A LowCost Flooding Algorithm for Wireless Sensor Networks

  • Slides: 25
Download presentation
A Low-Cost Flooding Algorithm for Wireless Sensor Networks WCNC 2007, Hong Kong Ou Liang,

A Low-Cost Flooding Algorithm for Wireless Sensor Networks WCNC 2007, Hong Kong Ou Liang, Ahmet Sekercioglu and Nallasamy Mani Department of Electrical and Computer Systems Engineering Monash University, Australia www. eng. monash. edu

Sections 1. Flooding in WSNs. 2. Our Low-Cost Flooding algorithm. 3. Simulation study. 4.

Sections 1. Flooding in WSNs. 2. Our Low-Cost Flooding algorithm. 3. Simulation study. 4. Conclusion and future work. www. eng. monash. edu 2

Section 1 Section 2 Section 3 Section 4 Flooding in WSNs • Flooding is

Section 1 Section 2 Section 3 Section 4 Flooding in WSNs • Flooding is the simplest way of routing. It requires each node in the network to broadcast a packet upon receiving it for the first time. • Flooding is widely used in WSNs by many applications. Problems: • Redundant packets — nodes receive multiple copies of a packet. • Contention and collision — happen when using a contention MAC layer like IEEE 802. 11. • Energy wastage — redundant retransmissions consume energy. www. eng. monash. edu 3

Section 1 Section 2 Section 3 Section 4 Redundant flooding S www. eng. monash.

Section 1 Section 2 Section 3 Section 4 Redundant flooding S www. eng. monash. edu 4

Section 1 Section 2 Section 3 Section 4 An efficient way of flooding B

Section 1 Section 2 Section 3 Section 4 An efficient way of flooding B A S C www. eng. monash. edu 5

Section 1 Section 2 Section 3 Section 4 Low-Cost Flooding Algorithm It aims to

Section 1 Section 2 Section 3 Section 4 Low-Cost Flooding Algorithm It aims to form a Connected Dominating Set (CDS) in a given network. It operates in two steps: • Elects cluster-heads (dominators). • Generates connectors to link all the dominators. www. eng. monash. edu 6

Section 1 Section 2 Section 3 Section 4 Electing dominators Initially, all nodes in

Section 1 Section 2 Section 3 Section 4 Electing dominators Initially, all nodes in the network mark themselves as white nodes, and only the nodes in the white node state participate dominator election. A node announces itself as the dominator if it has the largest node degree among its white node neighbors. Nodes that are covered by the dominators change their states to dominatees. www. eng. monash. edu 7

Section 1 Section 2 Section 3 Section 4 Dominator election example I E A

Section 1 Section 2 Section 3 Section 4 Dominator election example I E A H Node | Node degree J F B T D C G K N 6 h 5 P 5 Dominators are two hops or three hops L apart from each other. P O D M www. eng. monash. edu 8

Section 1 Section 2 Section 3 Section 4 Generating connectors Two types of connectors:

Section 1 Section 2 Section 3 Section 4 Generating connectors Two types of connectors: • Active-Connector – selected by dominators • Passive-Connector – selected by dominators and active connectors. Passive-Connectors connect two-hop away dominators. Active-Connectors + Passive-connectors connect three-hop away dominators. www. eng. monash. edu 9

Section 1 Section 2 Section 3 Section 4 Connecting two-hop away dominators A dominator

Section 1 Section 2 Section 3 Section 4 Connecting two-hop away dominators A dominator U selects a dominatee V as a passiveconnector to connect two-hop away dominators based on two rules: • U has a bigger node ID than all its two-hop away dominators that are covered by V. • V covers the most number of two-hop away dominators of U. www. eng. monash. edu 10

Section 1 Section 2 Section 3 Section 4 Selecting passive connectors Node A: {

Section 1 Section 2 Section 3 Section 4 Selecting passive connectors Node A: { V } Dominator W A Node B: { U, V } W V Node A: { W } Dominator V B I am a Passive connector Selected by W U Node B: { U, W } Dominator U Node B: { V, W } www. eng. monash. edu 11

Section 1 Section 2 Section 3 Section 4 Connecting three-hop away dominators Two steps

Section 1 Section 2 Section 3 Section 4 Connecting three-hop away dominators Two steps to connect three-hop away dominators: • A dominator U selects an active-connector V. • Active-connector V selects other passive connectors to connect three-hop away dominators. www. eng. monash. edu 12

Section 1 Section 2 Section 3 Section 4 New definitions Special-dominatee: A dominatee V

Section 1 Section 2 Section 3 Section 4 New definitions Special-dominatee: A dominatee V marks another dominatee W as a special dominatee if W has no shared one-hop dominator with V. Dominatee U and V have a shared dominator C. U C V B W A Dominatee V and W have no shared dominators. V and W mark each other as the special-dominatees. www. eng. monash. edu 13

Section 1 Section 2 Section 3 Section 4 New definitions Special-dominator: Dominatee V marks

