• No results found

Tree Based Data Gathering from Sensors:Topology Management Sustaining QoS.

N/A
N/A
Protected

Academic year: 2023

Share "Tree Based Data Gathering from Sensors:Topology Management Sustaining QoS."

Copied!
300
0
0

Loading.... (view fulltext now)

Full text

The first paper of the thesis proposes a distributed BFS tree construction scheme based on a sink node for crash-tolerant sensor network data collection. The proposed theory was substantiated by analyzing the worst possible calculation of the sensor network.

Background

Sensory Data Collection

Data collection or convergence [18, 123] is one of the most used applications in sensor network, where sensory data is sent from the sensor nodes to the base station for statistical analysis. Whether event-triggered or query-driven, the generated sensory data is sent from each node to the base station through a multi-hop path.

Data Gathering Tree

Some other applications may require latency and reliability constraints to be met for efficient data collection. For latency-coupled applications, the spanning tree must support the shortest path distance from all nodes to the sink.

Motivation

As discussed, border area networks require strong area coverage, whereas strip-length coverage is sufficient for road sensor networks. Sensory data must be forwarded to the base station with minimal processing and forwarding delay.

Objectives

Solution Approach : An Overview

The tree management activities of the proposed TMM include both tree construction and tree maintenance against random node failure. The performance of the proposed scheme has been compared with existing schemes in the literature, together with the scheme proposed in the first contribution of this thesis.

Organization of the Thesis

Energy-Latency Trade-off Analysis

In another work [113], the authors proposed a hierarchical scheme to reduce the energy x delay metric for data collection. However, in all the above works, the focus was limited to the analysis of data collection performance in terms of energy and delay.

Data Gathering and Topology Control

They proposed a tree structure called DB-MDST (minimum spanning tree with delay) to achieve efficient data collection in terms of fairness of energy consumption per node and delay constraint. The goal of the proposed tree structure is to reduce the height and at the same time increase the grade.

BFS Tree for Data Gathering

A routing tree is constructed on demand, rooted at each source node, for efficient congestion control using resource control technique. There can be multiple trees rooted in different sources with one final destination as the sink node, so multiple options exist for choosing a data forwarding path.

Fault-tolerance

Tree Maintenance from Node Failure

58] proposed a scheme where a spanning tree is constructed based on the weighted average of hop count and weight of the tree edges. A collection tree is built on the fly with minimum cost for each of the nodes that advertise themselves as the root of the tree.

Supporting Failure in Hierarchical Network Framework

When a routing path fault is detected, a new routing path is established using a resource-based path discovery mechanism. Both CTP and back pressure routing protocol calculate a new path when a fault is detected in the routing path.

Wireless Sensor Network: Theory and Practice

  • Network Connectivity and Sensing Coverage
  • Sensor Deployment Strategy
  • Sensor Power Management
  • Delay Sensitive Applications

A series of works have been proposed to deploy the sensor nodes in the network in such a way that some predefined QoS requirements are met. The proposed scheme does not consider the traffic load pattern in the sensor network which is important for forwarding delay-sensitive tree-based data.

Figure 2.1: Different types of sensing coverage
Figure 2.1: Different types of sensing coverage

Application Specific Customization

Intelligent Transport System

In [111], the authors have developed a multi-hop data distribution protocol for vehicle sensor network based on absolute positioning information obtained from GPS server. In [106], the authors designed an optimization problem to reduce the communication cost in a road sensor network.

Critical Infrastructure Information System

In [66], the authors have proposed the use of multipath data distribution in sensor network to improve reliability in data distribution. As discussed, for applications in CI monitoring, reliability in data delivery must be ensured along with network connectivity and maintenance of sensor coverage.

Figure 2.3: An example of progress speed estimation in MMSPEED protocol that the protocol can deliver data with high degree of reliability in spite of multiple node failures that are not within close proximity
Figure 2.3: An example of progress speed estimation in MMSPEED protocol that the protocol can deliver data with high degree of reliability in spite of multiple node failures that are not within close proximity

Summary

Most of the notable works in the literature have focused on analyzing data collection performance in terms of energy and delay as discussed in Chapter 2. Executing the proposed TMM at each node constructs a spanning tree rooted at the sink.

Figure 3.1: Network Protocol Stack
Figure 3.1: Network Protocol Stack

Topology Management Module

TMM Initialization : A Distributed Tree Construction

Every time a node u receives a Token message from a node v, it stores parent(v) and levelv, as stated in lines 1-2 of Algorithm 3.1, which are required during the precomputation phase. On a timeout from the LazyTimer, the switchP arent procedure of Algorithm 3.2 is triggered to change its parent to a node with a better level.

