1 / 75

Routing in Sensor Networks

Explore the ARRIVE algorithm for robust routing in sensor networks, ensuring energy-efficient data dissemination and secure data delivery. Learn about the advantages, disadvantages, terms, and assumptions of this algorithm.

stevensims
Download Presentation

Routing in Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Routing in Sensor Networks

  2. Why Routing? • Routing means carrying data packets from a source node to a destination node (usually called sinks in sensor networks terminology) • Such routing paths helps to create energy-efficient data dissemination paths between sources (sensors) and sinks (global processing unit or human interface devices) • Two kinds of routing: single-path and multi-path • Since energy efficiency is the most essential factor, routing algorithms must be robust to failures and secure against the compromised and malicious nodes to ensure data delivery without impacting the lifetime of the network

  3. Algorithm for Robust Routing in Volatile Environments (ARRIVE) [Karlof+, 2002] • Probabilistic algorithm and makes packet forwarding decisions based on localized information • Based on a tree-like topology rooted at the sink of the network • Uses forward approach to contribute to end-to-end reliability • Avoids packet loss by sending multiple packets of the single event • Three sources of packets loss expected: • Isolated link • Patterned node failures • Malicious or misbehaving nodes

  4. ARRIVE [Karlof+, 2002] • Terminology • Event: Identified by [SourceID, EventID] • Level: Each node has unique level indicating distance from source to sink (in terms of hops) • Parents: Nodes one level closer to the sink • Neighbors: Nodes on the same level and be able hear each other • Push: Push packet to one of the neighbors • Forward: Forward packet to one of the parents • Forwarding Probability: Included in the packet header and used to probabilistically select whether to push or forward • Reputation History: Each node keeps this information for each of its parents and neighbors • Convergence: Prevents multiple packets of the same event being sent to same source of failure

  5. ARRIVE [Karlof+, 2002] • Achieves diversity in paths in two ways: • Upon receiving a packet, the next hop is selected probabilistically based on link reliability and node reputation • When more than two or more packets of the same event are processed, these packets are ensured to follow different outgoing links • Takes advantage of passive participation and needs to be used cautiously • Each nodes keeps the following information: • Level • Neighbors list • Parents list • Reputation history of neighbors and parents • Convergence history of specific events

  6. ARRIVE [Karlof+, 2002] • Assumptions • The networks is assumed to be dense enough that sufficient multiplicity of paths between sources and sink for algorithm to perform well • The network is almost considered as a static network • Sensors are considered to have a low per-node cost • Routes used by the packets are unlikely to be optimal due to the probabilistic nature of the algorithm • Messages flow from nodes to sink, not the other way around • There is only one sink available • Performance Metrics • Event delivery ratio • Three other metrics measuring the cost of deploying ARRIVE

  7. ARRIVE [Karlof+, 2002] • Algorithm Description • Bread first search rooted at sink is used to initialize level, parents, neighbors state information at each node • When a nodes hears a packets, it checks to see if the packet is addressed for it • If so, threshold processing takes place. Nodes are filtered by their reputation and convergence history of the neighbors and parents • A decision needs to be made to either to choose to forward the packet to a parent or push it to one of its neighbors with the probability value found in the packet header. This is randomly determined by the forwarding probability function Pr(f). • Each node is weighed by their reputation. The destination is randomly selected from the rest of the nodes (since bad reputation nodes are eliminated) • If the the packet is forwarded to one of the parents, Pr(f) is not changed; however, its value is increased

  8. Algorithm for Robust Routing in Volatile Environments (ARRIVE) [Karlof+, 2002] Figure 0: Overview of ARRIVE Adapted from [Karlof+ 2002]

  9. ARRIVE [Karlof+, 2002] • Advantages: • High end-to-end reliability • Provides security by eliminating the compromised or malicious nodes • By using multiple paths to forward the same event, the probability of the event reaching sink is increased and this also ensures to avoid packets being forwarded to the same broken link • Reputation history assists in establishing a reliable path

