Routing Protocols: Reference Papers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

7/1/2018

Reference papers
Routing Protocols  J. Al-Karaki, A. E. Kamal, “Routing Techniques in
Wireless Sensor Networks: A Survey”

 K. Akkaya, M. Younis, “A Survey on Routing Protocols


for Wireless Sensor Networks”

Kuliah Jaringan Sensor


Dosen: Ali Husein A. ST. MEng

Routing challenges and design Routing challenges and design


issues issues
 Node deployment  Data routing methods
 Manual deployment  Application-specific
 Sensors are manually deployed  Time-driven: Periodic monitoring
 Data is routed through predetermined path
 Event-driven: Respond to sudden changes
 Random deployment  Query-driven: Respond to queries
 Optimal clustering is necessary to allow connectivity &
energy-efficiency  Hybrid

 Multi-hop routing

Routing challenges and design Routing challenges and design


issues issues
 Node/link heterogeneity  Fault tolerance
 Homogeneous sensors  Some sensors may fail due to lack of power, physical

 Heterogeneous nodes with different roles & damage, or environmental interference


capabilities  Adjust transmission power, change sensing rate,
 Diverse modalities reroute packets through regions with more power
 If cluster heads may have more energy & computational
capability, they take care of transmissions to the base station
(BS)

1
7/1/2018

Routing challenges and design Routing challenges and design


issues issues
 Network dynamics  Transmission media
 Mobile nodes  Wireless channel

 Mobile events, e.g., target tracking  Limited bandwidth: 1 – 100Kbps

 If WSN is to sense a fixed event, networks can work  MAC


in a reactive manner  Contention-free, e.g., TDMA or CDMA
 A lot of applications require periodic reporting  Contention-based, e.g., CSMA, MACA, or 802.11

Routing challenges and design Routing challenges and design


issues issues
 Connectivity  Coverage
 High density  high connectivity  An individual sensor’s view is limited
 Area coverage is an important design factor
 Some sensors may die after consuming their battery
power  Data aggregation
 Connectivity depends on possibly random
 Quality of Service
deployment  Bounded delay
 Energy efficiency for longer network lifetime

Routing Protocols in WSNs


I. Flat routing
 I. Flat
 II. Hierarchical
 III. Location-based
 IV. QoS-based

2
7/1/2018

SPIN (Sensor Protocols for


Information via Negotiation)
 Flooding
 Too much waste
 Implosion & Overlap
 Use in a limited scope,
if necessary
 Data-centric routing
 No globally unique ID
 Naming based on data
attributes
 SPIN, Directed
diffusion, ...

SPIN Direct Diffusion: Motivation


 Pros  Properties of Sensor Networks
 Each node only needs to know its one-hop  Data centric
neighbors  No central authority
 Significantly reduce energy consumption compared  Resource constrained
to flooding  Nodes are tied to physical locations
 Cons  Nodes may not know the topology
 Data advertisement cannot guarantee the delivery of  Nodes are generally stationary
data
 If the node interested in the data are far from the source,
 How can we get data from the sensors?
data will not be delivered
 Not good for applications requiring reliable data delivery,
e.g., intrusion detection

Directed Diffusion: Main Directed Diffusion: Motivating


Features Example
 Data centric  Sensor nodes are monitoring animals
 Individual nodes are unimportant  Users are interested in receiving data for all 4-legged
 Request driven creatures seen in a rectangle
 Sinks place requests as interests  Users specify the data rate
 Sources satisfying the interest can be found
 Intermediate nodes route data toward sinks
 Localized repair and reinforcement
 Multi-path delivery for multiple sources, sinks,
and queries

3
7/1/2018

Directed Diffusion: Interest and Directed Diffusion: Interest


Event Naming Propagation
 Query/interest:  Flood interest
1. Type=four-legged animal  Constrained or Directional flooding based on location is
2. Interval=20ms (event data rate)
3. Duration=10 seconds (time to cache) possible
4. Rect=[-100, 100, 200, 400]  Directional propagation based on previously cached data
 Reply:
1. Type=four-legged animal Gradient
2. Instance = elephant Source Interest
3. Location = [125, 220]
4. Intensity = 0.6
5. Confidence = 0.85
6. Timestamp = 01:20:40
 Attribute-Value pairs, no advanced
naming scheme Sink

Directed Diffusion: Data


Propagation Directed Diffusion: Reinforcement
 Multipath routing  Reinforce one of the neighbor after receiving initial data.
 Consider each gradient’s link quality  Neighbor who consistently performs better than others
 Neighbor from whom most events received

