A Review on Virtualization in Wireless Sensor Network

Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546 A Review on Virtualization in Wireless Sen...
Author: Kelly James
7 downloads 2 Views 333KB Size
Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546

A Review on Virtualization in Wireless Sensor Network Chandana Das, Siba Prasada Tripathy Roland Institute of Technology, Behampur, India [email protected], [email protected] Abstract- Wireless Sensor Network (WSNs) has played a vital role in current era on broad range of commercial applications such as in home automation, health-care and automation industry. In such kind of application multi-vendor and homogeneous sensor nodes are deployed. By allowing heterogeneous wireless sensor networks to coexist on a shared physical substrate, virtualization in sensor network it may provide flexibility, promote diversity, ensure security and increase manageability. This paper surveys the novel approach of using the virtual sensor architecture and give emphasis’s on the opportunities and the challenges in the research field. Keyword: Network architecture, network virtualization Virtualization in WSN, Physical substrate.

I.

II.

INTRODUCTION Some of the latest achievements in wireless communication and electronic have lower the cost factor and power, multifunctional sensor nodes that are of small size can communicate in shorter distance. The concept of WSN virtualization has bought the attention from industry and academia in a great deal [2] [4]. Virtualization on sensor network (VSN) can be defined by differentiating the roles of the traditional WSN service provider into two parts: first part is sensor infrastructure provider (SInP), and the second one is sensor virtualization network service provider (SVNSP). VIRTUAL SENSOR NETWORK A subset of sensor nodes of a WSN forms a Wireless Sensor Network. The subset of nodes belonging to the VSN (Virtual Sensor Network) carries out a specific task and

www.ijacta.com

supports functionality to create, maintain and operate. They may not be able to communicate directly with each other, as the nodes in a VSN may be distributed over the physical network. III.

VIRTUAL SENSOR NETWORK PROTOCOL ARCHITECTURE The increasing demand of WSN in different state-of-the-technology applications makes it necessary to differentiate between the roles of WSN infrastructure providers and service providers as they are of same entity. The reason behind this is to decrease the establishment cost, to reduce the manageability cost etc. VSN environment is a collection of multiple heterogeneous sensor networks from different SInP (Sensor Infrastructure Provider). a.

Sensor (SInP)

Infrastructure

Provider

SInP place strategically and manages the substrate physical sensor network resources in the field and such resources include different types of sensor nodes. SInPs signified through the type of services they provide. Among the sensor nodes there are few sensor gateway routers (SGR) that act as the sink node. The SGR are connected through high speed wireless network. All the SGR has sufficient power supply and other resources such as memory and computing power. SGR can host different virtual sensor gateway router (VSGR). b.

Sensor Virtualization Service Provider(SVNSP)

Network

Page 28

Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546 SVNSP grant the use of resources like memory, processing power and bandwidth from multiple SInPs 2 and both SVNSP consist of leased resources from SInP. c.

Application Level User (ALU)

ALU in VSN architecture are similar to those of the existing WSN, except that the existence of multiple SVNSPs from competing SInPs provides a wide range of choice. For multiple applications any end user from different SInP can connect to multiple VSNs. IV.

(Sensor Infrastructure Provider).There SVNPS such as SVNSP-1 and

RELATED WORKS From the past records the research community has mostly paid attention to issues of sensor networks, such as energy efficient routing issues, security and reliable transmission and data aggregation[1-2]. But recently a numbers of related researches have been performed on the virtualization of

sensor network [7] [3] [10]. V.

CHALLENGES There was a general thinking that tiny sensor node with its little processing capability could be applicable in very specific areas with very specific purposes. But with the rapid advancement of micro electro mechanical systems, the concept of the researcher has been dramatically changed. These sensor nodes have been implemented in various fields such as health care, management facility, building and home automation, personal sports and entertainment, asset management, environmental monitoring, security and safety and industrial automation.

A. Interfacing: Sensor Virtualization Network Service Provider(SVNSP) uses physical resources from one or more infrastructure provider to create sensor virtual networks. For allowing Virtual Service provider to communicate and express their requirements SInPs must provide well-defined interfaces. C. Resource Discovery In order to provide resource requested from different virtual service provider, infrastructure providers must be able to determine the topology of the sensor networks they manage as well as the status of the corresponding sensor network elements. D. Virtual Nodes and Virtual Link Embedding To overcome some of the multiple physical constraints such as change of latency, link capacity, platform compatibility issues, and even capabilities of destination physical gateway. Virtual link and node embedding is

B.