  10. ARRIVE [Karlof+, 2002] • Disadvantages: • Extra power consumption for inactive nodes (passive listeners) are not considered • Better mechanism to take care problems caused by passive listening • There is only one sink, packets are sent from sources to sink and not the other way around • Sensor may have storage problems due to maintaining information about its neighbors and parents (reputation history) • Maintaining multiple paths requires more resources

  11. ARRIVE [Karlof+, 2002] • Suggestions/Improvements/Future Work: • Beneficial to measure how much passive listening affects energy use • Nodes can be mobile during the simulation instead of static • If there is a significant mobility, state information should be updated using a better mechanism than flooding • Explanation of how multiple packets are generated • How much redundant data is sufficient to optimize the network • Energy-awareness needs to be taken into consideration • Possibly use energy level parameter in the decision making • Include probabilistic analysis of the algorithm • Study the tradeoff the communication cost of ARRIVE vs. its robustness • Consider load balancing issues such that nodes near the sink deplete their resources sooner than nodes farther away • Lack of quantitative analysis of passive participation for security reasons • Experiment with larger number of events

  12. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002] Preliminaries • Each node has its neighbor list, and an events table, with forwarding information to all the events it knows. • After a node witnesses an event, an agent may be created, which is a long-lived packet and travels around the network. Each agent contains an events table, including the routing information for all events it knows. • Since an event happens in a zone, composed of several or many nodes, it’s possible more than one agents are created from the zone and moving in the network.

  13. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002] Algorithm Description • When a node observes an event, it will add the event to its event table and may also create an agent • An agent will travel in the network and its routing table will be updated if there is a shorter path to an event within the routing table of the node it is visiting • In a similar way, the routing table of the currently visited node will be updated if its route to an event is more costly than the agent’s • Any node may generate a query for a particular event. If it knows the route to the event, it will transmit the query. Otherwise, the query will be sent in a random direction, and this continues until the query reach a node which has a route to the event

  14. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002] Adapted from [Braginsky+ 2002]

  15. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002] Figure 3: The agent modifies the exist path (left) to a more optimal one (right) Adapted from [Braginsky+ 2002]

  16. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002] Advantages: • Deliver queries to events in large networks with less average cumulative hops and lower energy requirements than simple flooding. • The algorithm can handle node failure gracefully, degrading its delivery rate linearly with the number of failed nodes.

  17. Rumor Routing Algorithm for Sensor Networks [Braginsky+ 2002] Disadvantages: • The path found by the agent sometimes is not the shortest and could be unavailable if one of the links of the path is broken. • The agent may carry lots of routing information of events even some events have disappeared. • No hints from the paper about the number of agents which should be created from the event zone. • Can the nodes make a query for an event if no such event is existing in the network? • It seems that each event should have an id, but no information is provided in the paper. • Optimization is not considered

  18. A Stream Enabled Routing (SER) Protocol for Sensor Networks [Weilian+, 2002] • SER protocol allows sources to choose the routes based on the instruction (or task) provided by the sinks • An instruction is a predefined as an identifier value instead of attributes being assigned to task as in the case of directed diffusion [Intanagonwiwat + 2000]. Therefore, only identifier is sent rather than the attribute list, resulting in memory conservation • It takes into account the available energy of the sensor nodes, QoS requirements of the instruction, memory limitation of nodes, and the localized effect of dense nodes • Sinks can give new instructions to the sources without establishing another path

  19. SER [Weilian+, 2002] • Benefits of dynamic set-up of routes include: • Periodic updates of routes is not needed • Adapts to failures and cope with topology changes • No routing table is needed at each sensor node • New sensor nodes can be added into the route selection • The routes are determined based on the QoS requirements of sources • Four types of communications are allowed: one-to-one, one-to-many, many-to-one and many-to-many • Four types of messages are used: • Scout message (S-message) • Information message (I-message) • Neighbor-neighbor message (N-message) • Update message (U-message)