Figure 3.2: Initial graph G
Figure 3.2: Initial graph G

Alternate Parent Precomputation

Let the node declare itself a power node if it satisfies the conditions of line 5 and line 6 of Algorithm 3.5, and then it will not be a power node. So altp on each node is correctly set to the powerP arent or deboostP arent.

Figure 3.6: Neighborhood information pre-processing for alternate parent computation
Figure 3.6: Neighborhood information pre-processing for alternate parent computation

Proof of Correctness

Once all the nodes in V reach the stable state, no further node receives any of the Sign, Add or Remove messages. Letx2 chose x1 as its parent upon receiving a Token message from x1 at time tj.

Tree Repairing from Arbitrary Node Crash

First Phase of Tree Repairing : Proactive Approach

Therefore, upon receiving a Booster message from v at time tj > ti, you reset its power and become a Booster node, according to lines 1-5 of Algorithm 3.6. Lemma 3.6. According to Algorithm 3.6, you select only one as an alternate parent so that it provides the shortest path from the root.

Figure 3.9 - Figure 3.11 give a pictorial description of the repairing mechanism from an arbitrary node crash
Figure 3.9 - Figure 3.11 give a pictorial description of the repairing mechanism from an arbitrary node crash

Second Phase of Tree Repairing : Reactive Approach

Otherwise, w broadcasts an urgent message in the 1-hop environment with the updated UrgList, according to lines 18-26 of Algorithm 3.13. Upon receiving an UrgentAck, each node updates its neighborhood information according to lines 1-5 of Algorithm 3.14.

Application Message Controller

Simulation Results

Phase I : Extreme Case Scenario

This is the simplest case, since node 4 is a Power node, and it sets its parent to node 2. Each of the nodes, from node 5 to node 8, does not change its parent; neither because of the parental invalidation nor because of the level improvement.

Table 3.2: Parameters for Simulation Environment
Table 3.2: Parameters for Simulation Environment

Phase II : Regular Grid Topology

As the grid size increases, the percentage of packets received at the sink decreases linearly as shown in Figure 3.18. From Figure 3.19 and Figure 3.20, when the timer value is small, the convergence time is large.

Figure 3.16: Scalability in terms of tree repairing time
Figure 3.16: Scalability in terms of tree repairing time

Phase III : Random Topology

Due to the failure of node 19, nodes 20 and 29 set the parent to their respective alternate parent. It can be observed that the repair time for victim nodes increases along a walk in the subtree rooted at the crashed node, from the root to the leaves.

Figure 3.24: BFS tree after nodes 1, 21 and 24 crashed
Figure 3.24: BFS tree after nodes 1, 21 and 24 crashed

Summary

The framework of the data collection tree management protocol based on the proposed deployment technique is provided in the next chapter. Thus, energy dissipation from the leaf nodes is significantly less compared to the nodes near the sink.

Figure 3.28: Application data received by the sink sent from node 14
Figure 3.28: Application data received by the sink sent from node 14

Deployment Strategy : Background

The area of ​​redundancy of a node u, denoted by Ψ(u), can be defined as the area such that u is the only active node within Ψ(u), and all other nodes within the Ψ(u) operate as the dedicated set redundant for that area. To ensure that the area Ψ(u) is always observation-covered, and the network connectivity is maintained upon failure of the primary node and for all subsequent active nodes v∈R(u) replacing the faulty node, R(v) is set on R(u).

Estimation of Deployment Density

Estimating Average Number of Children

Nodev can be placed at any point on line segmentBE, bounded bydmin todM AX. The child of node u can be placed at any position within the region bounded by F, R, G\ and F, H, G.

Figure 4.6: Avg no. of children
Figure 4.6: Avg no. of children

Estimating Average Energy Dissipation Factor

Since the child node can be uniformly placed in the region bounded by the arcsF, R, G\ and F, H, G\ for the parent node u at position E,ξ can be calculated as,.

Estimating the Gradient of Node Density

Theoretical Analysis

Redundancy Analysis

Estimated EDF: Figure 4.11 shows the percentage of redundancy relative to the level in the data collection tree. The figures show that although the percentage of redundancy varies with respect to levels, regardless of site size, the average percentage of redundancy in a site is almost constant at 67.258%.

Probability of Sensing Coverage based on Deployment Strategy

Let the probability that each primary node has enough redundant nodes to supply (which is the EDF function at that node) be represented by P{suf f Red(EDF)}. The figure shows that the probability of complete coverage is very high.

