1 / 37

Bounding the Lifetime of Sensor Networks Via Optimal Role Assignments

Bounding the Lifetime of Sensor Networks Via Optimal Role Assignments. Manish Bhardwaj, Anantha Chandrakasan Massachusetts Institute of Technology June 2002. B. r. Data Gathering Wireless Networks: A Primer. Sensor. Relay. Aggregator. Asleep. R. Network Characteristics.

ossie
Download Presentation

Bounding the Lifetime of Sensor Networks Via Optimal Role Assignments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Bounding the Lifetime of Sensor Networks Via Optimal Role Assignments Manish Bhardwaj, Anantha Chandrakasan Massachusetts Institute of Technology June 2002

  2. B r Data Gathering Wireless Networks: A Primer Sensor Relay Aggregator Asleep R

  3. Network Characteristics • Sensor Types: Low Rate (e.g., acoustic and seismic) • Bandwidth: bits/sec to kbits/sec • Transmission Distance: 5-10m (< 100m) • Spatial Density • 0.1 nodes/m2 to 20 nodes/m2 • Node Requirements • Small Form Factor • Required Lifetime: > year Maximizing network lifetime is a key challenge

  4. Processed Sensor Data “Raw” Sensor Data Analog Sensor Signal Radio+ Protocol Processor DSP+RISC +FPGA etc. Functional Abstraction of DGWN Node Sensor+ Analog Pre-Conditioning A/D Sensor Core Computational Core Communication & Collaboration Core

  5. d Etx = a11+ a2dn n = Path loss index Transmit Energy Per Bit • Transceiver Electronics • Startup Energy Power-Amp Erx = a12 Receive Energy Per Bit d Erelay = a11+a2dn+a12 = a1+a2dn Prelay = (a1+a2dn)r Relay Energy Per Bit Sensing Energy Per Bit Esense = a3 Eagg = a4 Aggregation Energy Per Bit Energy Models

  6. r A d B The Role Assignment Problem: Jargon • Node Roles: Sense, Relay, Aggregate, Sleep • Role Attributes: • Sense: Destination • Relay: Source and Destination • Aggregate: Source1, Source2, Destination • Sleep: None • Feasible Role Assignment: An assignment of roles to nodes such that valid and non-redundant sensing is performed

  7. B Feasible Role Assignment 11 1 6 2 5 15 12 13 7 8 14 4 3 9 10 FRA: 1  5  11  14  B

  8. B Infeasible Role Assignment (Redundant)

  9. B Infeasible Role Assignment (Invalid)

  10. B Infeasible Role Assignment (Invalid)

  11. B Infeasible Role Assignment (Invalid)

  12. B Infeasible Role Assignment (Redundant)

  13. B Feasible Role Assignment 11 1 6 2 5 15 12 13 7 8 14 4 3 9 10 FRA: 1  5  11  14  B; 2  3  9  14  B

  14. B Infeasible Role Assignment

  15. B B B 5 4 3 2 1 5 4 3 2 1 Enumerating FRAs (Collinear Networks) 5 4 3 2 1 • Collinear networks: All nodes lie on a line • Flavor being considered: Sensor given, no aggregation (Max Lifetime Multi-hop Routing) • Property: Self crossing roles need not be considered

  16. B Enumerating Candidate FRAs 5 4 3 2 1 • Property allows reduction of candidate FRAs from (N-1)! to 2N-1 R0: 1  B R1: 1  2  B R2: 1  3  B R3: 1  4  B R4: 1  5  B R5: 1  2  3  B R6: 1  2  4  B R7: 1  2  5  B R8: 1  3  4  B R9: 1  3  5  B R10: 1  4  5  B R11: 1  2  3  4  B R12: 1  2  3  5  B R13: 1  2  4  5  B R14: 1  3  4  5  B R15: 1  2  3  4  5  B

  17. B Collaborative Strategy • Collaborative strategy is a formalism that precisely captures the mechanism of gathering data • Is characterized by specifying the order of FRAs and the time for which they are sustained • A collaborative strategy is feasible iff it ends with non-negative energies in the nodes R2, t0 R13, t1 R15, t2 R2, t4 R6, t5 R11, t8 R2, t9 R11, t10 R0, t3 R8, t6 R5, t7 5 4 3 2 1

  18. Canonical Form of a Strategy • Canonical form: FRAs are sequenced in order. Some FRAs might be sustained for zero time • It is always possible to express any feasible collaborative strategy in an equivalent canonical form Ra0, t0 Ra1, t1 Ra2, t2 Ra4, t4 Ra5, t5 Ra8, t8 Ra9, t9 Ra10, t10 Ra6, t6 Ra3, t3 Ra7, t7 R0, t’0 R2, t’2 R6, t’6 R7, t’7 R9, t’9 R10, t’10 R12, t’12 R14, t’14 R1, t’1 R3, t’3 R5, t’5 R8, t’8 R11, t’11 R13, t’13 R15, t’15 R4, t’4 Canonical Form

  19. The Role Assignment Problem • How to assign roles to nodes to maximize lifetime? • Same as: Which collaborative strategy maximizes lifetime? • Same as: How long should each of the FRAs be sustained for maximizing lifetime (i.e. determine the t’ks)? • Solved via Linear Programming: Objective: subject to: [Non-negativity of role time] [Non-negativity of residual energy]

  20. B Persistent Optimal Min-hop R0: 0.09 R1: 0.23 R2: 0 R3: 1.0 R0: 0 R1: 0.375 R2: 0.375 R3: 0.625 R0: 0.25 R1: 0 R2: 0 R3: 0 Min-Energy R0: 0 R1: 0 R2: 1.0 R3: 0 1.32 1.38 0.25 1.0 Example dchar dchar/2 dchar/2 3 2 1 R0: 1  B R1: 1  2  B R2: 1  3  B R3: 1  2  3  B Total Lifetime

  21. Strategy • Polynomial time separation oracle + Interior point method • Transformation to network flows • Key observation (motivated by Tassiulas et al.) Broad class of RA problems can be transformed to network flow problems Network flow problems solved in polynomial time Flow solution  RA solution in polynomial time

  22. B B Equivalence to Flow Problems Role Assignment View 3/11 3/11 3/11 R0: 0 (0) R1: 0.375 (3/11) R2: 0.375 (3/11) R3: 0.625 (5/11) 3 2 1 1.375 (11/11) 5/11 5/11 3/11 3/11 Network Flow View 3/11 + 3/11 3/11 3/11 + 5/11 f12: 8/11 f13: 3/11 f1B: 0 f23: 3/11 f2B: 5/11 f3B: 6/11 3 2 1 5/11 3/11

  23. Equivalent Flow Program

  24. B Extensions to k-of-m Sensors • Set of potential sensors (S), |S| = m • Contract: k of m sensors must sense • Flow framework easily extended • Total net volume emerging from nodes in S is now k • Constraints to prevent monopolies • Constraints to prevent consumption S

  25. k of m sensors Program (additional constraints)

  26. B B 2-Sensor Example 3/11 Single Sensor Lifetime 1.375 s R0: 0 (0) R1: 0.375 (3/11) R2: 0.375 (3/11) R3: 0.625 (5/11) • Sensing time divided equally between 1a and 1b • Note the complete change in optimal routing strategy 3 2 1 1.375 (11/11) 5/11 3/11 2/15 2 Sensor Lifetime 1.816 s R0: 0.246 (2/15) R1: 0.615 (5/15) R2: 1.0 (8/15) R3: 0 (0) 1a 3 2 1b 1.816 (15/15) 5/15 8/15

  27. B Extensions to Aggregation 3 2 1 • Flavor: 1 and 2 must sense, aggregation permitted • Roles increase from 2N-1 to 3.(2N-2)2 (for N-node collinear network with two assigned sensors) R0: 1  B; 2  B R1: 1  2  B; 2  B R2: 1  3  B; 2  B R3: 1  2  3  B; 2  B R4: 1  B; 2  3  B R5: 1  2  B; 2  3  B R6: 1  3  B; 2  3  B R7: 1  2  3  B; 2  3  B R8: 1  2  B; 2  B R9: 1  2  3  B; 2  3  B R10: 1  3  B; 2  3  B R11: 1  2  3  B; 2  3  B Non-Aggregating FRAs Aggregating FRAs

  28. B Aggregation Example • Aggregation energy per bit taken as 180 nJ • Total lifetime is 1.195 (1.596 for 0 nJ/bit, 0.8101 for  nJ/bit) • It is NOT optimal for network to aggregate ALL the time • The aggregator roles shifts from node to node 3 2 1 R8: 1  2  B; 2  B (56%) R10: 1  3  B; 2  3  B (20%) R6: 1  3  B; 2  3  B (20%)

  29. Aggregation Flavors 9 8 B 10 3 9 8 1 2 3 4 5 6 7 4 3 11 8 4 1 2 5 6 7 1 2 5 6 7 2-Level Flat General

  30. Flat and 2-Level are Poly-Time • Key Idea: Multicommodity Flows • Two classes of bits: • Bits destined for aggregation • Bits not destined for aggregation • Already aggregated • Never aggregated • Total of P+1 commodities 0 P-2 P-1 P

  31. Multiple Sources • Constraints non-trivial due to possible overlaps … B

  32. Key: Virtual Nodes • Constraints as before (but using virtual nodes when there are overlaps) • Virtual nodes connected via an overall energy constraint B

  33. Probabilistic Extension • Single source, but lives at A, B and C probabilistically • Discrete source location pmf • What is the lifetime bound now? • Previous program except weigh the flow by the probability C B A B

  34. Extensions to Arbitrary PDFs • Given topology and the source location pdf how can we derive a lifetime bound? • No more difficult than the discrete problem … B R

  35. Key: Partitioning R b • Partition into sub-regions (a through k) • Every point in a sub-region has the same S • Calculate the probabilities of all the sub-regions • Same as the discrete problem! 1 c 3 B g e f d 2 j i h l 4 k 5 a R

  36. Reduction to discrete probabilistic source • Growth of number of regions • For fixed density and r, grows linearly with the number of nodes B R

  37. “Future Work” • PDFs of lifetime using PDFs of input graphs • Lifetime loss in the absence of an oracle • Multiple access issues • Translating optimal role assignment into feasible data gathering protocols

More Related