1-1 routing. 1-2 data-centric routing r paradigm shift from accessing data from individual nodes to...

Post on 19-Dec-2015

213 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1-1

Routing

1-2

Data-Centric Routing

Paradigm shift from accessing data from individual nodes to accessing “relevant” data. Data within certain region, Data on events, Collective data processing, e.g., “What’s the

average temperature of a region?”, “How many animals cross this path?”, “Is there an intruder in the area?”.

1-3

Challenges

Energy-limited nodes. Computation.

Aggregate data. Suppress redundant routing information.

Communication. Bandwidth-limited. Energy-intensive.

Goal: Minimize energy dissipation

1-4

Challenges

Scalability: arbitrarily large scale ad-hoc deployment. Fully distributed w/o global knowledge. Large numbers of sources and sinks.

Robustness: unexpected sensor node failures.

Dynamics: Topology changes (e.g., mobility, failures, etc.) Target mobility.

1-5

Directed Diffusion

Intanagonwiwat et al., ACM Mobicom 2000.

One of the first data centric routing paradigms.

1-6

Application Example: Remote Surveillance

““ Give me periodic report Give me periodic reportss about animal lo about animal lo cation in region A every t seconds” cation in region A every t seconds”..

Tell me in what direction that vehicle in Tell me in what direction that vehicle in region Y is moving?region Y is moving?

1-7

Basic Idea

Simple attribute-based naming as fundamental building block.

Requests for information (interests) and relevant data (reports) are described as sets of value-attribute pairs.

1-8

NamingNaming

Content-based naming. Tasks are named by a list of attribute – value pairs. Task description specifies an interest for data

matching the attributes. Animal tracking:

Interest ( Task ) DescriptionType = four-legged animalInterval = 20 msDuration = 1 minuteLocation = [-100, -100; 200, 400]

RequestRequest

Node dataType =four-legged animalInstance = elephantLocation = [125, 220]Confidence = 0.85Time = 02:10:35

ReplyReply

1-9

Elements of Directed Diffusion

Naming Data is named using attribute-value pairs.

Interests A node requests data by sending interests for named

data .

Gradients Gradients are set up within the network designed

toward the sink to “draw” events, i.e. data matching interest.

Reinforcement Sink reinforces particular neighbors to draw higher

quality ( higher data rate) events.

1-10

Basic Algorithm Sink floods interest.(interest may be

periodically repeated).

Every node caches interest while valid, and creates local gradient towards neighboring nodes from which it heard interest.

Sources with relevant data starts sending it according to local gradients.

When sink starts receiving data, it reinforces one or some of the paths, pruning the rest.

Negative reinforcements can be used for adjusting to changing consitions.

1-11

Source

Sink

Interest = Interrogation

Gradient = Who is interested(data rate , duration, direction)

Example

Neighbor’s choices :1. Flooding 2. Geographic routing3. Cache data to direct interests

1-12

Data Propagation

Sensor node computes the highest requested event rate among all its outgoing gradients.

When a node receives data: Find a matching interest entry in its cache

• Examine the gradient list, send out data by rate.

Cache keeps track of recent seen data items (loop prevention).

Data message is unicast individually to the relevant neighbors.

1-13

Source

Sink

Reinforcing the Best Path

Low rate event Reinforcement = Increased interest

The neighbor reinforces a path:1. At least one neighbor2. Choose the one from whom it first received the latest event (low delay)3. Choose all neighbors from which new events were recently received

1-14

Local Behavior Choices

For propagating interests: In the example, flood.In the example, flood. More sophisticated behaviors possible: e.g.

based on GPS.

For setting up gradients: Data-rate gradients are set up towards Data-rate gradients are set up towards

neighbors who send an interestneighbors who send an interest.. Others possible: probabilistic

gradients, energy gradients, etc.

1-15

Local Behavior Choices

For data transmission Multi-path delivery with selective quality along Multi-path delivery with selective quality along

different pathsdifferent paths Probabilistic forwarding Single-path delivery, etc.

For reinforcement Reinforce paths based on observed delaysReinforce paths based on observed delays Losses, variances etc.

