SlideShare a Scribd company logo
1 of 31
Directed Diffusion for Wireless
Sensor Networking
Authors:
Chalermek Intanagonwiwat, Ramesh Govindan, Deborah
Estrin, John Heidemann, and Fabio Silva
Presented by:
Md. Habibur Rahman (AIUB)
Course:
Sensor Networks and Wireless Computing
Instructor:
Md. Saidur Rahman (AIUB)
Wireless Networks
Variety of architectures
Single hop networks
Multi-hop networks
Internet
The Wireless Future …
Motivation
Properties of Sensor Networks
Data centric approach: communication based named data,
not named nodes
No central authority
Resource constrained like limited power, computation
capacities and memory
Nodes are tied to physical locations
Nodes may not know the topology due to rapidly changes
of topology
Nodes are generally stationary
Q: How can we get data from the sensors?
Introduction(1/2)
A sensor network is composed of a large number of
sensor nodes, which are densely deployed either inside
the phenomenon or very close to it.
Random deployment
Cooperative capabilities
Sensor nodes scattered in a sensor field
Multi-hop communication is expected
Motivating factors for emergence
Applications
Advances in wireless technology
Introduction(2/2)
A region requires event-
monitoring
Deploy sensors forming a
distributed network
Wireless networking
Energy-limited nodes
On event, sensed and/or
processed information
delivered to the inquiring
destination
The Problem
 Where should the data be
stored?
 How should queries be
routed to the stored data?
 How should queries for
sensor networks be
expressed?
 Where and how should
aggregation be performed?
EventEvent
Sources
Sink Node
Directed
Diffusion
A sensor field
Directed Diffusion
Designed for robustness, scaling and energy efficiency
Data centric
Sinks place requests as interests for named data
Sources satisfying the interest can be found
Intermediate nodes can cache or transform data directly
toward sinks
Attribute-naming based
Data aggregation
Interest, data aggregation and data propagation are
determined by localized interactions.
Directed Diffusion
Four main features: Interests, Data, Gradients &
Reinforcement
Interest: a query or an interrogation which specifies what
a user wants.
Data: collected or processed information
Gradient: direction state created in each node that
receives interest.
Gradient direction is toward the neighboring node which the
interest is received
Events start flowing from originators of interests along
multiple gradient paths.
Directed Diffusion
Directed Diffusion
Naming
 Task descriptions are named by a list of attribute value pairs that
describe a task
 eg:
type=wheeled vehicle // detect vehicle location
interval=20ms // send events every 20 ms
duration=10s // for the next 10s
rect=[-100,100,200,400]// from sensors within rectangle
Interests and Gradients
 Interest is usually injected to the network from sink
 For each active task, sink periodically broadcasts an interest
message to each of its neighbors
 Initial interest contains the specified rect and duration attributes
but larger interval attribute
 Interests tries to determine if there are any sensor nodes that
detect the wheeled vehicle(exploratory).
Interests
Interests: a query which specifies what a user wants by
naming the data.
Sink periodically broadcasts interest messages to each
neighbor.
Includes the rectangle and duration attributes from the
request.
Includes a larger interval attribute
All nodes maintain an interest cache
Interest Cache
Sensor Node
Receives interest packet
Node is within the rectangle coordinates
Task the sensor system to generate samples at the
highest rate of all the gradients.
Data is sent using unicast
Data Return
Exploratory versus Data
Exploratory use lower data rates
Once the sensor is able to report the data a reinforcement
path is created
Data gradients used to report high quality/high
bandwidth data.
Positive Reinforcement
Sink re-sends original interest message with smaller
interval
Neighbor nodes see the high bandwidth request and
reinforce at least one neighbor using its data cache
This process selects an empirically low-delay path.
Multiple Sources & Sinks
The current rules work for multiple sources and sinks
Negative Reinforcement
Repair can result in more than one path being reinforced
Time out gradients
Send negative reinforcement message
Repair
C detects degradation
Notices rate of data significantly lower
Gets data from another neighbor that it hasn’t seen
To avoid downstream nodes from repairing their paths C
must keep sending interpolated location estimates.
Design Considerations
Simulation Environment
NS2, 50 nodes in 160x160 sqm., range 40m
Random 5 sources in 70x70, random 5 sinks
Average node density constant in all simulations
Comparison against flooding and omniscient multicast
1.6Mbps 802.11 MAC
Not realistic (reliable transmission, RTS/CTS, high power, idle
power ~ receive power)
Set idle power to 10% of receive power, 5% of transmit
power
Metrics
Average dissipated energy
per node energy dissipation / # events seen by sinks
Average packet delay
latency of event transmission to reception at sink
Distinct event delivery
# of distinct events received / # of events originally sent
Both measured as functions of network size
Average Dissipated Energy
In-network aggregation reduces DD redundancy
Flooding poor because of multiple paths from source to sink
flooding
DiffusionMulticast
Flooding
DiffusionMulticast
Delay
DD finds least delay paths, as OM – encouraging
Flooding incurs latency due to high MAC contention,
collision
flooding
Diffusion
Multicast
Average energy and delay
Average delay is misleading
Directed Diffusion is better than Omniscient Multicast!?
Omniscient multicast sends duplicate messages over the
same paths
Topology has little path diversity
Why not suppress messages with Omniscient Multicast
just as in Directed Diffusion?
Event Delivery Ratio under node failures
Delivery ratio degrades with higher % node failures
Graceful degradation indicates efficient negative
reinforcement
0 %
10%
20%
Analysis
Energy gains are dependent on 802.11 energy assumptions
Directed Diffusion has lowest average dissipated energy
Data aggregation and negative reinforcement enhance
performance considerably
Differences in power consumption disappear if idle–
time power consumption is high
Can the network always deliver at the interest’s requested
rate?
Can diffusion handle overloads?
Does reinforcement actually work?
Continued….
Pros
Energy – Much less traffic than flooding.
Latency – Transmits data along the best path
Scalability – Local interactions only
Robust – Retransmissions of interests
Cons
The set up phase of the gradients is expensive
Need of and adequate MAC layer to support an efficient
implementation. The simulation analysis uses a modified
802.11 MAC protocol
Design doesn’t deal with congestion or loss
Periodic broadcasts of interest reduces network lifetime
Nodes within range of human operator may die quickly
Conclusions
Directed diffusion, a paradigm proposed for event
monitoring sensor networks
Energy efficiency achievable
Diffusion mechanism resilient to fault tolerance
Conservative negative reinforcements proves useful
More thorough performance evaluation is required
MAC for sensor networks needs to be designed
carefully for further performance gains
Thank you 

