MAC-layer Approach for Cluster-Based Aggregation in Sensor Networks - - PowerPoint PPT Presentation

mac layer approach for cluster based aggregation in
SMART_READER_LITE
LIVE PREVIEW

MAC-layer Approach for Cluster-Based Aggregation in Sensor Networks - - PowerPoint PPT Presentation

MAC-layer Approach for Cluster-Based Aggregation in Sensor Networks Petar Popovski, Frank H.P. Fitzek, Hiroyuki Yomo, Tatiana K. Madsen and Ramjee Prasad Center for TeleInFrastructure (CTIF) Aalborg University Niels Jernes Vej 12, DK-9220


slide-1
SLIDE 1

MAC-layer Approach for Cluster-Based Aggregation in Sensor Networks

Petar Popovski, Frank H.P. Fitzek, Hiroyuki Yomo, Tatiana K. Madsen and Ramjee Prasad

Center for TeleInFrastructure (CTIF) Aalborg University Niels Jernes Vej 12, DK-9220 Aalborg, Denmark Email: petarp|ff|yomo|tatiana|prasad@kom.aau.dk

slide-2
SLIDE 2

2 09/06/2004

Content

  • Introduction & Problem definition
  • System Model
  • New proposed Algorithm
  • Results
  • Conclusion and Outlook
slide-3
SLIDE 3

3 09/06/2004

Introduction

  • Sensor Network

– Sensor field for monitoring and surveillance – Large number devices, unattended deployment – Device

  • Tiny device with lightweight wireless transceiver
  • Limited Energy (irreplaceable battery)
  • Physical Sensor (defines the measurable attributes)

– Wireless sensor network is instantiated through the collaboration among the nodes in order to fulfill a larger sensing task

slide-4
SLIDE 4

4 09/06/2004

Introduction

  • Features of the sensor network

– Data-centric style of communication

  • Directed diffusion – inquirer expresses interest, sensor

that match the required attribute send replies

– Bootstrap procedures for network self-assembly – Data aggregation

  • The nodes which are data aggregators should be

active upon arrival of query

slide-5
SLIDE 5

5 09/06/2004

Problem definition – node wakeup

slide-6
SLIDE 6

6 09/06/2004

Clustering and data aggregation

slide-7
SLIDE 7

7 09/06/2004

Clustering an aggregation of data

The sink should connect to at least one active

  • node. Then the

complete data is available through the network

Clusterhead Bridge Clusterhead/ Bridge Terminal in sleep mode.

slide-8
SLIDE 8

8 09/06/2004

Approach to the problem

  • Why each node does not send the data to the sink

upon triggering?

– Excessive contention – High transmitting power – The sink does not need the data from all nodes

  • Three sub-problems for clustered solution

1. How to access the wireless channel upon wakeup 2. How to organize the nodes into interconnected clusters 3. How to store all the data in the created sensor network

  • Cross-layered approach
slide-9
SLIDE 9

9 09/06/2004

System Model

  • Channel types

– Rendezvous channel (R-channel) – Communication channel

  • Symmetric radio links
  • Synchronization issues

– Slotted channel assumed to facilitate explanation – The probe packets are used as synchronizers

  • Node B replies to node A only after receiving probe
  • Collision is the only source of error
slide-10
SLIDE 10

10 09/06/2004

Basics of the proposed algorithm

  • Node roles in the sensor network

– Data aggregation: aggregator and contributor – Networking: clusterhead, remote, bridge

  • Reliable link formation

– Asymmetric procedure: interrogator and responder

  • Cross-layering:

– Use the roles of interrogator-responder to define the network roles

slide-11
SLIDE 11

11 09/06/2004

Reliable link formation – role conflict

  • Neighbor discovery and link formation
  • Symmetric randomized protocol

– Role conflict defined – Solved by a leader election procedure

  • A node starts to send probe with probability
  • This probability is doubled if no reply is received

– Collision is also a reply – means that some responder is interested in forming the link!

probe response

A B time A B

max

1 N p =

slide-12
SLIDE 12

12 09/06/2004

Reliable link formation – reply conflict

  • Reply conflict defined

– The interrogator resolves the collisions among the responders by a splitting tree.

  • Erroneously received probes

– E.g. when a responder is in range of two interrogators – Address adaptation is introduced to rejoin the splitting tree

I0 R1 R2 R3 R4 R5 R6 R7 R8

probe response ack

I0 Ri I0

slide-13
SLIDE 13

13 09/06/2004

Obtaining a connected network (1)

Example physical topology. A dashed link denotes that the nodes are in range

A B C D E F B C D E F A

E must for a link as responder for 2 different

  • interrogators. Alternatively, E can be

responder for D and interrogator for F.

F B C D E A

The clusters of A and E are connected through two bridges (C and D), although

  • nly one is necessary.
slide-14
SLIDE 14

14 09/06/2004

Obtaining a connected network (2)

  • Local criterion for link formation

– Avoids exchange of messages at network layer – A good candidate for local criterion:

After forming link as a responder, give up further creation of links with probability:

– If a node that has only one link as a responder gives up, it goes to sleep.

K α − 1

α is a parameter

K is number of known neighbors

slide-15
SLIDE 15

15 09/06/2004

Role assignment at upper layers

  • At network layer

– A node that has at least one link as interrogator is a clusterhead – A node that has links as responder to at least two different interrogators, takes role of bridge – A node that has link as interrogator, but also has a link as responder, takes two roles: clusterhead and bridge. NB: We allow two nodes A and B to make mutual link only once, such that it can not happen that A is clusterhead of B and B is also clusterhead of A.

  • At aggregation layer

– A node aggregates its data in the cluster in which it has formed its first link. – If a node is first responder and then interrogator, it will be a clusterhead, but not aggregator!

slide-16
SLIDE 16

16 09/06/2004

Simulation model and performance measures

  • N nodes are uniformly placed in L x L square
  • Communication range R determined from the node density
  • All nodes wake up and start the protocol at the same time
  • The duration of the procedure is measured until each

interrogator node has sent Pmax=2 “empty” probe packets

– When all interrogators stop sending probe packets, no further event can occur in the network creation.

  • External observer as a reference

2 2

L R N ⋅ ⋅ = π λ

slide-17
SLIDE 17

17 09/06/2004

Results (1) – Average duration

slide-18
SLIDE 18

18 09/06/2004

Results (2) – Average number of messages transmitted by a node

slide-19
SLIDE 19

19 09/06/2004

Results (3) - Probability of getting connected topology in dependency of alpha

slide-20
SLIDE 20

20 09/06/2004

Results (4) – Fraction of terminals in dependency of alpha

slide-21
SLIDE 21

21 09/06/2004

Conclusion and outlook

  • Protocol for prompt network formation and data

aggregation has been designed

– The proposed reliable link formation deals with excessive contention due to spatial-temporal correlation in sensor activation – Cross-layered approach – The localized algorithms produce global network property

  • Future work

– Introduce power control during the network formation – Analytical approach to the tuning of the parameters in the localized algorithms