Resource Allocation

Resource allocation in a sensor network virtualization environment refers to static or dynamic allocation of virtual sensor gateway router nodes and links on physical nodes and paths, respectively. It may be known as the virtual sensor network embedding. an open research issue in VSN (Virtual Sensor Network). E. Service Level Agreement The service level agreement is the most challenging issues in the Virtual Sensor network. If SVNSP violates the service level agreement then there should be a penalty. SVNSP should ensure service level agreement to the application level users. Designing such type of typical interface is still a challenge in the resource areas. (Table 1 Project with detail on Virtual Sensor NetworkWSN)

Project

Research Area

FRESnel

To build a large scale federated sensor network framework with multiple applications sharing the same resources,

www.ijacta.com

are two SVNSP-

URL http://www.cl.cam.ac.uk/research/srg/ netos/fresnel/index.html

Page 29

Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546 VSNs

Random routing, virtual coordinates, and VSN support functions,

http://www.cnrl.colostate.edu/Project/ VSNs/vsns.html

SensorPlanet

Sensor Planet is a Nokia-initiated cooperation, a global research framework, on mobile device-centric large-scale Wireless Sensor Networks. Virtualization of sensor/actuator system, creating customized

http://www.sensorplanet.org/

ViSE

http://groups.geni.net/geni/wiki/ViSE

STONE

virtual sensor network test beds Energy-efficient Storage for sensors

http://sensors.cs.umass.edu/projects/e ssense/

DVM

To build a system that supports software reconfiguration in embedded sensor networks at multiple levels,

http://nesl.ee.ucla.edu/project/show/5 1

PRESTO

Takes a fresh look at the design of tiered largescale sensor networks,

http://presto.cs.umass.edu/

SensEye

Multi-tier multi-modal sensor networks Complex virtual sensors and user-created streams can be dynamically,

http://sensors.cs.umass.edu/projects/s enseye/

SenQ

Multiple, heterogeneous, networks can be

http://www.cs.virginia.edu/wsn/medic al/projects/senq

wireless

sensor

2. VI.

METHODOLOGY a.

System design architecture Design principles

principles

and

A design logic behind the VSN system is the selection of the Internet as the physical bearer between sensor platforms and the applications. The reason is that VSN-compliant sensor networks can be considered as a huge network, whose core is the Internet, where VSNcompliant client applications run.The main two drivers for the architectural design are: 1. Advanced Sensor Design. Advanced sensor design which is able to support advanced features in several fields ( such as energy saving, routing capability, middleware support, etc.). b.

Wireless Sensor Island (WSI): A WSI is any grouping of one or more legacy,

www.ijacta.com

VII.

Middleware Design Middleware design to mediate between applications and sensors. The major issues that the system architecture must address are (a) How a new application finds the sensors that it needs? (b) How it negotiates for the right to use those sensors with the organizations who deployed and administer them? (c) How an application reacts to changes in the network? GENERAL ARCHITECTURE

The Prior terms used to deal with the architecture of the VSN system is: a. Virtual Sensor Network (VSN): A VSN is the seamless (joint less) grouping of WSNs also called Wireless Sensor Islands as shown in figure1 proprietary, or VSN- aware sensor networks which are able to communicate,

Page 30

Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546

c.

d.

VIII.

respectively, via a legacy, proprietary, or VSN aware gateway node. A WSI is an autonomous administrative domain offering at least one service. VSN service: Defined as any combination of one or more operational and/or supporting services. As operational service, we define any sensing capability offered individually by a sensor nodes or collectively. By a WSI. As supporting services, we define functions that support the provisioning of the operational services. Many VSN services may be combined to offer new VSN services (as service mash-ups). Resource: A resource is defined as any physical or logical entity of a sensor node or of a WSI, which can be allocated, utilized, and released in order to realize a service. The three main actors can be identified: 1. WSI Enablers. 2. VSN Service providers, and 3. Users. SERVICE PROVIDER

In figure 2,Each VSN Service Provider offers a number of applications through a VSN Core framework that consists of one Dynamic Virtual Network Server (DVNS), a number of instanced VSN Managers and may also host some Legacy Gateway Interworking Functions . The VSN Manager is responsible for service negotiation, session establishment, and monitoring, while the LGW IF enables the interaction with legacy WSIs. The core part of the DVNS is the Services Registry. This is a database where all the known/registered WSI Enablers and the VSN services, which are known to this VSN service provider, are listed and described.. In Figure 3, SMAG stands for Sensor Mobile Access Gateway. This is a fully functional gateway of the sensor nodes in a particular WSN domain. In a battlefield there are many SMAGs which provide services for hosting different types of surveillance information. Individual SMAG communicate with application service gateway through the virtual service gateways. IX.

