Title: Topology Management
1Topology Management Ad hoc and Sensor Networks
2The Need for Topology Management
- What is it?
- The physical or logical interconnection pattern
of a network - Topology schemes in wired networks
- Bus
- Star
- Ring
- Why do we need different schemes in sensor
networks? - location of sensors is not deterministic
- resource constraints
3The Need for Topology Management
- Energy/Power consumption
- Interference
- Throughput
- Connectivity
4Motivation for Backbone Architecture
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks Basagni 2001
- essential for management of large ad hoc networks
- helps generate the minimum possible overhead for
construction and maintenance of the backbone
network - can provide efficient solution for mobility and
node/link failures in very large ad hoc networks
5Proposed B-Protocol Description
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- B-Protocol
- Also known as backbone protocols
- Sets up and maintains a connected network
(B-network) - B-network convey the time-sensitive network
management information - from every node in the network with minor
overhead and in a timely manner - Comprises two major tasks
- (a) B-nodes selection
- (b) B-links establishment
- Nodes that are not selected as B-nodes are termed
F- nodes that belong to the - flat network
6B-nodes Selection
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- Executed at each node based on a nodes own
weight - Weight is computed based on what is most critical
to that node for the specific network application - The highest weight of a node is more suitable to
be a B-node - A node knows
- Its own identifier (ID) and weight
- Ids, weights and roles (B-node or F-node) of
one-hop neighbors - Once a node b determines its role as B-node, all
its neighbors may become the F-nodes served under
b unless they have decided to join another node - B-nodes selection is adaptive to node mobility
and changes in its local status
7B-nodes Selection
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
Illustrative Example
Numbers represent node IDs and numbers within
parentheses represent the node weights
8B-nodes Selection
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
Illustrative Example
6(1)
2(3)
4(9)
B-node
1(6)
B-node
7(5)
3(2)
5(8)
8(1)
B-node
9B-links Establishment
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- Determines the inter-B-nodes links to be
established in order for the network to be
connected - Two types of B-links
- Physical when a direct link between B-nodes at
most three hops away can be established without
involving intermediate F-nodes (via power
control or directional antenna) - Virtual when a direct link between B-nodes at
most three hops away cannot be established. In
this case, virtual link is implemented among two
B-nodes by a corresponding physical path with at
most three links - The rules stated follow the theorem proven in
Chlamtac 96
10B-links Establishment
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
Theorem 1 Chlamtac 96
Given a set B of network nodes such that no two
of them are neighbors and every other node has a
link to a node in B, then a connected backbone is
guaranteed to arise if each node in B establishes
links to all other nodes in B that are at most
three hops away. Moreover, these links are all
needed for the deterministic guarantee in the
worst case, in the sense that if any of them is
left out then it is not true anymore that the
arising backbone is connected for any underlying
flat network.
11Properties of B-protocol
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- Each node in flat network knows only its one-hop
neighbors. This induces the minimum possible
overhead - B-link establishment is run at each B-node only
with no knowledge of the surrounding B-nodes.
Again, this induces the minimum overhead - Every B-node serves a number of F-nodes each of
which is at most three-hops away. B-node
selection protocol guarantees that all the
F-nodes are served by only one neighboring B-node - There are no two B-nodes that are neighbors in
the flat network. This guarantees that B-nodes
are evenly distributed in the network - B-node selection is based on the nodes current
status (weight)
12Properties of B-protocol
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- The B-network is always connected provided that
the underlying flat network is connected - B-protocols takes into account different
technologies and mechanisms that can be used to
link the B-nodes in the network. Two types of
B-links are provided namely physical and virtual
links. Physical links are used when there is a
direct link between B-nodes at most three hops
away and virtual links are used when there is a
direct link cannot be established
13Simulation Environment
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- A simulator used for an ad hoc network of nodes
ranges 100 - 1000 - Nodes can freely move around in a rectangular
region (a grid) - Node movements are discretized to grid units of 1
meter - A node determines its direction randomly by
choosing between its current direction (with 75
probability) and uniformly among all other
directions (with 25 probability) - When a node hits a grid boundary, it bounces back
into the region with an angle determined by the
incoming direction - Fixed transmission range of each node (250 m) and
the grid size have been chosen to obtain a good
network connectivity - Each packet contains the time-stamped, node
identified weight of the sending node. All
packets are sent for the one-hop neighbors only
14Simulation Results
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- k is the total number of F-nodes a B-node can
serve at any point in time - Three cases
- k lt n (where n is total number of nodes in
network) - k lt 4
- k lt 8
Figure 1 Number of B-nodes ( w.r.t the number
of the network nodes)
15Simulation Results
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- k is the total number of F-nodes a B-node can
serve at any point in time - Three cases
- k lt n (where n is total number of nodes in
network) - k lt 4
- k lt 8
Figure 2 Number of B-links () when a physical
link between any two B-nodes can be established
directly.
