SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Directed Diffusion for Wireless
Sensor Networking
Authors:
Chalermek Intanagonwiwat, Ramesh Govindan, Deborah
Estrin, John Heidemann, and Fabio Silva
Presented by:
Md. Habibur Rahman (AIUB)
Course:
Sensor Networks and Wireless Computing
Instructor:
Md. Saidur Rahman (AIUB)
Wireless Networks
Variety of architectures
Single hop networks
Multi-hop networks
Internet
The Wireless Future …
Motivation
Properties of Sensor Networks
Data centric approach: communication based named data,
not named nodes
No central authority
Resource constrained like limited power, computation
capacities and memory
Nodes are tied to physical locations
Nodes may not know the topology due to rapidly changes
of topology
Nodes are generally stationary
Q: How can we get data from the sensors?
Introduction(1/2)
A sensor network is composed of a large number of
sensor nodes, which are densely deployed either inside
the phenomenon or very close to it.
Random deployment
Cooperative capabilities
Sensor nodes scattered in a sensor field
Multi-hop communication is expected
Motivating factors for emergence
Applications
Advances in wireless technology
Introduction(2/2)
A region requires event-
monitoring
Deploy sensors forming a
distributed network
Wireless networking
Energy-limited nodes
On event, sensed and/or
processed information
delivered to the inquiring
destination
The Problem
 Where should the data be
stored?
 How should queries be
routed to the stored data?
 How should queries for
sensor networks be
expressed?
 Where and how should
aggregation be performed?
EventEvent
Sources
Sink Node
Directed
Diffusion
A sensor field
Directed Diffusion
Designed for robustness, scaling and energy efficiency
Data centric
Sinks place requests as interests for named data
Sources satisfying the interest can be found
Intermediate nodes can cache or transform data directly
toward sinks
Attribute-naming based
Data aggregation
Interest, data aggregation and data propagation are
determined by localized interactions.
Directed Diffusion
Four main features: Interests, Data, Gradients &
Reinforcement
Interest: a query or an interrogation which specifies what
a user wants.
Data: collected or processed information
Gradient: direction state created in each node that
receives interest.
Gradient direction is toward the neighboring node which the
interest is received
Events start flowing from originators of interests along
multiple gradient paths.
Directed Diffusion
Directed Diffusion
Naming
 Task descriptions are named by a list of attribute value pairs that
describe a task
 eg:
type=wheeled vehicle // detect vehicle location
interval=20ms // send events every 20 ms
duration=10s // for the next 10s
rect=[-100,100,200,400]// from sensors within rectangle
Interests and Gradients
 Interest is usually injected to the network from sink
 For each active task, sink periodically broadcasts an interest
message to each of its neighbors
 Initial interest contains the specified rect and duration attributes
but larger interval attribute
 Interests tries to determine if there are any sensor nodes that
detect the wheeled vehicle(exploratory).
Interests
Interests: a query which specifies what a user wants by
naming the data.
Sink periodically broadcasts interest messages to each
neighbor.
Includes the rectangle and duration attributes from the
request.
Includes a larger interval attribute
All nodes maintain an interest cache
Interest Cache
Sensor Node
Receives interest packet
Node is within the rectangle coordinates
Task the sensor system to generate samples at the
highest rate of all the gradients.
Data is sent using unicast
Data Return
Exploratory versus Data
Exploratory use lower data rates
Once the sensor is able to report the data a reinforcement
path is created
Data gradients used to report high quality/high
bandwidth data.
Positive Reinforcement
Sink re-sends original interest message with smaller
interval
Neighbor nodes see the high bandwidth request and
reinforce at least one neighbor using its data cache
This process selects an empirically low-delay path.
Multiple Sources & Sinks
The current rules work for multiple sources and sinks
Negative Reinforcement
Repair can result in more than one path being reinforced
Time out gradients
Send negative reinforcement message
Repair
C detects degradation
Notices rate of data significantly lower
Gets data from another neighbor that it hasn’t seen
To avoid downstream nodes from repairing their paths C
must keep sending interpolated location estimates.
Design Considerations
Simulation Environment
NS2, 50 nodes in 160x160 sqm., range 40m
Random 5 sources in 70x70, random 5 sinks
Average node density constant in all simulations
Comparison against flooding and omniscient multicast
1.6Mbps 802.11 MAC
Not realistic (reliable transmission, RTS/CTS, high power, idle
power ~ receive power)
Set idle power to 10% of receive power, 5% of transmit
power
Metrics
Average dissipated energy
per node energy dissipation / # events seen by sinks
Average packet delay
latency of event transmission to reception at sink
Distinct event delivery
# of distinct events received / # of events originally sent
Both measured as functions of network size
Average Dissipated Energy
In-network aggregation reduces DD redundancy
Flooding poor because of multiple paths from source to sink
flooding
DiffusionMulticast
Flooding
DiffusionMulticast
Delay
DD finds least delay paths, as OM – encouraging
Flooding incurs latency due to high MAC contention,
collision
flooding
Diffusion
Multicast
Average energy and delay
Average delay is misleading
Directed Diffusion is better than Omniscient Multicast!?
Omniscient multicast sends duplicate messages over the
same paths
Topology has little path diversity
Why not suppress messages with Omniscient Multicast
just as in Directed Diffusion?
Event Delivery Ratio under node failures
Delivery ratio degrades with higher % node failures
Graceful degradation indicates efficient negative
reinforcement
0 %
10%
20%
Analysis
Energy gains are dependent on 802.11 energy assumptions
Directed Diffusion has lowest average dissipated energy
Data aggregation and negative reinforcement enhance
performance considerably
Differences in power consumption disappear if idle–
time power consumption is high
Can the network always deliver at the interest’s requested
rate?
Can diffusion handle overloads?
Does reinforcement actually work?
Continued….
Pros
Energy – Much less traffic than flooding.
Latency – Transmits data along the best path
Scalability – Local interactions only
Robust – Retransmissions of interests
Cons
The set up phase of the gradients is expensive
Need of and adequate MAC layer to support an efficient
implementation. The simulation analysis uses a modified
802.11 MAC protocol
Design doesn’t deal with congestion or loss
Periodic broadcasts of interest reduces network lifetime
Nodes within range of human operator may die quickly
Conclusions
Directed diffusion, a paradigm proposed for event
monitoring sensor networks
Energy efficiency achievable
Diffusion mechanism resilient to fault tolerance
Conservative negative reinforcements proves useful
More thorough performance evaluation is required
MAC for sensor networks needs to be designed
carefully for further performance gains
Thank you 

