Technical Report Writing Final Report

Embed Size (px)

Citation preview

  • 8/3/2019 Technical Report Writing Final Report

    1/26

    December 9th, 2011

    To:

    Mr Abdul Waheed Haris

    Lecturer Technical Report Writing

    FAST-NUCES (Main Campus)

    Karachi

    Dear Sir,

    I have enclosed the Final Year Project Report of IEEE 802.15.4/ZigBee Network Lifetime

    Optimization.

    As I had predicted, the introduction of Cluster Heads or ZigBee Coordinators to the

    simulated network on OMNeT++ and adding a little more intelligence to them increased the

    network uptime by at least 10%. The details are discussed in the enclosed report. If the

    methodologies that I have discussed are implemented, it would be a great achievement for

    the WSN Committee to have an even better and efficient network at their disposal.

    It was a great honour working with you on this project.

    I would be available for contact on my email address if there are any queries regarding this

    project and/or project report.

    Thank You.

    Yours Sincerely,

    Usman Muhammad Nooruddin

    Roll Number: 07-0039

    Section A, BS (TE)

    Email Address: [email protected]

  • 8/3/2019 Technical Report Writing Final Report

    2/26

  • 8/3/2019 Technical Report Writing Final Report

    3/26

    NETWORK LIFETIME OPTIMIZATION OF

    IEEE 802.15.4/ZIGBEE

    National University of Computer and Emerging Sciences FAST

    Dated: December 9th

    , 2011

    Prepared By:

    Usman Muhammad NooruddinRoll Number: 07-0039

    Prepared For:

    Abdul Waheed HarisLecturer Technical Report Writing

  • 8/3/2019 Technical Report Writing Final Report

    4/26

    2

    [This page is intentionally left blank]

  • 8/3/2019 Technical Report Writing Final Report

    5/26

    3

    Table of Contents

    01. Abstract 4

    02. Summary 5

    03. Introduction 5

    04. Background 5

    05. Scope 6

    06. Applicable Documents 6

    07. Nomenclature / Definitions 7

    08. References 7

    09. Methodology 7

    10. Theory

    10.1 Evaluation of Low Rate Wireless Personal Area Network (LR-WPAN) Standardization

    10.2 Why is it called ZigBee?

    10.3 Device Types10.4 Network Topologies

    10.5 Architecture

    10.6 Network and Application Support Layer

    10.7 Physical (PHY) Layer

    10.8 Media Access Control (MAC) Layer

    8

    8

    8

    89

    10

    11

    11

    11

    11. Design Parameters 11

    12. Technical Requirements 12

    13. Assumptions 12

    14. Technical Description 13

    15. Instructions & Procedures 13

    16. Evaluations / Analysis 14

    17. Acceptance Criteria 14

    18. Results & Conclusion 15

    19. Discussion of Results 15

    20. Recommendations & Alternatives 15

    21. Bibliography 16

    22. Appendix

    Annealing Sensor Networks, Andrew Jennings and Daud A. Channa

    17

    18

    List of Figures:

    Figure 1: Star Topology 9

    Figure 2: Peer to Peer Topology 9

    Figure 3: Mesh Topology 10

    Figure 4: ZigBee Stack 10

    Figure 5: Proposed Scenario 12

    List of Graphs:

    Graph 1: Results 15

  • 8/3/2019 Technical Report Writing Final Report

    6/26

    4

    01. ABSTRACT

    IEEE 802.15.4 or ZigBee is a standards-based technology for remote monitoring, control and sensor

    network applications. The ZigBee standard was created to address the need for a cost-effective, standards-

    based wireless networking solution that supports low data-rates, low-power consumption, security, and

    reliability.

    Although the ZigBee Alliance employs enough intelligence for a network to grant ZigBee devices a long

    uptime, this report studies another method that can well increase the Network Lifetime up to 10% - 15%

    more than the conventional methods that are proposed by default. This is done by intelligently routing the

    packets from source to sink by looking at the LQI (Link Quality Indicator) of the link currently under

    consideration.

  • 8/3/2019 Technical Report Writing Final Report

    7/26

    5

    02. SUMMARY:

    This report focuses on the possibility of an introduction of a new protocol to route the packets from the

    ZigBee end-devices to the Monitoring station at the other end. A packet may have to pass many devices in

    between to reach the predefined destination. But, it all comes down to the cumulative intelligence of the

    network to route that packet efficiently from the source to the destination to save energy in this process.

    03. INTRODUCTION:

    The technology defined by the ZigBee specification is intended to be simpler and less expensive than other

    WPANs, such as Bluetooth. ZigBee is targeted at radio-frequency (RF) applications that require a low data

    rate, long battery life, and secure networking.

    This research report studies the implementation of a new Networking protocol that provides further

    intelligence to the ZigBee Coordinators so that they can well manage the routing of packets from source to

    sink.

    This report complies with the standards set by the IEEE 802.15.4.