16Simulation Results
Mobility-Adaptive Protocols for Managing Large
Ad hoc Networks
- k is the total number of F-nodes a B-node can
serve at any point in time - Three cases
- k lt n (where n is total number of nodes in
network) - k lt 4
- k lt 8
Figure 3 Number of B-links () when a link
between B-nodes is implemented by a physical
path with at most three hops away
17Optimizing Sensor Networks in the
Energy-Latency-Density Design SpaceSchurgers
2002
- Describes
- a topology management technique that is power
efficient - energy, Latency and Density trade-offs
- Provides
- a theoretical analysis of these techniques,
including a mathematical formulation that can be
used to design a network with required energy,
latency and density configuration - a hybrid solution with existing topology
management scheme (GAF) to provide energy saving
of over two order of magnitude - The proposed new topology management scheme is
called - STEM (Sparse Topology and Energy Management)
18Optimizing Sensor Networks in the
Energy-Latency-Density Design SpaceSchurgers
2002
- Two states for sensor nodes
- Monitoring State
- Transfer State
- Most of the time a sensor remains in monitoring
state (i.e. sensing environment) - When an event occurs, nodes come into transfer
mode and transfer their data
19Optimizing Sensor Networks in the
Energy-Latency-Density Design SpaceSchurgers
2002
- Issues
- Nodes must listen periodically for call to duty
(i.e transfer) - But if they poll periodically on the same
frequency, it will collide with other data
transfer - Solution
- Use two radios, one for polling while the other
for data transfer - STEM-B (Beacon Approach)
- Initiator sends a stream of beacon packets to
poll a target with initiator and target MAC
addresses - Target node sends acknowledgement on receiving
the packet - Target node turns its transfer radio on
20Optimizing Sensor Networks in the
Energy-Latency-Density Design SpaceSchurgers
2002
- STEM-T (Tone Approach)
- Initiator sends a wake up tone
- Every node receiving that tone starts its data
transfer radio - No need to send acknowledgement
- Every node in the neighborhood of initiator wakes
up - STEM/GAF Hybrid
- GAF proposes a scheme in which a sensor network
is divided in a grid - One node in a region has its radio on, others
have it turned off - Nodes alternate the responsibility of being the
active node - GAF uses network density to conserve energy
- Assuming the active node to be the virtual node,
STEM can be used on the virtual node to manage
whole network
21Optimizing Sensor Networks in the
Energy-Latency-Density Design SpaceSchurgers
2002
- Advantages
- Highly efficient in environments where events are
rare - Flexible in term of design trade-off for energy,
latency and density - Transition from monitoring state to transfer
state is easily achieved - No synchronization required
- Can be use with other topology management schemes
like GAF - Disadvantages
- Continuous polling consumes energy
- Not suitable for highly reactive environments
- Requires extra radio on sensor nodes
- Suggestions/Improvements/Future Work
- Analysis of STEM with clustered networks
22ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- In ASCENT, the nodes coordinate to exploit the
redundancy provided by high density to extend the
overall system lifetime - Nodes achieve self-configuration to establish a
topology that provides communication and sensing
coverage under energy constraints - Each node examines its connectivity and adapts
its participation in the multi-hop network
topology based on the operating region - The node
- Signals when it detects high message loss,
requesting additional nodes to join the network
to continue relaying messages - Reduces its duty cycle if high messages losses
are detected due to collisions - Probes local communication environment and only
joins to the multi-hop routing infrastructure if
it is useful
23ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- Sensor nodes do local processing to reduce
communication and energy costs - Challenges arises from the increased level of
dynamics (systems and environmental) - One of the most important challenge arises from
energy constraints imposed by unattended systems - These systems must be long-lived and operate
without manual intervention - They need to self-configure and adapt to
