Visibility: A New Metric for Protocol Design

Size: px
Start display at page:

Download "Visibility: A New Metric for Protocol Design"

Transcription

1 Visibility: A ew Metric for Protocol Design Megan Wachs, Jung Il Choi, Jung Woo Lee, Kannan Srinivasan, Zhe Chen*, Mayank Jain, & Philip Levis Stanford University, *Columbia University

2 Visibility What are we doing wrong?

3 Visibility It is difficult to observe what occurs deep within a sensor network. This is the direct result of energy constraints on a mote. This lack of visibility directly hinders development.

4 Contribution This talk is OT about a debugging tool This talk is about quantifying how easy it is to debug a protocol

5 Visibility Cost The energy required to diagnose the cause of a failure or behavior

6 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion

7 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion

8 What kinds of failures are observed in real deployments?

9 What kinds of failures are observed in real deployments? Identifiable Failures

10 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts

11 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts etwork Problems: Saturation & Congestion

12 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts etwork Problems: Saturation & Congestion Protocol Issues: Conflicts & Failures

13 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts etwork Problems: Saturation & Congestion Protocol Issues: Conflicts & Failures Unknown Collisions? Interference? Buggy code? Hardware problems?

14 Effects of Failures on Deployment Performance Great Duck Island: 58% Peter Scott R. Szewczyk, J. Polastre, A. Mainwaring, and D. Culler. An analysis of a large scale habitat monitoring application. In Proceedings of the Second ACM Conference On Embedded etworked Sensor Systems (SenSys), 2004.

15 Effects of Failures on Deployment Performance Great Duck Island: 58% Redwoods : 40% G. Tolle, J. Polastre, R. Szewczyk, D. Culler,. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay,, and W. Hong. A macroscope in the redwoods. In Proceedings of the Third ACM Conference on Embedded etworked Sensor Systems (SenSys), 2005.

16 Effects of Failures on Deployment Performance Great Duck Island: 58% Redwoods : 40% Potato Field: 2% K. Langendoen, A. Baggio, and O. Visser. Murphy loves potatoes: Experiences from a pilot sensor network deployment in precision agriculture. In the Fourteenth Int. Workshop on Parallel and Distributed Real-Time Systems (WPDRTS), 2006.

17 Effects of Failures on Deployment Performance Great Duck Island: 58% Redwoods : 40% Potato Field: 2% Volcan Reventador: 68% G. Werner-Allen, K. Lorincz, J. Johnson, J. Leess, and M. Welsh. Monitoring volcanic eruptions with a wireless sensor network. In Proceedings of the Second European Workshop on Wireless Sensor etworks (EWS), 2005.

18 Management and Debugging Sympathy Lightweight RPC etwork Snooping Tools

19 Example Protocol: Collection Tree

20 Example Protocol: Possible Causes

21 Example Protocol: Possible Causes

22 Example Protocol: Possible Causes

23 Example Protocol: Possible Causes

24 Example Protocol: Possible Causes

25 Example Protocol: Decision Tree Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Duplicate Suppression? Duplicate Suppression Above Max Tx? Egress Drop Ingress Drop? Ingress Drop Link Layer Failure

26 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion

27 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior.

28 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Cause A Q1 Cause B Q2 Q3 Cause C Cause D

29 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Cause A Q1: cost = 0 Q2: cost = C Cause B Q3: cost = C Cause C Cause D

30 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Cause A Q1: cost = 0 Q2: cost = C Cause B Q3: cost = C Cause C Cause D

31 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A Q2: cost = C Cause B C Q3: cost = C Cause C Cause D

32 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A 0 Q2: cost = C Cause B C Q3: cost = C Cause C 2C Cause D 2C

33 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A Q2: cost = C Cause B 0.25 C Q3: cost = C Cause C C Cause D C

34 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A Q2: cost = C Cause B 0.25 C Q3: cost = C Cause C C Cause D 0.25 Visibility Cost = 1.25 C 2C

35 Increasing Visibility Q1: cost = 0 Cause A Q2: cost = C Cause B 0.33 C Cause C 0.33 C Remove Leaves From the Tree Visibility Cost = 0.66 C

36 Increasing Visibility Q1: cost = 0 Cause A Q2: cost = Cause B Cause C Reduce Cost of Questions Visibility Cost = 0.00 C

37 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion

38 A Design Example: Pull Collection Protocol

39 Diagnosing Why Packets Were Lost Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Above Max Tx? Egress Drop Ingress Drop? Ingress Drop Link Layer Failure

40 Diagnosing Why Packets Were Lost Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Above Max Tx? Egress Drop Ingress Drop? Ingress Drop Link Layer Failure

41 Eliminating Egress Drops Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Ingress Drop? Ingress Drop Link Layer Failure

42 Eliminating Ingress Drops Traditional Rate Control

43 Eliminating Ingress Drops Traditional Rate Control

44 Eliminating Ingress Drops Traditional Rate Control

45 Eliminating Ingress Drops Pull-Based Rate Control

46 Eliminating Ingress Drops Pull-Based Rate Control

47 Eliminating Ingress Drops Pull-Based Rate Control

48 Eliminating Ingress Drops Pull-Based Rate Control

49 Eliminating Ingress Drops Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Ingress Drop? Ingress Drop Link Layer Failure

50 Eliminating Ingress Drops Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Link Layer Failure

51 PCP Decision Tree Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Link Layer Failure Traverse the remainder with information included in packets, used by the protocol itself

52 Evaluating PCP 40-ode MoteLab Testbed PCP: sending as fast as possible. MultihopLQI: 1300ms, 800ms, and 20ms packet generation interval Interference-Aware SIGCOMM 2006 Fair Rate Control (IFRC): Results from Metrics: Reliability Fairness Throughput Visibility

53 PCP Performance Delivery Probability MultihopLQI 1300ms IFRC PCP MultihopLQI 800ms Throughput (pps)

54 PCP Fairness Fairness (JFI) PCP MultihopLQI1300ms MultihopLQI800ms MultihopLQI20ms IFRC

55 PCP Visibility MultihopLQI visibility cost at 800ms interval: 1.615C PCP visibility cost: 0.00 C

56 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion

57 Applying Visibility: Deluge Dissemination Protocol Advertises odes new binary with advertisement packets send requests for new binary from best neighbor Why does a node still have an out-of-date binary? Two expensive causes to diagnose: Suppressions Interference due to misbehaving nodes during binary transmission

58 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission

59 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission Request

60 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission Request

61 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission

62 V-Deluge Visibility Deluge Visibility: 1.02 C V-Deluge Visibility: 1.00 C

63 Total Packets Sent (thousands) V-Deluge Performance Deluge V-Deluge Time (sec)

64 Percentage of odes with Full Binary V-Deluge Performance Deluge V-Deluge 100% 75% 50% 25% 0% Time (sec)

65 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion

66 Future Work Refining the visibility metric Visibility in networks with multiple protocols depends on isolation between protocols

67 Conclusions We should consider the visibility of a protocol along with traditional metrics The visibility metric provides a new way for thinking about and comparing protocols Visibility has broader implications: systems, languages

68 Comments & Questions?

69 Extra Slides

70 Management and Debugging Sympathy Receive o Packets? Seq. # is zero? Disconnection Reboot Duplicate Suppression? Above Max Tx? Alien Failure? Default Overload? Duplicates Egress Drop Ingress Drop? Ingress Drop Overload Gamma Ray? Alien Failure Deadlock Suppression? Alpha Radiation Flipped Bits Suppression Link Layer Failure

71 Management and Debugging Sympathy Receive o Packets? Disconnection Link Layer Failure

72 Increasing Visibility Q1: cost = 0 Cause A Q2: cost = C Cause B 0.33 C Cause C 0.10 C Reduce Probability of Expensive Causes Visibility Cost = 0.43 C

73 Conclusions Are we just changing the question: Why is the network dropping packets? becomes Why is a node not sending any packets?

Opening the Sensornet Black Box. Megan Wachs, Jung Woo Lee, Jung Il Choi, & Philip Levis Computer Systems Laboratory, Stanford University

Opening the Sensornet Black Box. Megan Wachs, Jung Woo Lee, Jung Il Choi, & Philip Levis Computer Systems Laboratory, Stanford University Opening the Sensornet Black Box Megan Wachs, Jung Woo Lee, Jung Il Choi, & Philip Levis Computer Systems Laboratory, Stanford University The Sensornet Black Box It is difficult to observe what occurs deep

More information

Visibility: A New Metric For Protocol Design

Visibility: A New Metric For Protocol Design Visibility: A ew Metric For Protocol Design Megan Wachs, Jung Il Choi, Jung Woo Lee, Kannan Srinivasan, Zhe Chen, Mayank Jain, and Philip Levis Computer Systems Laboratory, Stanford University, Stanford,