  20. SER [Weilian+, 2002] • SER Overview • SER has seven phases: • Source Discovery • Route Selection • Route Establishment • Route Reconnection • I-message Transmission • Instruction Update • Task Termination • S-message is used during the source discovery to determine sources that will process the instruction (or task) specified in the S-message • Sources decide the type and level of the routes needed by the instruction • There are four types of routes, each with two levels (i.e., level-1 and level-2) • The µ value is the radius of the level-2 routes

  21. SER [Weilian+, 2002] • SER Overview • Stream: Identified by both the type and the level of route • Each level-2 stream includes level-1 stream • In level-2, the size of the radius µ of the stream can be determined based on QoS specified in the instruction • Combination of types and levels creates different kinds of QoS for a stream • After streams are chosen, the source sends N-message to establish the streams back to the sink • The repairs of streams are accomplished via N-message and S-message • Once the streams are accomplished, data travels from sources to the sink through either level-1 or level-2 stream with I-message • The sink can update the instruction (or task) at the sources through either level-1 or level-2 stream using U-message • Both sources and sink can terminate the streams using U-message

  22. SER [Weilian+, 2002] TID NAP LID NH AE NHi-1 * AEi-1 + Ei AE = NHi-1 + 1 • 1. Source Discovery • A sink broadcasts an S-message to find routes from sink to source • S-message contains the following fields: TID: Task ID NAP: Network Access Point (indicates where the instruction is originated; represents a unique sink) LID: Local ID (each node has a local ID that is randomly selected from a set) NH: Number of hops from the sink AE: Average energy of a route

  23. SER [Weilian+, 2002] LI MT INS TLOC • 1. Source Discovery • TID has the following fields: LI: Length indicator MT: Message type (MT=0 (S-message); MT=1 (I-message); MT=2 (U-message); MT=3 (N-message); INS: Instruction (Maps a numeric value to a specific instruction) TLOC: Targeted location • When a sensor node receives an S-message, it determines if the instruction (INS) is intended for the node • If the INS in the S-message is not intended for the node, the node stores the fields of S-message in a connection-tree (C-tree)

  24. SER [Weilian+, 2002] • 1. Source Discovery • C-tree is a logical tree which represents possible connections through the node. C-tree maintains the node’s neighbors that can participate in a routing back to sink • DSP: Downlink Sensor Problem (indicates if the downlink sensor node is having problem in routing I-message) • NS: Node Selected (indicates if the node is selected for routing) • DLID: LID of downlink sensor node (store the LID value of neighbor node which will route the I-message back to sink) • ULID: LID of uplink sensor node (U-message can be forwarded to sources from the sink or route reconnection is possible using N-message) • A sensor node in an established route knows the LID values of both uplink and downlink nodes • Initially, DLID and ULID values are not set and DSP and NS values are set to OFF • Updated values of AE, NH and LID fields of S-message is broadcast to neighbors

  25. SER [Weilian+, 2002] • 1. Source Discovery • If sensor node receive the same S-message from its neighbors, it dismisses it • The sources store S-message in a task-tree (T-tree) • T-tree has XDLID values since source can select up to XLIDs to route I-message back to the sink based on QoS requirement • The max value of x is the number of neighbor nodes • Each DLID value corresponds to a DSP indicator • In the T-tree, the leaf nodes has no ULID and NS indicator since sources are destination of S-message • A source can receive xS-message since it has x neighbors • Route associated with the first received S-message is considered shortest route • Sources selects neighbor node to send I-message back to sink based on the QoS requirement of INS

  26. SER [Weilian+, 2002] TID NAP LID SLID MES • 2. Route Selection • Once the sources receive the S-message, they determine the QoS requirement of task in the S-message • There are four types of streams for communication between sources and sinks and each stream can either be level-1 or level-2: • Type 1: Time Critical But Not Data Critical • Type 2: Data Critical But Not Time Critical • Type 3: Not Time and Data Critical • Type 1: Data and Time Critical • After the sources select the neighbor nodes, the sources broadcast an N-message to their neighbors indicating the level and size of the stream • N-message contains the following fields: SLID: Selected ID MES: Message