environmental dynamics and some terrain
conditions may result regions with non-uniform
communication density - These issues can be addressed by deploying
redundant nodes and designing algorithms to use
redundancy to extend the system lifetime - Scaling challenges are associated with spatial
coverage and robustness - Central vs. Distributed
- When energy is constraint and environment is
dynamic, distributed approaches are preferable
and practical
24ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- Scalable wireless sensor networks require to
avoid large amounts of data being transmitted
over long distances - ASCENT applies well-known techniques from MAC
layer protocols to the problem of distributed
topology formation - Imagine a habitat monitoring sensor network that
is deployed in remote forest - The deployed systems must confer with the
following conditions - Ad-hoc deployment
- Energy constraints
- Unattended operation under dynamics
- If we use too few nodes initially
- the distance between neighboring nodes will be
too far - packet loss rate may increase
- energy required to transmit over larger distances
may be prohibitive
25ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- If we use all deployed nodes simultaneously
- system will expand unnecessary energy
- nodes interfere with each other by congesting the
channel - ASCENT does not use localized distributed
algorithm to find a single solution - Adaptive self-configuration using localized is
suited to problem spaces which have a vast number
of possible solutions (in this case, large
solution spaces means dense node deployment) - ASCENT has the following two assumptions
- Carrier Sense Multiple Access (CSMA) MAC protocol
- Possibilities for resource contention when too
many neighboring nodes participate in the
multi-hop network - Reacts when links have high packet loss
- Does not detect or repair network partitions and
assumes that there is enough node density to
connect the entire region
26ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- Two essential contributions of ASCENT design are
- Adaptive techniques that allow applications to
configure the topology based on the needs while
saving energy to extend network lifetime. The
techniques do not assume a specific model or
fairness, degree of connectivity, or capacity
required - Self-configuring techniques that react to
operating conditions are measured locally. It
does not assume any specific radio propagation
model, geographical distribution of nodes, or
routing mechanisms used - ASCENT Design
- Adaptively elects active nodes from all the nodes
- Active nodes stay awake always and participate in
routing while the other nodes remain passive and
periodically checks if they should become active
27ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- ASCENT Design
- Initially, only some nodes are active while other
are passively listening to packets but not
transmitting - When source starts transmitting data packets
towards the sink, the sink gets high message loss
from the source due to limited radio range,
called communication hole - The receiver gets high packet loss due to poor
connectivity with the sender
Figure 2(a) Communication Hole
28ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- ASCENT Design
- Sink start sending help messages to neighbors
that are in listen-only mode, called passive
neighbors, to join the network - When a neighbor receive a help message, it
decides to join the network or not - If the node joins, it becomes an active neighbor
and signals the existence of a new active
neighbor to other passive neighbors by sending a
neighbor announcement message - It continues until the number of active nodes
stabilizes on a certain value and the cycle stops
29ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- ASCENT Design
- When the process is completed, the newly joined
nodes participate in the data delivery process
from source to sink more reliably - The process will be repeated in the case of
network event (e.g., node failure) or
environmental effect (e.g., new obstacle) causes
message loss
Figure 2(b-c) Self-configuration transition and
final state
30ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
ASCENT State Transactions
NT neighbor threshold LT loss threshold T?
