Clock Synchronization for Wireless Sensor Networks: A Survey

Download Report

Transcript Clock Synchronization for Wireless Sensor Networks: A Survey

Clock Synchronization for
Wireless Sensor Networks:
A Survey
Bharath Sundararaman, Ugo Buy, and
Ajay D. Kshemkalyani
Department of Computer Science
University of Illinois at Chicago
1
Outline
 I.
Introduction
 II. Synchronization protocols
 III. Comparison
 IV. Conclusion & comments
2
I. Introduction
3
Why synchronization?
 The
time of the day at which an event
happened.
 The time interval between two events.
 The relative ordering of events.
4
Requirements
 Cope
with unreliable network transmission
and unbounded message latencies.
 Able to estimate the local time on the other
node’s clock.
 Time must never run backward.
 Should not degrade system performance.
5
Several issues in synchronization (1/5)
 Master-slave
v.s. peer-to-peer
synchronization
Master-slave. The slave node consider the
clock reading of the master as the reference
time and attempt to synchronize with the master.
Peer-to-peer. Any node can communicate
directly with every node in the network. They
are more flexible but are also more difficult to
control.
6
Several issues in synchronization (2/5)
 Clock
correction versus untethered clocks
Clock correction. Correcting the local clock in
each node to run on par with a global time scale
or an atomic clock.
Untethered clock. Build a table of parameters
that relate the local clock of each node to the
local clock of every other node in the network.
When timestamps are exchanged between
nodes, they are transformed to the local clock
values of the receiving node.
7
Several issues in synchronization (3/5)
 Internal
synchronization v.s. external
synchronization
Internal synchronization. The goal is to
minimize the maximum difference between the
readings of local clocks of the sensors.
External synchronization. A standard source of
time is provided.
8
Several issues in synchronization (4/5)
 Probabilistic
v.s. deterministic
synchronization
Probabilistic synchronization. Provide a
probabilistic guarantee on the maximum clock
offset with a failure probability that can be
bounded or determined.
Deterministic synchronization. Guarantee an
upper bound on the clock offset with certainty.
9
Several issues in synchronization (5/5)

Sender-to-receiver v.s. receiver-to-receiver
synchronization
 Sender-to-receiver synchronization. The receiver
synchronizes with the sender using the time stamps
received. Message delay is calculated by measuring
the round-trip delay.
 Receiver-to-receiver synchronization. If any two
receivers receives the same message in single-hop
transmission, they receive it at approximately the same
time. The receivers exchange the time at which they
received the same message and compute their offset
based on the difference in reception time.
10
Terminology (1/3)
 Time:
The time of a clock in a machine p is
given by the function Cp(t), where Cp(t) = t
for a perfect clock.
 Frequency : Frequency is the rate at which
a clock progresses. The frequency at time t
of clock Ca is C’a(t).
 Offset: Clock offset is the difference
between the time reported by a clock and
the real time.
11
Terminology (2/3)
Skew: The skew of a clock is the difference in the
frequencies of the clock and the perfect clock.
The skew of a clock Ca relative to clock Cb at time
t is (C’a(t) − C’b(t)).
 Drift (rate): The drift of clock Ca is the second
derivative of the clock value with respect to time,
namely C’’a (t). The drift of clock Ca relative to
clock Cb at time t is (C’’a (t) − C’’b (t)).

12
Terminology (3/3)

A timer is said to be working within its
specification if
where constant ρ is the maximum skew rate
specified by the manufacturer.
13
II. Synchronization protocols
14
Remote clock reading method
The client then sets its time to Stime (accurate time
from the server) + (T1-T0)/2 (time required to
transmit the message).
 The time for any message to be sent is highly
variable due to network traffic and message
routing.

15
Time transmission method (1/2)
M
is the source node and S is the target
node.
 M sends a series of synchronization
messages to S. The ith message is sent at
time Ti of M’s clock and received at time Ri
of S’s clock.
Ti
M
Ri
S
16
Time transmission method (2/2)
δ: the offset between clock S
and M
d: message delay
17
Set-valued estimation method (1/3)

We assume that the local times ti and tj on
processors Pi and Pj ,respectively, can be related
by the linear equation:
 ti = aijtj + bij
 where aij and bij represent the relative skew and offset
between the two hardware clocks.

