Module 4 QB Solutions
Module 4 QB Solutions
Maximize network lifetime: A WSN’s task is not to transport data, but to observe (and possibly control).
Hence, energy-efficient transmission is at best a means to an end and the actual end should be the
optimization goal: the network should be able to fulfill its duty for as long as possible.
Which event to use to demarcate the end of a network’s lifetime is, however, not clear either. Several options
exist
• Time until the first node fails.
• Time until there is a spot that is not covered by the network (loss of coverage, a useful metric only for
redundantly deployed networks).
• Time until network partition (when there are two nodes that can no longer communicate with each other).
Routing considering available battery energy: While maximizing the network lifetime is clearly a useful
goal, it is not immediately obvious how to reach this goal using observable parameters of an actual network.
As the finite energy supply in nodes’ batteries is the limiting factor to network lifetime, it stands to reason
to use information about battery status in routing decisions. Some of the possibilities are:
• Maximum Total Available Battery Capacity: Choose that route where the sum of the available battery
capacity is maximized, without taking needless detours.
• Minimum Battery Cost Routing (MBCR): Instead of looking directly at the sum of available battery
capacities along a given path, MBCR instead looks at the “reluctance” of a node to route traffic. This
reluctance increases as its battery is drained.
• Min–Max Battery Cost Routing (MMBCR): This scheme follows a similar intention, to protect nodes
with low energy battery resources. Instead of using the sum of reciprocal battery levels, simply the
largest reciprocal level of all nodes along a path is used as the cost for this path. Then, again the path
with the smallest cost is used. In this sense, the optimal path is chosen by minimizing over a maximum.
• Conditional Max–Min Battery Capacity Routing (CMMBCR): Another option is to conditionalize
upon the actual battery power levels available. If there are routes along which all nodes have a battery
level exceeding a given threshold, then select the route that requires the lowest energy per bit. If there
is no such route, then pick that route which maximizes the minimum battery level.
• Minimize variance in power levels: To ensure a long network lifetime, one strategy is to use up all the
batteries uniformly to avoid some nodes prematurely running out of energy and disrupting the network.
Hence, routes should be chosen such that the variance in battery levels between different routes is
reduced.
Minimum Total Transmission Power Routing (MTPR): Without actually considering routing as such,
Bambos looked at the situation of several nodes transmitting directly to their destination, mutually causing
interference with each other. A given transmission is successful if its SINR exceeds a given threshold. The
goal is to find an assignment of transmission power values for each transmitter (given the channel attenuation
metric) such that all transmissions are successful and that the sum of all power values is minimized. MTPR
is of course also applicable to multihop networks.
2. Explain Rumor Routing with an example and a neat diagram.
Ans. Assume some sensors are interested in certain events (e.g. temperature exceeding a given value) and a
sensor can observe it. Classical options are to flood either the query for the event or the notifications that an
event has occurred through the entire network. The “rumor routing” approach proposed here does not flood
the network with information about an event occurrence but only installs a few paths in the network by
sending out one or several agents. Each of these agents propagates from node to node and installs routing
information about the event in each node that it visited. This is illustrated in Figure 11.2(a) where the node
in the middle detects an event and installs two event paths in the network (shaded areas). Once a node tries
to query an event (or to detect whether an event actually exists), it also sends out one or more agents. Such
a search agent is forwarded through the network until it intersects with a preinstalled event path and then
knows how to find an event.
In Figure 11.2(b), the node in the lower left corner sends out such a search, which happens to propagate
upward until it intersects with one event path. All these agent propagations are limited to avoid endless
circling of data. The rationale behind this technique is the relatively high probability that two random lines
in a square intersect each other. While neither the event paths nor the search paths will in reality be straight
lines, the approximation is claimed to be good enough. Using five instead of one event paths increases this
probability to about 99.7 %. In effect, rumor routing allows to trade off effort in path creation and/or search
against probability of detecting an event. There are a few more functionalities included in rumor routing.
For example, agents spread information about more than one event if they have crossed an event path for
another event. Also, an agent uses opportunities to shorten existing event paths if they know about shorter
paths.