state timer values (p passive, s sleep, t
test) DL Data loss rate
31ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- ASCENT State Transactions
- Initially, a random timer turns on the nodes to
avoid synchronization - Node initializes to test state
- Sends data and routing control messages
- Sets up a timer, Tt and sends neighbor
announcement messages - Moves into passive state if the conditions are
met before Tt expires - When Tt expires, it enters to active state
- The reasoning behind the test state is to probe
the network to decide whether the addition of a
new node would improve connectivity - On entering the passive state, node
- Sets up a timer Tp and when Tp expires, it enters
to sleep state - If before Tp expires, it enters to test state
only if the conditions are met - Nodes in passive state can hear all packets
transmitted, but no routing or data packets are
forwarded in this state since this is listen-only
state
32ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- ASCENT State Transactions
- The reasoning behind the passive state is to
gather information about the state of the network
without causing interference with other nodes - Nodes in passive and test states update the
number of active neighbors and data loss rates - In passive states, the nodes still consume energy
since the radio is on - The nodes in sleep state turns the radio off,
sets up timer Ts and goes to sleep - When Ts expires, the nodes moves into passive
state - A node in the active state continuous to forward
data and routing packets until it runs out of
energy
33ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- ASCENT Parameters Tuning
- ASCENT has many parameters and the choices are
left to the applications such as a particular
application may trade energy savings for greater
sensing coverage - Neighbor Threshold (NT)
- Determines the average connectivity if the
network - Tradeoff between energy consumed and/or level of
interference (packet loss) vs. desired sensing
coverage - Loss Threshold (LT)
- Determines the maximum amount of data loss an
application can tolerate before requesting help
to improve network connectivity - This value is highly application dependent
34ASCENT Adaptive Self-Configuring sEnsor Networks
Topologies Cerpa 2002
- ASCENT Parameters Tuning
- Test timer (Tt), Passive timer (Tp), Sleep timer
(Ts) - Determines the maximum time a node remains in
test, passive, sleep states - Tradeoff between power consumption vs. decision
quality
35SPAN An Energy-Efficient Coordination Algorithm
for Topology Maintenance in Ad hoc Wireless
Networks Chen 2002
- SPAN is a power saving technique for multi-hop ad
hoc networks that reduces energy consumption with
the consideration of maintaining the capacity or
connectivity of the network - It is distributed and randomized algorithm in
which the nodes make local decisions on whether
to sleep or join to the backbone - Each node decides based on an estimate of how
many neighbors will benefit from it being awake
and the energy available to it - Improvement in the system lifetime increases
along with the ratio of idle-to-sleep energy
consumptions - Non-coordinators remain in power saving mode and
periodically check to see if they should wake up
and become coordinators
36SPAN
- A good power saving technique for ad hoc networks
should have the following - Allow as many as nodes to turn their radios off
most of the time - Forward packets between any source and
destination with the minimum possible delay than
if all nodes were awake - Distributed algorithm where having each node
making local decisions - Backbone formed by the awake nodes should provide
close to total capacity as the original networks
such that congestion can be avoided - Do not make many assumptions about the link
layers facilities for sleeping and work with any
link layer that provides sleeping and periodic
polling - Inter-operate correctly with any routing
algorithm being used - SPAN fulfills all the above requirements
- Each node makes periodic local decisions to sleep
or stay awake as a coordinator and participate in
the forwarding backbone topology
37SPAN
- In order to keep the same level of capacity of
the original network, a node may volunteer to
become a coordinator if it figures out from the
local information gathering that two of its
neighbors cannot communicate directly or through
one or two existing coordinators - In order to keep the number of coordinators low
and rotate this role amongst all nodes, each
node delays sending message about its desire to
become a coordinator by a random time interval - The decision is based on two factors
- the remaining battery energy
- the number of pairs of neighbors it can connect
together - This allows SPAN to maintain capacity-preserving
backbone at any time with the nodes consuming
about the same level of energy - SPAN also scales well with the number of nodes
38SPAN
- SPAN Design
- The goals of SPAN includes
- Ensures enough coordinators to be elected such
that each node is in radio range of at least one
coordinator - Rotates coordinators to ensure that all nodes
provides equal support to achieve global
connectivity - Increases the network lifetime, preserves the
capacity with minimum latency by minimizing the
number of elected coordinators - Coordinators are elected based on local available
information - SPAN is proactive such that each node
periodically broadcasts HELLO messages which
contains the nodes status (coordinator or not),
its current coordinators, and its current
neighbors - From these HELLO messages, each node keeps tracks
of a list of the nodes neighbors and
coordinators, and for each neighbor, a list of
its neighbors and coordinators
39SPAN
- Coordinator Announcement
- Each non-coordinator node periodically determines
whether it should become a coordinator or not - The coordinator eligibility rules ensures that
the network is covered with sufficient number of
coordinators - Coordinator Eligibility Rule
- A non-coordinator node should become a
coordinator if it figures out from the local - information gathering that two of its neighbors
cannot communicate directly or through - one or two existing coordinators
- If many nodes are willing to become coordinators,
SPAN solves this contention by delaying
coordinator announcement with a randomized
backoff delay - Each node selects a delay value and delays
sending HELLO message indicating the desire to
become coordinator for that amount of time - At the end of the delay, the node reevaluates its
eligibility based on the HELLO messages received
from neighbors and if it is still eligible, it
makes announcement
40SPAN
- Coordinator Announcement
- At the end of the delay, the node reevaluates its
eligibility based on the HELLO messages received
from neighbors and if it is still eligible, it
makes announcement - Consider a case where all the nodes have the same
level of energy which means that only topology is
considered in the decision of becoming a
coordinator - Consider a case where the nodes have unequal
energy left - Er energy remaining at node Ni number of
neighbors for node i - Em maximum amount of energy T round-trip
delay for packet - Ci number of new connections through node i R
random number in 0, 1
Eq. 1
Eq. 2
41SPAN
- Coordinator Announcement
- In Eq. 1, if nodes with high Ci become
coordinators, total number of coordinators needed
would be less to ensure that every node in the
network is covered - Therefore, the nodes with a high Ci values should
volunteer for coordinator position quicker than
those with smaller Ci - In Eq. 2, the node with large value of (Er/Em) is
expected to volunteer quicker to become a
coordinator than the nodes with smaller ratio in
order to assure the fairness
42SPAN
- Coordinator Withdrawal
- Each node periodically checks whether it should
withdraw as a coordinator - A node withdraws if all of its neighbors can
reach each other directly or with one or more
coordinators - For fairness, after some period of time, a
coordinator withdraws and declares itself as a
tentative coordinator if all neighbors can reach
each other via other neighbors, even if these are
not coordinators (allows neighbors to act as
coordinators) - A tentative coordinator is still used to forward
packets and described coordinator announcement
algorithm treats tentative coordinators as
non-coordinator nodes - A coordinator nodes gives its neighbors the
opportunity to become coordinators by declaring
itself as tentative coordinator - A coordinator maintains its position as tentative
for WT time, where WT is the maximum value of Eq.
2 which is - WT 3 x Ni x T
43SPAN
- Coordinator Withdrawal
- If the coordinator has not withdrawn within WT
time period, it clears its tentative bit - In order to prevent node to drain its battery
completely, the amount time a node acts as a
coordinator before turning on its tentative bit
is proportional to the amount of energy it has,
indicated as (Er/Em)
44Simulation Results
SPAN
45Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Topology Control
- Does not describe a new topology
- Provides a mechanism to build certain topology
- Distributed
- No central control or central source of
information - Asymmetric Links
- Due to the presence of heterogeneous devices
46Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Objective
- Reachability between any two nodes is guaranteed
to be like initial topology - Nodal power consumption is minimized
47Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Model
- Network of heterogeneous sensors (called nodes)
- Nodes deployed in a two dimensional plane
- Each node equipped with omni-directional antenna
with adjustable transmission power - Nodes have different maximum power
- Pi Transmission Power of Node i
- Pimax Maximum Transmission Power of Node i
- Pij Transmission Power required for node i to
reach j - Lij Asymmetric link from i to j
- G (V, L) directed graph of topology with max
