Networ k Management
for Wireless Sensor Networ ks
Zena Mohammed
Outline
Introduction
Network Management Requirements
Traditional Network Management Models
Network Management Design Issues
Example of Management Architecture: MANNA
Other Issues Related to Network Management
Naming
Localization
Introduction
Network management is the process of managing,
monitoring, and controlling the behavior of a network.
Application
Transport
Network
Data Link
Wireless sensor networks (WSNs) pose unique Physical
challenges for network management that make
traditional network management techniques impractical.
A network management system designed for WSNs should
provide a set of management functions that integrate
configuration, operation, administration, security, and
maintenance of all elements and services of a sensor
network
Network Management Requirements
A computer communication network generally consists of three
components:
o Physical devices
Links (wireless or wired link),
Network nodes (hub, bridge, switch, or router), and
Terminals and Servers;
o Protocol; and
o Infor mation that is being carried, including applications.
The collaboration of physical devices and network protocols forms the
underpinning support for the applications. However, the physical devices and
protocols are not sufficient to support effective operation of a communications
network; network management (NM) tools and techniques are also required to
help provision network services and ensure cooperation of entities in the
network.
the reasons for management functions are
manifold and may be summarized as follows:
1. There are many heterogeneous devices and software entities that
comprise the network, and some may fail.
2.
Optimization of system performance as a distributed system
require NM to collaborate in the process.
3.
For most networks, NM functions can be used to gather and
analyze the behavior of user interaction during network
interface, which is very important in planning the long-term
evolution of network capacity and its performance.
Traditional Network Management Models
3.1Simple Network Management Protocol
For managing networks, SNMP is broadly use today.
It includes three components:
Network Management System (NMS),
Managed Elements, and
Agents.
Role of NMS :
o
o
o
o
NMS is a set of applications that monitor and/or control managed elements.
NMS can request management information/attributes from the agent.
NMS present the results to NM users in figures/tables form.
NMS can also set attributes within the agent.
Role of Managed Element :
o
SNMP agents run on each managed element.
The managed elements:
o
Collect & Store management information in the MIB and
Provide access through SNMP to the MIBs.
managed elements include: Routers, Switches, Servers, and Hosts.
Advantages of SNMP:
o
Its very simple and widely deployment.
In SNMP version 3 it can obtain more information by a pair of PDUs such as
(GetBulkRequest and GetResponse).
Disadvantages of SNMP :
o
It consumes considerable bandwidth since it often gets only one piece of
management information at a time: GetRequest (GetNextRequest) and
GetResponse.
Due to the usually large number of managed elements, large bandwidth
consumption still exists.
It only manages network elements; it does not support network-level
management.
3.2 Telecom Operation Map
It is based on the Service management Network management process models.
TOM presents a model for telecommunications management for network and service
management and a view of operations.
o
IDEA: To introduce processes comprising operations and their automation.
TOM only provides a fr amewor k for service management.
Levels / Layers
o
Hor izontally Layer s for service management
o
Service Fulfilment,
Service Assurance, and
Service Billing.
Ver tical Layer s for service management:
o
Network and Systems Management,
Service Development and Operations, and
Network Management Design Issues
Several issues must be addressed carefully before designing
network management tools for WSNs. To begin with, the
management functions required for WSNs should first be identified
Basic Issues:
o
o
o
o
o
o
Power efficiency
Data centric
Data aggregation
Attribute-based Addressing
Locationing systems, and
External Networks
Which factors should be consider while designing a
Network Management Protocol ?
o Management solutions should be energy efficient, using as little wireless
bandwidth as possible since communication is highly energy demanding.
o
Management solutions should be scalable. This is especially important
since it future WSNs may consist of tens to thousands of nodes.
o Management solutions should be simple and practical since WSNs are
resource-constrained distributed systems.
o
MIB for WSNs should contain a general information model for sensor nodes,
features of WSNs, and WSN applications.
o Management solutions for WSNs should provide a general interface
to the applications since applications can perform better when able to access
management information.
o
Management solutions should be implementable as middleware.
WSN Communications Architecture
Sensing node
Sensor nodes can be
data originators and
data routers
Internet
Sink
Manager Node
Sensor nodes
Sensor field
Example of Management Architecture: MANNA
MANNA (a Management Architecture for Wireless Sensor Networks ) is a policybased management system that collects dynamic management information , maps
this into WSN models, and executes management functions and services based on
WSN models.