More Related Content

What's hot

Small scale fading
Small scale fadingSmall scale fading
Small scale fadingAJAL A J
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
The cellular concept
The cellular conceptThe cellular concept
The cellular conceptZunAib Ali
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC ProtocolDarwin Nesakumar
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 

What's hot (20)

Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
6LoWPAN.pptx
6LoWPAN.pptx6LoWPAN.pptx
6LoWPAN.pptx
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 

Similar to Directed diffusion for wireless sensor networking

Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Throughput maximization technique in wireless sensor network using data aggr...
Throughput maximization technique in wireless sensor network using data  aggr...Throughput maximization technique in wireless sensor network using data  aggr...
Throughput maximization technique in wireless sensor network using data aggr...jency j
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgialrazgi
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
25143515-Wireless-Communication.ppt
25143515-Wireless-Communication.ppt25143515-Wireless-Communication.ppt
25143515-Wireless-Communication.ppt10ADWAITHSECE
 

Similar to Directed diffusion for wireless sensor networking (20)

Sensor net
Sensor netSensor net
Sensor net
 
Lect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptxLect-3-M2M-IoT.pptx
Lect-3-M2M-IoT.pptx
 
networking
networkingnetworking
networking
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Throughput maximization technique in wireless sensor network using data aggr...
Throughput maximization technique in wireless sensor network using data  aggr...Throughput maximization technique in wireless sensor network using data  aggr...
Throughput maximization technique in wireless sensor network using data aggr...
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Mobile Database ,alrazgi
Mobile Database ,alrazgiMobile Database ,alrazgi
Mobile Database ,alrazgi
 