power - G is strongly connected
48Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Algorithm
- Fully distributed with no synchronization
required - Takes G as input and produces G where G has
- Same bi-directional reachability
- Consumes minimum power
- Phases
- Establishing the vicinity topology
- Deriving the minimum power vicinity tree
- Propagation of transmission powers
- Optimizations
49Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Establishing the vicinity topology
- Node i broadcasts initialization request (IRQ)
with Pimax - Vi is the set of nodes that receive the message
i.e. locationi, Pimax - Each node j in Vi sends initialization reply
(IRP) message i.e. locationj, Pjmax - If Pjmax gt Pij , j can reach I with single hop
Lji - Otherwise find a multi-hop path to reach i
- Given the knowledge of location and max power of
itself and all vicinity nodes, node i can
determine the vicinity edges - Node i establishes a vicinity topology , Gi (Vi,
Ei)
50Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Deriving Minimum Power Vicinity Tree
- Derive Minimum power path in Gi, to reach from a
node i to node j using Dijkstra or Bellman-Ford
algortihms based on sum of power consumption on
that path. - Compute it for each node in Vi to obtain
minimum-power vicinity tree, - Gis (Vi, Eis)
51Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Propagation of transmission powers
- Node i computes minimum power requirement for
itself and others nodes in Vi - Node i sends a power request (PR) message to each
node in Vi, describing the minimum power required
for that node to reach farthest hop - A node j in Vi, receiving the PR message
increases its power requirement if the requested
power in PR is greater than current one - Otherwise, it discards the PR message
52Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Optimizations
- Achieved via discarding PR messages when
- A node already has run the algorithm to find its
shortest vicinity tree - A node receives a PR message for a node in its
vicinity - Example A asks B for PBC while B already has PBD
to reach node C
Figure 1 A scenario of further optimized nodal
transmission range
53Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Advantages
- Guarantees same bi-directional interconnection
while reducing per node power consumption - Distributed algorithm
- No synchronization required
- No central control node with network information
- Easy to add/remove nodes from the network
- Uses existing well known algorithms to obtain
minimum power consumption - Works on network with asymmetric links, which
seem more realistic - Assumption of asymmetric links, makes it possible
to obtain minimum power path via multi-hop rather
than using a single hop high power link
54Distributed Topology Control in Wireless Sensor
Networks with Asymmetric Links Liu 2003
- Disadvantages
- Computationally expensive to be run on network
with mobile sensors - Overhead of sending IRQ, IRP and RP in a large
network of sensors - Time to converge for the algorithm is large
- Suggestions/Improvements/Future Work
- More details on how multi-hop paths will be
discovered - Detailed example covering more complex scenarios
55Optimal Local Topology for Energy Efficient
Geographical Routing in Sensor NetworksMelodia
2004
- The primary design constraints of the sensor
network algorithms and protocols are
energy-efficiency, scalability and localization - The improved energy efficiency can be achieved by
designing protocols and algorithms with
cross-layer approach, i.e., considering
interactions between different layers of the
communication process such that overall energy
consumption is minimized - A scalable algorithm performs well in a large
network - The scalability for an algorithm is related to
that of localization in a scalable algorithm
each node exchanges information only with its
neighbors (localized information exchange) in a
very large wireless network
56Optimal Local Topology for Energy Efficient
Geographical Routing in Sensor NetworksMelodia
2004
- This paper considers the interaction between
topology control and energy efficient
geographical routing - The question to answer is How extensive should
be the Local Knowledge of the global topology in
each sensor node, so that an energy efficient
geographical routing can be guaranteed? - This question is related to the degree of
localization of the routing scheme - If each sensor node have the complete knowledge
of the topology, it could compute the global
optimal next hop to minimize the energy
consumption - However, the knowledge of complete topology
information has an associated cost, i.e., energy
used to exchange the signaling traffic
57Optimal Local Topology for Energy Efficient
Geographical Routing in Sensor NetworksMelodia
2004
- An analytical framework is developed to capture
the tradeoff between the topology information
cost, which increases with the Knowledge Range of