    04. BACKGROUND:

    The IEEE 802.15.4 standard is a simple packet data protocol for lightweight wireless networks and specifies

    the Physical (PHY) and Medium Access Control (MAC) layers for Multiple Radio Frequency (RF) bands,

    including 868 MHz, 915 MHz, and 2.4 GHz. The IEEE 802.15.4 standard is designed to provide reliable data

    transmission of modest amounts of data up to 100 meters or more while consuming very little power.

    ZigBee technology takes full advantage of the IEEE 802.15.4 standard and extends the capabilities of this

    new radio standard by defining a flexible and secure network layer that supports a variety of architectures

    to provide highly reliable wireless communication. ZigBee technology also offers simplicity and a cost-

    effective approach to building, construction and remodelling with wireless technology. ZigBee is all set to

    provide the consumers with ultimate flexibility, mobility, and ease of use by building wireless intelligence

    and capabilities into every day devices.

    Thus, ZigBee technology is a low data rate, low power consumption, low cost, wireless networking

    protocol targeted towards automation and remote control applications.

    The focus of network applications under the IEEE 802.15.4 / ZigBee standard include the features of low

    power consumption, needed for only two major modes (Tx/Rx or Sleep), high density of nodes per

    network, low costs and simple implementation. These features are enabled by the following characteristics

    2.4GHz and 868/915 MHz dual PHY modes.

    This represents three license-free bands: 2.4-2.4835 GHz, 868-870 MHz and 902-928 MHz. The

    number of channels allotted to each frequency band is fixed at 16 channels in the 2.45 GHz band,

    10 channels in the 915 MHz band, and 1 channel in the 868 MHz band

    Maximum data rates allowed for each of these frequency bands are fixed as 250kbps @2.4 GHz, 40

    kbps @ 915 MHz, and 20 kbps @868 MHz.

    Allocated 16 bit short or 64 bit extended addresses.

    Allocation of guaranteed time slots (GTSs)

    Carrier sense multiple access with collision avoidance (CSMA-CA) channel access Yields highthroughput and low latency for low duty cycle devices like sensors and controls.

  • 8/3/2019 Technical Report Writing Final Report

    8/26

    6

    Fully hand-shake acknowledged protocol for transfer reliability.

    Low power consumption with battery life ranging from months to years.

    Energy detection (ED).

    Link quality indication (LQI).

    Multiple topologies : star, peer-to-peer, mesh topologies

    05. SCOPE:

    Increasing network lifetime is a great advantage to keeping the network up even under desolate

    conditions. We want the network to be robust and resistant to failure.

    Since the core markets include consumer electronics, energy management and efficiency, health care,

    home automation, telecommunication services, building automation and industrial automation, an

    increase in network lifetime would mean increase in efficiency of all the above mentioned and not leaving

    out the increase in revenue of the company due to a resistant to failure network.

    06. APPLICABLE DOCUMENTS:

    [1] LAN/MAN Standards Committee of the IEEE Computer Society, IEEE Standard for Information

    technology Telecommunications and information exchange between systems Local and

    metropolitan area networks Specific requirements Part 15.4: Wireless Medium Access Control

    (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks

    (WPANs), 2006.

    [2] Holger Karl and Andreas Willig, Protocols and Architectures for Wireless Sensor Networks, 2005

    John Wiley & Sons, Ltd. ISBN: 0-470-09510-5.[3] Shahin Farahini, ZigBee Wireless Networks and Transceivers, 30 September, 2008, NewNes

    Publishers, ISBN: 0-750-68393-7.[4] Andrs Varga, OMNeT++ User Guide for v4.2b2, May 5th, 2011.[5] INET Framework for OMNeT++ Manual, 2011.[6] The ZigBee Alliance, .[7] OMNeT++ in a Nutshell,

    [8] MiXiM,

  • 8/3/2019 Technical Report Writing Final Report

    9/26

    7

    07. NOMENCLATURE / DEFINITIONS:

    APL Application Layer

    FFD Forward Function Device

    LQI Link Quality Indicator

    LR-WPAN Low Rate Wireless Personal Area NetworkMAC Medium Access Layer

    Mote A ZigBee Coordinator

    Node A ZigBee End Device

    NWK Network Layer

    PAN Personal Area Network

    PHY Physical Layer

    QOS Quality of Service

    RFD Reduced Function Device

    WLAN Wireless Local Area Network

    WPAN Wireless Personal Area Network

    08. REFERENCES:

    [1] Andrew Jennings and Daud A. Channa, Annealing Sensor Networks, Lecture Notes in Computer

    Science, Volume 3684, Aug 2005, Pages 581 - 586.

    [2] Arun S., Seminar Report on ZigBee, September 2008.

    [3] Feng Chen and Falko Dressler, A Simulation Model of IEEE 802.15.4 in OMNeT++, 2006.

