mac layer approach for cluster based aggregation in
play

MAC-layer Approach for Cluster-Based Aggregation in Sensor Networks - PowerPoint PPT Presentation

MAC-layer Approach for Cluster-Based Aggregation in Sensor Networks Petar Popovski, Frank H.P. Fitzek, Hiroyuki Yomo, Tatiana K. Madsen and Ramjee Prasad Center for TeleInFrastructure (CTIF) Aalborg University Niels Jernes Vej 12, DK-9220


  1. MAC-layer Approach for Cluster-Based Aggregation in Sensor Networks Petar Popovski, Frank H.P. Fitzek, Hiroyuki Yomo, Tatiana K. Madsen and Ramjee Prasad Center for TeleInFrastructure (CTIF) Aalborg University Niels Jernes Vej 12, DK-9220 Aalborg, Denmark Email: petarp|ff|yomo|tatiana|prasad@kom.aau.dk

  2. Content • Introduction & Problem definition • System Model • New proposed Algorithm • Results • Conclusion and Outlook 09/06/2004 2

  3. Introduction • Sensor Network – Sensor field for monitoring and surveillance – Large number devices, unattended deployment – Device • Tiny device with lightweight wireless transceiver • Limited Energy (irreplaceable battery) • Physical Sensor (defines the measurable attributes) – Wireless sensor network is instantiated through the collaboration among the nodes in order to fulfill a larger sensing task 09/06/2004 3

  4. Introduction • Features of the sensor network – Data-centric style of communication • Directed diffusion – inquirer expresses interest, sensor that match the required attribute send replies – Bootstrap procedures for network self-assembly – Data aggregation • The nodes which are data aggregators should be active upon arrival of query 09/06/2004 4

  5. Problem definition – node wakeup 09/06/2004 5

  6. Clustering and data aggregation 09/06/2004 6

  7. Clustering an aggregation of data Clusterhead The sink should connect to at Bridge least one active Clusterhead/ node. Then the Bridge complete data is Terminal in available through sleep mode. the network 09/06/2004 7

  8. Approach to the problem • Why each node does not send the data to the sink upon triggering? – Excessive contention – High transmitting power – The sink does not need the data from all nodes • Three sub-problems for clustered solution 1. How to access the wireless channel upon wakeup 2. How to organize the nodes into interconnected clusters 3. How to store all the data in the created sensor network • Cross-layered approach 09/06/2004 8

  9. System Model • Channel types – Rendezvous channel (R-channel) – Communication channel • Symmetric radio links • Synchronization issues – Slotted channel assumed to facilitate explanation – The probe packets are used as synchronizers • Node B replies to node A only after receiving probe • Collision is the only source of error 09/06/2004 9

  10. Basics of the proposed algorithm • Node roles in the sensor network – Data aggregation: aggregator and contributor – Networking: clusterhead, remote, bridge • Reliable link formation – Asymmetric procedure: interrogator and responder • Cross-layering: – Use the roles of interrogator-responder to define the network roles 09/06/2004 10

  11. Reliable link formation – role conflict • Neighbor discovery and link formation A B A B probe response time • Symmetric randomized protocol – Role conflict defined – Solved by a leader election procedure 1 p = • A node starts to send probe with probability N max • This probability is doubled if no reply is received – Collision is also a reply – means that some responder is interested in forming the link! 09/06/2004 11

  12. Reliable link formation – reply conflict • Reply conflict defined R 1 R 2 R 3 – The interrogator resolves the collisions among the R 4 R 8 responders by a splitting tree. I 0 R 5 R 7 • Erroneously received probes R 6 – E.g. when a responder is in I 0 R i I 0 range of two interrogators probe response ack – Address adaptation is introduced to rejoin the splitting tree 09/06/2004 12

  13. Obtaining a connected network (1) B Example physical topology. A dashed link F D A denotes that the nodes are in range E C B F E must for a link as responder for 2 different D A E interrogators. Alternatively, E can be responder for D and interrogator for F. C B F The clusters of A and E are connected D A E through two bridges (C and D), although only one is necessary. C 09/06/2004 13

  14. Obtaining a connected network (2) • Local criterion for link formation – Avoids exchange of messages at network layer – A good candidate for local criterion: After forming link as a responder, give up further creation of links with probability: α α is a parameter − 1 K K is number of known neighbors – If a node that has only one link as a responder gives up, it goes to sleep. 09/06/2004 14

  15. Role assignment at upper layers • At network layer – A node that has at least one link as interrogator is a clusterhead – A node that has links as responder to at least two different interrogators, takes role of bridge – A node that has link as interrogator, but also has a link as responder, takes two roles: clusterhead and bridge. NB: We allow two nodes A and B to make mutual link only once, such that it can not happen that A is clusterhead of B and B is also clusterhead of A. • At aggregation layer – A node aggregates its data in the cluster in which it has formed its first link. – If a node is first responder and then interrogator, it will be a clusterhead, but not aggregator! 09/06/2004 15

  16. Simulation model and performance measures • N nodes are uniformly placed in L x L square • Communication range R determined from the node density = π ⋅ N ⋅ 2 R λ 2 L • All nodes wake up and start the protocol at the same time • The duration of the procedure is measured until each interrogator node has sent Pmax=2 “empty” probe packets – When all interrogators stop sending probe packets, no further event can occur in the network creation. • External observer as a reference 09/06/2004 16

  17. Results (1) – Average duration 09/06/2004 17

  18. Results (2) – Average number of messages transmitted by a node 09/06/2004 18

  19. Results (3) - Probability of getting connected topology in dependency of alpha 09/06/2004 19

  20. Results (4) – Fraction of terminals in dependency of alpha 09/06/2004 20

  21. Conclusion and outlook • Protocol for prompt network formation and data aggregation has been designed – The proposed reliable link formation deals with excessive contention due to spatial-temporal correlation in sensor activation – Cross-layered approach – The localized algorithms produce global network property • Future work – Introduce power control during the network formation – Analytical approach to the tuning of the parameters in the localized algorithms 09/06/2004 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend