1 / 21

SAFE (Sinks Accessing data From Environments)

SAFE (Sinks Accessing data From Environments). Authors: Sooyeon Kim, Sang H. Sony, John A. Stankovicy, Shuoqi Liy, Yanghee Choi Presented by: Chih-Ping Chou. SAFE. A Data Dissemination Protocol for Periodic Updates in Sensor Networks

anne-cash
Download Presentation

SAFE (Sinks Accessing data From Environments)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SAFE (Sinks Accessing data From Environments) Authors: Sooyeon Kim, Sang H. Sony, John A. Stankovicy, Shuoqi Liy, Yanghee Choi Presented by: Chih-Ping Chou

  2. SAFE • A Data Dissemination Protocol for Periodic Updates in Sensor Networks • Attempts to save energy through data dissemination path sharing among multiple data sinks.

  3. Why SAFE? • It's a heavy load to construct grid networks per data source. • It's infeasible to let every potential data source keep flooding their measurement before any explicit user requests. • Complicated setup phase of grid construction • Long-term comparison between multiple data delivery paths

  4. Protocol design criteria • Immediate deployment • Adaptability • Fast response to data requests • Energy efficiency

  5. Data dissemination in a two-tiered network • Stationary sensor nodes • Mobile data users

  6. Environmental model • ATMEL 90LS8535 processor • 8 KB flash program memory • 512 byte SRAM data memory • RF Monolithic 916.50 MHz transceiver • Photo/Temperature sensors

  7. Proposed Protocol

  8. Data management table

  9. Query transfer recvQuery(q) 1 if isRecentlyDealtWith (q) 2 then return 3 saveQueryAsRecentOne (q) 4 if isSource (q) 5 then sendPathSetup (sender(q)) 6 else if isJunction (q) 7 then sendJunctionInfo (sender(q)) 8 else if isApproachingToSource (q) 9 then forwardQueryToNextHop (q)

  10. Dissemination path setup recvPathSetup (p) 1 if destination (p) 6= myAddr 2 then if noEntryInDataManTable (p) 3 then e createEntry (p) 4 waitForAckFromSink (e) 5 else /* if the PathSetup p is destined for this node */ 6 then e findEntry (p) 7 if currState (e) = QUERY SENT 8 then sendAck (hopSender (p)) 9 changeMyState (e, SUBSCRIBE SENT) 10 else if currState (e) = FEEDBACK RCVD 11 then if bestFeedbackCost (e) > cost (p) 12 then saveAsBestFeedback (p)

  11. How SAFE establishes data delivery paths

  12. How SAFE establishes data delivery paths

  13. How SAFE establishes data delivery paths

  14. How SAFE establishes data delivery paths

  15. Conclusion • Energy efficiency • Scalability Both of which are crucial for large-scale battery-powered sensor networks

  16. Future work • Data aggregation that accumulates multiple data provision into a single hop-by-hop transfer • Timeliness

  17. Question?

More Related