    [4] Feng Chen, Isabel Dietrich, Reinhard German and Falko Dressler, An Energy Model for SimulationStudies of Wireless Sensor Networks using OMNeT++, 2007.

    [5] Feng Chen, Nan Wang, Reinhard German and Falko Dressler, Performance Evaluation of IEEE

    802.15.4 LR-WPAN for Industrial Applications, 2008.

    [6] Sajjad Hussain Shah, Kashif Naseer, Wajid Ali, Sohail Jabbar, Abid Ali Minhas, Prolonging the

    Network Lifetime in WSN through Computational Intelligence, Proceedings of the World Congress

    on Engineering and Computer Science 2011 Vol I, WCECS 2011, October 19-21, 2011, San

    Francisco, USA.

    09. METHODOLOGY:

    The network lifetime of the ZigBee transceiver is obtained by simulating a ZigBee network on a network

    simulator. In this project we have opted for OMNeT++.

    The simulation is first performed first by turning off the sleep cycles and testing the transmissions and the

    energy consumed. Then the sleep cycles would be introduced and the energy consumed would be

    recorded. Lastly, the protocol that would be discussed in the theory would be introduced and the energy

    consumption would be recorded.

    A graphing utility would be used to plot the results of the energy consumed for every iteration of the test.

  • 8/3/2019 Technical Report Writing Final Report

    10/26

    8

    10. THEORY:

    The cellular network was a natural extension of the wired telephony network that became persistent

    during the mid-20th century. As the need for mobility and the cost of laying new wires increased, the

    motivation for a personal connection independent of location to that network also increased. Coverage of

    large area is provided through (1-2km) cells that co-operate with their neighbours to create a seamlessnetwork. Cellular standards basically aimed at facilitating voice communications throughout a metropolitan

    area. During themid-1980s, it turned out that an even smaller coverage area is needed for higher user

    densities and the emergent data traffic.

    10.1 Evolution of Low-Rate Wireless Personal Area Network (LR-WPAN) Standardization

    The IEEE 802.11 working group for Wireless Local Area Network (WLAN) was formed, to create a wireless

    local area network standard. Whereas IEEE 802.11 was concerned with features such as Ethernet matching

    speed, long range(100m), complexity to handle seamless roaming, message forwarding, and data

    throughput of 2-11 Mbps.

    Wireless personal area networks (WPANs) are used to convey information over relatively short distances.WPANs are focused on a space around a person or object that typically extends up to 10m in all directions.

    The focus of WPANs is low-cost, low power, short-range and very small size.

    The high data rate WPAN (IEEE 802.15.3) is suitable for multi-media applications that require very

    high quality of services.

    Medium rate WPANs (IEEE 802.15.1/Bluetooth) will handle a variety of tasks ranging from cell

    phones to PDA communications and have QoS suitable for voice communications.

    The low rate WPANs (IEEE 802.15.4/LR-WPAN) is intended to serve a set of industrial, residential

    and medical applications with very low power consumption, with relaxed needs for data rate and

    QoS. The low data rate enables the LR-WPAN to consume very little power. This feature allows

    small, power-efficient, inexpensive solutions to be implemented for a wide range of devices.

    10.2 Why is it called ZigBee?

    It has been suggested that the name evokes the haphazard paths that bees follow as they harvest pollen,

    similar to the way packets would move through a mesh network. Using communication system, whereby

    the bee dances in a zigzag pattern, worker bee is able to share information such as the location, distance,

    And direction of a newly discovered food source to her fellow colony members. Instinctively implementing

    the ZigBee Principle, bees around the world actively sustain productive itchiness and promote future

    generations of Colony members.

    10.3 Device Types

    ZigBee devices are required to conform to the IEEE 802.15.4-2006 Low-Rate Wireless Personal AreaNetwork (WPAN) standard. ZigBee wireless devices are expected to transmit 10-75 meters, depending on

    the RF environment and the power output consumption required for a given application, and will operate

    in the unlicensed Worldwide (2.4GHz global, 915MHz Americas or 868 MHz Europe). The data rate

    is250kbps at 2.4GHz, 40kbps at 915MHz and 20kbps at 868MHz.

    There are three different ZigBee device types that operate on these layers in any self-organizing application

    network. These devices have 64-bit IEEE addresses, with option to enable shorter addresses to reduce

    packet size, and work in either of two addressing modes star and peer-to-peer.

    The ZigBee (PAN) coordinator node: The most capable device, the coordinator forms the root of

    the network tree and might bridge to other networks. It is able to store information about the

  • 8/3/2019 Technical Report Writing Final Report

    11/26

    9

    network. There is one, and only one, ZigBee coordinator in each network to act as the router to

    other network. It also acts as the repository for security keys.

    The Full Function Device (FFD): The FFD is an intermediary router transmitting data from other

    devices. It needs lesser memory than the ZigBee coordinator node, and entails lesser

    manufacturing costs. It can operate in all topologies and can act as coordinator.