  27. SER [Weilian+, 2002] • 2. Route Selection • If stream is level-1, µ = 0 (width of the stream) • At level-1, messages are routed back to the sink via hop-by-hop communication. Message are sent to only one node • Level-2 stream contains level-1 stream which serves as a backbone in setting up level-2 stream • The value of µ is the number of hops away from the nodes in the level-1 stream • Messages can flow downhill to the sink or uphill to the sources by flooding through only the nodes that are part of the stream • I-message flows downhill from sources to sink by using NH value stored in each node in the C-tree • The nodes near to the sources have higher NH values • U-message flows uphill from sink to sources by using the negative of NH value • The nodes near to the sources have higher negative NH values

  28. SER [Weilian+, 2002] TID FI CNH Payload • 3. Route Establishment • N-message is used by a sensor node to inform neighbors about its local information • The source sends an N-message to establish stream back to the sink • Sensor nodes that are not part of a stream delete all data associated with N-message from C-tree • If intermediate nodes between the sources and sinks have not received an N-message in response to S-message in a set time interval, the sensor node deletes the C-tree branch that is associated to S-message • After the N-message arrives to the sink, the minimum delay or maximum average energy stream is established • Sources can start sending I-messages to the sink • I-message contains the following fields: FI: Flow Indicator (message going uphill or downhill) CNH: Current number of hops Payload: Description

  29. SER [Weilian+, 2002] • 4. I-message Transmission • The neighbor nodes can determine if they need to route the I-message by the TID since each neighbor nodes maintain a C-tree • When a source broadcasts I-message, it sends CNH field with the value from T-tree • Intermediate nodes between sources and sink use C-tree • FI and CNH fields are only used when the stream is level-2 • Each node only rebroadcasts once to avoid a node from broadcasting the same message over again • After an I-message is received, the sensor nodes turns OFF the receiver for some amount of time if the sleep mode operation is ON such that the node can avoid listening neighbors broadcasting the same I-message • C-tree indicates which instructions the sensor nodes need to route

  30. SER [Weilian+, 2002] • 5. Route Reconnection • If a sensor node is low on energy or there is too much noise around when transmitting at level-1, it can broadcast an N-message by setting up reconnect message indicator • Once the neighbors receive N-message, they check their C-tree to decide if there are possible alternate routes • N-message will be broadcasted until the alternate route is found • Sudden Death of Route • If the stream suddenly terminates, sink cannot get the I-messages • The sink sends out a new S-message with higher QoS requirement version of the same instruction (higher QoS INS value) • New streams can be found to avoid broken paths • Multiple streams of level-2 can be setup between source and sink to improve robustness of I-message routing

  31. SER [Weilian+, 2002] TID FI CNH NINS • 6. Instruction Update • U-message allows sink to update its instruction to the sources • The U-message from the sink to the sources flow uphill while it flows downhill from sources to the the sink when streams are level-2 • U-message contains the following fields: NINS: New INS • 7. Task Termination • A task at the sources are terminated in two ways: • Sources have finished the task associated with the instruction given by sink • U-message with the task completed instruction indicator is broadcast by sources • Sink decides to terminate the instruction • U-message with the task termination instruction indicator is set by the sink • The streams are torn down by removing C-tree braches at the intermediate nodes and T-tree at the sources

  32. SER [Weilian+, 2002] • Advantages: • QoS requirements of the instruction is considered • Average energy of the routes are taken into consideration in routing • Robustness is achieved through selection of level-1 and level-2 streams • After the route is established, sink can give new instructions to the sources without setting up another route • Four types of communication is supported: one-to-one, one-to-many, many-to-one, and many-to-many • Disadvantages: • Storage and computation cost at the nodes • Loops can form in level-2 streams • How to set the value of µ

  33. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Introduction • This paper proposes a multipath routing to increase resilience to node failure • Even though multipath routing techniques have been discussed in the literature, application of multipath routing to sensor networks that permit data-centric routing with localized path setup has not been studied too much • Two different approaches to construct multipaths between two nodes have been considered • Classical node-joint multipath adopted by prior work, where the alternate paths do not intersect the original path or each other. The disjoint property ensures that when k alternate paths are constructed, no set of k node failures can eliminate all the paths • Another approach is building many braided paths. With this approach, there are usually no completely disjoint paths, instead, there may be many partially disjoint alternate paths