More information

Opening the Sensornet Black Box

Opening the Sensornet Black Box Opening the Sensornet Black Box Jung Il Choi, Jung Woo Lee, Megan Wachs, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA 94305 Abstract We argue that the principal cause of

More information

An Empirical Study of Data Collection Protocols for Wireless Sensor Networks

An Empirical Study of Data Collection Protocols for Wireless Sensor Networks An Empirical Study of Data Collection Protocols for Wireless Sensor Networks Stephen Rothery stevekr@gmail.com Wen Hu wen.hu@csiro.au Peter Corke peter.corke@csiro.au Abstract In the past few years, numerous

More information

Granting Silence to Avoid Wireless Collisions

Granting Silence to Avoid Wireless Collisions Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route

More information

Deployment of Sensor Networks: Problems and Passive Inspection. Matthias Ringwald, Kay Römer (ETH Zurich)

Deployment of Sensor Networks: Problems and Passive Inspection. Matthias Ringwald, Kay Römer (ETH Zurich) Deployment of Sensor Networks: Problems and Passive Inspection Matthias Ringwald, Kay Römer (ETH Zurich) Sensor Networks Ad hoc network of sensor nodes Perceive real world (sensors) Process data (microcontroller)

More information

Routing: Collection Tree Protocol. Original slides by Omprakash Gnawal

Routing: Collection Tree Protocol. Original slides by Omprakash Gnawal Routing: Collection Tree Protocol Original slides by Omprakash Gnawal Collection Anycast route to the sink(s) collects data from the network to a small number of sinks network primitive for other protocols

More information

Starburst SSD: An Efficient Protocol for Selective Dissemination

Starburst SSD: An Efficient Protocol for Selective Dissemination Starburst SSD: An Efficient Protocol for Selective Dissemination Tahir Azim Stanford University Stanford, California 9435 Email:tazim@cs.stanford.edu Qasim Mansoor National University of Sciences and Technology

More information

A Measurement-based Analysis of the Interaction between Network Layers in TinyOS

A Measurement-based Analysis of the Interaction between Network Layers in TinyOS A Measurement-based Analysis of the Interaction between Network Layers in TinyOS Umberto Malesci 1,2, and Samuel Madden 1 1 MIT CSAIL Cambridge, MA 02139 {umberto, madden}@csail.mit.edu 2 Fluidmesh Networks,

More information

Passive Distributed Assertions for Sensor Networks

Passive Distributed Assertions for Sensor Networks Passive Distributed Assertions for Sensor Networks Kay Römer Institute for Pervasive Computing ETH Zurich, Switzerland roemer@inf.ethz.ch Abstract When deployed in a real-world setting, many sensor networks

More information

Collection Tree Protocol

Collection Tree Protocol Collection Tree Protocol Omprakash Gnawali (Stanford University) with Rodrigo Fonseca (Brown University) Kyle Jamieson (University College London) David Moss (People Power Company) Philip Levis (Stanford

More information

On Testing Wireless Sensor Networks

On Testing Wireless Sensor Networks On Testing Wireless Sensor Networks Tomasz Surmacz, Bartosz Wojciechowski, Maciej Nikodem, and Mariusz Słabicki Abstract Testing wireless sensor networks (WSNs) is not a trivial task, due to the massively-parallel

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Realistic Sensing Area Modeling

Realistic Sensing Area Modeling Realistic Sensing Area Modeling Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis {jhwang,yugu,tianhe,kyd}@cs.umn.edu Abstract Despite the

More information

Wireless Sensor Networks: From Science to Reality. Kay Römer ETH Zurich

Wireless Sensor Networks: From Science to Reality. Kay Römer ETH Zurich Wireless Sensor Networks: From Science to Reality Kay Römer ETH Zurich Sensor Networks Ad hoc network of sensor nodes Perceive (sensors) Process (microcontroller) Communicate (radio) Autonomous power supply

More information

Measurement and Analysis on the Packet Delivery Performance in A Large Scale Sensor Network

Measurement and Analysis on the Packet Delivery Performance in A Large Scale Sensor Network Measurement and Analysis on the Packet Delivery Performance in A Large Scale Sensor Network Wei Dong, Yunhao Liu, Yuan He, Tong Zhu CS College, Zhejiang University; TNLIST, Tsinghua University; CSE Dept.