1-16

Initial simulation study of diffusion

Key metric Average Dissipated Energy per event delivered

• indicates energy efficiency and network lifetime

Compare diffusiondiffusion to FloodingFlooding Centrally computed tree (omniscient multicastomniscient multicast)

1-17

Diffusion Simulation Details

Simulator: -2ns-2ns - Network Size: 50 250 Nodes Transmission Range: 40m Constant Density: 1.95x10-3 nnnnnnn2 nnnn(9 .8

s in radius) MAC: Modified Contention-based MAC Energy Model: Mimic a realistic sensor radio [Pottie

2000] nn nnnnnnnnnn nnn 660 , 3 9 5 ,

35mw in idle

1-18

Diffusion Simulation

Surveillance application 5 sources are randomly selected within a 70m x

nnnnnn nn nnn nnnnn70 5 sinks are randomly selected across the field nnnn nn n nnnnnnnnnn2/ nnnnnnnnnn0.02/ Event size: 64 bytes 36Interestsize: byt es All sources send the same location estimate for b All sources send the same location estimate for b

ase experiments ase experiments

1-19

Average Dissipated Energy

0

0.002

0.004

0.006

0.008

0.01

0.012

0.014

0.016

0.018

0 50 100 150 200 250 300

Ave

rag

e D

issi

pat

ed E

ner

gy

(Jo

ule

s/N

od

e/R

ecei

ved

Eve

nt)

Network Size

DiffusionDiffusion

Omniscient MulticastOmniscient Multicast

FloodingFlooding

Diffusion can outperform flooding and even omniscient multicast.Diffusion can outperform flooding and even omniscient multicast.(suppress duplicate location estimates) (suppress duplicate location estimates)

1-20

Directed Diffusion Variants

Original mechanism: 2-phase pull, i.e., interests and reinforcements.

1-phase pull variant: eliminates reinforcements as a separate phase. Sink floods interest. Data source selects best reverse path. Assumes links are bidirectional.

Push-diffusion: Initiative from sources, i.e., they advertise

their data along multiple paths; sink, if interested, reinforces one or some of the paths.

1-21

Pull versus Push Diffusion

Overall performance is application dependent.

“Pull” is more energy-efficient in terms of route setup in the case of many active sources.

“Push” is more efficient when there are fewer sources and more sinks.

1-22

Multipath Routing

Robustness/resilience to failures. Multipath versus alternate path routing. Totally- or partially disjoint paths.

1-23

Directed Diffusion Resilience

Periodic flooding of interests and events to circumvent failures.

Problem?

1-24

Braided Multipath Routing

Ganesan et al., MC2R 2002. Alternate path routing. Braided path: node/link disjointedness

between the multiple paths is not required.

Braided paths: For each nodein the main path, find path thatdoes not include that node.

1-25

Observations

Primary path: “best” path. Data sent at lower rate on alternate

paths. Upon failure on primary path,

reinforcement on alternate path. If all alternate paths fail, flooding for

path re-establishment. Overhead: alternate path maintenance. Resilience measured as how often path

re-establishment is needed.

1-26

Approach

Disjoint versus “braided” paths. How to build multiple paths with local

information only?

1-27

Localized disjoint multipaths

Sink establishes primary path. Sink selects “next best” neighbor “A”. A propagates “alternate path”

reinforcement to its “best” neighbor “B”.

If B is already on a path between sink and source, B sends back a “negative reinforcement”.

Access to local information only may lead to longer paths.

1-28

Braided multipath

Partially disjoint. For each node on primary path, find

best path from source to sink that does not contain that node.

Paths in the braid expend equivalent energy.

Reinforcement to “best” node and alternate reinforcement to “next best” node.

1-29

Evaluation

Energy efficiency. Overhead.

Resilience to failures. Isolated versus patterned failures.

1-30

Results

Braided multipaths are more energy efficient. Especially at lower densities.

Disjoint multipaths have better resilience to patterned losses.

Braided multipaths exhibit better resilience to isolated failures.

1-31

Gradient Cost Routing (GRAd) Poor et al., ACM Queue 2003. All nodes keep estimated cost to

destinations (sinks); e.g., number of hops. When packet is sent, it includes cost so

far (i.e., number of hops traversed) and TTL.

Node receiving packet whose cost is smaller than packet TTL, forwards packet.

Increments packet cost by one; decrements TTL by one.

GRAd = limited flood for robustness at expense of overhead.

1-32

Gradient Broadcast (GRAB)

Ye et al., IPSN 2003. Enhances GRAd with “credits”

decremented at each hop. Earlier hops receive greater credit and thus

higher spreading initially. Ensures diverse paths converge to sink.

SD

1-33

Energy-Efficient Routing

Maximize network lifetime. Techniques range from:

Use of suitable shortest-path metric. Derive energy-efficient routes using global

optimization. Traffic spreading for load balancing.

