Title: Clock Synchronization for Wireless Sensor Networks: A Survey
1Clock Synchronization for Wireless Sensor
Networks A Survey
- Bharath Sundararaman, Ugo Buy, and Ajay D.
Kshemkalyani - Department of Computer Science
- University of Illinois at Chicago
2Outline
- I. Introduction
- II. Synchronization protocols
- III. Comparison
- IV. Conclusion comments
3I. Introduction
4Why synchronization?
- The time of the day at which an event happened.
- The time interval between two events.
- The relative ordering of events.
5Requirements
- Cope with unreliable network transmission and
unbounded message latencies. - Able to estimate the local time on the other
nodes clock. - Time must never run backward.
- Should not degrade system performance.
6Several issues in synchronization (1/5)
- Master-slave v.s. peer-to-peer synchronization
- Master-slave. The slave node consider the clock
reading of the master as the reference time and
attempt to synchronize with the master. - Peer-to-peer. Any node can communicate directly
with every node in the network. They are more
flexible but are also more difficult to control.
7Several issues in synchronization (2/5)
- Clock correction versus untethered clocks
- Clock correction. Correcting the local clock in
each node to run on par with a global time scale
or an atomic clock. - Untethered clock. Build a table of parameters
that relate the local clock of each node to the
local clock of every other node in the network.
When timestamps are exchanged between nodes, they
are transformed to the local clock values of the
receiving node.
8Several issues in synchronization (3/5)
- Internal synchronization v.s. external
synchronization - Internal synchronization. The goal is to
minimize the maximum difference between the
readings of local clocks of the sensors. - External synchronization. A standard source of
time is provided.
9Several issues in synchronization (4/5)
- Probabilistic v.s. deterministic synchronization
- Probabilistic synchronization. Provide a
probabilistic guarantee on the maximum clock
offset with a failure probability that can be
bounded or determined. - Deterministic synchronization. Guarantee an
upper bound on the clock offset with certainty.
10Several issues in synchronization (5/5)
- Sender-to-receiver v.s. receiver-to-receiver
synchronization - Sender-to-receiver synchronization. The receiver
synchronizes with the sender using the time
stamps received. Message delay is calculated by
measuring the round-trip delay. - Receiver-to-receiver synchronization. If any two
receivers receives the same message in single-hop
transmission, they receive it at approximately
the same time. The receivers exchange the time
at which they received the same message and
compute their offset based on the difference in
reception time.
11Terminology (1/3)
- Time The time of a clock in a machine p is given
by the function Cp(t), where Cp(t) t for a
perfect clock. - Frequency Frequency is the rate at which a
clock progresses. The frequency at time t of
clock Ca is Ca(t). - Offset Clock offset is the difference between
the time reported by a clock and the real time.
12Terminology (2/3)
- Skew The skew of a clock is the difference in
the frequencies of the clock and the perfect
clock. The skew of a clock Ca relative to clock
Cb at time t is (Ca(t) - Cb(t)). - Drift (rate) The drift of clock Ca is the second
derivative of the clock value with respect to
time, namely Ca (t). The drift of clock Ca
relative to clock Cb at time t is (Ca (t) -
Cb (t)).
13Terminology (3/3)
- A timer is said to be working within its
specification if - where constant ? is the maximum skew rate
specified by the manufacturer.
14II. Synchronization protocols
15Remote clock reading method
- The client then sets its time to Stime (accurate
time from the server) (T1-T0)/2 (time required
to transmit the message). - The time for any message to be sent is highly
variable due to network traffic and message
routing.
16Time transmission method (1/2)
- M is the source node and S is the target node.
- M sends a series of synchronization messages to
S. The ith message is sent at time Ti of Ms
clock and received at time Ri of Ss clock.
S
Ti
M
Ri
17Time transmission method (2/2)
d the offset between clock S and M d message
delay
18Set-valued estimation method (1/3)
- We assume that the local times ti and tj on
processors Pi and Pj ,respectively, can be
related by the linear equation - ti aijtj bij
- where aij and bij represent the relative skew and
offset between the two hardware clocks. - Time-stamped triples.
19Set-valued estimation method (2/3)
20Set-valued estimation method (3/3)
21Reference broadcast synchronization (1/5)
- RBS seeks to reduce nondeterministic latency
using receiver-to-receiver synchronization and to
conserve energy via post-facto synchronization.
22Reference broadcast synchronization (2/5)
Time critical path nondeterministic delay
23Reference broadcast synchronization (3/5)
- Receiver j will compute its offset relative to
any other receiver i as the average of clock
differences for each packet received by nodes i
and j.
24Reference broadcast synchronization (4/5)
25Reference broadcast synchronization (5/5)
- The largest sources of error are removed.
- Require O(n2) message exchanges for a network of
n nodes.
26Romers protocol (1/4)
- Uses innovative time transformation algorithm for
achieving clock synchronization - Assumptions
- There is a maximum skew ? of computer clocks
- Whenever a message is exchanged between two
nodes, the connection remains long enough for the
two nodes to exchange one additional message.
27Romers protocol (2/4)
- Real time difference ?t
- Computer clock difference ?C1, ?C2
- Skew upper bound for node 1 and node 2 are ?1 and
?2,, respectively.
28Romers protocol (3/4)
- The message delay between two node is estimated
by bounding it within interval - 0, rtt
29Romers protocol (4/4)
- Require low resource and message overhead.
- The synchronization error increases with the
number of hops along the path of the message
containing the timestamp.
30Timing-sync Protocol for sensor networks (1/3)
- A self-configuring hierarchical structure.
- A node in this structure can simultaneous act as
a synchronization server to a number of client
nodes and as a synchronization client to another
node.
31Timing-sync Protocol for sensor networks (2/3)
- Two phase.
- Level discovery phase. It is based on
constrained flooding. The root node is assigned
level 0 The receiver assign themselves a level
that is one greater than the level in the packet
received. - Synchronization phase. T2T1dd and d represents
the clock offset between two nodes and d
represents the propagation delay.
32Timing-sync Protocol for sensor networks (3/3)
- The protocol is scalable and the accuracy does
not degrade significantly as the size of the
network is increased. - The protocol requires a hierarchical
infrastructure which makes it unsuitable for
highly mobile nodes.
33III. Comparison
34Quantitatively evaluation (1/2)
- Synchronization precision
- Piggybacking
- Reduction of message traffic
- Computational complexity
- Run time and memory requirements
- Number of messages exchanged
- Convergence time
- Total time required to synchronize a network
- Network size
- Compatibility with sleep mode
- Synchronize and active only when application
demands it.
35Quantitatively evaluation (2/2)
36Qualitatively evaluation (1/2)
- Energy efficiency
- Accuracy
- How well the time maintained within the network
is true to the standard time - Scalability
- Overall complexity
- Fault tolerance
- Poor reliability of message delivery
37Qualitatively evaluation (2/2)
38IV. Conclusion comments
39Conclusion
- The design considerations presented will help
designers in building successful synchronization
scheme, best tailored to his application.
40Comments
- Pros
- It is a good start to begin studying
synchronization. - Design tradeoffs are discussed and these help us
in designing synchronization protocols. - Cons
- Some protocols description are too rough to be
useful. - The authors didnt conduct any experiment to
verify the claimed results.