Gradient Gradient
Source Data
Source Data
Reinforcement

Sink Sink

Directed Diffusion: Negative Directed Diffusion: Summary of the


Reinforcement protocol
 Explicitly degrade the path by re-sending interest with lower data
rate.
 Time out: Without periodic reinforcement, a gradient will be torn
down

Gradient
Source Data
Reinforcement

Sink

4
7/1/2018

Directed Diffusion: Pros & Cons Extension of Directed Diffusion


 Different from SPIN in terms of on-demand data querying  One-phase pull
mechanism
 Sink floods interests only if necessary  Propagate interest
 A lot of energy savings
 In SPIN, sensors advertise the availability of data  A receiving node pick the link that delivered the
 Pros interest first
 Data centric: All communications are neighbor to neighbor with no  Assumes the link bidirectionality
need for a node addressing mechanism
 Each node can do aggregation & caching  Push diffusion
 Cons  Sink does not flood interest
 On-demand, query-driven: Inappropriate for applications requiring
continuous data delivery, e.g., environmental monitoring  Source detecting events disseminate exploratory
 Attribute-based naming scheme is application dependent data across the network
 For each application it should be defined a priori
 Extra processing overhead at sensor nodes  Sink having corresponding interest reinforces one of
the paths

Rumor Routing Rumor Routing


 Variation of directed diffusion  When a node generates a query, a node
 Don’t flood interests (or queries) knowing the route to a corresponding event can
 Flood events when the number of events is small but respond by looking up its events table
the number of queries large
 Route the query to the nodes that have observed a  No need for query flooding 
particular event  Only one path between the source and sink  
 Long-lived packets, called agents, flood events  Rumor routing works well only when the number of
through the network
events is small 
 When a node detects an event, it adds the event to
its events table, and generates an agent  Cost of maintaining a large number of agents and large
 Agents travel the network to propagate info about event tables will be prohibitive 
local events  Heuristic for defining the route of an event agent highly
 An agent is associated with TTL (Time-To-Live)
affects the performance of next-hop selection 

MCFA (Minimum Cost Forwarding


Algorithm) MCFA
 Assume the direction of routing is always known, i.e.,  Each node has to know the least cost path estimate to
toward the fixed base station (BS) BS
 BS broadcasts a message with cost set to 0
 No need for a node to have a unique ID or routing table  Every node initially sets its cost to BS to ∞
 Each node maintains the least cost estimate from itself  When a node receives the msg from BS, it checks if the
to BS estimate in the packet + 1 < the node’s current estimate to BS
 If yes, the current estimate & estimate in the msg are updated and
 Broadcast a message to neighbors resent
 A neighbor checks if it’s on the least cost path btwn the  Else, delete the msg; Do nothing
source and BS  A node far from BS may receive several msg’s  A node will
not send the updated msg until a * lc where a is a constant & lc
 If so, it re-broadcasts the message to its neighbors is the link cost
 Repeat until BS is reached  Works well for fixed topologies  
 Sensors are assumed to know what they have to look
for
  or ?

5
7/1/2018

Gradient-Based Routing (GBR) COUGAR & TinyDB


 Variation of directed diffusion
 Each node memorizes the number of hops when the interest is  View a WSN as a distributed database
diffused
 Each node computes its height, i.e., the minimum number of hops  Use declarative queries to abstract query
to BS processing from the network layer—network
 Difference btwn a node’s height & its neighbor’s is the gradient on layer independent
the link
 Forward a packet on a link with the largest gradient  Perform in-network data aggregation
 Data aggregation
 When multiple paths pass through a node, the node can combine data  Drawbacks
 Traffic spreading  Extra overhead & energy consumption due to the
 Uniformly divide traffic over the network to increase network lifetime extra query layer
 Stochastic scheme: Randomly pick a gradient when two or more next hops
have the same gradient  Synchronization is required for data aggregations
 Energy-based scheme: A node increases its height when its energy drops
below a certain threshold  Leader nodes should be dynamically maintained to
 Stream-based scheme: New streams are not routed through nodes that are prevent them from being hotspots
part of the path for other streams
 Outperforms directed diffusion in terms of total energy