Weitere ähnliche Inhalte

Was ist angesagt?

Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
Mahesh Rajawat
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
Chandra Meena
 

Was ist angesagt? (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 

Ähnlich wie Directed diffusion for wireless sensor networking

Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgi
alrazgi
 

Ähnlich wie Directed diffusion for wireless sensor networking (20)

Sensor net
Sensor netSensor net
Sensor net
 
Lect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptxLect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptx
 
networking
networkingnetworking
networking
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Throughput maximization technique in wireless sensor network using data aggr...
Throughput maximization technique in wireless sensor network using data  aggr...Throughput maximization technique in wireless sensor network using data  aggr...
Throughput maximization technique in wireless sensor network using data aggr...
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgi
 
40120140501003
4012014050100340120140501003
40120140501003
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
25143515-Wireless-Communication.ppt
25143515-Wireless-Communication.ppt25143515-Wireless-Communication.ppt
25143515-Wireless-Communication.ppt
 

Mehr von Habibur Rahman

Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Habibur Rahman
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
Habibur Rahman
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
Habibur Rahman
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
Habibur Rahman
 
Simulation and modeling
Simulation and modelingSimulation and modeling
Simulation and modeling
Habibur Rahman
 
Performace analysis of mipv4 vs mipv6
Performace  analysis of mipv4 vs mipv6Performace  analysis of mipv4 vs mipv6
Performace analysis of mipv4 vs mipv6
Habibur Rahman
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
Habibur Rahman
 

Mehr von Habibur Rahman (11)

Cycling for the body and mind
Cycling for the body and mindCycling for the body and mind
Cycling for the body and mind
 
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentation
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
 
Simulation and modeling
Simulation and modelingSimulation and modeling
Simulation and modeling
 
Performace analysis of mipv4 vs mipv6
Performace  analysis of mipv4 vs mipv6Performace  analysis of mipv4 vs mipv6
Performace analysis of mipv4 vs mipv6
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Directed diffusion for wireless sensor networking