MANNA defines the following managed object classes:
1.
2.
3.
4.
5.
6.
7.
Network (information on network behavior and features such as data delivery
model, network structure, and mobility)
Managed Elements(such as sensor nodes)
Equipment (the physical components of sensor nodes)
System (information on operating system)
Environment (the environment the WSN is running),
Phenomenon, and
Connection.
MANNA lists several common management functions for
WSNs:
environment monitoring functions, a coverage area supervision
function, a topology map discovery function, an energy-level discovery
function, an energy map generation function, and several others.
It also provides a dynamic MIB model for WSNs: a sensing coverage
area map, a communication coverage area map, a WSN behavior model,
a node dependence model, network topology, residual energy, and so on.
In MANNA, the management functions have the lowest granularity and
can be combined into management services.
Some examples of WSN models include:
Topology map depicting node connectivity and reachability of the
network.
Residual energy map showing battery level of nodes in the network.
Sensing coverage area map describing the area covered by sensor
elements.
Communication coverage area map presenting communication
range of nodes in a network.
Audit map describing the security status of sensor nodes in a
network, whether nodes have been attacked.
Other Issues Related to Network Management
There are sever al other issues related to sensor networ k
management, the most impor tant being
o
o
o
o
naming,
localization,
maintenance, and
fault tolerance.
Naming is the scheme used to identify a sensor node.
An efficient naming scheme can lower computation overhead and make routing
protocol energy efficient.
Localization
schemes determine the location of sensor nodes since such
information is important for some sensor applications.
The
maintenance issue may involve actions such as replacing batteries, keeping
connectivity, and configuring sensor nodes.
-The maintenance activity is used to maintain normal operation of the entire
network for as long as possible.
Several factors can cause
faults
in network operation, including hardware and
software error. Therefore, different schemes must be implemented to provide fault
tolerance.
4.1 Naming
Naming is the scheme used to identify a sensor node.
An efficient naming scheme can lower computation overhead
and make routing protocol energy efficient.
There are two traditional approaches to naming:
o
low level: naming such as node addresses is typically
application independent but topology and location dependent
high level: naming is usually application dependent
and location independent.
High-level naming is built on the top of low-level naming.
4.2 Localization
Localization schemes determine the location of sensor
nodes since such information is important for some sensor
applications.
Advantages of this knowledge are that :
1. some applications, such as those for tracking of objects, are
highly location dependent
2. location-based routing, which may also result in energy
conservation is enabled
3. knowledge of location usually enhances security;
4. locations are helpful for sensor network management and
monitoring
5. locations stimulate the creation of new applications
6. sensor nodes that move can be controlled through knowledge of their
location and
7. for applications with low-level naming and/or data-centric WSNs,
knowledge of location information is absolutely necessary.
Localization classification
Localization Algorithm
Centralized Schemes
Distributed Schemes
Range-based Scheme
Range-free Schemes
Centr alized Scheme
o
In this scheme Sensor nodes send control messages to a central node whose
location is known.
The central node then computes the location of every sensor node and informs the
nodes of their locations.
Distr ibuted Scheme
o
Each sensor node determines its own location independently.
The distributed localization can be further grouped into:
o
Range-based schemes and
Range-free schemes.
In the range-based approach, some range information, such as time of arrival,
angle of arrival, or time difference of arrival is required.
The range-free algorithms works as follows:
o
Several seed nodes are distributed in WSNs.
Seed nodes know their own locations, and they periodically broadcast a control
message with their location information.
Sensor nodes that receive these control messages can then estimate their own
locations.
CLUSTERING IN WSN
Clusters: grouping of sensors that performing similar tasks are
known as clusters.
Hierarchical clustering is the efficient way to utilize the energy in an
efficient manner.
In hierarchical cluster, it contains Cluster Head, Regular Nodes and
Base Station.
After the cluster head is selected, it collects the data from all of its
member nodes and aggregates it in order to eliminate the redundancy.
Thus it limits the amount of data transmission to Base Station, hence
remaining energy level is increased and network lifetime is
maximized.
the optimal number of cluster head that would lead to minimize the
average energy spends in the network for each round.