each node, and the communication cost, which
decreases when the knowledge becomes more
complete - This analytical framework is then applied to
different position based forwarding schemes and
demonstrated by using Monte Carlo simulations
that a limited knowledge is sufficient to make
energy efficient routing decisions - A neighbor for a certain sensor node is another
node which falls into its topology Knowledge
Range, denoted as KR
58Optimal Local Topology for Energy Efficient
Geographical Routing in Sensor NetworksMelodia
2004
- The contributions of this work are
- Introduction of a novel analytical framework to
evaluate the energy consumption of geographical
routing algorithms for sensor networks - Integer Linear Programming (ILP) formulation of
the topology Knowledge Range optimization problem - Detailed comparison of the leading existing
forwarding schemes Takagi 1984, Hou , Finn
1987, Kranakis 1999, Nelson 1984 and
introduced a new scheme called Partial Topology
Knowledge Forwarding (PTKF) - Introduction of PRobe-bAsed Distributed protocol
for knowledge rAnge adjustment (PRADA) for the
on-line solution of the problem that allows nodes
to select near-optimal Knowledge Ranges in a
distributed way
59Optimal Local Topology for Energy Efficient
Geographical Routing in Sensor NetworksMelodia
2004
- Advantages
- No need for knowing the global topology of the
network - PRADA can be run independently in the nodes, thus
the nodes do not require time synchronization - Demonstrates a limited amount of topology
knowledge is sufficient in order for energy
conserving routing protocols to be implemented - The nodes periodically update their knowledge
range, thus the algorithm could be implemented
in sensor networks where the nodes are mobile - Draws a fine line between topology information
cost and communication cost
60Optimal Local Topology for Energy Efficient
Geographical Routing in Sensor NetworksMelodia
2004
- Disadvantages
- No mentioning about the sensitivity towards
location error of their proposed protocol - For a pair of source-destination path, the most
optimal path is always chosen however, this
would lead to a starvation of some of the nodes
that would not get any traffic - The performance evaluation of protocol does not
consider the lower layers, such as MAC
61Optimal Local Topology for Energy Efficient
Geographical Routing in Sensor NetworksMelodia
2004
- Suggestions/Improvements/Future Work
- Extending the optimization objectives to include
not only power but also battery level of each
node (thus improving network lifetime) - Implementing the proposed routing protocol within
a simulator which considers routing and MAC layer
together to draw a more convincible conclusion
62References
- Basagni 2001 S. Basagni, D. Turgut, and S.K.
Das, Mobility-Adaptive Protocols for Managing
Large Ad hoc Networks, Proceedings of IEEE
International Conference on Communications (ICC),
Helsinki, Finland, June 11-14, 2001, pp.
1539-1543. - Chen 2002 B. Chen, K. Jamieson, R. Morris, and
H. Balakrishnan, SPAN An Energy-Efficient
Coordination Algorithm for Maintenance in Ad hoc
Wireless Networks, To appear in ACM Wireless
Networks Journal, Vol. 8, No. 5, September 2002. - Cerpa 2002 A. Cerpa and D. Estrin, ASCENT
Adaptive Self-Configuring Sensor Networks
Topologies, Proceedings of the Twenty First
International Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM
2002), New York, NY, USA, June 23-27 2002. - Finn 1987 G.G. Finn, Routing and Addressing
Problems in Large Metropolitan-Scale
Internetworks, ISI res. rep ISU/RR- 87-180, Mar.
1987. - Hou T.C. Hou and V.O.K. Li, Transmission
Range Control in multihop packet radio networks,
IEEE Transactions on Communications, Vol. 34,
No.1, pp. 38-44. - Kranakis 1999 E. Kranakis, H. Singh, and J.
Urrutia, Compass routing on geometric networks,
Proceedings of the 11th Canadian Conference on
Computational Geometry, Vancouver, Canada, August
1999. - Liu 2003 J. Liu and B. Li, Distributed
Topology Control in Wireless Sensor Networks with
Asymmetric Links, GLOBECOM 2003.
63References
- Melodia 2004 T. Melodia, D. Pompili, and I.F.
Akyildiz, Optimal Topology Knowledge for Energy
Efficient Geographical Routing in Sensor
Networks, Proceedings of the Twenty First
International Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM
2004), Hong Kong, P.R., China, March 2004. - Nelson 1984 R. Nelson and L. Kleinrock, The
spatial capacity of a slotted ALOHA multihop
packet radio network with capture, IEEE
Transactions on Communications, Vol. 32, No.6,
pp. 684-694, 1984. - Takagi 1984 H. Takagi and L. Kleinrock,
Optimal Transmission Ranges for Randomly
Distributed Packet Radio Terminals, IEEE
Transactions on Communications, Vol. 32, No.3,
pp. 246-57, 1984. - Schurgers 2002 C. Schurgers, V. Tsiatsis, S.
Ganeriwal, and M.B, Srivastava, Optimizing Sensor
Networks in the Energy-Latency-Density Design
Space, IEEE Transactions on Mobile Computing,
Vol. 1, No.1, pp. 70-80, January-March 2002.