    The Reduced Function Device (RFD): This device is just capable of talking in the network; it cannotrelay data from other devices. Requiring even less memory, (no flash, very little ROM and RAM), an

    RFD will thus be cheaper than an FFD. This device talks only to a network coordinator and can be

    implemented very simply in star topology.

    An FFD can talk to RFDs or other FFDs, while an RFD can talk only to an FFD. An RFD is intended for

    applications that are extremely simple, such as a light switch or a passive infrared sensor; they do not have

    the need to send large amounts of data and may only associate with a single FFD at a time. Consequently,

    the RFD can be implemented using minimal resources and memory capacity.

    10.4 Network Topologies

    There are 3 basic topologies that exist in ZigBee networks. These can be mingled together to create moretopologies.

    Star Topology

    Peer-to-Peer Topology

    Mesh Topology

    Figure 1: Star Topology

    Figure 2: Peer - to - Peer Topology

  • 8/3/2019 Technical Report Writing Final Report

    12/26

    10

    Figure 3: Mesh Topology

    10.5 Architecture

    The LR-WPAN architecture is defined in terms of a number of blocks in order to simplify the standard.

    These blocks are called layers. Each layer is responsible for one part of the standard and offers services to

    the higher layers. The layout of the blocks is based on the open systems interconnection (OSI) seven-layer

    model. The interfaces between the layers serve to define the logical links between layers. The LR-WPAN

    architecture can be implemented either as embedded devices or as devices requiring the support of an

    external device such as a PC.

    An LR-WPAN device comprises a PHY, which contains the radio frequency (RF) transceiver along with its

    low-level control mechanism, and a MAC sub layer that provides access to the physical channel for all types

    of transfer.

    Figure 4: ZigBee Stack

  • 8/3/2019 Technical Report Writing Final Report

    13/26

    11

    10.6 Network and Application Support layer:

    The network layer permits growth of network without high power transmitters. This layer can handle huge

    numbers of nodes.

    This level in the ZigBee architecture includes

    The ZigBee Device Object (ZDO)

    User-Defined Application Profile(s)

    The Application Support (APS) Sub-layer.

    The APS sub-layer's responsibilities include maintenance of tables that enable matching between two

    devices and communication among them, and also discovery, the aspect that identifies other devices that

    operate in the operating space of any device.

    The responsibility of determining the nature of the device (Coordinator / FFD or RFD) in the network,

    commencing and replying to binding requests and ensuring a secure relationship between devices rests

    with the ZDO (ZigBee Define Object). The user defined application refers to the end device that conformsto the ZigBee Standard.

    10.7 Physical (PHY) layer:

    The PHY service enables the transmission and reception of PHY protocol data units (PPDU) across the

    physical radio channel.

    The features of the IEEE 802.15.4 PHY physical layer are Activation and deactivation of the radio

    transceiver, energy detection (ED), Link quality indication (LQI), channel selection, clear channel

    assessment (CCA) and transmitting as well as receiving packets across the physical medium.

    10.8 Media access control (MAC) layer:The MAC service enables the transmission and reception of MAC protocol data units (MPDU) across the

    PHY data service. The features of MAC sub layer are beacon management, channel access, GTS

    management, frame validation, acknowledged frame delivery, association and disassociation.

    11. DESIGN PARAMETERS:

    1. The simulation should be a large scale implementation, that is, not less than 200 nodes.

    2. At least 3 ZigBee Coordinator cluster heads (CH) should be involved.

    3. Attest 30 ZigBee Routers should be involved.

    4. At least 60 ZigBee End-devices should be involved.

    5. The protocol to be tested would have the following specifications: If the CH is connected to two routers, and one of them is sleeping, the CH would route the

    frame through the other Router.

    If this has been repeated a certain number of times, the CH would wake the other router and

    let the previous one sleep and save its battery.

    If both of them are asleep, the CH would look at the time they have been sleeping and the

    battery life they have remaining with them and wake the one who has been asleep the

    longest with more battery life.

    If both of them are awake, the CH would determine who has the longest uptime and the

    least battery remaining of the two, and would put that node to sleep.

  • 8/3/2019 Technical Report Writing Final Report

    14/26

  • 8/3/2019 Technical Report Writing Final Report

    15/26

    13

    14. TECHNICAL DESCRIPTION:

    The current applications of the ZigBee transceiver are numerous, which also leads to much possible

    advancements and enhancements. Most of the applications in various different criterions require only

    major enhancement: Network Lifetime Prolongation.

    The longer we can maintain the nodes alive, i.e., prolonging the battery life in the network, the better the

    application and hence broaden the scope of the ZigBee Transceiver.

    We would be using two tools to accomplish this:

    1. OMNeT++. This is an open source Network Simulator

    OMNeT++ is a discrete event simulation environment. Its primary application area is the simulation of

    communication networks, but because of its generic and flexible architecture, is successfully used in other

    areas like the simulation of complex IT systems, queuing networks or hardware architectures as well.