ROUTER VIRTUALIZATION

Router is the general term to refer to a network device that performs routing or switching operations. The router virtualization technologies

www.ijacta.com

can be described in the following three subsections and fundamentally different functionalities. a) Routers in Virtual OS: For better performance the OS is often customized to the specially designed hardware; some examples include VxWorks, Cisco’s Internetwork Operating System (IOS), Linux, and BSD. b) Router Control/Data Plane Virtualization: Routing table is the core component of routers that maps incoming packets to output ports. Some routers may have a single routing table for all packets, with the routing table being maintained by a single process. Where as some routers may have multiple routing tables, each table serving a different routing context. c) Hardware-Partitioned Router: Routers that support hardware partitioning may host multiple routing instances in a single device; these are called “protected system domains” [1][3][13] by Juniper Networks, or “logical routers” [4][14] by Cisco Systems. Hardware-partitioned routers are mainly deployed in Points of Presence (Pop) of network carriers to save space and power and reduce management cost. X. LINK VIRTUALIZATION Link virtualization technologies create “virtual links”, a term which has various interpretations and reveal the various layers of link virtualization. 1) Physical Channel Multiplexing: When discussing link virtualization, the first thing which comes to the discussion to need to be clarified is what exactly constitutes a “link”. If the link is a physical medium, then link virtualization might be identical to multiplexing. A physical medium could Wired or wireless such as fiber, copper cable and wireless spectrum respectively. Although multiplexing is generally not considered as a link virtualization technology but technologies such as time division multiplexing (TDM), frequency division multiplexing (FDM) and code division multiple access (CDMA) are widely used to multiplex distinct communication channels over a single physical medium

Page 31

Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546 2) Bandwidth Virtualization: In this part, “link virtualization” refers to combine the bandwidth of individual channels together to form virtual links technologies. a) Circuit: A virtual circuit is a circuit or a path between points in a network that appears to be a discrete, physical path but is actually a managed pool of circuit resource from which specific circuits are allocated as needed to meet traffic requirement b) Reverse Multiplexing: It is possible to combine bandwidth to create flexible service independent of the capacity of the underlying physical links and devices through the advancement in optical technologies. 3) Data Path Virtualization: It is the technique that doesn’t manipulate the channel itself, but rather the packets (data) carried on the channels. Two popular techniques are discussed below: a) Labels: Labels are also called as Tags, IDs. Labels occupy a certain fields and serve as identification and sharing mechanism .Labels are the important points in the virtual links or the data path so that they may point traffic to the right direction. b) Tunnels and Encapsulation: Tunnels (often using encapsulation techniques) provide virtual (logical) links to connect network devices that are not physically adjacent.[3][2][11]. XI. KEY RESOURCE DIRECTIONS Current network virtualization research mostly give emphasizes on the lingering problem of the internet. As a result of which several technical problems in terms of operation, instantiation and management of an overall network virtualization environment. Some of the examples related to instantiation are interfacing ,signaling and bootstrapping and resource allocation. a)

Interfacing: Infrastructure providers should create well define infrastructure and should allow service providers to communicate and express their requirements. For

www.ijacta.com

interoperability, the interfaces should follow some set of standards that express virtual network request in terms of virtual links and virtual nodes along with their corresponding attributes [2]. b) . Signaling and bootstrapping: The first and foremost part before creating a virtual network, a service provider must have network connectivity to one or more infrastructure provider in order to issue it request. To allow the service providers to customize the virtual resources to be allocated bootstrapping capabilities are required. Bootstrapping and signaling both call for another network that they will always present to provide connectivity to handle such issues [2][3]. c) Resource allocation: Allocating resource in a network virtualization environment refers to dynamic and static allocation of virtual nodes and links on physical nodes and path respectively [4]. XII. CONCLUSION In this paper, we have focused on the main challenges and features of the network virtualization. We have also concentrated on the future internet architecture research, deployment, and experimentation. Virtualization in sensor network is also effective in the battlefield, rock sliding, animals and civilians crossing the mountain retain. Our future emphasize is to build a large scale federated sensor network framework with multiple application sharing the same physical resources. XIII. ACKNOWLEDGEMENT We would like to thank the anonymous reviewers for their very useful comments that helped us a lot in enrich the quality and presentation of the paper. This work was supported by the staff of MCA department, principal, and Management of Roland Institute Of Technology.

