SlideShare a Scribd company logo
1 of 16
Sensor Protocols for
Infor mation via
Ne gotiation (SPIN)
Rajiv Agarwal
B.Sc.(cs)Hons.
115090
Outline





WSN
Components of Sensor node
SPIN
Conclusions
Wireless Sensor Network
Wireless sensor networks

consist of large number of
nodes that have sensing,
computing and communication
capabilities. It is basically an
interconnection between large
number of nodes that are
deployed for system
monitoring by measuring its
parameters.
Wireless

Networks of
sensors are likely to be widely
deployed in the future
Limitations of a Sensor node
Several obstacles need to overcome
Energy - limited supply of energy simply
performing computations and transmitting
information in a wireless environment, energyconserving forms of communication and
computation are essential .
Computation

- limited computing power so may
be unable to run some network protocols.

Communication

- The bandwidth of the wireless
links connecting sensor nodes is often limited, on
the order of a few hundred Kbps.


Classic flooding
A source node sends its data to all of its neighbors. Upon
receiving a piece of data, each node then stores and sends a
copy of the data to all of its neighbors.



limitations
– Implosion
– Overlap
– Resource blindness
Implosion
(A)

A

B

(A)

C
(A)

(A)

D
The implosion problem. In this graph, node A starts by flooding its data to all of
its neighbors. Two copies of the data eventually arrive at node D. The system
energy waste energy and bandwidth in one unnecessary send and receive.
Overlap
q

r

s

A

B

(q,r)

(r,s)

C
The overlap problem. Two sensors cover an overlapping geographic region. When
these sensors flood their data to node C, C receives two copies of the data marked r.

8
Resource

blindness

In classic flooding, nodes do not modify their activities
based on the amount of energy available to them at a given time.
A network of embedded sensors can be “resource-aware” and
adapt its communication and computation to the state of its energy
resource.
The SPIN (Sensor Protocols for Information via Negotiation) family
of protocols incorporates two key innovations that overcome these
deficiencies :
 negotiation
 resource-adaptation

9
SPIN: A Data Centric Protocol For
Wireless Sensor Networks
Data-centric

protocols differ from traditional address-centric
protocols in the manner that the data is sent from source sensors to the
sink.
In

address-centric protocols, each source sensor that has the
appropriate data responds by sending its data to the sink
independently of all other sensors.
In

datacentricprotocols, when the source sensors send theirdata to
the sink, intermediate sensors can performsome form of aggregation
on the data originating from multiple source sensors and send the
aggregated data toward the sink.
SPIN
 SPIN-1
 SPIN-2

 The

SPIN family of protocols rests upon two basic ideas:

◦ To operate efficiently and to conserve energy
◦ Nodes in a network must monitor and adapt to changes in their own
energy resources to extend the operating lifetime of the system.

11
Meta-Data


SPIN does not specify a format for meta-data



Meta-data format is application specific

SPIN Messages


ADV-When a node has new data to share; it can advertise this
using ADV message containing Metadata.



REQ- Node sends an REQ when it needs to receive actual data.



DATA – Contains actual data message
SPIN-1 : 3-Stage Handshake Protocol (SPIN-PP)




Simple handshake protocol for disseminating data through a
lossless network
Work in three stages (ADV-REQ-DATA)
Node A starts by
advertising its data to node B
(a).
Node B responds by
sending a request to node A
(b).
After receiving the
requested data (c), node B
then sends out advertisement
to its neighbors (d), who in
turn send requests back to B
(e, f).

13
SPIN-1 : 3-Stage Handshake Protocol




SPIN-1 can be run in a completely unconfigured network with a small,
startup cost to determine nearest neighbors
If the topology of the network changes frequently, these change only
have to travel one hop before the nodes can continue running the
algorithm

SPIN-2 : SPIN-1 with a Low-Energy Threshold (SPIN-EC)


Adds a simple energy-conservation heuristic to the SPIN-1 protocol



When energy is plentiful, SPIN-2 nodes communicate using the same
3-stage protocol as SPIN-1 node



14

When its energy is approaching a low-energy threshold, it adapts by
reducing its participation in the protocol
Conclusions





SPIN solves the implosion and overlap
problems.
SPIN-1 and SPIN-2 are simple protocols for
wireless sensor networks.
SPIN-1 consumes only 25% energy w.r.t
flooding
SPIN-2 distributes 60% more data per unit
energy w.r.t flooding.
Thank you!