    OMNeT++ provides a component architecture for models. Components (modules) are programmed in C++,

    then assembled into larger components and models using a high-level language (NED). Reusability of

    models comes for free. OMNeT++ has extensive GUI support, and due to its modular architecture, the

    simulation kernel (and models) can be embedded easily into your applications.

    2. MiXiM Framework

    MiXiM is an OMNeT++ modelling framework created for mobile and fixed wireless networks (wireless

    sensor networks, body area networks, ad-hoc networks, vehicular networks, etc.). It offers detailed models

    of radio wave propagation, interference estimation, radio transceiver power consumption and wireless

    MAC protocols (e.g. ZigBee).

    15. INSTRUCTIONS AND PROCEDURES:

    1. Install OMNeT++

    a. Download OMNeT++ from

    b. Extract the latest version of OMNeT++ on the disk.

    c. Run the bash terminal.

    WARNING: Do not install OMNeT++ on any directory which has a space in its name,

    otherwise the bash terminal would register an error.

    d. Type ./configure and press Enter.e. After the process is over, type make and press Enter. This is a time consuming process.

    f. After the process is over, type omnetpp to run OMNeT++.

    g. If the need to log out arises, type exit and press Enter.

    2. Install MiXiM framework over OMNeT++

    a. Download the latest version of MiXiM .

    b. Open OMNeT++.

    c. Go to File-> Import.

    d. Select the .tar.gz file and press import.

    e. After the import process completes, press CTRL+B to build all configurations and to

    append MiXiM to OMNeT++. This is a time consuming process.

    f. Now, all the modules of MiXiM have been integrated on to OMNeT++ for use.

  • 8/3/2019 Technical Report Writing Final Report

    16/26

    14

    3. Start a new project file of MiXiM by using the Wizard.

    4. Make the topology shown in Figure xx .

    5. Build the project.

    NOTE: Add the record-eventlog = true to the omnetpp.ini file.

    6. Run the project and simulate up to 100,000 events.

    7. Save the simulation and exit.8. Open the results sub-folder in OMNeT++ file browser and plot the scalar values.

    9. Repeat the process from 5 to 8 for:

    a. No Sleep cycles introduced into the topology.

    b. Sleep Cycles introduced into the topology.

    c. The protocols that is proposed in this project, specific to the cluster heads or ZigBee

    Coordinators.

    16. EVALUATIONS AND ANALYSIS:

    When the plots start appearing, we can see how the results vary from one another. It may be quite vague

    at first but, after filtering is applied to the results, the plots would become clear to reveal the results asshown in Graph 1.

    The parameter record-eventlog = true enables to capture every moment and every magnitude

    that happens during a simulation. It is also clear to note that unless until it is required, like here, this

    parameter puts a lot of load on the CPU hence should be used carefully, since it is capturing the most

    minute of details happening inside the simulated environment.

    After filtering, the scalar graphs would show how the network life of the whole ZigBee network decreases

    until one of the node fails. The simulation would end where one node fails and gives an interrupt flag to

    stop the simulation. Here the total events would be displayed in the Tkenv status bar.

    17. ACCEPTANCE CRITERIA:

    1. The whole simulation should show that the proposed method increases the network lifetime.

    2. The Network Lifetime increased should be of a measurable factor.

    3. The model drawn out of this proposal should be implementable and should follow the standards

    specified by IEEE 802.15.4.

    4. Since the battery lifespan specified by ZigBee Alliance is minimum 2 years, no node should die

    before 2 years simulated time.

  • 8/3/2019 Technical Report Writing Final Report

    17/26

    15

    18. RESULTS AND CONCLUSION:

    The following are the results from the simulations successfully completed in OMNeT++:

    Graph 1: Results

    1. With no sleep cycles in the ZigBee Network, the network dies very soon.

    2. As soon as the sleep cycles are introduced, the Network lives up to the ZigBee standard.

    3. When the Network is tested on the protocols that are mentioned in this report, the Network life is

    increased by approximately 15%, which is a measurable and a considerable amount.

    19. DISCUSSION OF RESULTS:

    As we can clearly see how the results vary from when no sleep cycles are introduced to when the protocol

    involving the proposed scenario is introduced. This concludes that our method of approach was correct

    and properly defined.

    20. RECOMMENDATIONS AND ALTERNATIVES:

    Recommendations:

    1. The scenario should be followed strictly. Any changes would lead to a different scenario and would

    need to be evaluated.

    2. Since this applies to a ZigBee configuration employing ZigBee end-devices, the same scenario canbe evaluated with more ZigBee Routers. It might lead to a better Network Lifetime since we are

    introducing more intelligent devices into the network premises.

    Technology alternatives can be used which apply the IEEE 802.15.4 stack in a different way as opposed to

    ZigBee:

    1. CEBus

    2. LonWorks

    3. Insteon

    4. Z-Wave

    One should note that an alternative would lead to the same amount of paper work as done here.