Section 1 Section 2 Section 3 Section 4 New definitions Special-dominator: Dominatee V marks all the one-hop dominators of a specialdominatee W as the special-dominators. Dominatee V marks dominator A as the special-dominator. U C V W A Dominatee W marks dominator B and C as the special-dominators. B www. eng. monash. edu 14

Section 1 Section 2 Section 3 Section 4 New definitions Use D 2(C) to

Section 1 Section 2 Section 3 Section 4 New definitions Use D 2(C) to represent the set of two-hop away dominators of a dominator C. Isolated-dominator: A dominator C marks a special-dominator A of dominatee V as the isolated-dominator if A is neither a two-hop away dominator of C, nor a two-hop away dominator of any node in D 2(C). U C V B W A www. eng. monash. edu 15

Section 1 Section 2 Section 3 Section 4 Selecting active-connectors A dominator U selects

Section 1 Section 2 Section 3 Section 4 Selecting active-connectors A dominator U selects a dominatee V as an active-connector if: • U has marked some isolated-dominator from V. • U has larger node ID than those marked isolated dominators. Dominator U will inform active-connector V about the isolated-dominators V needs to connect. www. eng. monash. edu 16

Section 1 Section 2 Section 3 Section 4 Selecting passive-connectors (by active-connectors) An active-connector

Section 1 Section 2 Section 3 Section 4 Selecting passive-connectors (by active-connectors) An active-connector V selects a dominatee W as the passive-connector if: • W connects to the most number of isolated-dominators. U C Connect isolateddominator A V B W A I am a passiveconnector www. eng. monash. edu 17

Section 1 Section 2 Section 3 Section 4 Simulation study Simulator OMNe. T++ with

Section 1 Section 2 Section 3 Section 4 Simulation study Simulator OMNe. T++ with Mobility Framework. MAC protocol Assume a perfect MAC layer (error and collision free). Network area 100 m x 100 m two dimensional area. Topology generation Randomly distribute nodes in the area. Each node is placed within the transmission range of a previously placed node to make sure connectivity. Total nodes Range from 100 to 500. Transmission range Two transmission ranges: 15 m and 25 m. Performance metrics Number o forwarding nodes, number of signaling messages, and signaling message size. Number of runs 11 random topologies simulated for each network size. www. eng. monash. edu 18

Section 1 Section 2 Section 3 Section 4 Simulation study Number of forwarding nodes

Section 1 Section 2 Section 3 Section 4 Simulation study Number of forwarding nodes generated www. eng. monash. edu 19

Section 1 Section 2 Section 3 Section 4 Simulation study Number of signaling messages

Section 1 Section 2 Section 3 Section 4 Simulation study Number of signaling messages generated www. eng. monash. edu 20

Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in

Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in bytes) R=15 m Total number of nodes in the network 100 200 300 400 500 LCF 15. 79 25. 55 34. 03 43. 13 51. 48 MOA 17. 50 26. 15 31. 92 41. 10 51. 49 GMPR 28. 92 48. 69 65. 24 80. 91 94. 01 MPR 32. 02 52. 40 70. 06 86. 91 100. 86 SIMPR 32. 02 52. 40 70. 06 86. 91 100. 86 91. 53 125. 08 157. 25 183. 95 2653. 06 4946. 21 7809. 1 9136. 01 EMPR EEMPR 53. 58 911. 24 www. eng. monash. edu 21

Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in

Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in bytes) R=25 m Total number of nodes in the network 100 200 300 400 500 LCF 16. 36 27. 85 35. 45 46. 51 55. 52 MOA 17. 94 28. 25 39. 14 50. 21 53. 65 GMPR 31. 42 52. 47 74. 11 92. 74 112. 11 MPR 34. 41 56. 9 78. 51 98. 93 118. 62 SIMPR 34. 41 56. 9 78. 51 98. 93 118. 62 EMPR 58. 57 101. 06 142. 74 182. 43 220. 92 EEMPR 1056. 63 3096. 98 5888. 12 7464. 2 4 8945. 48 www. eng. monash. edu 22

Section 1 Section 2 Section 3 Section 4 Conclusion and future work We have

Section 1 Section 2 Section 3 Section 4 Conclusion and future work We have proposed a Low-Cost Flooding (LCF) algorithm for wireless senor networks. The algorithm aims to minimize the redundant retransmissions in the network by generating a Connected Dominating Set (CDS). Future work: • Design efficient routing protocols for sensor networks. • Implement a real world sensor network test bed. www. eng. monash. edu 23

Thank you for your attention! www. eng. monash. edu 24

Thank you for your attention! www. eng. monash. edu 24

Section 1 Section 2 Section 3 Section 4 Flooding protocol designing considerations • Scalability

Section 1 Section 2 Section 3 Section 4 Flooding protocol designing considerations • Scalability — flooding algorithms for WSNs need to be distributed and depends on localized information. • Simplicity — flooding algorithms need to be simple in both computation and communication. • Efficiency — flooding algorithms can dramatically reduce unnecessary redundant transmissions and save energy. www. eng. monash. edu 25