ACQUIRE
 View a WSN as a distributed DB II. Hierarchical Routing
 Complex queries can be divided into subqueries
 BS sends a query
 Each node tries to answer the query by using precached info and
forwards the query to another node
 If the cached info is not fresh, the nodes gather info from their
neighbors within a lookahead of d hops
 Once the query is resolved completely, it is sent back to BS via the
reverse path or shortest path
 ACQUIRE can deal with complex queries by allowing many nodes
send to send responses
 Directed diffusion cannot handle complex queries due to too much
flooding
 ACQUIRE can adjust d for efficient query processing
 If d = network diameter, ACQUIRE becomes similar to flooding
 In contrast, a query has to travel more if d is too small
 Provides mathematical modeling to find an optimal value of d for a grid
of sensors, but no experiments performed

LEACH (Low Energy Clustering


Hierarchy) LEACH
 Cluster-based protocol  Pros
 Each node randomly decides to become a cluster heads (CH)
 CH chooses the code to be used in its cluster  Distributed, no global knowledge required
 CDMA between clusters  Energy saving due to aggregation by CHs
 CH broadcasts Adv; Each node decides to which cluster it belongs  Shortcomings
based on the received signal strength of Adv
 CH creates a xmission schedule for TDMA in the cluster  LEACH assumes all nodes can transmit with enough power
 Nodes can sleep when its not their turn to xmit to reach BS if necessary (e.g., elected as CHs)
 CH compresses data received from the nodes in the cluster and  Each node should support both TDMA & CDMA
sends the aggregated data to BS
 CH is rotated randomly
 Extension of LEACH [5]
 High level negotiation, similar to SPIN
 Only data providing new info is transmitted to BS

6
7/1/2018

Comparison between SPIN, LEACH & TEEN (Threshold sensitive Energy


Directed Diffusion Efficient Network protocol)
SPIN LEACH Directed  Reactive, event-driven protocol for time-critical
applications
Diffusion  A node senses the environment continuously, but turns radio on
and xmit only if the sensor value changes drastically
Optimal No No Yes  No periodic xmission
Route 

Don’t wait until the next period to xmit critical data
Save energy if data is not critical
Network Good Very good Good  CH sends its members a hard & a soft threshold
 Hard threshold: A member only sends data to CH only if data
Lifetime values are in the range of interest

Resource Yes Yes Yes


 Soft threshold: A member only sends data if its value changes
by at least the soft threshold
Awareness  Every node in a cluster takes turns to become the CH for a time
interval called cluster period
Use of Yes No Yes  Hierarchical clustering
meta-data

Multi-level hierarchical clustering in


TEEN & APTEEN TEEN
 Good for time-critical applications 
 Energy saving 
 Less energy than proactive approaches
 Soft threshold can be adapted
 Hard threshold could also be adapted depending on
applications
 Inappropriate for periodic monitoring, e.g.,
habitat monitoring 
 Ambiguity between packet loss and
unimportant data (indicating no drastic change)

APTEEN (Adaptive Threshold sensitive


Energy Efficient Network protocol) Sensor aggregate routing
 Extends TEEN to support both periodic sensing &  Sensor aggregate: a set of nodes satisfying a
reacting to time critical events grouping predicate
 Unlike TEEN, a node must sample & transmit a data if  Mainly designed for target tracking
it has not sent data for a time period equal to CT (count
time) specified by CH
 Compared to LEACH, TEEN & APTEEN consumes
less energy (TEEN consumes the least)
 Network lifetime: TEEN ≥ APTEEN ≥ LEACH
 Drawbacks of TEEN & APTEEN
 Overhead & complexity of forming clusters in multiple levels
and implementing threshold-based functions

Source: M. Handy at University of Rostock

7
7/1/2018

TTDD (Two Tier Data


Dissemination) TTDD: Sensor Network Model
 Data dissemination to mobile sinks
 Two-tier query & data forwarding
Sink
 Objectives
 Source proactively builds a grid structure to support
data availability for mobile sinks
 Mobility pattern is unknown a priori
 Localize impacts of sink mobility on data forwarding Stimulus Source Sink
 Only a small set of sensor nodes maintain forwarding
state

Source: TTDD at Mobicom ‘02

TTDD Basics TTDD Mobile Sinks

Dissemination Node Dissemination Node

Data Announcement Data Announcement Trajectory


Forwarding
Source Source
Immediate
Dissemination
Data Data Node

Sink Sink

Immediate Query Immediate


Dissemination Dissemination Trajectory
Node Node Forwarding

Source: TTDD at Mobicom ‘02 Source: TTDD at Mobicom ‘02

TTDD Multiple Mobile Sinks Grid Maintenance

Dissemination Node Dissemination Node

Data Announcement Trajectory


Forwarding
Source Source
Immediate X Immediate
Dissemination Dissemination
Data Node Data Node