  • 8/3/2019 Technical Report Writing Final Report

    18/26

    16

    21. BIBLIOGRAPHY:

    [1] Fabrizio Granelli, Dzmitry Kliazovich and Nelsom L. S. Da Fonseca, Performance Limitations of IEEE

    802.15.4 Networks and Potential Enhancements, 2007.

    [2] Nicky van Frost, Simulating Queuing Networks with OMNeT++, January 23rd

    , 2004.

    [3] C. Mallanda, A. Suri, V. Kunchakarra, S. S. Iyengar, R. Kannan and A. Durresi, Simulating Wireless

    Sensor Networks with OMNeT++, 2005.

    [4] E. Egea-Lpez, J. Vales-Alonso, A. S. Martnez-Sala, P. Pavn-Mario and J. Garca-Haro, Simulation

    Tools for Wireless Sensor Networks, Summer Simulation Multiconference SPECTS 2005.

    [5] Tao Shu and Marwan Krunz, Coverage-Time Optimization for Clustered Wireless Sensor Networks:

    A Power-Balancing Approach, IEEE/ACM Transactions on Networking, Vol. 18, No. 1, February

    2010.

    [6] Deborah Estrin, Ramesh Govindan, John Heidemann and Satish Kumar, Next Century Challenges:

    Scalable Coordination in Sensor Networks, 1999.

    [7] Pablo Suarez, Carl-Gustav Renmarker, Adam Dunkels and Thiemo Voigt, Increasing ZigBee

    Network Lifetime with X-MAC, 2008.

    [8] Myung-Gon Park, Kang-Wong Kim and Chan-Gun Lee, A Holistic Approach for Optimizing Lifetime

    of IEEE 802.15.4/ZigBee Networks with Deterministic Guarantee of Real-Time Flows, 2009.

  • 8/3/2019 Technical Report Writing Final Report

    19/26

    17

    22. APPENDIX

  • 8/3/2019 Technical Report Writing Final Report

    20/26

    Annealing Sensor Networks

    Andrew Jennings & Daud Channa

    Electrical & Computer Engineering School,

    RMIT University, Melbourne, Australia

    {[email protected], [email protected]}

    Abstract. With a continuing improvement in the capabilities of intelligence perunit of energy, we should reconsider the organisation of sensor networks. We

    contend that solutions should be model-free, locally based and need to behighly dynamic in nature. Here we propose an approach inspired by simulatedannealing. In the context of several application scenarios we explore the poten-

    tial for adding intelligence to sensor networks.

    1. Introduction

    Sensor networks [1] are envisioned to become an integral part of our lives. Thesenetworks are being applied to provide various tasks such as surveillance and monitor-ing systems for commercial and military applications. Applications are being devel-

    oped to gather process and utilize the information from the surrounding environmentas required. These requirements have kept challenging researchers in the design ofbetter architectures and protocols for sensor networks. We now have some early de-ployment of sensor networks, showing that we have successfully established the basicprotocols. These follow two main directions: clustering of nodes [2], and synchronisedsleep cycle networks with a flatter structure [3]. Now the main challenge is to estab-lish a wide range of application systems. To deploy applications we need methods ofcoordination that are efficient both in delivering services and conserving energy.

    The growth and advancements in technologies and the constant reduction in thesize and cost of Micro Electro Mechanical Systems (MEMS) have given rise to awhole new dimension of networking which involves sensors and actuators that arequickly deployable and self organizing. They have resulted in a new dimension in

    network computing, namely pervasive sensing and control. The ongoing rapid ad-vancements, developments, and research in the sensor and actuator networks onlyleaves one to foresee that they will soon intervene and associate into all living habitatsof humans and their surrounding environment.

    In most scenarios the network must be functional over long periods of time, it iscrucial for the operation, management and continued lifespan of the network to con-trol the behaviour/reaction of the sensors and actuators to the different occurrences ofevents in the network. The sensors in these networks are limited in energy, memory

    To appear in KES Invited Session on Evolutionary and Self-Organizing Sensors, Actua-

    tors and Processing Hardware. Jennings A. and Channa D., Melbourne, 2005

  • 8/3/2019 Technical Report Writing Final Report

    21/26

    and computational facilities, while generally the actuators have an ample supply ofresources as their mobility can enable them to recharge thus utilizing their resources tothe fullest without energy constraint.

    The deployment and maintenance of the nodes must be cost effective, because itwill be unfeasible to configure these large networks of small devices. The sensornodes along with the actuators must be self organizing and provide a means of pro-gramming and managing the network as a whole, rather than administering individualnodes and actuators.

    2 Status & scenarios

    Although it is not yet clear which applications are viable for sensor networks, wehave selected three scenarios to motivate our work. They serve to highlight the issuesthat we now face. We aim to create solutions for these situations.

    2.1 Pedestrian Crossing Guard

    Fig. 1. A proposal for an instrumented pedestrian crossing

    We aim to improve the safety of pedestrian crossings using sensor networks. Howmight we prevent the running down of pedestrians?

    One possible solution is to use an array of pressure sensors on the roadway surfaceto detect pedestrians walking. This would be in addition to proximity sensors and vis-ual surveillance [5], as illustrated in Figure 1. Through combination of sensor read-ings, we can improve the accuracy of recognition. If we want to make use of the sen-sor readings then we need confidence that there is a low probability of false positives -otherwise car drivers will not accept the system.

    With a reliable method of pedestrian detection, we can perhaps move to the nextlevel with these systems. If we can reliably detect a car traveling at a speed likely to

  • 8/3/2019 Technical Report Writing Final Report

    22/26

    result in a collision, then the crossing system can intervene and communicate with thecar - potentially it could also override car braking systems. This would bring the car toa halt. We have the possibility of eliminating the possibility of cars contacting pedes-trians at crossings. There may also be a role for coordinating with robot teams to en-able more active monitoring of pedestrians here we need development of team be-haviour [6]

    2.2 Animal Counting

    Environmental monitoring was one of the earliest motivations for exploring sensornetworks. A typical task is the estimation of animal populations. We would like toknow how many of a particular type of animal are within a geographic area. In con-

    trast to urban applications, this setting is very demanding in terms of energy manage-ment. Note that the estimation of populations is more difficult than simply trackinganimals - we need some confidence of the identity of animals. Is the set of readings fora single animal, or two that are within the same area?

    2.3 Perimeter Surveillance

    This is a classical application of sensory technology. We have a perimeter that wewish to patrol, with video and movement surveillance. To augment this, we would liketo deploy proximity sensors to improve accuracy. These scenarios can give us aframework to consider sensor network application approaches. They provide chal-lenges and a range of difficulties. All are real applications that may have some pros-

    pect of widespread deployment. At this stage of development of the field, it is impor-tant to focus on feasible applications to focus the research.

    3 Energy and Intelligence

    One of the central tenets of sensor networks has been the need to keep nodes simpleand careful in their use of energy. We could not, for example, implement the fullTCP/IP stack on sensor nodes. This would be a waste of energy, since the nature ofthe communication is quite different.

    Progress in battery technology is painful and very slow. But when we consider in-telligence per unit of energy, then progress is quite dramatic. So we should be moreopen to incorporating intelligence in the sensor node, as long as that results in signifi-cant energy conservation.

  • 8/3/2019 Technical Report Writing Final Report

    23/26

    3.1 Local Resolution

    Fig. 2. Directed diffusion (network wide) versus local resolution

    One of the original proposals for sensor network protocols was "directed diffusion"(DD) [4]. It is a robust protocol that can work in very tough environments. Even withextensive network breakages, it will continue to operate. As Figure 2 illustrates, "in-terests" are propagated to areas of the network, and "gradients" are used to reinforcethe successful delivery of packets across the network.

    Given the constraints placed on directed diffusion, it is an appealing solution. Buthow might it change if we allowed local processing, rather than propagating resultsacross the broader sensor network? DD assumes that we have to send this outside thesensor network, but with local processing we can avoid the energy consumption ofnetwork wide reporting.

    This creates both a need for local algorithms that can actually resolve sensor data,and also a means of coordination. There are clear energy advantages in local resolu-tion.

    Similar difficulties arise in the location of mobile sensor nodes. The author in [7]has presented the use of simulated annealing for this problem. Here we are concernedwith organisation and messaging for fixed nodes.

    3.2 Model Based, or Model Free?

    If we want to improve monitoring, then perhaps a more accurate model of the con-text will help? In the case of the pedestrian crossing, we could develop a trackingmodel. For example, Kalman filtering could aid following an individual through thenetwork. But if we incorporate this model, what will happen in non-modelled cases?How will our model-based approach react when a person falls over, and lies stationary

  • 8/3/2019 Technical Report Writing Final Report

    24/26

    on the crossing? In the worst case, we might decide that the crossing is clear, and letthe cars proceed.

    Similarly, in surveillance of a perimeter, we might improve accuracy by statisticaltraining to detect people walking across the field. But will we detect somebody crawl-ing across the space?

    Once we fix a model for the sensing environment, defining the range of possibletargets, then the task of constructing the sensor network is reduced to optimisation.There is no need for further intelligence. So the real challenge for sensor networks ishow to deal with unusual data. Consider surveillance when a bunch of leaves falls tothe ground. Do we raise an alarm or simply log the event for further processing? If welog it, what priority do we give to the event?

    This is a familiar problem in AI, bringing us to the very familiar challenges of se-mantics. How do we deal with images that do not have familiar content? How can wego beyond simple statistical pattern matching? These are very difficult, but also veryimportant problems.