Simultaneous transmissions over multiple paths: When using multiple paths as a standby for the primary
path, failover times might be improved compared to strictly single-path solutions. Nevertheless, there is
some delay in detecting the need to use a secondary path. Depending on which node makes this decision –
only the source node or any node on the primary path – there can be more or less overhead involved. To
further shorten the time to delivery and to increase the delivery ratio of a given packet, it is also conceivable
to use all or several of the multiple paths simultaneously. The simplest idea is to assume node-disjoint paths
and to send several copies of a given packet over these different paths to the destination. Clearly, this trades
off resource consumption against packet error rates. The degree of redundancy and the number of paths can
be tuned to the expected error behavior, trading off overhead against residual packet error rate.
Randomly choosing one of several paths: When maintaining multiple paths, it actually makes sense also
to use paths that are less energy efficient than the optimal one. One reason to do so is to share the load among
all nodes in order to use the available battery capacity in the network better. Each node maintains an energy
cost estimate for each of its neighbors (toward the destination, packets are not routed “away” from their
destination). When forwarding a packet, the next hop is randomly chosen proportional to the energy
consumption of the path over this neighbor. To the upstream node, the appropriately weighted average of
these costs (i.e., the harmonic mean of the costs) is reported.
Trade-off analysis: Clearly, supporting such multiple paths in a network implies a trade-off between
robustness (the probability that paths are available even after node failure) and energy efficiency (as both
the management of these paths and the nonoptimal choices made for packet forwarding decisions imply
increased energy expenditure) – irrespective of the concrete routing protocol in use.
4. Explain the Overview of possible multicast approaches (sep).
Ans.
Source-based tree: The first idea is to construct, for each source, a tree, rooted at the given source, that
contains all the destinations for this source and, if necessary, additional nodes of V to ensure that the tree
can be constructed.
Which tree to select (out of, in general, many possible ones) is determined by the optimization
goal, which reflects the link costs:
For each source, minimize the total cost: Try to find a tree for which the sum of all link costs is minimal
(over all possible trees rooted at the source). This is the Steiner tree problem and matches best the intuitive
expectation how a multicast routing structure should look like. It is, however, NP-complete.
For each source, minimize the maximum cost to each destination: Owing to the complexity
of the previous optimization problem, a different optimization goal can be considered: Instead of trying to
minimize the total cost of the tree, one can minimize the costs to each individual destination separately. In
effect, this maps the multicast problem to repeated unicast shortest path problems, which can be solved by
any routing algorithm, for example, Dijkstra’s.
Shared, core-based tree: Constructing and maintaining a dedicated tree for each source incurs considerable
overhead. This overhead can be reduced if only a single tree is maintained – typically, this is promising when
the destination sets for all sources are identical. The obvious downside is that for a given source the paths to
its destinations can, in general, no longer be as short as with a dedicated, source-based tree. To share a tree
among several sources, a representative node in the network (not necessarily a source or a destination node)
is selected and, from this node, a tree is constructed to contain all destination nodes; this tree is shared among
all the sources. Selecting this core node is again NP-complete and optimization goals similar to the source-
based trees can be considered. In such a shared tree concept, the core node evidently becomes a single point
of failure. To overcome this shortcoming, multicore shared trees are also considered in the literature.
Mesh: While trees represent the overhead-optimal routing structures, they are not redundant – failure of
even a single link will disconnect the tree. Adding additional links to the tree to obtain redundancy, however,
will alter its essential properties, in particular the absence of cycles. The resulting routing structure will be a
mesh and requires more complicated forwarding structures than does a simple tree.
5. Explain the BIP algorithm that exploits the wireless multicast advantage.
Ans. A node that wants to transmit to multiple neighbors (because it has multiple children in the tree, for
example) experiences a proportional cost. The Broadcast Incremental Power (BIP) algorithm [874] differs
here in that it exploits the wireless multicast advantage to compute a heuristic for a broadcast tree. The core
idea is that a node that is already transmitting to some other node would only have to raise its transmission
power in order provide data also to further nodes, without incurring cost for another transmission. Hence,
the additional cost for a node to supply a further node with data is only the difference between the current
and the needed (higher) transmission power.
