Mobile self-organizing networks. Vilmos Simon BME Dept. of Networked Systems and Services

Similar documents
ECE 586 Advanced Topics: Wireless Networking

WSN Routing Protocols

Ad Hoc Networks: Introduction

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Ad Hoc Networks: Issues and Routing

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Subject: Adhoc Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

CS551 Ad-hoc Routing

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless networks. Wireless Network Taxonomy

UNIT 1 Questions & Solutions

Part I. Wireless Communication

Lecture 8 Wireless Sensor Networks: Overview

CSMA based Medium Access Control for Wireless Sensor Network

Introduction to Mobile Ad hoc Networks (MANETs)

Location Awareness in Ad Hoc Wireless Mobile Neworks

Sensor Network Protocols

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

MAC LAYER. Murat Demirbas SUNY Buffalo

Wireless Networking & Mobile Computing

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Routing protocols in WSN

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

MAC protocols. Lecturer: Dmitri A. Moltchanov

Wireless Ad-Hoc Networks

Mobile Communications. Ad-hoc and Mesh Networks

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

SENSOR-MAC CASE STUDY

Mobile and Sensor Systems

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Lecture 9. Quality of Service in ad hoc wireless networks

ARPA Mobile Information Systems Applications Workshop December 7-8, Mobile Networking

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Outline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices.

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

ECSE 414 Fall 2014 Final Exam Solutions

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

Multiple Access Links and Protocols

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Data Communications. Data Link Layer Protocols Wireless LANs

CE693: Adv. Computer Networking

Wireless Security Background

MAC in /20/06

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Mohamed Khedr.

15-441: Computer Networking. Wireless Networking

Energy Efficiency and Latency Improving In Wireless Sensor Networks

Wireless Networked Systems

Page 1. EEC173B/ECS152C, Spring Wireless Mesh Networks. Wireless LAN or Cellular Networks. Introduction Flow Control Issues Rate Adaptation

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Chapter 7 CONCLUSION

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Fast, Efficient, and Robust Multicast in Wireless Mesh Networks

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Advanced Networking Technologies

An Introduction to Cyber-Physical Systems INF5910/INF9910

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

The MAC layer in wireless networks

LECTURE 9. Ad hoc Networks and Routing

WP-PD Wirepas Mesh Overview

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

CS 268: Computer Networking. Taking Advantage of Broadcast

DTN Interworking for Future Internet Presented by Chang, Dukhyun

WeVe: When Smart Wearables Meet Intelligent Vehicles

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Wireless Network Security Spring 2011

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Multicasting in ad hoc networks: Energy efficient

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

2013, IJARCSSE All Rights Reserved Page 85

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Ad Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Broadcasting Techniques for Mobile Ad Hoc Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

Last Lecture: Data Link Layer

Performance Evaluation of Modified IEEE MAC for Multi-Channel Multi-Hop Ad Hoc Network *

An Efficient Broadcast Algorithm To Transmit Data In Multi-hop Relay MANETs Fathima Sana 1, Dr. M. Sudheep Elayidom 2

EE 122: Ethernet and

Transcription:

Mobile self-organizing networks Vilmos Simon BME Dept. of Networked Systems and Services

Trends: Mobile user numbers Source: http://mybroadband.co.za/news/wp-content/uploads/ 2012/12/Global-Fixed-Telephone-Lines-vs.-Mobile- Subscriptions-1994-2009.jpg Source: https://jmerril.files.wordpress.com/2011/11/ screen-shot-2011-11-16-at-9-39-15-pm1.png

Energy Management Traffic Management Trends: Internet of Things Smart Cities - M2M applications everywhere Bus Air Conditions Smart City Rail Smart City Smart Building Logistics Environmental Irrigation Public Transport Smart Grid Water Agriculture Manageme nt Cool Chain Monitoring Sports Medical Application Ticketing Industrial Green Houses Public Safety Tram Subway Train Metro Smart Buildings Remote Monitoring Automatic Vehicle Location Signage Waste Management Transportation Elderly Retail Living Cool Chain Monitoring Vending Energy Monitoring Green Houses First Responders Metering Medical Elderly Living Remote Monitoring Public Health Fitness Machines Reverse Vending Medical Value Transport Source: Eurotech - Smart City Many Applications and Devices Retail

Trends: Crowd sensing Source: http://www.ict-citypulse.eu/page/sites/default/files/ traysequence-460_0.png 4