1-34

Power-Aware Routing for MANETs

Singh et al., ACM Mobicom 98. Pick nodes with longer remaining

battery lifetime as intermediate relays. If Ri is remaining energy of node i, then

link metric is C=1/Ri. Shortest-path algorithm finds route that

minimizes i 1/Ri.

1-35

Traffic Spreading

Load balance across multiple paths.

1-36

Traffic spreading approaches

Stochastic: node picks next-hop randomly (chosen from neighbors with equal gradient).

Energy-based: node increases its “height” when its energy falls below a certain threshold. All nodes need to adjust their height accordingly.

Stream-based: divert streams from nodes that are part of paths used b other streams.

1-37

Geographic Routing

Useful for location-specific interests/queries.

Deliver packets to nodes or regions based on their geographic location.

Typically, nodes know their position and immediate neighbors.

1-38

Geographic Forwarding

Simplest form of geographic-based forwarding. Finn, ISI Tech Report, 1987. Greedy approach. Forwards packet to neighbor closest to

destination.

1-39

Basic Geographic ForwardingBasic Geographic Forwarding

B. Karp and H.T. Kung. GPSR: Greedy Perimeter stateless Routing for Wireless Networks. MobiCom2000.

Greedy: send packet to neighbor that is closest to destination

Can get stuck in voids. GPSR proposes a perimeter routing mode to avoid this.

1-40

Trajectory Based ForwardingTrajectory Based Forwarding

D. Niculescu and B. Nath, Trajectory Based Forwarding and Its Applications. MOBICOM 2003.

Pre-encode arbitrary geographic trajectory; packet goes through nodes closest to this trajectory.

Particularly well suited for large networks with high density.

1-41

Geographic routing without location information (Rao et al.) Apply geographic routing when (most)

nodes do not have position information. Approach: “virtual coordinates”.

Use local connectivity information.

1-42

Assumptions

Nodes know their own coordinates. Nodes know coordinates of nodes in the

2-hop neighborhood.

1-43

Data Forwarding

Greedy: forward to neighbor closest to destination.

When packet arrived to destination, stop.

If stuck, do expanding ring search until closer node found.

1-44

Coordinate construction

A node’s coordinates is the average of its neighbors’ coordinates.

Finding perimeter nodes’ coordinates. Beacon nodes flood “Hello” message. Perimeter nodes discover distance in hops

to other perimeter nodes. Perimeter nodes broadcast their perimeter

vector. Perimeter nodes use triangulation to find

coordinates of all perimeter nodes.

1-45

Coordinate construction (cont’d) Deciding whether a node is on

perimeter: Use distance to beacon nodes. If node is the farthest away from beacon

node compared to all its 2-hop neighbors, then it’s on the perimeter.

1-46

Evaluation

Comparison between greedy routing using real- versus virtual coordinates.

Metrics: Success rate: number packets reaching

destination using purely greedy routing. Average path length. Routing load. Overhead.

1-47

Results

Scalability. Network size. Density.

Mobility. Losses. Obstacles. Trade-offs.

1-48

Routing with Mobile Nodes Significant previous work on routing for

MANETs where potentially all nodes can move.

Sensor networks are assumed to be predominantly static. However, a few nodes (e.g., the sinks) can be mobile. E.g., robots, humans roaming in the area,

etc. Advantages of mobility:

Enable collecting information in a timely manner.

Provide network connectivity.

1-49

Data MULEs

1-50

Target deployments.

Sparse networks. Multi-tiered deployments.

Sensors. Wired access points. Mules.

1-51

Approach

Mobile agents. MULEs: mobile ubiquitous LAN

extensions. Mobility. Communication (short range).

• UWB radios? [low power and ability to handle bursts].

Buffering.

1-52

Pros and cons

1-53

Pros and cons

Pros: Energy efficiency ?

• Listen for the mule. Intermittent connectivity.

Cons: Increased latency.

1-54

3-tier architecture

Wired APs. Mules. Sensors.

1-55

Considerations

APs have no limitations. Mules:

Storage, mobility, ability to communicate with sensors and APs.

Unpredictable movement patterns. Can talk to other mules.

• Benefits?

Robustness. Reliability.

1-56

More considerations…

No routing overhead. Mules can transport data for multiple

applications. High latency.

Delay bounds? Mobility limitations.

1-57

Main results

Buffer requirements at sensors inversely proportional to ratio of number of mules to grid size.

Buffer requirement at mule inversely proportional to ratio of number of mules to grid size and ratio of APs to grid size.

Relationship between buffer capacity, number of mules, and reliability.

top related