  34. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Two issues are addressed: • The paper defines localized algorithms for the construction of alternate paths. In order to achieve robustness and energy-efficiency, sensor network data dissemination mechanisms use localized decisions for path setup and recovery from failure • The relative performance of disjoint and braided multipaths are evaluated using two metrics: resilience and maintenance overhead. The resilience of a scheme measures the possibility of when the shortest path has fails, an alternate path is available between source and sink. The maintenance overhead of a scheme is a measure of the energy required to maintain these alternate paths using period keep-alives. There is a tradeoff between these two metrics – becoming more resilient generally consumes more energy

  35. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Disjoint and Braided Multipaths • A. Sensor Networks: • Due to compact form factor of the sensor nodes and their low cost, packed cluster of sensor nodes can be densely deployed, near the phenomena to be sensed. • The advantage would be to still obtain high SNR (signal generated by any physical phenomena attenuates with distance) with cheap sensors. • Additionally, an individual sensor may not have to frequently perform multi-target resolution (i.e., distinguish between different targets such as individuals and vehicles) • Such multi-target resolution can involve complex deconvolution algorithms requiring non-trivial processing capability [Pottie+ 2000]

  36. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Disjoint and Braided Multipaths • A. Sensor Networks: • Three criteria drive the design of large-scale sensor networks: • Scalability • These networks may involve thousands of nodes • Energy-efficiency • Wireless communication can have much higher energy cost than computation [Pottie+ 2000] • Robustness • To environmental effects and link failures

  37. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Disjoint and Braided Multipaths • B. The Problem: • Previous work, directed diffusion [Intanagonwiwat + 2000] constructs dissemination paths from multiple sinks to multiple sources. Here, multipath dissemination from a single source to a single sink is considered • The solution which constructs energy-efficient paths on-demand works as follows: • A source of sensory data periodically broadcasts (at a low rate) about events describing the detection of the external phenomena that is being sensed • Upon receiving multiple copies of these events, the sink sends a reinforcement message to one of its neighbors stating that it prefers to receive notification of detection of events at a higher frequency from this neighbor (Figure 4(a))

  38. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Disjoint and Braided Multipaths • B. The Problem: • This enforcement message is propagated to the source via hop-by-hop. Each node makes and independent, local decision about which of its neighbors it chooses to forward the reinforcement (Figure 4(b)). As it propagates, the reinforcement message implicitly sets up a data path in the reverse direction. At each node, the reinforcement message sets up state that forwards matching data towards the previous hop • When a node in the reinforcement path fails (Figure 4(c)), the sink detects an absence of detection events and reinitiates reinforcement. The sink must periodically send reinforcement messages

  39. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] Disjoint and Braided Multipaths B. The Problem: Figure 4: A Simplified schematic for Directed Diffusion Adapted from [Ganesan+ 2002]

  40. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Disjoint and Braided Multipaths • B. The Problem: • The main problems considered in this paper are: • For energy-efficiency reasons, paths are constructed on-demand rather than proactively • For robustness reasons, a periodic low-rate flooding scheme notifies the sink and other nodes of available alternate paths. The periodicity of flooding determines the temporal accuracy of alternate path characteristics • The major drawback of this scheme, from energy-efficiency point of view, is the periodic flooding of low-rate events

  41. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Disjoint and Braided Multipaths • B. The Problem: • This paper considers mechanisms that allow restoration of paths from source to sink without the periodic flooding • These mechanisms are based on some observations: while setting up the path between a source and sink, it may be possible to set up and maintain alternate paths in advance (with some extra energy) to minimize the possibility of having to invoke data flooding for alternate path discovery

  42. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Multipath Routing • The multipath routing allows the establishment of multiple paths between source and destination • The reasons for classical multipath routing are: • Load balancing -- traffic between a source-destination pair is divided across multiple (partially or completely) disjoint paths • Increase the possibility of reliable data delivery • In these approaches, the multiple copies of data are sent along different paths • Both of these reasons of classical multipath are still applicable in wireless sensor networks • load balancing can distribute energy utilization across nodes in the network, possibly resulting in longer lifetimes • duplicate data delivery along multiple paths allows more accurate tracking in surveillance application with an additional energy usage

  43. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Multipath Routing • The focus of this paper is to find alternate paths between source and sink with the help of multipath routing • The rationale of using multipath can be described as: • The goal of localized reinforcement based mechanisms is to empirically (i.e., by measuring short-time traffic characteristics) establish best path (i.e., low latency, low packet loss, etc). • Primary path is used to represent this best path. From the application’s perspective, the goal is to deliver data along this primary path. • To recover from failure of this primary path, a small number of alternative paths are constructed and maintained without using period flooding in case the primary path fails • When the primary path is set up, the network also sets up the multipaths along which data is sent at a low-rate

  44. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Multipath Routing • This low-rate data represent energy expended for maintaining multipaths and the term maintenance overhead denotes this energy. The low-rate data represent keep-alives on the alternate paths • When failure is detected on the primary path, nodes can rapidly reinforce an alternate path without initiating route discovery thru flooding • In case of the failures on the primary path and on all the alternate paths simultaneously, the source or sink initiates network-wide flooding of data to re-establish the multipath • This paper considers two possible multipath routing: • Disjoint • Braided

  45. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Multipath Routing • This paper addresses two issues: • It is not obvious what localized mechanisms may be used to construct disjoint and braided paths • Disjoint and braided multipath trade energy for resilience differently • Disjoint Multipaths • Construct a small number of alternate paths that are node-disjoint with the primary path and with each other • These alternate paths are independent of the failures on the primary path; however, they can be less desirable (i.e., high latency, low throughput, etc)

  46. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] • Disjoint Multipaths • The definition of k node-disjoint multipath is: • Construct the primary path P between source and sink • The first alternate disjoint path P1 is the best path node-joint with P • The second alternate disjoint path P2 is the best path that is a node-disjoint with P and P1, and so on • This definition assumes global knowledge of topology and network characteristics; there this is called idealized algorithm for constructing disjoint paths and the corresponding multipath is called idealized k-disjoint multipath • The question is how can we obtain node disjoint multipaths using local information only without global topology information?

  47. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] Source Sink Low-rate samples • Disjoint Multipaths • Assume that some low-rate sample have initially been flooded throughout the network (Figure 5(a)) • The sink has some empirical information about which of its neighbors can provide it with the highest quality of data (lowest loss or lowest latency) (a) Low-rate samples Figure 5: Construction of Localized Disjoint Paths Adapted from [Ganesan+ 2002]

  48. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] Source Sink Primary-path reinforcement • Disjoint Multipaths • To this most preferred neighbor, it sends out a primary-path reinforcement (Figure 5(b)) • Similar to basic directed diffusion scheme, that neighbor locally determines its most preferred neighbor in the direction of the source and so on (b) Primary-path P Figure 5: Construction of Localized Disjoint Paths Adapted from [Ganesan+ 2002]

  49. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] Source Sink B alternate-path reinforcement negative reinforcement A • Disjoint Multipaths • After it starts receiving data along the primary path or after sending the primary-path reinforcement, the sink sends an alternate path reinforcement to its next most preferred neighbor. This neighbor A propagates the alternate path reinforcement to its most preferred neighbor B in the direction of the source. (c) Alternate-path Negative Reinforcement Figure 5: Construction of Localized Disjoint Paths Adapted from [Ganesan+ 2002]

  50. Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Networks [Ganesan+, 2002] Source Sink P P1 • Disjoint Multipaths • If B can determine from local state that it is already on the primary path between source and sink, it sends a negative reinforcement to A (Figure 5(c)) • A then selects its next best preferred neighbor; otherwise, B propagates the alternate path reinforcement to its most preferred neighbor and so on (Figure 5(d)) (d) Alternate-path P1 Figure 5: Construction of Localized Disjoint Paths Adapted from [Ganesan+ 2002]

More Related