Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Sensor Protocols for
Infor mation via
Ne gotiation (SPIN)
Rajiv Agarwal
B.Sc.(cs)Hons.
115090
Outline





WSN
Components of Sensor node
SPIN
Conclusions
Wireless Sensor Network
Wireless sensor networks

consist of large number of
nodes that have sensing,
computing and communication
capabilities. It is basically an
interconnection between large
number of nodes that are
deployed for system
monitoring by measuring its
parameters.
Wireless

Networks of
sensors are likely to be widely
deployed in the future
Limitations of a Sensor node
Several obstacles need to overcome
Energy - limited supply of energy simply
performing computations and transmitting
information in a wireless environment, energyconserving forms of communication and
computation are essential .
Computation

- limited computing power so may
be unable to run some network protocols.

Communication

- The bandwidth of the wireless
links connecting sensor nodes is often limited, on
the order of a few hundred Kbps.


Classic flooding
A source node sends its data to all of its neighbors. Upon
receiving a piece of data, each node then stores and sends a
copy of the data to all of its neighbors.



limitations
– Implosion
– Overlap
– Resource blindness
Implosion
(A)

A

B

(A)

C
(A)

(A)

D
The implosion problem. In this graph, node A starts by flooding its data to all of
its neighbors. Two copies of the data eventually arrive at node D. The system
energy waste energy and bandwidth in one unnecessary send and receive.
Overlap
q

r

s

A

B

(q,r)

(r,s)

C
The overlap problem. Two sensors cover an overlapping geographic region. When
these sensors flood their data to node C, C receives two copies of the data marked r.

8
Resource

blindness

In classic flooding, nodes do not modify their activities
based on the amount of energy available to them at a given time.
A network of embedded sensors can be “resource-aware” and
adapt its communication and computation to the state of its energy
resource.
The SPIN (Sensor Protocols for Information via Negotiation) family
of protocols incorporates two key innovations that overcome these
deficiencies :
 negotiation
 resource-adaptation

9
SPIN: A Data Centric Protocol For
Wireless Sensor Networks
Data-centric

protocols differ from traditional address-centric
protocols in the manner that the data is sent from source sensors to the
sink.
In

address-centric protocols, each source sensor that has the
appropriate data responds by sending its data to the sink
independently of all other sensors.
In

datacentricprotocols, when the source sensors send theirdata to
the sink, intermediate sensors can performsome form of aggregation
on the data originating from multiple source sensors and send the
aggregated data toward the sink.
SPIN
 SPIN-1
 SPIN-2

 The

SPIN family of protocols rests upon two basic ideas:

◦ To operate efficiently and to conserve energy
◦ Nodes in a network must monitor and adapt to changes in their own
energy resources to extend the operating lifetime of the system.

11
Meta-Data


SPIN does not specify a format for meta-data



Meta-data format is application specific

SPIN Messages


ADV-When a node has new data to share; it can advertise this
using ADV message containing Metadata.



REQ- Node sends an REQ when it needs to receive actual data.



DATA – Contains actual data message
SPIN-1 : 3-Stage Handshake Protocol (SPIN-PP)




Simple handshake protocol for disseminating data through a
lossless network
Work in three stages (ADV-REQ-DATA)
Node A starts by
advertising its data to node B
(a).
Node B responds by
sending a request to node A
(b).
After receiving the
requested data (c), node B
then sends out advertisement
to its neighbors (d), who in
turn send requests back to B
(e, f).

13
SPIN-1 : 3-Stage Handshake Protocol




SPIN-1 can be run in a completely unconfigured network with a small,
startup cost to determine nearest neighbors
If the topology of the network changes frequently, these change only
have to travel one hop before the nodes can continue running the
algorithm

SPIN-2 : SPIN-1 with a Low-Energy Threshold (SPIN-EC)


Adds a simple energy-conservation heuristic to the SPIN-1 protocol



When energy is plentiful, SPIN-2 nodes communicate using the same
3-stage protocol as SPIN-1 node



14

When its energy is approaching a low-energy threshold, it adapts by
reducing its participation in the protocol
Conclusions





SPIN solves the implosion and overlap
problems.
SPIN-1 and SPIN-2 are simple protocols for
wireless sensor networks.
SPIN-1 consumes only 25% energy w.r.t
flooding
SPIN-2 distributes 60% more data per unit
energy w.r.t flooding.
Thank you!

More Related Content

What's hot

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
Swathi Ch
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
ArunChokkalingam
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
Abhijeet Awade
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
SyedAhamed44
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
Mshari Alabdulkarim
 
TinyOS
TinyOSTinyOS
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 

What's hot (20)

SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
TinyOS
TinyOSTinyOS
TinyOS
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 

Viewers also liked

Routing
RoutingRouting
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
eSAT Journals
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
Deepak Kumar Dhal
 
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
IJMER
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
015 spins
015 spins015 spins
015 spins
Sam Ram
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
Mahmuda Rahman
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
Darpan Dekivadiya
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Pradipta Ghosh
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
Muhammad Kaife Uddin
 
Wireless sensor network
Wireless sensor networkWireless sensor network
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
Tejas Wasule
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
Karthik
 
Spinal cord trauma
Spinal cord traumaSpinal cord trauma
Spinal cord trauma
Paulina Asiain L
 
article198
article198article198
article198
nonchalantfurvo01
 
Ghgfgf
GhgfgfGhgfgf
Ghgfgf
series77
 

Viewers also liked (20)