More information

Data Discovery and Dissemination with DIP

Data Discovery and Dissemination with DIP Data Discovery and Dissemination with DIP Authors: Kaisen Lin, Philip Levis Speaker: Giannakakis Spyridon 10-937-548 ETH Zurich, D-INFK March 22, 2011 1 / 24 Problem How to efficiently distribute binaries

More information

Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x

Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x Dhaval Patel, 1 Bijal Chawla, 2 Chandresh Parekh 3 12 PG Student, Department of Wireless Mobile Computing, Gujarat

More information

The Internet vs. Sensor Nets

The Internet vs. Sensor Nets The Internet vs. Sensor Nets, Philip Levis 5/5/04 0 The Internet vs. Sensor Nets What they ve learned, Philip Levis 5/5/04 1 The Internet vs. Sensor Nets What they ve learned, and we ve forgotten. Philip

More information

The Firecracker Protocol

The Firecracker Protocol The Firecracker Protocol Philip Levis and David Culler {pal,culler}@eecs.berkeley.edu EECS Department University of California, Berkeley Berkeley, CA 94720 ABSTRACT We propose the Firecracker protocol

More information

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter

Collection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Protocols Why do we need collection protocols? Collecting data at a base station is a

More information

Collecting and processing data from wireless sensor networks

Collecting and processing data from wireless sensor networks Collecting and processing data from wireless sensor networks Pavel Vajsar 1, Patrik Morávek 1, Petr Žoldoš 1 1 Faculty of Electrical Engineering and Communication Brno University of Technology Email: pavel.vajsar@phd.feec.vutbr.cz,

More information

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan

More information

Apples, Oranges, and Testbeds

Apples, Oranges, and Testbeds Apples, Oranges, and Testbeds Koen Langendoen Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology, The Netherlands K.G.Langendoen@tudelft.nl Abstract Research

More information

Practical Network Coding in Sensor Networks: Quo Vadis?

Practical Network Coding in Sensor Networks: Quo Vadis? Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),

More information

Experiences from a Decade Development

Experiences from a Decade Development Experiences from a Decade of Development Philip Levis Stanford University @OSDI 2012 1 2 Back to 1999... Information technology (IT) is on the verge of another revolution The use of EmNets [embedded networks]

More information

Understanding Routing Dynamics in a Large-scale Wireless Sensor Network

Understanding Routing Dynamics in a Large-scale Wireless Sensor Network 23 IEEE th International Conference on Mobile Ad-Hoc and Sensor Systems Understanding Routing Dynamics in a Large-scale Wireless Sensor Network Tong Zhu,2, Wei Dong 3, Yuan He 2, Qiang Ma 2, Lufeng Mo

More information

Rethinking Multi-Channel Protocols in Wireless Sensor Networks

Rethinking Multi-Channel Protocols in Wireless Sensor Networks Rethinking Multi-Channel Protocols in Wireless Sensor Networks Chieh-Jan Mike Liang Department of Computer Science Johns Hopkins University cliang4@cs.jhu.edu Andreas Terzis Department of Computer Science

More information

A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks

A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College

More information

CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks

CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College

More information

SensorBench: Benchmarking Approaches to Processing Wireless Sensor Network Data

SensorBench: Benchmarking Approaches to Processing Wireless Sensor Network Data SensorBench: Benchmarking Approaches to Processing Wireless Sensor Network Data Ixent Galpin 1, Alan B. Stokes 2, George Valkanas 3, Alasdair J. G. Gray 4, Norman W. Paton 2, Alvaro A. A. Fernandes 2,

More information

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University

More information

Impact of Mobile Sink Speed on the Performance of Wireless Sensor Networks

Impact of Mobile Sink Speed on the Performance of Wireless Sensor Networks Journal of Information & Communication Technology Vol. 1, No. 2, (Fall 2007) 49-55 ABSTRACT This paper investigates the impact of mobile sink speed on the performance of Wireless Sensor Networks (WSNs).

More information

Energy-Directed Test Suite Optimization

Energy-Directed Test Suite Optimization Energy-Directed Test Suite Optimization Ding Li, Cagri Sahin, James Clause, and William G.J. Halfond Computer Science Department University of Southern California, Los Angeles, CA, USA Computer and Information

More information

Never replicate a successful experiment. -Fett's law.

Never replicate a successful experiment. -Fett's law. Never replicate a successful experiment -Fett's law. Fidelity and Yield in a Volcano Monitoring Sensor Network Authors: Geoffrey Werner-Allen, Konrad Lorincz, and Matt Welsh Harvard University Jeff Johnson

More information

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a

More information

Architectural Principles of the Internet

Architectural Principles of the Internet TLEN7000/ECEN7002: Analytical Foundations of Networks Architectural Principles of the Internet Lijun Chen 11/27/2012 The Internet Protocol Stack TCP/IP was first proposed in 1973 The specifications are

More information

The κ Factor: Inferring Protocol Performance Using Inter-link Reception Correlation

The κ Factor: Inferring Protocol Performance Using Inter-link Reception Correlation The κ Factor: Inferring Protocol Performance Using Inter-link Reception Correlation Kannan Srinivasan, Mayank Jain, Jung Il Choi, Tahir Azim, Edward S Kim, Philip Levis, and Bhaskar Krishnamachari {srikank,

More information

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University

More information

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System

WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System Basem Shihada Computer Science & Electrical Engineering CEMSE, KAUST University of Waterloo Seminar December 8 th, 2014 2 3 How

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3, Issue 2, July- September (2012), pp. 470-477 IAEME: www.iaeme.com/ijcet.html Journal

More information

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri

Design of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve

More information

Technical Report. A Framework for Programming Sensor Networks with Scheduling and Resource- Sharing Optimizations

Technical Report. A Framework for Programming Sensor Networks with Scheduling and Resource- Sharing Optimizations www.hurray.isep.ipp.pt Technical Report A Framework for Programming Sensor Networks with Scheduling and Resource- Sharing Optimizations Vikram Gupta Eduardo Tovar Karthik Lakshmanan Ragunathan (Raj) Rajkumar

More information

Leveraging IP for Sensor Network Deployment

Leveraging IP for Sensor Network Deployment Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirström, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science {simonduq,niwi,nvt,adam}@sics.se ABSTRACT Ease of deployment

More information

Energy-Efficient Self-Organization for Wireless Sensor Networks

Energy-Efficient Self-Organization for Wireless Sensor Networks Energy-Efficient Self-Organization for Wireless Sensor Networks Thomas Watteyne CTTC, 22nd May 2007 Thomas Watteyne, PhD. candidate CITI Laboratory INRIA / INSA de Lyon France Telecom R&D Grenoble Advisor:

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get

More information

MNP: Multihop Network Reprogramming Service for Sensor Networks 1

MNP: Multihop Network Reprogramming Service for Sensor Networks 1 MNP: Multihop Network Reprogramming Service for Sensor Networks Sandeep S. Kulkarni Limin Wang Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan

More information

Modeling Energy Consumption of Wireless Sensor Networks by SystemC

Modeling Energy Consumption of Wireless Sensor Networks by SystemC 2010 Fifth International Conference on Systems and Networks Communications Modeling Energy Consumption of Wireless Sensor Networks by SystemC Wan Du, Fabien Mieyeville, and David Navarro Lyon Institute

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Benchmarking for Wireless Sensor Networks

Benchmarking for Wireless Sensor Networks Benchmarking for Wireless Sensor Networks Jono Vanhie-Van Gerwen, Stefan Bouckaert, Ingrid Moerman, Piet Demeester Department of Information Technology (INTEC) Ghent University - IBBT Ghent, Belgium Email:

More information

Efficient Online Estimation of Bursty Wireless Links

Efficient Online Estimation of Bursty Wireless Links Efficient Online Estimation of Bursty Wireless Links Muhammad Hamad Alizai, Hanno Wirtz, Georg Kunz, Benjamin Grap, Klaus Wehrle Communication and Distributed Systems (ComSys), RWTH Aachen University,

More information

WSN WIRELESS WSN WSN WSN. Application agriculture SENSOR. Application geophysical. Application agriculture NETWORK: 11/30/2016

WSN WIRELESS WSN WSN WSN. Application agriculture SENSOR. Application geophysical. Application agriculture NETWORK: 11/30/2016 WIRELESS SENSOR NETWORK: ENERGY CONSERVATION APPROACHES agriculture Localized environmental conditions varies over short distances. Yitian Shui agriculture Problems of traditional monitoring techniques

More information

Towards a Wireless Lexicon. Philip Levis Computer Systems Lab Stanford University 20.viii.2007

Towards a Wireless Lexicon. Philip Levis Computer Systems Lab Stanford University 20.viii.2007 Towards a Wireless Lexicon Philip Levis Computer Systems Lab Stanford University 20.viii.2007 Low Power Wireless Low cost, numerous devices Wireless sensornets Personal area networks (PANs) Ad-hoc networks

More information

Towards Robust and Flexible Low-Power Wireless Networking

Towards Robust and Flexible Low-Power Wireless Networking Towards Robust and Flexible Low-Power Wireless Networking Philip Levis (joint work with Leonidas Guibas) Computer Systems Lab Stanford University 3.vii.2007 Low Power Wireless Low cost, numerous devices

More information

Application Aware Data Aggregation in Wireless Sensor Networks

Application Aware Data Aggregation in Wireless Sensor Networks Application Aware Data Aggregation in Wireless Sensor Networks Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul,

More information

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks Turkmen Canli, Zhihui Chen, Ashfaq Khokhar University of Illinois at Chicago Ajay Gupta Western Michigan University Abstract-This

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks

An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks Abstract A substantial amount of research on routing in sensor networks has focused upon methods for constructing the best

More information

Minimization of Collision in Energy Constrained Wireless Sensor Network

Minimization of Collision in Energy Constrained Wireless Sensor Network Wireless Sensor Network, 2009, 1, 350-357 doi:10.4236/wsn.2009.14043 Published Online November 2009 (http://www.scirp.org/journal/wsn). Minimization of Collision in Energy Constrained Wireless Sensor Network

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Network Scheduling for Data Archiving Applications in Sensor Networks

Network Scheduling for Data Archiving Applications in Sensor Networks Network Scheduling for Data Archiving Applications in Sensor Networks Yong Yao S. M. Nazrul Alam Johannes Gehrke Sergio D. Servetto Department of Computer Science, School of Electrical and Computer Engineering

More information

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN

A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN Sweta A.Kahurke M.Tech(IV) Wireless communication & Computing G.H.Raisoni College Of Engineering

More information

Congestion Detection Approaches In Wireless Sensor Networks: -A Comparative Study

Congestion Detection Approaches In Wireless Sensor Networks: -A Comparative Study International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 12, Issue 3 (March 2016), PP.59-63 Congestion Detection Approaches In Wireless Sensor

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Crankshaft: An Energy-Efficient MAC-Protocol for Dense Wireless Sensor Networks

Crankshaft: An Energy-Efficient MAC-Protocol for Dense Wireless Sensor Networks : An Energy-Efficient MAC-Protocol for Dense Wireless Sensor Networks G.P. Halkes and K.G. Langendoen Faculty of Electrical Engineering, Mathematics and Computer Science Delft University of Technology,

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Cross Layering in MANETs Design: The MobileMAN Approach

Cross Layering in MANETs Design: The MobileMAN Approach National Research Council - Pisa - Italy Cross Layering in MANETs Design: The MobileMAN Approach Marco Conti Italian National Research Council (CNR) IIT Institute Pisa, Italy marco.conti@iit.cnr.it Slide

More information

Abstract The wireless sensor network community approached networking abstractions as an open question, allowing answers

Abstract The wireless sensor network community approached networking abstractions as an open question, allowing answers The Emergence of a Networking Primitive in Wireless Sensor Networks doi:.1145/1364782. 1 3 6 4 8 0 4 By Philip Levis, Eric Brewer, David Culler, David Gay, Sam Madden, Neil Patel, Joe Polastre, Scott Shenker,

More information

SensorScope: Out-of-the-Box Environmental Monitoring

SensorScope: Out-of-the-Box Environmental Monitoring 28 International Conference on Information Processing in Sensor Networks SensorScope: Out-of-the-Box Environmental Monitoring Guillermo Barrenetxea, François Ingelrest, Gunnar Schaefer, and Martin Vetterli

More information

A Global-State Perspective on Sensor Network Debugging

A Global-State Perspective on Sensor Network Debugging A Global-State Perspective on Sensor Network Debugging M. Lodder G.P. Halkes K.G. Langendoen Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology The Netherlands

More information

Metrics for Sensor Network Platforms

Metrics for Sensor Network Platforms Metrics for Sensor Network Platforms Jan Beutel Computer Engineering and Networks Lab, ETH Zurich 19-Jun-06 Wireless Sensor Networks Visions 1991 1996 1999 2000 2001 2003 2004 Ubiquitous Vision Smart Dust

More information

Architecture and Evaluation of an Unplanned b Mesh Network

Architecture and Evaluation of an Unplanned b Mesh Network Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May

More information

Wireless Sensor Networks CS742

Wireless Sensor Networks CS742 Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture

More information

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science

MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC

More information

An Enhanced Data Collection for Wireless Sensor Network Using Topology Routing Tree

An Enhanced Data Collection for Wireless Sensor Network Using Topology Routing Tree An Enhanced Data Collection for Wireless Sensor Network Using Topology Routing Tree I V.Priya., II S.Nivas I Research Scholar, Bharathiar University, Coimbatore, II Assistant Professor, CS, I, II Dept.

More information

Why today's sensor networks don't sell... and what can be done about it.

Why today's sensor networks don't sell... and what can be done about it. Why today's sensor networks don't sell... and what can be done about it. Jan Beutel Computer Engineering and Networks Lab, ETH Zurich 23-Nov-05 Outline Why today s sensor networks don t sell Motivation:

More information

New RF Models of the TinyOS Simulator for IEEE Standard

New RF Models of the TinyOS Simulator for IEEE Standard New RF Models of the TinyOS Simulator for IEEE 82.15.4 Standard Changsu Suh, Jung-Eun Joung and Young-Bae Ko R & D Departments, Hanback Electronics Company, Daejeon, Republic of Korea College of Information

More information

QoF: Towards Comprehensive Path Quality Measurement in Wireless Sensor Networks

QoF: Towards Comprehensive Path Quality Measurement in Wireless Sensor Networks : Towards Comprehensive Path Quality Measurement in Wireless Sensor Networks Jiliang Wang, Yunhao Liu,MoLi, Wei Dong, Yuan He CSE Department, The Hong Kong University of Science and Technology TNLIST,

More information

CS263 Wireless Sensor Networks

CS263 Wireless Sensor Networks CS263 Wireless Sensor Networks Lecture 1: Introduction Prof. Matt Welsh Harvard University January 29, 2009 Introduction: Wireless Sensor Networks TMote Sky (Sentilla) Tiny, low-power, wireless sensors

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

The method of GBR optimization by special parameters to decrease energy consumption in WSNs

The method of GBR optimization by special parameters to decrease energy consumption in WSNs Journal of mathematics and computer science 8 (2014), 387-397 The method of GBR optimization by special parameters to decrease energy consumption in WSNs Sina Hedayati 1, Arash Ghorbannia Delavar 2 Article

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

The Emergence of a Networking Primitive in Wireless Sensor Networks

The Emergence of a Networking Primitive in Wireless Sensor Networks The Emergence of a Networking Primitive in Wireless Sensor Networks Philip Levis, Eric Brewer, David Culler, David Gay, Sam Madden, Neil Patel, Joe Polastre, Scott Shenker, Robert Szewczyk, and Alec Woo

More information

Cybersecurity was nonexistent for most network data exchanges until around 1994.

Cybersecurity was nonexistent for most network data exchanges until around 1994. 1 The Advanced Research Projects Agency Network (ARPANET) started with the Stanford Research Institute (now SRI International) and the University of California, Los Angeles (UCLA) in 1960. In 1970, ARPANET

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3

TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving

More information

CS533 Modeling and Performance Evaluation of Network and Computer Systems

CS533 Modeling and Performance Evaluation of Network and Computer Systems CS533 Modeling and Performance Evaluation of Network and Computer Systems Selection of Techniques and Metrics (Chapter 3) 1 Overview One or more systems, real or hypothetical You want to evaluate their

More information

More wireless: Sensor networks and TCP on mobile hosts

More wireless: Sensor networks and TCP on mobile hosts More wireless: Sensor networks and TCP on mobile hosts CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) Outline Routing in sensor networks

More information

Power Aware Metrics for Wireless Sensor Networks

Power Aware Metrics for Wireless Sensor Networks Power Aware Metrics for Wireless Sensor Networks Ayad Salhieh Department of ECE Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren Schwiebert Department of Computer Science Wayne State University

More information

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time

A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail

More information

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks

Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Monty Barber 21 April 2003 CSC774 Network Security Overview Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,

More information

Collection Tree Protocol

Collection Tree Protocol Collection Tree Protocol Omprakash Gnawali Stanford University & University of Southern California gnawali@cs.stanford.edu Rodrigo Fonseca Brown University & Yahoo! Research rfonseca@cs.brown.edu Kyle

More information

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs

PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado

More information