Figure 4.13: Probability of Full Coverage and Sufficient Redundancy
Figure 4.13: Probability of Full Coverage and Sufficient Redundancy

Simulation Results

Data rate (kbps in logarithmic scale) Proposed Framework Framework by Liao et al., 2011 Framework by Yun et al., 2010 Percentage of Node Failed Proposed Framework Framework by Liao et al., 2011 Framework by Yun et al.

Figure 4.15: d min = R s /2 and d M AX = R s
Figure 4.15: d min = R s /2 and d M AX = R s

Summary

Any failure of an intermediate node in the data collection tree affects both connectivity and record coverage in the network. Furthermore, the amount of redundancy also depends on the nature of the data collection tree.

Table 5.1: State variables at each node u Variable
Table 5.1: State variables at each node u Variable

First Phase of Tree Management

Active Nodes Selection Procedure

The Bcast messages are propagated from the sink towards the periphery of the terrain so that each node in the network becomes either a primary tree member or a redundant one. Upon receiving a Bcast message from a node v, node u compares the RSSI with SSd, where SSd indicates the strength of the received signal from d distance.

Load-Balanced BFS Tree Construction

If u receives a token from w, it changes the parent from v to w according to lines 10-13 of Algorithm 5.2 and Algorithm 5.3. Therefore, according to Algorithm 5.8, node w sends an AddMe message tov (where v ∈altpSet(w) by assumption).

Figure 5.1: Unbalanced tree
Figure 5.1: Unbalanced tree

Post Tree Construction Activities

Second Phase of Tree Management

Maintenance Scheme for Single Node Failure

So if the parent node fails due to aging or crash, the child can repair the parent to T+ 2Ω at worst. The slave node and the parent node with the error send a total of 3 messages (1Leave + 1J oin + 1J oinAck) to repair their parent due to the failure of the parent.

Maintenance Scheme for Multiple Node Failures

Since the Leave message is broadcast, the exchange of Join and JoinAck messages between each pair of nodes with respect to node u can be assumed to be parallel, and thus they can cumulatively introduce a 2Ω amount of delay in the worst case. However, the worst possible event is a rare event, so the implementation cost can be afforded depending on the usage requirement.

Figure 5.7: Node u and node x fails. Connectivity after recovery
Figure 5.7: Node u and node x fails. Connectivity after recovery

Application Message Controller

Simulation Results

  • Effect of Load Balancing on Energy Dissipation
  • Time to Fail: Comparison with “Online Repairing”
  • Amount of Sensory Packets Received
  • Comparison with Gradient based Deployment without Redundancy . 148

When node 1 fails, all data traffic from part A of the terrain goes through nodes 5 and 2. In the proposed scheme in this chapter, the density of primary nodes is uniform over the entire terrain.

Table 5.2: Comparison of balanced and unbalanced tree based forwarding Data
Table 5.2: Comparison of balanced and unbalanced tree based forwarding Data

Summary

Furthermore, the reliability of the delivery of sensory data to the roadsides is low for these schemes due to the mobility of the vehicles. The ADCROSS protocol proposes the concept of k-strip length coverage, which ensures that any passing vehicle is detected by at least k active sensors along the length of the road segment.

Figure 6.1: Road sensor network
Figure 6.1: Road sensor network

Problem Definition and Objectives

Centralized Scheduling

  • Coverage Interval Stabbing
  • Construction of the Set of Feasible Solutions for the L-chain
  • Optimal Solution of the B-chains
  • Optimal Solution of the CSLC Graph

This helps to reduce the complexity of the greedy approximation heuristic for solving the optimal CSLC graph. The second step of the CSLC graph optimality problem determines the optimal B chains for all ui ∈ χ.

Figure 6.4: Hierarchical representation of the connected k-strip length coverage
Figure 6.4: Hierarchical representation of the connected k-strip length coverage

Distributed Approach : Active Node Selection

Basics

Back-off Computation

Scheduling Strategy

Initialization

Adjusting SYN-DATA Intervals

Tree based Data Collection

Figure

Figure 1.3: A BFS tree for data gathering rooted at the sink
Table 2.1: Comparison of different sensor deployment strategies Ref. Terrain Coverage
Figure 2.4: An example of MUSTER: mul- mul-tiple rooted collection trees
Figure 3.4: c and g select wrong parent; j selects right parent with incorrect level
+7

References

Related documents

CBNiO CBCdS VBNiO VBCdS 2 .4 5 e V 3 .5 e V e− h+ h ν e− e− H2 H+ SO32− SO42− Scheme 2 Schematic illustration of the efficient electron transfer and the band energy positions

Exercising the right to return and the right to peaceful assembly and association as enshrined in articles 13 and 20 respectively of the UN Universal Declaration of Human Rights,