that node.

  • 3. In turn, the node will send the missing chunks until the laptop

indicates it has received all sequences.

  • 4. Because the network is sparse, the laptop uses fmooding to

request data from the network.

17

slide-40
SLIDE 40

solution

The authors developed a reliable data-collection protocol, which they called Fetch. Protocol

  • 1. The sensor node breaks it’s data down into 256 bytes, then

tags these blocks with timestamps and sequence numbers.

  • 2. The laptop then sends packets out to the target node ID

identifying which sequence numbers it is missing from that node.

  • 3. In turn, the node will send the missing chunks until the laptop

indicates it has received all sequences.

  • 4. Because the network is sparse, the laptop uses fmooding to

request data from the network.

17

slide-41
SLIDE 41

solution

The authors developed a reliable data-collection protocol, which they called Fetch. Protocol

  • 1. The sensor node breaks it’s data down into 256 bytes, then

tags these blocks with timestamps and sequence numbers.

  • 2. The laptop then sends packets out to the target node ID

identifying which sequence numbers it is missing from that node.

  • 3. In turn, the node will send the missing chunks until the laptop

indicates it has received all sequences.

  • 4. Because the network is sparse, the laptop uses fmooding to

request data from the network.

17

slide-42
SLIDE 42

solution

The authors developed a reliable data-collection protocol, which they called Fetch. Protocol

  • 1. The sensor node breaks it’s data down into 256 bytes, then

tags these blocks with timestamps and sequence numbers.

  • 2. The laptop then sends packets out to the target node ID

identifying which sequence numbers it is missing from that node.

  • 3. In turn, the node will send the missing chunks until the laptop

indicates it has received all sequences.

  • 4. Because the network is sparse, the laptop uses fmooding to

request data from the network.

17

slide-43
SLIDE 43

solution

The authors developed a reliable data-collection protocol, which they called Fetch. Protocol

  • 1. The sensor node breaks it’s data down into 256 bytes, then

tags these blocks with timestamps and sequence numbers.

  • 2. The laptop then sends packets out to the target node ID

identifying which sequence numbers it is missing from that node.

  • 3. In turn, the node will send the missing chunks until the laptop

indicates it has received all sequences.

  • 4. Because the network is sparse, the laptop uses fmooding to

request data from the network.

17

slide-44
SLIDE 44

time synchronization

18

slide-45
SLIDE 45

problem

Problem The low-cost crystal oscillators on these nodes have low

  • tolerances. Therefore, the clock rate varies across the

network.

19

slide-46
SLIDE 46

solution

The team implemented the Flooding Time Synchronization Protocol (FTSP). Protocol

  • 1. One node was outfjtted with a Garmin GPS receiver.
  • 2. Using this receiver, the node would map FTSP global time to

GMT.

  • 3. This data was then fmooded across the network and each node

would update its time when its time was ofg by more than 10 milliseconds.

20

slide-47
SLIDE 47

solution

The team implemented the Flooding Time Synchronization Protocol (FTSP). Protocol

  • 1. One node was outfjtted with a Garmin GPS receiver.
  • 2. Using this receiver, the node would map FTSP global time to

GMT.

  • 3. This data was then fmooded across the network and each node

would update its time when its time was ofg by more than 10 milliseconds.

20

slide-48
SLIDE 48

solution

The team implemented the Flooding Time Synchronization Protocol (FTSP). Protocol

  • 1. One node was outfjtted with a Garmin GPS receiver.
  • 2. Using this receiver, the node would map FTSP global time to

GMT.

  • 3. This data was then fmooded across the network and each node

would update its time when its time was ofg by more than 10 milliseconds.

20

slide-49
SLIDE 49

solution

The team implemented the Flooding Time Synchronization Protocol (FTSP). Protocol

  • 1. One node was outfjtted with a Garmin GPS receiver.
  • 2. Using this receiver, the node would map FTSP global time to

GMT.

  • 3. This data was then fmooded across the network and each node

would update its time when its time was ofg by more than 10 milliseconds.

20

slide-50
SLIDE 50

network topology

21

slide-51
SLIDE 51

network topology

  • Roughly linear confjguration that radiated away from the

volcano’s vent.

  • Aperture of roughly 3 kilometers. This was large enough to

get a good understanding of seismic activity and small enough to allow for reliable communication.

  • Most nodes had 3 hops to base station. A select few were

using 6.

22

slide-52
SLIDE 52

network topology

  • Roughly linear confjguration that radiated away from the

volcano’s vent.

  • Aperture of roughly 3 kilometers. This was large enough to

get a good understanding of seismic activity and small enough to allow for reliable communication.

  • Most nodes had 3 hops to base station. A select few were

using 6.

22

slide-53
SLIDE 53

network topology

  • Roughly linear confjguration that radiated away from the

volcano’s vent.

  • Aperture of roughly 3 kilometers. This was large enough to

get a good understanding of seismic activity and small enough to allow for reliable communication.

  • Most nodes had 3 hops to base station. A select few were

using 6.

22

slide-54
SLIDE 54

figure 1

Figure 1: Figure from the paper describing the topology

23

slide-55
SLIDE 55

results

24

slide-56
SLIDE 56

results

  • General good performance
  • 19 day deployment
  • Network uptime: 61%
  • Most common point of failure was software failure.
  • Detected 230 events and 107 Mbytes of data.

Figure 2: Typical seismic activity

25

slide-57
SLIDE 57

future work

  • Optimize data collection path
  • Deploy WSN with more than 100 nodes
  • Deployment time > a few days
  • Compute partial tomology images in WSN

26

slide-58
SLIDE 58

questions?

27