Trends: self-organized flocking Mobiles users moving in autonomous groups: flocks UAVs, robots, cars Novel research: split and join actions 5

Network topologies Types of network topologies Centralized Decentralized (peer-to-peer) Hybrid Centralized Decentralized

Centralized topology Communication from one node to another goes through a hub or base station (BS) Hub station controls nodes and monitors transmissions from each node Hub manages access by nodes to network s allocated bandwidth Configuration for cellular mobile and WLAN networks

Advantages of centralized topology Efficient use of transmit power Optimized placement of Hub/BS: minimizing obstruction Hub/BS: provides connection to backbone network Power control a central point can determine required power for nodes to minimize interference and conserve battery

Disadvantages of centralized topology Single point of failure Can not deal with unpredictable propagation environments Cannot cover wide areas where connections exceed range of single link Not suitable for self-organizing networks Requires significant infrastructure setup

Decentralized topologies Fully-connected network All nodes can communicate directly Requires nodes to be co-located Multi-hop network If nodes can not directly reach the destination: intermediate nodes must relay messages to destination Widely used in ad-hoc and mesh networks Not possible to guarantee connectivity of all nodes

Fully-connected peer-to-peer network Advantages No single point of failure No store-and-forward delay A node can be designated as a gateway to backbone network Disadvantages Performance degradation in large networks Near-far problem

Multi-hop peer-to-peer Advantages Only solution if no infrastructure available Widely used in military applications Gaining popularity in other types of wireless networks Ad hoc networks Sensor networks Disadvantages Multiple store-and-forwards Increase delay for users separated by multiple hops No central timing or power control authority

Types of networks WiFi/ 802.11 Two modes Centralized: wireless local area data network Peer-to-peer: MAC/PHY for ad hoc networks Self-organized networks Multi-hop peer-to-peer networks Hybrid networks Unicast, multicast and broadcast networks Wireless sensor networks

Self-organizing networks Dynamic topology nodes enter and leave the network continuously No centralized control or fixed infrastructure Application areas: Meetings Emergency or disaster relief Military communications Wearable computers Sensor networks

Self-organizing networks Limited communication range of the mobile nodes Enables spatial reuse of limited bandwidth: increased network capacity Each mobil node is a Packet source Packet sink Router Problem: how to determine where a destination node is located relative to a sending node

Routing in self-organizing networks Route-finding is a current area of much research Want to determine an optimal way to find optimal routes Dynamic links Broken links must be updated New links must be formed Based on this new information: routes must be modified Frequency of route changes a function of node mobility

Issues in self-organizing networks Routing performance Routes change over time due to node mobility To avoid long delays when sending packets But also to avoid lots of route maintenance overhead MAC Broadcast communication channel Neighbor nodes change over time Sleep mode: to reduce energy drain No coordination/cooperation among nodes?

Issues in self-organizing networks Quality of service Link variability Collisions Congestion Security New vulnerabilities and complexities Routing denial of service Nodes may agree to route packets Nodes may then fail to do so Broken, malicious, selfish nodes Key distribution and trust issues

MAC protocols No centralized control therefore: Nodes independently determine access Local nodes elected to control channel access Goals for MAC protocols High channel efficiency Low power Scalable Support for prioritization (QoS) Distributed operation Low control overhead

MAC: Channel separation Common channel vs. multiple channels Typical use of channel Data transmission RTS/CTS handshake Carrier sensing Common: single channel for all packets Multiple: some packets (overhead) on one channel, while other packets (data) on others allow more simultaneous users

Single channel Data and control messages on the same channel Collisions and contention Handshake protocol ACKs Backoff protocol

Multiple channels Typically, one channel for control, others for data TDMA-based Time slots + synchronization Best with real-time, periodic data FDMA-based Allows multiple nodes to transmit simultaneously

Multiple channels (cont.) CDMA-based Simultaneous transmissions via code separation SDMA-based separation Directional antennas to transmit in particular direction Hybrid schemes Combine channel separation methods

Topologies: Flat Flat Nodes make independent decisions to access the channel Local coordination via handshaking, carrier sensing Single-hop: concerned only with immediate neighbors Scalability issues Multi-hop: some notion of nodes outside local neighborhood Most use multiple channels

Topologies: Clustered Clustered Elect local cluster head (CH) to perform control/management of network resources Reduces burden on nodes, increases burden on cluster head Good for heterogeneous networks VBA: elect CH based on lowest IP address WCA: elect CH based on weighting of distance to nbrs, battery power, mobility and connectivity; allows roaming between clusters Jin, GPC: elect CH based on battery power Bluetooth: elect CH (Master) as node that initiated cluster (piconet)