Time-stamped triples.
18
Set-valued estimation method (2/3)
19
Set-valued estimation method (3/3)
20
Reference broadcast
synchronization (1/5)
 RBS
seeks to reduce nondeterministic
latency using receiver-to-receiver
synchronization and to conserve energy via
post-facto synchronization.
21
Reference broadcast
synchronization (2/5)
Time critical path: nondeterministic delay
22
Reference broadcast
synchronization (3/5)

Receiver j will compute its offset relative to any
other receiver i as the average of clock
differences for each packet received by nodes i
and j.
23
Reference broadcast
synchronization (4/5)
24
Reference broadcast
synchronization (5/5)
 The
largest sources of error are removed.
 Require O(n2) message exchanges for a
network of n nodes.
25
Romer’s protocol (1/4)
 Uses
innovative time transformation
algorithm for achieving clock
synchronization
 Assumptions:
There is a maximum skew ρ of computer clocks
Whenever a message is exchanged between
two nodes, the connection remains long enough
for the two nodes to exchange one additional
message.
26
Romer’s protocol (2/4)
Real time difference Δt
 Computer clock difference ΔC1, ΔC2
 Skew upper bound for node 1 and node 2 are ρ 1
and ρ2,, respectively.

C
 1   
t
1  1 t  C1  1  1 t
1    
C1
C1
 t 
1  1
1  1
1  2 t  C2
 1   2 t
1  2
1  2
C1  C2 
C1
1  1
1  1
27
Romer’s protocol (3/4)

The message delay between two node is
estimated by bounding it within interval
[0, rtt]
28
Romer’s protocol (4/4)
Require low resource and message overhead.
 The synchronization error increases with the
number of hops along the path of the message
containing the timestamp.

29
Timing-sync Protocol for sensor
networks (1/3)
 A self-configuring
hierarchical structure.
 A node in this structure can simultaneous
act as a synchronization server to a number
of client nodes and as a synchronization
client to another node.
30
Timing-sync Protocol for sensor
networks (2/3)

Two phase.
 Level discovery phase. It is based on constrained flooding. The
root node is assigned level 0; The receiver assign themselves a
level that is one greater than the level in the packet received.
 Synchronization phase. T2=T1+δ+d and δ represents the clock
offset between two nodes and d represents the propagation
delay.
T4  T3    d
T2  T1    d

T2  T1   T4  T3  ; d  T2  T1   T4  T3 
2
2
31
Timing-sync Protocol for sensor
networks (3/3)
 The
protocol is scalable and the accuracy
does not degrade significantly as the size of
the network is increased.
 The protocol requires a hierarchical
infrastructure which makes it unsuitable for
highly mobile nodes.
32
III. Comparison
33
Quantitatively evaluation (1/2)


Synchronization precision
Piggybacking
 Reduction of message traffic

Computational complexity
 Run time and memory requirements
 Number of messages exchanged

Convergence time
 Total time required to synchronize a network


Network size
Compatibility with sleep mode
 Synchronize and active only when application demands it.
34
Quantitatively evaluation (2/2)
Protocols
Precision
Piggybacking
Complexity
Convergence
time
Network
size
Sleep
mode
RBS [19]
1.85
± 1.28 μs
N/A
High
N/A
2-20 Nodes
Yes
Romer [56]
3 ms
Yes
Low
N/A
Unknown
Yes
TSPN [25]
16.9 μs
No
Low
Unknown
150-300
Nodes
Yes
35
Qualitatively evaluation (1/2)
 Energy
efficiency
 Accuracy
How well the time maintained within the network
is true to the standard time
 Scalability
 Overall
complexity
 Fault tolerance
Poor reliability of message delivery
36
Qualitatively evaluation (2/2)
Protocols
Accuracy
Energy
Efficiency
Overall
Complexity
Scalability
Fault
Tolerance
RBS[19]
High
High
High
Good
No
Romer [56] Low
High
Low
Poor
No
TSPN[25]
Average
Low
Good
Yes
High
37
IV. Conclusion & comments
38
Conclusion
 The
design considerations presented will
help designers in building successful
synchronization scheme, best tailored to his
application.
39
Comments

Pros
 It is a good start to begin studying synchronization.
 Design tradeoffs are discussed and these help us in
designing synchronization protocols.

Cons
 Some protocols’ description are too rough to be useful.
 The authors didn’t conduct any experiment to verify the
claimed results.
40