1 / 25

A Low-Cost Flooding Algorithm for Wireless Sensor Networks

Department of Electrical and Computer Systems Engineering Monash University, Australia. A Low-Cost Flooding Algorithm for Wireless Sensor Networks. WCNC 2007, Hong Kong. Ou Liang, Ahmet Sekercioglu and Nallasamy Mani. Sections. Flooding in WSNs. Our Low-Cost Flooding algorithm.

brighton
Télécharger la présentation

A Low-Cost Flooding Algorithm for Wireless Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Department of Electrical and Computer Systems Engineering Monash University, Australia A Low-Cost Flooding Algorithm for Wireless Sensor Networks WCNC 2007, Hong Kong Ou Liang, Ahmet Sekercioglu and Nallasamy Mani

  2. Sections Flooding in WSNs. Our Low-Cost Flooding algorithm. Simulation study. Conclusion and future work.

  3. Section 1 Section 2 Section 3 Section 4 Flooding in WSNs • Flooding is the simplest way of routing. It requires each node in the network to broadcast a packet upon receiving it for the first time. • Flooding is widely used in WSNs by many applications. Problems: • Redundant packets— nodes receive multiple copies of a packet. • Contention and collision — happen when using a contention MAC layer like IEEE 802.11. • Energy wastage — redundant retransmissions consume energy.

  4. Section 1 Section 2 Section 3 Section 4 Redundant flooding S

  5. Section 1 Section 2 Section 3 Section 4 An efficient way of flooding B S A C

  6. Section 1 Section 2 Section 3 Section 4 Low-Cost Flooding Algorithm It aims to form a Connected Dominating Set (CDS) in a given network. It operates in two steps: • Elects cluster-heads (dominators). • Generates connectors to link all the dominators.

  7. Section 1 Section 2 Section 3 Section 4 Electing dominators Initially, all nodes in the network mark themselves as white nodes, and only the nodes in the white node state participate dominator election. A node announces itself as the dominator if it has the largest node degree among its white node neighbors. Nodes that are covered by the dominators change their states to dominatees.

  8. Section 1 Section 2 Section 3 Section 4 Dominator election example I Node | Node degree E D 6 A J H h 5 F T P 5 B D K Dominators are two hops or three hops apart from each other. C L P G O M N

  9. Section 1 Section 2 Section 3 Section 4 Generating connectors Two types of connectors: • Active-Connector – selected by dominators • Passive-Connector – selected by dominators and active connectors. Passive-Connectors connect two-hop away dominators. Active-Connectors + Passive-connectors connect three-hop away dominators.

  10. Section 1 Section 2 Section 3 Section 4 Connecting two-hop away dominators A dominator U selects a dominatee V as a passive-connector to connect two-hop away dominators based on two rules: • U has a bigger node ID than all its two-hop away dominators that are covered by V. • V covers the most number of two-hop away dominators of U.

  11. Section 1 Section 2 Section 3 Section 4 Node A: { W} Node A: { V} Node B: { U, W } Node B: { U, V } Node B: { V, W } Selecting passive connectors Dominator W A W V Dominator V B I am a Passive connector Selected by W Dominator U U

  12. Section 1 Section 2 Section 3 Section 4 Connecting three-hop away dominators Two steps to connect three-hop away dominators: • A dominator U selects an active-connector V. • Active-connector V selects other passive connectors to connect three-hop away dominators.

  13. Section 1 Section 2 Section 3 Section 4 New definitions Special-dominatee: A dominatee V marks another dominatee W as a special dominatee if W has no shared one-hop dominator with V. Dominatee U and V have a shared dominator C. U Dominatee V and W have no shared dominators. C V W A V and W mark each other as the special-dominatees. B

  14. Section 1 Section 2 Section 3 Section 4 New definitions Special-dominator: Dominatee V marks all the one-hop dominators of a special-dominatee W as the special-dominators. Dominatee V marks dominator A as the special-dominator. U Dominatee W marks dominator B and C as the special-dominators. C V W A B

  15. Section 1 Section 2 Section 3 Section 4 New definitions Use D2(C) to represent the set of two-hop away dominators of a dominator C. Isolated-dominator: A dominator C marks a special-dominator A of dominatee V as the isolated-dominator if A is neither a two-hop away dominator of C, nor a two-hop away dominator of any node in D2(C). U C V W A B

  16. Section 1 Section 2 Section 3 Section 4 Selecting active-connectors A dominator U selects a dominatee V as an active-connector if: • U has marked some isolated-dominator from V. • U has larger node ID than those marked isolated dominators. Dominator U will inform active-connector V about the isolated-dominators V needs to connect.

  17. Section 1 Section 2 Section 3 Section 4 Selecting passive-connectors (by active-connectors) An active-connector V selects a dominatee W as the passive-connector if: • W connects to the most number of isolated-dominators. U C V W A Connect isolated-dominator A I am a passive-connector B

  18. Section 1 Section 2 Section 3 Section 4 Simulation study

  19. Section 1 Section 2 Section 3 Section 4 Simulation study Number of forwarding nodes generated

  20. Section 1 Section 2 Section 3 Section 4 Simulation study Number of signaling messages generated

  21. Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in bytes) R=15m

  22. Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in bytes) R=25m

  23. Section 1 Section 2 Section 3 Section 4 Conclusion and future work We have proposed a Low-Cost Flooding (LCF) algorithm for wireless senor networks. The algorithm aims to minimize the redundant retransmissions in the network by generating a Connected Dominating Set (CDS). Future work: • Design efficient routing protocols for sensor networks. • Implement a real world sensor network test bed.

  24. Thank you for your attention!

  25. Section 1 Section 2 Section 3 Section 4 Flooding protocol designing considerations • Scalability— flooding algorithms for WSNs need to be distributed and depends on localized information. • Simplicity — flooding algorithms need to be simple in both computation and communication. • Efficiency — flooding algorithms can dramatically reduce unnecessary redundant transmissions and save energy.

More Related