  • 1. Directed Diffusion for Wireless Sensor Networking Authors: Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva Presented by: Md. Habibur Rahman (AIUB) Course: Sensor Networks and Wireless Computing Instructor: Md. Saidur Rahman (AIUB)
  • 2. Wireless Networks Variety of architectures Single hop networks Multi-hop networks
  • 4. Motivation Properties of Sensor Networks Data centric approach: communication based named data, not named nodes No central authority Resource constrained like limited power, computation capacities and memory Nodes are tied to physical locations Nodes may not know the topology due to rapidly changes of topology Nodes are generally stationary Q: How can we get data from the sensors?
  • 5. Introduction(1/2) A sensor network is composed of a large number of sensor nodes, which are densely deployed either inside the phenomenon or very close to it. Random deployment Cooperative capabilities Sensor nodes scattered in a sensor field Multi-hop communication is expected Motivating factors for emergence Applications Advances in wireless technology
  • 6. Introduction(2/2) A region requires event- monitoring Deploy sensors forming a distributed network Wireless networking Energy-limited nodes On event, sensed and/or processed information delivered to the inquiring destination
  • 7. The Problem  Where should the data be stored?  How should queries be routed to the stored data?  How should queries for sensor networks be expressed?  Where and how should aggregation be performed? EventEvent Sources Sink Node Directed Diffusion A sensor field
  • 8. Directed Diffusion Designed for robustness, scaling and energy efficiency Data centric Sinks place requests as interests for named data Sources satisfying the interest can be found Intermediate nodes can cache or transform data directly toward sinks Attribute-naming based Data aggregation Interest, data aggregation and data propagation are determined by localized interactions.
  • 9. Directed Diffusion Four main features: Interests, Data, Gradients & Reinforcement Interest: a query or an interrogation which specifies what a user wants. Data: collected or processed information Gradient: direction state created in each node that receives interest. Gradient direction is toward the neighboring node which the interest is received Events start flowing from originators of interests along multiple gradient paths.
  • 11. Directed Diffusion Naming  Task descriptions are named by a list of attribute value pairs that describe a task  eg: type=wheeled vehicle // detect vehicle location interval=20ms // send events every 20 ms duration=10s // for the next 10s rect=[-100,100,200,400]// from sensors within rectangle Interests and Gradients  Interest is usually injected to the network from sink  For each active task, sink periodically broadcasts an interest message to each of its neighbors  Initial interest contains the specified rect and duration attributes but larger interval attribute  Interests tries to determine if there are any sensor nodes that detect the wheeled vehicle(exploratory).
  • 12. Interests Interests: a query which specifies what a user wants by naming the data. Sink periodically broadcasts interest messages to each neighbor. Includes the rectangle and duration attributes from the request. Includes a larger interval attribute All nodes maintain an interest cache
  • 14. Sensor Node Receives interest packet Node is within the rectangle coordinates Task the sensor system to generate samples at the highest rate of all the gradients. Data is sent using unicast
  • 16. Exploratory versus Data Exploratory use lower data rates Once the sensor is able to report the data a reinforcement path is created Data gradients used to report high quality/high bandwidth data.
  • 17. Positive Reinforcement Sink re-sends original interest message with smaller interval Neighbor nodes see the high bandwidth request and reinforce at least one neighbor using its data cache This process selects an empirically low-delay path.
  • 18. Multiple Sources & Sinks The current rules work for multiple sources and sinks
  • 19. Negative Reinforcement Repair can result in more than one path being reinforced Time out gradients Send negative reinforcement message
  • 20. Repair C detects degradation Notices rate of data significantly lower Gets data from another neighbor that it hasn’t seen To avoid downstream nodes from repairing their paths C must keep sending interpolated location estimates.
  • 22. Simulation Environment NS2, 50 nodes in 160x160 sqm., range 40m Random 5 sources in 70x70, random 5 sinks Average node density constant in all simulations Comparison against flooding and omniscient multicast 1.6Mbps 802.11 MAC Not realistic (reliable transmission, RTS/CTS, high power, idle power ~ receive power) Set idle power to 10% of receive power, 5% of transmit power
  • 23. Metrics Average dissipated energy per node energy dissipation / # events seen by sinks Average packet delay latency of event transmission to reception at sink Distinct event delivery # of distinct events received / # of events originally sent Both measured as functions of network size
  • 24. Average Dissipated Energy In-network aggregation reduces DD redundancy Flooding poor because of multiple paths from source to sink flooding DiffusionMulticast Flooding DiffusionMulticast
  • 25. Delay DD finds least delay paths, as OM – encouraging Flooding incurs latency due to high MAC contention, collision flooding Diffusion Multicast
  • 26. Average energy and delay Average delay is misleading Directed Diffusion is better than Omniscient Multicast!? Omniscient multicast sends duplicate messages over the same paths Topology has little path diversity Why not suppress messages with Omniscient Multicast just as in Directed Diffusion?
  • 27. Event Delivery Ratio under node failures Delivery ratio degrades with higher % node failures Graceful degradation indicates efficient negative reinforcement 0 % 10% 20%
  • 28. Analysis Energy gains are dependent on 802.11 energy assumptions Directed Diffusion has lowest average dissipated energy Data aggregation and negative reinforcement enhance performance considerably Differences in power consumption disappear if idle– time power consumption is high Can the network always deliver at the interest’s requested rate? Can diffusion handle overloads? Does reinforcement actually work?
  • 29. Continued…. Pros Energy – Much less traffic than flooding. Latency – Transmits data along the best path Scalability – Local interactions only Robust – Retransmissions of interests Cons The set up phase of the gradients is expensive Need of and adequate MAC layer to support an efficient implementation. The simulation analysis uses a modified 802.11 MAC protocol Design doesn’t deal with congestion or loss Periodic broadcasts of interest reduces network lifetime Nodes within range of human operator may die quickly
  • 30. Conclusions Directed diffusion, a paradigm proposed for event monitoring sensor networks Energy efficiency achievable Diffusion mechanism resilient to fault tolerance Conservative negative reinforcements proves useful More thorough performance evaluation is required MAC for sensor networks needs to be designed carefully for further performance gains