More Related Content

What's hot

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 

What's hot (20)

Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
TinyOS
TinyOSTinyOS
TinyOS
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor NetworksSPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 

Viewers also liked

Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 
015 spins
015 spins015 spins
015 spins
Sam Ram
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
Darpan Dekivadiya
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah
 

Viewers also liked (20)

Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Routing
RoutingRouting
Routing
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
015 spins
015 spins015 spins
015 spins
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Spinal cord trauma
Spinal cord traumaSpinal cord trauma
Spinal cord trauma
 

Similar to Sensor Protocols for Information via Negotiation (SPIN)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsn
Gr Patel
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
Sharon Roberts
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
prj_publication
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
Editor IJARCET
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 

Similar to Sensor Protocols for Information via Negotiation (SPIN) (20)

Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsn
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...Data Center Network Design Using Metrics And Their Results...
Data Center Network Design Using Metrics And Their Results...
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...Bidirectional data centric routing protocol to improve the energy efficiency ...
Bidirectional data centric routing protocol to improve the energy efficiency ...
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Sensor Protocols for Information via Negotiation (SPIN)

  • 1. Sensor Protocols for Infor mation via Ne gotiation (SPIN) Rajiv Agarwal B.Sc.(cs)Hons. 115090
  • 3. Wireless Sensor Network Wireless sensor networks consist of large number of nodes that have sensing, computing and communication capabilities. It is basically an interconnection between large number of nodes that are deployed for system monitoring by measuring its parameters. Wireless Networks of sensors are likely to be widely deployed in the future
  • 4.
  • 5. Limitations of a Sensor node Several obstacles need to overcome Energy - limited supply of energy simply performing computations and transmitting information in a wireless environment, energyconserving forms of communication and computation are essential . Computation - limited computing power so may be unable to run some network protocols. Communication - The bandwidth of the wireless links connecting sensor nodes is often limited, on the order of a few hundred Kbps.
  • 6.  Classic flooding A source node sends its data to all of its neighbors. Upon receiving a piece of data, each node then stores and sends a copy of the data to all of its neighbors.  limitations – Implosion – Overlap – Resource blindness
  • 7. Implosion (A) A B (A) C (A) (A) D The implosion problem. In this graph, node A starts by flooding its data to all of its neighbors. Two copies of the data eventually arrive at node D. The system energy waste energy and bandwidth in one unnecessary send and receive.
  • 8. Overlap q r s A B (q,r) (r,s) C The overlap problem. Two sensors cover an overlapping geographic region. When these sensors flood their data to node C, C receives two copies of the data marked r. 8
  • 9. Resource blindness In classic flooding, nodes do not modify their activities based on the amount of energy available to them at a given time. A network of embedded sensors can be “resource-aware” and adapt its communication and computation to the state of its energy resource. The SPIN (Sensor Protocols for Information via Negotiation) family of protocols incorporates two key innovations that overcome these deficiencies :  negotiation  resource-adaptation 9
  • 10. SPIN: A Data Centric Protocol For Wireless Sensor Networks Data-centric protocols differ from traditional address-centric protocols in the manner that the data is sent from source sensors to the sink. In address-centric protocols, each source sensor that has the appropriate data responds by sending its data to the sink independently of all other sensors. In datacentricprotocols, when the source sensors send theirdata to the sink, intermediate sensors can performsome form of aggregation on the data originating from multiple source sensors and send the aggregated data toward the sink.
  • 11. SPIN  SPIN-1  SPIN-2  The SPIN family of protocols rests upon two basic ideas: ◦ To operate efficiently and to conserve energy ◦ Nodes in a network must monitor and adapt to changes in their own energy resources to extend the operating lifetime of the system. 11
  • 12. Meta-Data  SPIN does not specify a format for meta-data  Meta-data format is application specific SPIN Messages  ADV-When a node has new data to share; it can advertise this using ADV message containing Metadata.  REQ- Node sends an REQ when it needs to receive actual data.  DATA – Contains actual data message
  • 13. SPIN-1 : 3-Stage Handshake Protocol (SPIN-PP)   Simple handshake protocol for disseminating data through a lossless network Work in three stages (ADV-REQ-DATA) Node A starts by advertising its data to node B (a). Node B responds by sending a request to node A (b). After receiving the requested data (c), node B then sends out advertisement to its neighbors (d), who in turn send requests back to B (e, f). 13
  • 14. SPIN-1 : 3-Stage Handshake Protocol   SPIN-1 can be run in a completely unconfigured network with a small, startup cost to determine nearest neighbors If the topology of the network changes frequently, these change only have to travel one hop before the nodes can continue running the algorithm SPIN-2 : SPIN-1 with a Low-Energy Threshold (SPIN-EC)  Adds a simple energy-conservation heuristic to the SPIN-1 protocol  When energy is plentiful, SPIN-2 nodes communicate using the same 3-stage protocol as SPIN-1 node  14 When its energy is approaching a low-energy threshold, it adapts by reducing its participation in the protocol
  • 15. Conclusions     SPIN solves the implosion and overlap problems. SPIN-1 and SPIN-2 are simple protocols for wireless sensor networks. SPIN-1 consumes only 25% energy w.r.t flooding SPIN-2 distributes 60% more data per unit energy w.r.t flooding.