Source

Source: TTDD at Mobicom ‘02 Source: TTDD at Mobicom ‘02

8
7/1/2018

GAF (Geographic Adaptive


Fidelity)
III. Location-based routing  Energy-aware location-based protocol mainly designed
protocols for MANET
 Each node knows its location via GPS
 Associate itself with a point in the virtual grid
 Nodes associated with the same point on the grid are considered
equivalent in terms of the cost of packet routing
 Node 1 can reach any of nodes 2, 3 & 4  2,3, 4 are equivalent;
Any of the two can sleep without affecting routing fidelity

GEAR (Geographic and Energy


GAF Aware Routing)
 Three states  Restrict the number of interest floods in
 Discovery: Determine neighbors in a grid directed diffusion
 Active  Consider only a certain region of the network rather
than flooding the entire network
 Sleep
 Each node keeps an estimated cost & a
 Each node in the grid estimates its time of leaving the
grid and sends it to its neighbors
learning cost of reaching the sink through its
neighbors
 The sleeping neighbors adjust their sleeping time to
keep the routing fidelity  Estimated cost = f(residual energy, distance to
the destination)
 Learned cost is propagated one hop back
every time a packet reaches the sink
 Route setup for the next packet can be adjusted

GEAR GEAR
 Phase 1: Forwarding packets towards the region  Phase 2: Forwarding the packet within the
 Forward a packet to the neighbor minimizing the cost target region
function f  Apply either recursive forwarding
 Forward data to the neighbor which is closest to the sink and  Divide the region into four subareas and send four copies of
has the highest level of remaining energy the packet
 Repeat this until regions with only one node are left
 If all neighbors are further than itself, there is a hole
 Pick one of the neighbors based on the learned  Alternatively apply restricted flooding
 Apply when the node density is low
cost
 GEAR successfully delivers significantly more
packets than GPSR (Greedy Perimeter
Stateless Routing)
 GPSR will be covered in detail in another class

9
7/1/2018

SAR (Sequential Assignment


Routing)
IV. QoS-aware routing  Table-driven multi-path approach to achieve
energy efficiency & fault tolerance
 Creates trees rooted at one hop neighbors of
the sink -> Form multiple paths from sink to
sensors
 QoS metrics, energy resource, priority level of each
packet
 Local Failure Recovery
 Select one of the paths according to the energy
resources and QoS on the path
 High overhead to maintain tables and states at
each sensor

Energy Aware QoS Routing Energy Aware QoS Routing


Protocol Protocol
 Basic settings  Finds least cost and
 Base station
energy efficient paths that
 Gateways can
communicate with each meet the end-to-end delay
other during connection
 Sensor nodes in a cluster
can only be accessed by  Link cost = f(energy reserve,
the gateway managing the transmission energy, error
cluster rate) of nodes
 Focus on QoS routing in
one cluster  Class-based queuing
 Real-time & non-real-time model used to support
traffic exist best-effort and real-time
 Support timing constraints
for RT traffic generated by
 Improve throughput of non-
RT traffic
imaging sensors

Energy Aware QoS Routing Energy Aware QoS Routing


Protocol Protocol
 Support bandwidth ratio r between real-time and best-  Drawbacks
effort traffics  Transmission time is not considered to estimate E2E
 Properly adjust r to support end-to-end delay without severely
starving best-effort traffic delay
 Use extended Dijkstra’s algorithm to list an ascending  Usually, transmission delay >> propagation delay
set of least cost paths  Assumes more powerful gateways
 A gateway checks if E2E QoS can be met  All communications are through gateways
 Estimates E2E delay = E2E queuing delay + E2E propagation  Gateways have to find paths and r to support QoS
delay requirements
 Only allows to establish a real-time connection if E2E delay ≤
E2E Deadline
 Also, tries to find which r value maximizes the throughput of
non-RT traffic

10
7/1/2018

SPEED Summary
 Each node maintains info about its neighbors and uses
greedy geographic forwarding to find the paths
 Tries to ensure a certain speed for each packet in the
network
 Congestion avoidance
 Flat routing – Does not assume more powerful gateways
or cluster heads
 To be discussed in detail in another class

Questions?

11

You might also like