Routing
RoutingRouting
Routing
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
015 spins
015 spins015 spins
015 spins
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Spinal cord trauma
Spinal cord traumaSpinal cord trauma
Spinal cord trauma
 
article198
article198article198
article198
 
Ghgfgf
GhgfgfGhgfgf
Ghgfgf
 

Similar to Sensor Protocols for Information via Negotiation (SPIN)

Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
ijtsrd
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
RamprakashSingaravel1
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
ShrutiGupta858540
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsn
Gr Patel
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
eSAT Publishing House
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
Sharon Roberts
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
ijsrd.com
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
Munazza63
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Rutvik Pensionwar
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
Editor IJARCET
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
vimalmanit
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
IRJET Journal
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
IOSR Journals
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
barak422
 

Similar to Sensor Protocols for Information via Negotiation (SPIN) (20)

Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsn
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
 

Recently uploaded

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
UiPathCommunity
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 

Recently uploaded (20)

Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
Automation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI AutomationAutomation Student Developers Session 3: Introduction to UI Automation
Automation Student Developers Session 3: Introduction to UI Automation
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 

Sensor Protocols for Information via Negotiation (SPIN)

  • 1. Sensor Protocols for Infor mation via Ne gotiation (SPIN) Rajiv Agarwal B.Sc.(cs)Hons. 115090
  • 3. Wireless Sensor Network Wireless sensor networks consist of large number of nodes that have sensing, computing and communication capabilities. It is basically an interconnection between large number of nodes that are deployed for system monitoring by measuring its parameters. Wireless Networks of sensors are likely to be widely deployed in the future
  • 4.
  • 5. Limitations of a Sensor node Several obstacles need to overcome Energy - limited supply of energy simply performing computations and transmitting information in a wireless environment, energyconserving forms of communication and computation are essential . Computation - limited computing power so may be unable to run some network protocols. Communication - The bandwidth of the wireless links connecting sensor nodes is often limited, on the order of a few hundred Kbps.
  • 6.  Classic flooding A source node sends its data to all of its neighbors. Upon receiving a piece of data, each node then stores and sends a copy of the data to all of its neighbors.  limitations – Implosion – Overlap – Resource blindness
  • 7. Implosion (A) A B (A) C (A) (A) D The implosion problem. In this graph, node A starts by flooding its data to all of its neighbors. Two copies of the data eventually arrive at node D. The system energy waste energy and bandwidth in one unnecessary send and receive.
  • 8. Overlap q r s A B (q,r) (r,s) C The overlap problem. Two sensors cover an overlapping geographic region. When these sensors flood their data to node C, C receives two copies of the data marked r. 8
  • 9. Resource blindness In classic flooding, nodes do not modify their activities based on the amount of energy available to them at a given time. A network of embedded sensors can be “resource-aware” and adapt its communication and computation to the state of its energy resource. The SPIN (Sensor Protocols for Information via Negotiation) family of protocols incorporates two key innovations that overcome these deficiencies :  negotiation  resource-adaptation 9
  • 10. SPIN: A Data Centric Protocol For Wireless Sensor Networks Data-centric protocols differ from traditional address-centric protocols in the manner that the data is sent from source sensors to the sink. In address-centric protocols, each source sensor that has the appropriate data responds by sending its data to the sink independently of all other sensors. In datacentricprotocols, when the source sensors send theirdata to the sink, intermediate sensors can performsome form of aggregation on the data originating from multiple source sensors and send the aggregated data toward the sink.
  • 11. SPIN  SPIN-1  SPIN-2  The SPIN family of protocols rests upon two basic ideas: ◦ To operate efficiently and to conserve energy ◦ Nodes in a network must monitor and adapt to changes in their own energy resources to extend the operating lifetime of the system. 11
  • 12. Meta-Data  SPIN does not specify a format for meta-data  Meta-data format is application specific SPIN Messages  ADV-When a node has new data to share; it can advertise this using ADV message containing Metadata.  REQ- Node sends an REQ when it needs to receive actual data.  DATA – Contains actual data message
  • 13. SPIN-1 : 3-Stage Handshake Protocol (SPIN-PP)   Simple handshake protocol for disseminating data through a lossless network Work in three stages (ADV-REQ-DATA) Node A starts by advertising its data to node B (a). Node B responds by sending a request to node A (b). After receiving the requested data (c), node B then sends out advertisement to its neighbors (d), who in turn send requests back to B (e, f). 13
  • 14. SPIN-1 : 3-Stage Handshake Protocol   SPIN-1 can be run in a completely unconfigured network with a small, startup cost to determine nearest neighbors If the topology of the network changes frequently, these change only have to travel one hop before the nodes can continue running the algorithm SPIN-2 : SPIN-1 with a Low-Energy Threshold (SPIN-EC)  Adds a simple energy-conservation heuristic to the SPIN-1 protocol  When energy is plentiful, SPIN-2 nodes communicate using the same 3-stage protocol as SPIN-1 node  14 When its energy is approaching a low-energy threshold, it adapts by reducing its participation in the protocol
  • 15. Conclusions     SPIN solves the implosion and overlap problems. SPIN-1 and SPIN-2 are simple protocols for wireless sensor networks. SPIN-1 consumes only 25% energy w.r.t flooding SPIN-2 distributes 60% more data per unit energy w.r.t flooding.