The broadcast incremental power algorithm for exploiting the wireless multicast advantage
Greedy and (Other Adaptive) Face Routing (GOAFR)+ algorithm: GOAFR is the worst-case optimal
and at the same time efficient in the average case. The crucial point is when to fall back to greedy mode –
too soon loses worst-case optimality, too late wastes average-case performance. Two techniques realize this
behavior:
• The algorithm maintains a bounding circle, cantered at the destination node, that prevents the face search
from needlessly exploring in the wrong direction. This circle is reduced at every step in the greedy
forwarding phase and can be enlarged in face routing if, with the current circle restrictions, no progress
toward the destination can be made.
• A packet maintains two counters, p and q. When switching to face-based forwarding, both counters are
set to 0. Counter p contains the number of nodes on the face perimeter that are closer to the destination
than is the node where face search started; q counts nodes farther away. The algorithm falls back to
greedy search if p > σq (for some properly chosen constant σ), that is, when substantially more nodes
are closer to the destination on this face than are further away.
Geographic Random Forwarding (GeRaF): Two people investigate the combination of position-
informed, random forwarding and nodes that switch on and off to save energy. Their scenario for
investigation is the following:
Assume nodes are uniformly distributed over the plane, each node knows its position, and each node turns
on or off at arbitrary times; nodes also know their position and that of their neighbors. The goal is to transmit
a message, usually over multiple hops, to a destination node the position of which is also known; the
challenge is the constantly changing topology. Their basic idea is then to use receiver-initiated forwarding:
A node S forwarding a message simply broadcasts it without specifying – in the packet or otherwise – which
node shall forward it. Ideally, the node closest to the destination node T and in range of S will pick up the
message and forward it onward. However, since the neighbors of S do not know which of the other nodes is
currently asleep, a deterministic rule to pick the forwarder would be difficult. Hence, the problem is solved
by a position-informed randomization. Define N annuli with inner radius D − 1 + (i − 1)/N, i = 1, . . .,N and
width 1/N (where D = |ST | is the distance between nodes S and T and the radio range is normalized to 1);
let Ai be the intersection of these annuli with the radio range of S.
Graph EMbedding (GEM): GEM methods utilize the methodology from graph theory. GEM embeds a
graph into a WSN regardless of the physical distribution of the network. The algorithm for GEM uses a
spanning tree to construct the graph, then arranges sensor nodes using coordinates in Virtual Polar
Coordinate Space (VPCS)
Mesh-based protocols
To overcome scalability and robustness issues of tree-based protocols, a structure with higher connectivity
is necessary that can connect multiple sources to their destinations.
The first proposal in this sense was the Core-Assisted Mesh Protocol (CAMP). The mesh, a subgraph of the
original graph, has to contain all sources and destinations and provide at least one path from each source to
each destination. The redundancy of the mesh can actually enable shorter paths in the mesh than would be
possible in a core-based tree; it is, however, up to the forwarding procedure to actually be able to exploit
these shortcuts without resorting to flooding the entire mesh with data.
The energy consumption of mesh-based protocols is, on the average, (f + 1)/2 times larger than that of tree-
based multicast protocols (where f ≤ 2 is the node connectivity, analyzed for nodes laid out in a grid pattern).
Hence, their use in sensor networks requires careful deliberation.
As an example of a (in a sense) mesh-based protocol, let us consider the Two-Tier Data Dissemination
(TTDD).
Here, source nodes detect certain events that have to be forwarded to several mobile sinks.
To do so,
• Each source node, after detecting an event, starts to build a regularly spaced mesh of “dissemination
points”, resulting in rectangular cells of known size l.
• Sinks, flood their queries in their local vicinity with a bounded radius to live. This radius is selected
large enough so that at least one dissemination point must be found within it.
• In this sense, two tiers of forwarding functionality are deployed – global multicasting on a mesh and
local query broadcasting.
• Once a dissemination node receives a query, it forwards it upstream to the source of the data via the
multicast mesh.
• Dissemination nodes keep on forwarding (aggregated) queries toward the source and store information
from where the queries arrived.
• This information is used to send the actual data back to the sinks, implicitly setting up a multicast tree
on top of the multicast mesh.