40120140501003
4012014050100340120140501003
40120140501003
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
25143515-Wireless-Communication.ppt
25143515-Wireless-Communication.ppt25143515-Wireless-Communication.ppt
25143515-Wireless-Communication.ppt
 

More from Habibur Rahman

Cycling for the body and mind
Cycling for the body and mindCycling for the body and mind
Cycling for the body and mindHabibur Rahman
 
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14Habibur Rahman
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationHabibur Rahman
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Habibur Rahman
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloudHabibur Rahman
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSimHabibur Rahman
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulatorHabibur Rahman
 
Simulation and modeling
Simulation and modelingSimulation and modeling
Simulation and modelingHabibur Rahman
 
Performace analysis of mipv4 vs mipv6
Performace  analysis of mipv4 vs mipv6Performace  analysis of mipv4 vs mipv6
Performace analysis of mipv4 vs mipv6Habibur Rahman
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 

More from Habibur Rahman (11)

Cycling for the body and mind
Cycling for the body and mindCycling for the body and mind
Cycling for the body and mind
 
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
Poster Presentation of the 3rd IEEE Int. Conf. on ICIEV’14
 
A version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentationA version of watershed algorithm for color image segmentation
A version of watershed algorithm for color image segmentation
 
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
Segmentation of Color Image using Adaptive Thresholding and Masking with Wate...
 
A tutorial on GreenCloud
A tutorial on GreenCloudA tutorial on GreenCloud
A tutorial on GreenCloud
 
A tutorial on CloudSim
A tutorial on CloudSimA tutorial on CloudSim
A tutorial on CloudSim
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
Survey on cloud simulator
Survey on cloud simulatorSurvey on cloud simulator
Survey on cloud simulator
 
Simulation and modeling
Simulation and modelingSimulation and modeling
Simulation and modeling
 
Performace analysis of mipv4 vs mipv6
Performace  analysis of mipv4 vs mipv6Performace  analysis of mipv4 vs mipv6
Performace analysis of mipv4 vs mipv6
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Directed diffusion for wireless sensor networking

  • 1. Directed Diffusion for Wireless Sensor Networking Authors: Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, and Fabio Silva Presented by: Md. Habibur Rahman (AIUB) Course: Sensor Networks and Wireless Computing Instructor: Md. Saidur Rahman (AIUB)
  • 2. Wireless Networks Variety of architectures Single hop networks Multi-hop networks
  • 4. Motivation Properties of Sensor Networks Data centric approach: communication based named data, not named nodes No central authority Resource constrained like limited power, computation capacities and memory Nodes are tied to physical locations Nodes may not know the topology due to rapidly changes of topology Nodes are generally stationary Q: How can we get data from the sensors?
  • 5. Introduction(1/2) A sensor network is composed of a large number of sensor nodes, which are densely deployed either inside the phenomenon or very close to it. Random deployment Cooperative capabilities Sensor nodes scattered in a sensor field Multi-hop communication is expected Motivating factors for emergence Applications Advances in wireless technology
  • 6. Introduction(2/2) A region requires event- monitoring Deploy sensors forming a distributed network Wireless networking Energy-limited nodes On event, sensed and/or processed information delivered to the inquiring destination
  • 7. The Problem  Where should the data be stored?  How should queries be routed to the stored data?  How should queries for sensor networks be expressed?  Where and how should aggregation be performed? EventEvent Sources Sink Node Directed Diffusion A sensor field
  • 8. Directed Diffusion Designed for robustness, scaling and energy efficiency Data centric Sinks place requests as interests for named data Sources satisfying the interest can be found Intermediate nodes can cache or transform data directly toward sinks Attribute-naming based Data aggregation Interest, data aggregation and data propagation are determined by localized interactions.
  • 9. Directed Diffusion Four main features: Interests, Data, Gradients & Reinforcement Interest: a query or an interrogation which specifies what a user wants. Data: collected or processed information Gradient: direction state created in each node that receives interest. Gradient direction is toward the neighboring node which the interest is received Events start flowing from originators of interests along multiple gradient paths.
  • 11. Directed Diffusion Naming  Task descriptions are named by a list of attribute value pairs that describe a task  eg: type=wheeled vehicle // detect vehicle location interval=20ms // send events every 20 ms duration=10s // for the next 10s rect=[-100,100,200,400]// from sensors within rectangle Interests and Gradients  Interest is usually injected to the network from sink  For each active task, sink periodically broadcasts an interest message to each of its neighbors  Initial interest contains the specified rect and duration attributes but larger interval attribute  Interests tries to determine if there are any sensor nodes that detect the wheeled vehicle(exploratory).
  • 12. Interests Interests: a query which specifies what a user wants by naming the data. Sink periodically broadcasts interest messages to each neighbor. Includes the rectangle and duration attributes from the request. Includes a larger interval attribute All nodes maintain an interest cache
  • 14. Sensor Node Receives interest packet Node is within the rectangle coordinates Task the sensor system to generate samples at the highest rate of all the gradients. Data is sent using unicast
  • 16. Exploratory versus Data Exploratory use lower data rates Once the sensor is able to report the data a reinforcement path is created Data gradients used to report high quality/high bandwidth data.
  • 17. Positive Reinforcement Sink re-sends original interest message with smaller interval Neighbor nodes see the high bandwidth request and reinforce at least one neighbor using its data cache This process selects an empirically low-delay path.
  • 18. Multiple Sources & Sinks The current rules work for multiple sources and sinks
  • 19. Negative Reinforcement Repair can result in more than one path being reinforced Time out gradients Send negative reinforcement message
  • 20. Repair C detects degradation Notices rate of data significantly lower Gets data from another neighbor that it hasn’t seen To avoid downstream nodes from repairing their paths C must keep sending interpolated location estimates.
  • 22. Simulation Environment NS2, 50 nodes in 160x160 sqm., range 40m Random 5 sources in 70x70, random 5 sinks Average node density constant in all simulations Comparison against flooding and omniscient multicast 1.6Mbps 802.11 MAC Not realistic (reliable transmission, RTS/CTS, high power, idle power ~ receive power) Set idle power to 10% of receive power, 5% of transmit power
  • 23. Metrics Average dissipated energy per node energy dissipation / # events seen by sinks Average packet delay latency of event transmission to reception at sink Distinct event delivery # of distinct events received / # of events originally sent Both measured as functions of network size
  • 24. Average Dissipated Energy In-network aggregation reduces DD redundancy Flooding poor because of multiple paths from source to sink flooding DiffusionMulticast Flooding DiffusionMulticast
  • 25. Delay DD finds least delay paths, as OM – encouraging Flooding incurs latency due to high MAC contention, collision flooding Diffusion Multicast
  • 26. Average energy and delay Average delay is misleading Directed Diffusion is better than Omniscient Multicast!? Omniscient multicast sends duplicate messages over the same paths Topology has little path diversity Why not suppress messages with Omniscient Multicast just as in Directed Diffusion?
  • 27. Event Delivery Ratio under node failures Delivery ratio degrades with higher % node failures Graceful degradation indicates efficient negative reinforcement 0 % 10% 20%
  • 28. Analysis Energy gains are dependent on 802.11 energy assumptions Directed Diffusion has lowest average dissipated energy Data aggregation and negative reinforcement enhance performance considerably Differences in power consumption disappear if idle– time power consumption is high Can the network always deliver at the interest’s requested rate? Can diffusion handle overloads? Does reinforcement actually work?
  • 29. Continued…. Pros Energy – Much less traffic than flooding. Latency – Transmits data along the best path Scalability – Local interactions only Robust – Retransmissions of interests Cons The set up phase of the gradients is expensive Need of and adequate MAC layer to support an efficient implementation. The simulation analysis uses a modified 802.11 MAC protocol Design doesn’t deal with congestion or loss Periodic broadcasts of interest reduces network lifetime Nodes within range of human operator may die quickly
  • 30. Conclusions Directed diffusion, a paradigm proposed for event monitoring sensor networks Energy efficiency achievable Diffusion mechanism resilient to fault tolerance Conservative negative reinforcements proves useful More thorough performance evaluation is required MAC for sensor networks needs to be designed carefully for further performance gains