Page 32

Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546

Figure 1:Overall architecture of the VSN proposed system.

Figure 2:Building Block Of The VSN Core Framework.

www.ijacta.com

Page 33

Copyright International Journal of Advance Computing Technique and Applications (IJACTA), ISSN : 2321-4546

Figure 3:The VSN Cascading Architecture. REFERENCE

[1] Md.Motaharual Islam, E.N Huh, Virtualization in Wireless Sensor network: Challenges and Opportunities, Journal Of Network, Vol.7,pp412-418 3 march 2012. [2] L sarakois, T Zahariadis, H C. Leligou and M Dohler, A Framework for Service Provisioning in Virtual Sensor Networks,EURASIP journal on wireless Communication and Networking 2012, pp1-19. [3] N.M.M kabir Chowdhury, R Boutaba,A Survey of Network Virtualization, vol 54, issue 5 8 April 2010,pages 862-876. [4] A.W member IEEE, M Iyer, R Dutta, G N.Rouskas, Fellows, IEEE and Illi Balandine, Member, IEE, Journal Of Lightwave Technology,Vol, 31,No 4, FEBUARY 15,2013. [5]Jeong-Hun Shin, Daeyeon Park, ‘A virtual infrastructure for large-scale wireless sensor networks’, Journal of Computer Communications, Volume 30, Issue 14-15, pp. 2853–2866, 2007. [6]Ming Li, Deepak Ganesan, M, and Prashant Shenoy, PRESTO: Feedback-Driven Data Management in Sensor Networks, IEEE/ACM Transactions on Networking, Vol.17, No. 4, pp. 1256-1269, August 2009. [7]Amiya Bhattacharya, Meddage S. Fernando, Partha Dasgupta, ‘Community Sensor Grids: Virtualization for Sharing across Domains’, In the Proceedings of the First Workshop on Virtualization in Mobile Computing, pages: 49-54, 2008, Colorado, USA. [8] P. A. Aranda-Gutirrez and J. Carapinha, “Cloud networking: Implications of agile virtualization on provider relationships,” in Proc. ECE-ASST, 2011, vol. 37. [9] R. Dutta, G. N. Rouskas, I. Baldine, A. Bragg, and D. Stevenson, “The SILO architecture for services integration, control, and optimization for the future internet,” in Proc. IEEE ICC 2007, Glasgow, U.K., Jun. 2007, pp. 1899–1944. [10] T. Anderson, L. Peterson, S. Shenker, and J. Turner, “Overcoming the Internet impasse through virtualization,” Computer, vol. 38, no. 4, pp.34–41, 2005.

www.ijacta.com

[11] B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar, “An integrated experimental environment for distributed systems and networks,” in Proc. 5th Symp.Operating Systems Design Implement., Boston, MA, Dec. 2002, pp.255–270. [12] M. Hibler, R. Ricci, L. Stoller, J. Duerig, S. Guruprasad, T. Stack, K.Webb, and J. Lepreau, “Largescale virtualization in the Emulab network testbed,” in Proc. ATC’08: USENIX 2008 Annual Technical Conf.Annual Technical, Berkeley, CA, 2008, pp. 113–128. [13] L. Rizzo, “Dummynet: A simple approach to the evaluation of network protocols,” in Proc. SIGCOMM Comput. Commun. Rev., 1997, vol. 27, no. 1, pp. 31–41. [14] L. Rizzo, “Dummynet and forward error correction,” in Proc. ATEC’98: Proc. Annual Conf. USENIX Annual Technical Conf., Berkeley, CA, USA, 1998, pp. 31–31. [15] K. Fall, “Network emulation in the Vint/NS simulator,” in Proc. ISCC’99 4th IEEE Symp. Computers Communications, Washington DC, 1999, p. 2-44.

Page 34

Suggest Documents