    3.3 Dynamics

    Consider the problem of tracking (and identifying) an animal that gives us unusualreadings. Perhaps it is of a size that we have not encountered, or it genuinely is a newentry to the region. Clearly this is important, and we would like to track its trajectory.But in order to do this, we need to estimate velocities and alert the relevant part of the

    sensor network. Once we have lost contact, it will be difficult to sustain the identity.Remember, we are interested in counting animals, so identity is important. Clearly weneed application protocols that can deal effectively with highly dynamic situations.

    4 Annealing Sensor Networks

    The simulated annealing algorithm is a successful method of searching for optimalsolutions in complex spaces. Most importantly, it is model free : any problem can beformulated as an annealing process. In analogy with the process of annealing crystals,it has an associated temperature. At high temperature, large parameter changes arepossible, but as the process cools only smaller changes are possible.

    Fig. 3. Activation cycles (sleep cycles) for a single node

  • 8/3/2019 Technical Report Writing Final Report

    25/26

    We propose an approach to organising sensor networks that is inspired by simu-lated annealing. Regions have a temperature, which indicates the intensity of sensing.Figure 3 illustrates the sleep cycle of a single node. At a low temperature, the nodescycle only at A, but as the temperature increases we also cycle at B,C,D progressively.Since these cycles are divisions of the fundamental cycle (the A cycle), these sched-ules do not conflict.

    Fig. 4. Network temperature heating process

    In the event that a node encounters an unexpected stimulus, it can cause a local risein temperature. If several nodes in a region send this message, then a rapid rise in lo-cal temperature can take place. We can allow this temperature to spread rapidly inspace if we desire, or rapidly decay. In accordance with the physical analogy, localheating cannot spread vast distances without decay. Figure 4 illustrates the process.

    To effectively make use of annealing sensor networks, we need local resolution ofsensor information. For example, in the case of animal tracking, a local decision isneeded on the temperature response. Note that an identification is not needed, but onlylocal decision making. We are investigating how to provide this on the typical proces-sors used for sensor nodes. It certainly seems possible to accomplish this computationon the nodes. Of course over time, we can expect the intelligence/energy quotient tocontinue to grow.

    Annealing sensor networks (ASN) are a development of directed diffusion net-works. There are some important differences. The adaptive sleep cycle provides forrapid response. Local resolution of control is an important difference. Where directeddiffusion incorporates routing, ASN's only advise routing.

  • 8/3/2019 Technical Report Writing Final Report

    26/26

    5 Discussion

    We have proposed an approach to model-free local behaviour for sensor networks.Given that we have no local model of expected behaviour, how can we achieve localresolution? Each node can keep a statistical database of patterns it has encountered.When patterns within a statistical tolerance appear, this can trigger the appropriatebehaviour.

    Fully distributed control of sensor networks in this manner raises some importantnew issues. How do we maintain the currency of statistical data? How can we makechanges to behaviour whilst ensuring network stability?

    It is interesting that classical problems of semantics come to the forefront when wewant to further explore sensor networks. Here the resources we have to bring to the

    problem are limited. We have an unlimited source of data, through lifelong observa-tion of the world through the network sensors. Potentially we can bring vast computa-tion to the task, through recording and processing offline. But we are limited in humanintervention. This leads us to explore computationally intensive approaches. Perhapswe should consider the task as data mining for sensor organisation methods.

    References

    1. Deborah Estrin, Ramesh Govindan, John Heidemann and Satish Kumar Next CenturyChallenges: Scalable Coordination in Sensor NetworksIn Proceedings of the Fifth An-

    nual International Conference on Mobile Computing and Networks (MobiCOM '99),August 1999, Seattle, Washington.

    2. Wendi Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Energy-EfficientCommunication Protocols for Wireless Microsensor Networks, Proc. Hawaiian Int'lConf. on Systems Science, January 2000.

    3. Wei Ye and John Heidemann and Deborah Estrin An Energy-Efficient MAC Protocolfor Wireless Sensor Networks Proceedings 21st International Annual Joint Conference

    of the IEEE Computer and Communications Societies, 2002

    4. Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin Directed Diffusion:A Scalable and Robust Communication Paradigm for Sensor Networks In Proceedingsof the Sixth Annual International Conference on Mobile Computing and Networks

    (MobiCOM 2000), August 2000, Boston, Massachusetts.5. Christian Wohler Autonomous in situ training of classification modules in real-time vi-

    sion systems and its application to pedestrian recognition Pattern Recognition Letters

    Volume 23 , Issue 11 Pages: 1263 - 1270 (September 2002)6. H. Van Dyke Parunak, Sven. A. Bruekner & James Odell Swarming pattern detection

    in Sensor and Robot Networks Altarium Institute, Working Document

    7. Martinson E. and Payton D. Lattice Formation in Mobile Autonomous Sensor Arrays,HRL Laboratories, LLC. 2003-2004