• Consider a network with the source node at the center, m nodes p1. . . pm distributed on the unit circle,
and another m nodes q1, . . . , qm each placed on the line connecting the origin with node pi at distance
ε from the origin. (as shown in Figure)
• SPT will send one broadcast packet (using the wireless multicast advantage) to the inner ring at cost ε2
(assuming quadratic path loss), and each node qi forwards at cost (1 − ε)2. The total cost is thus ε2 + m
(1 −ε) 2.
• Having the source node send at power 1 will, on the other hand, distributed the information to all nodes.
• Thus, the approximation ratio is (ε2 + m (1 − ε)2)/1, which converges to m as ε → 0.
• Greedy heuristic does not have a good approximation ratio.
Steiner tree
Definition: A minimum-weight tree connecting a designated set of vertices, called terminals, in an
undirected, weighted graph.
The tree may include non-terminals, which are called Steiner vertices
or
Given an undirected graph with non-negative edge weights and a subset of vertices (terminals), the Steiner
Tree in graph is an MST “T” of minimum weight that contains all given terminals (but may include additional
vertices).
Geocast Adaptive Mesh Environment for Routing (GAMER) provides geocast communication in an ad
hoc network. GAMER adapts to the current network environment by dynamically changing the density of
the mesh. Thus, when nodes are highly mobile, a dense mesh is created; when nodes are moving slowly, a
sparse mesh is created. GAMER improve the transmission accuracy significantly, without increasing the
load on the network. GAMER provides a mesh of paths between the source and the geocast region. When a
link breaks due to the changing topology in an ad hoc network, the redundant paths that exist in the mesh
can be used.
GeoGRID
In this protocol the geographic area of the MANET is partitioned into 2D logical grid. Each cell in a grid is
a square of size d x d. The cells are numbered (x, y) following the conventional x-y coordinate. Each host
still has a unique ID (such as IPaddress). In each cell one host will be elected as the gateway of the cell. The
responsibility of gateway hosts is to propagate geocast packets to neighboring cells. For maintaining the
quality of routes, the gateway host of a grid should be the one nearest to the physical center of the grid. Two
versions of GeoGRID will be mentioned one called flooding-based and the other called ticket-based. In the
flooding-based version each node serving as a grid gateway within the flooding region will help forwarding
geocast messages. In the ticket-based approach, geocast messages are still forwarded by gateway hosts, but
not all the gateways in the flooding region will do this job.
In the previous approaches, the destination region was – intuitively – conceived of as a more or less convex
region somewhere “far away”.
But this is not the only possible interpretation of geocasting as the somewhat different approach of TBF
shows.
Instead of trying to send a packet to some region far away, the region of interest can actually be a path in the
network.
This path, or trajectory of the packet, can be embedded into the packet as a parametric description of the
curve that the packet is supposed to follow; the parameter could be time or, preferably, the length of the path
that the packet has followed.
In this sense, trajectory-based routing combines aspects from source routing (as the trajectory is defined by
the source) and geocasting.
11. Explain the trajectory based forwarding and TORA unicast protocols of geographic routing.
Refer Q.10
12. With a neat diagram, explain the publish-subscribe interaction paradigm of data-centric WSN
networking.
The conceptual idea of the publish-subscribe interaction paradigm is essentially very simple: All nodes are
connected to a “software bus”. On this bus, data is made publicly available via a publish action; those nodes
that have previously announced their interest in that particular kind of data by an appropriate subscribe action
are then notified about the availability of this data. Figure 12.1 illustrates this concept; note how several
publishers can publish data of the same kind and how notifications can be delivered to various subscribers.
This concept of publication and subscription matches the requirement for a data-centric wireless sensor
network remarkably well. The publish/subscribe interaction pattern provides three essential properties
concerning the relationship between providers and subscribers of information:
Decoupling in space Publishers and subscribers need not to be aware of each other, they can be oblivious
of their mutual identities and numbers.
Decoupling in time Publishing and notification of data can happen at different times; the “software bus”
provides intermediate storage.
Decoupling in flows Interactions with the software bus can happen asynchronously without blocking.
13. What are the challenges of routing and forwarding techniques in WSNs? Discuss the importance of
multipath unicast routing.