Cluster-head Election using Fuzzy Logic for
Wireless Sensor Networks
Cluster Head (CH) election is the process to select a node within the
cluster as a leader node. A CH is responsible for not only the general
request but also assisting the general nodes to route the sensed data to
the target nodes.
A Fuzzy Logic approach to cluster-head election is proposed based on
four descriptors:
remain energy - energy level available in each node
concentration - number of nodes present in the local distance r
vicinity
centrality- a value which classifies the nodes based the energy
concentration on cluster heads is distributed.
neighbor distance -the sum of distances between the node and the
nodes which is within r distance
Fuzzy c-means algorithm: the fuzzy c-means (FCM)
algorithm is one of the most widely used methods in fuzzy
clustering.
An extension of k-means
Hierarchical, k-means generates partitions
each data point can only be assigned in one cluster
Fuzzy c-means allows data points to be assigned
into more than one cluster
each data point has a degree of membership (or
probability) of belonging to each cluster
Fuzzy C Means Algorithm
Worked out Example
Input: Number of Objects = 6
Number of clusters = 2
C1 C2
0.8 0.2
0.9 0.1
0.7 0.3
0.3 0.7
0.5 0.5
0.2 0.8
Cluster 1
Cluster 2
Datapoint Distance Datapoint Distance
(1,6)
1.40
(1,6)
3.88
(2,5)
1.17
(2,5)
3.32
(3,8)
1.99
(3,8)
2.16
(4,4)
2.64
(4,4)
2.91
(5,7)
2.75
(5,7)
0.28
(6,9)
4.62
(6,9)
2.50
Now the New Membership value is
X
C1 C2
0.7 0.3
0.6 0.4
0.5 0.5
0.5 0.5
0.1 0.9
0.3 0.7
Step 5 : Now continue this process until get the same
centroids.
Dynamic Topology
Node mobility has a great
effect on the designing of
routing protocols
Node mobility creates a
dynamic topology, i.e.,
changes in the connectivity
between the nodes
Mobility in Ad Hoc Networks
Dynamic Routing
Route Maintenance
SPIN-BC
It
sends
meta-data
toitself
neighbors
Sensor
broadcasts
data
A
Neighbor
node
senses
sends
something
a REQ
listing
interesting
allthe
of network
the data it
The
process
repeats
across
Neighbors
aggregate
data
and broadcast
would like meta-data
to acquire
(advertise)
ADV
REQ
DATA
SPIN-BC
Advertise meta-data
Send data
Advertise
Send data
I am tired
Send
I need to
sleep
data
Advertise
meta-data
Advertise
Send
Request
Nodes doRequest
data
need data
not
to
data
participate in the
process
Request data
Directed Diffusion
Gradient
represents
both
direction
towards
data
matching
Uses
application-aware
communication
primitives
This
Consumer
Nodes
The
process
choice
diffuse
ofsets
of
data
path
the
upinitiates
interest
gr
isadients
made
interest
towards
locally
in the
inproducers
at
network
data
every
with
node
tovia
certain
draw
afor
Every
route
has agyprobability
being
chosen
Probability
1/ener
gyofcost
Collect
ener
metr
ics along
the way
and status
of demand
with
expressed
terms
ofdesired
namedupdate
data rate
sequence
events
matching
every
ofin
attributes
local
packet
interactions
the
interest
Four-legged
animal
Source
Sink
Directed Diffusion
Reinforcement
andtolerance
negativetoreinforcement
Has built-in
nodes movingused
to converge
to refficient
out of
ange or distribution
dying
Source
Sink
Some Applications of WSNs
Battlefield
Detection, classification and tracking
Examples: AWAIRS
(UCLA & Rockwell Science Center)
Habitat Monitoring Micro-climate and wildlife monitoring
Examples:
ZebraNet (Princeton)
Seabird monitoring in Maines Great
Duck Island (Berkeley & Intel)
Some Applications of WSNs
Structural, seismic
Bridges, highways, buildings
Examples: Coronado Bridge San Diego
(UCSD), Factory Building (UCLA)
Smart roads
Traffic monitoring, accident detection,
recovery assistance
Examples: ATON project (UCSD)
highway
camera
Contaminants detection
Examples: Multipurpose Sensor Program
(Boise State University)
microphone