Reducing energy consumption Radio operates in 3 modes: transmit, receive, standby Reduce transmit power Use just enough to reach intended destination Place nodes in standby mode as much as possible Nodes do not need to be on when not receiving data Requires nodes to know when they must listen to the channel and when they can sleep MAC protocols cannot use promiscuous mode to listen to other conversations Node must know when other nodes have data to transmit to it

Reducing energy consumption (cont.) Collisions should be minimized Retransmissions expend energy Introduce delays (e.g. Random Assessment Delay) Reduce number of ACKs required Use contention for reservations and contention-free for data transmission Allocate contiguous slots for transmission/reception Avoids power/time in switching from Tx to Rx Have node buffer packets and transmit all packets at once Allows node to remain asleep for long time Trade-off in delay to receive packets and buffer size

Reducing energy consumption (cont.) Make protocol decisions based on battery level Choose cluster head to have plenty of energy Give nodes with low energy priority in contention Reduce control overhead Need control to avoid collisions, but reduce as much as possible

Transmission Initiation Sender-initiated In most of the protocols Sender attempts to access channel when it has data Receiver-initiated Receiver attempts to clear channel for transmissions Send request-to-transmit (RTR) to all neighbors or specific node Only efficient if large amount of traffic on network

Information dissemination in mobile self-organized networks

Special case: multihop broadcast Multihop broadcast algorithms global (multihop) broadcast service for the dissemination of some control information The naive first implementation: flooding every node repeats the message after it is first received The central problem of broadcast algorithms is to decide when who should retransmit messages Too many retransmissions cause collisions waste the network bandwidth Choosing the smallest forwarding set is not easy a global view of the network is not available local information gets obsolete very quickly if the velocity of the nodes is high

Uses cases Wireless sensor networks Gathering measurements Sending queries Robotic swarms Keeping the swarm together Distributing information Vehicular networks Traffic info Efficient route planning Alerts

Information dissemination The goal: disseminate a message to (almost) all nodes in the network minimizing resource usage. Blind flood Broadcast storm Randomized Gossiping Quasi local information SBA, MMSBA, MIOBIO

Self-pruning algorithms Scalable Broadcast Algorithm (SBA) When a node receives a broadcasted packet from a node: excludes the neighbours of this node from the set of his own neighbours The resulting set is the set of the potentially interested nodes Random Assessment Delay (RAD) mechanism

SBA June 24, WiOpt 2009, Seoul 35

MIOBIO Uses a simple 3-stage handshake to discover neighbors that are interested in one of the carried messages Reduce unnecessary load of neighbouring nodes ("spamming ) Three different types of messages: ADV: the list of messages that the sending node has REQ: by sending it the neighbor nodes indicate their interest in the advertised messages DATA: the data message, which contains the requested information June 24, WiOpt 2009, Seoul 36

MIOBIO June 24, WiOpt 2009, Seoul 37

Which algorithm to use? Plenty of multihop broadcast algorithms, working well in different environments The environment is changing so rapidly: there is no hope for choosing a theoretically optimal algorithm One solution: adaptive approach, the system self-tunes itself Our approach: a biologically inspired method, natural selection June 24, WiOpt 2009, Seoul 38

Natural selection Main principle: to have many algorithm individuals that compete with each other in the system The individuals with the highest fitness will reproduce faster than the less fit ones Fitness estimation: direct feedback is not feasible Instead of trying to collect performance measurements at the sender the sender attaches the code of the sender algorithm to every packet delegates the decision to the receiver Local fitness function at every node June 24, WiOpt 2009, Seoul 39

Local fitness evaluation Every message carrying payload will also carry a genetic code of the sending algorithm The receiver knows which algorithms perform best: the highest number of useful messages When the algorithm individual dies at the receiver node: it will choose the best algorithm based on his local measurements Reduces overhead compared with a conventional statistics collecting scenario June 24, WiOpt 2009, Seoul 40

Evolutional concept If using genetical programming, the basic elements of the algorithms can recombine: new algorithms are born The competing set is changing rapidly Self-organization without any control!

Evolution results Difference between useful and duplicated messages Blue: without evolution Red: with evolution

Robustness Ratio of malware code to other 3 algorithms : 5, 30, 70% 70% case: Without evolution: With evolution: