250 likes | 260 Views
This study presents a low-cost flooding algorithm for efficient routing in wireless sensor networks, addressing issues such as redundant packets, contention, and energy wastage. The algorithm aims to form a Connected Dominating Set (CDS) by electing cluster-heads and generating connectors. Simulation studies validate the effectiveness of the algorithm.
E N D
Department of Electrical and Computer Systems Engineering Monash University, Australia A Low-Cost Flooding Algorithm for Wireless Sensor Networks WCNC 2007, Hong Kong Ou Liang, Ahmet Sekercioglu and Nallasamy Mani
Sections Flooding in WSNs. Our Low-Cost Flooding algorithm. Simulation study. Conclusion and future work.
Section 1 Section 2 Section 3 Section 4 Flooding in WSNs • Flooding is the simplest way of routing. It requires each node in the network to broadcast a packet upon receiving it for the first time. • Flooding is widely used in WSNs by many applications. Problems: • Redundant packets— nodes receive multiple copies of a packet. • Contention and collision — happen when using a contention MAC layer like IEEE 802.11. • Energy wastage — redundant retransmissions consume energy.
Section 1 Section 2 Section 3 Section 4 Redundant flooding S
Section 1 Section 2 Section 3 Section 4 An efficient way of flooding B S A C
Section 1 Section 2 Section 3 Section 4 Low-Cost Flooding Algorithm It aims to form a Connected Dominating Set (CDS) in a given network. It operates in two steps: • Elects cluster-heads (dominators). • Generates connectors to link all the dominators.
Section 1 Section 2 Section 3 Section 4 Electing dominators Initially, all nodes in the network mark themselves as white nodes, and only the nodes in the white node state participate dominator election. A node announces itself as the dominator if it has the largest node degree among its white node neighbors. Nodes that are covered by the dominators change their states to dominatees.
Section 1 Section 2 Section 3 Section 4 Dominator election example I Node | Node degree E D 6 A J H h 5 F T P 5 B D K Dominators are two hops or three hops apart from each other. C L P G O M N
Section 1 Section 2 Section 3 Section 4 Generating connectors Two types of connectors: • Active-Connector – selected by dominators • Passive-Connector – selected by dominators and active connectors. Passive-Connectors connect two-hop away dominators. Active-Connectors + Passive-connectors connect three-hop away dominators.
Section 1 Section 2 Section 3 Section 4 Connecting two-hop away dominators A dominator U selects a dominatee V as a passive-connector to connect two-hop away dominators based on two rules: • U has a bigger node ID than all its two-hop away dominators that are covered by V. • V covers the most number of two-hop away dominators of U.
Section 1 Section 2 Section 3 Section 4 Node A: { W} Node A: { V} Node B: { U, W } Node B: { U, V } Node B: { V, W } Selecting passive connectors Dominator W A W V Dominator V B I am a Passive connector Selected by W Dominator U U
Section 1 Section 2 Section 3 Section 4 Connecting three-hop away dominators Two steps to connect three-hop away dominators: • A dominator U selects an active-connector V. • Active-connector V selects other passive connectors to connect three-hop away dominators.
Section 1 Section 2 Section 3 Section 4 New definitions Special-dominatee: A dominatee V marks another dominatee W as a special dominatee if W has no shared one-hop dominator with V. Dominatee U and V have a shared dominator C. U Dominatee V and W have no shared dominators. C V W A V and W mark each other as the special-dominatees. B
Section 1 Section 2 Section 3 Section 4 New definitions Special-dominator: Dominatee V marks all the one-hop dominators of a special-dominatee W as the special-dominators. Dominatee V marks dominator A as the special-dominator. U Dominatee W marks dominator B and C as the special-dominators. C V W A B
Section 1 Section 2 Section 3 Section 4 New definitions Use D2(C) to represent the set of two-hop away dominators of a dominator C. Isolated-dominator: A dominator C marks a special-dominator A of dominatee V as the isolated-dominator if A is neither a two-hop away dominator of C, nor a two-hop away dominator of any node in D2(C). U C V W A B
Section 1 Section 2 Section 3 Section 4 Selecting active-connectors A dominator U selects a dominatee V as an active-connector if: • U has marked some isolated-dominator from V. • U has larger node ID than those marked isolated dominators. Dominator U will inform active-connector V about the isolated-dominators V needs to connect.
Section 1 Section 2 Section 3 Section 4 Selecting passive-connectors (by active-connectors) An active-connector V selects a dominatee W as the passive-connector if: • W connects to the most number of isolated-dominators. U C V W A Connect isolated-dominator A I am a passive-connector B
Section 1 Section 2 Section 3 Section 4 Simulation study
Section 1 Section 2 Section 3 Section 4 Simulation study Number of forwarding nodes generated
Section 1 Section 2 Section 3 Section 4 Simulation study Number of signaling messages generated
Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in bytes) R=15m
Section 1 Section 2 Section 3 Section 4 Simulation study Signaling message size (in bytes) R=25m
Section 1 Section 2 Section 3 Section 4 Conclusion and future work We have proposed a Low-Cost Flooding (LCF) algorithm for wireless senor networks. The algorithm aims to minimize the redundant retransmissions in the network by generating a Connected Dominating Set (CDS). Future work: • Design efficient routing protocols for sensor networks. • Implement a real world sensor network test bed.
Section 1 Section 2 Section 3 Section 4 Flooding protocol designing considerations • Scalability— flooding algorithms for WSNs need to be distributed and depends on localized information. • Simplicity — flooding algorithms need to be simple in both computation and communication. • Efficiency — flooding algorithms can dramatically reduce unnecessary redundant transmissions and save energy.