Réseaux de capteurs sans fil: comment fournir la qualité de service tout en économisant l énergie

Similar documents
High efficiency MAC protocols for IoT: iqueue-mac and implementation on RIOT OS

Principles of Wireless Sensor Networks. Medium Access Control and IEEE

Wireless Sensor Networks

Presented by: Murad Kaplan

Priority-MAC: A Priority based Medium Access Control solution with QoS for WSN

MAC LAYER. Murat Demirbas SUNY Buffalo

SENSOR-MAC CASE STUDY

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

Medium Access Control in Wireless Networks

MAC Essentials for Wireless Sensor Networks

Survey of Asynchronous Medium Access Protocols for Wireless Sensor Networks

Wireless Sensor Networks 8th Lecture

EL2745 Principles of Wireless Sensor Networks

Embedded Internet and the Internet of Things WS 12/13

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks

Medium Access Control in Wireless IoT. Davide Quaglia, Damiano Carra

Sensor Network Protocols

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

IRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network

SA-MAC: Self-stabilizing Adaptive MAC Protocol for Wireless Sensor Networks

Advanced Networking Technologies

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Principles of Wireless Sensor Networks

MAC in /20/06

Networking Sensors, I

Design of Energy Efficient MAC Protocols in Wireless Sensor Networks

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

sensors ISSN

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks

Medium Access Control in Wireless Sensor Networks & challenges!

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

Multiple Access Links and Protocols

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Ferry Route Design with MAC Protocol in Delay Tolerant Networks

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

Mobile Communications

A Survey on Medium Access Control Protocols based on Synchronous Duty Cycle Approach in Wireless Sensor Networks

CSC8223 Wireless Sensor Networks. Chapter 5 Medium Access Control Protocols

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

COMPARISON OF CSMA BASED MAC PROTOCOLS OF WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

CHAPTER 4 CROSS LAYER INTERACTION

Multichannel MAC for Energy Efficient Home Area Networks

ABSTRACT. Physical Implementation of Synchronous Duty-Cycling MAC Protocols: Experiences and Evaluation. Wei-Cheng Xiao

Energy Efficient MAC Protocols Design for Wireless Sensor Networks

Design and Implementation of a Multi-hop Zigbee Network

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

Medium Access Control in Wireless Sensor Networks

CS 268: Computer Networking. Taking Advantage of Broadcast

Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Routing over Low Power and Lossy Networks

Improving the IEEE Slotted CSMA/CA MAC for Time-Critical Events in Wireless Sensor Networks

Chapter 3: Medium Access Control in Wireless Sensor Networks

CSMA based Medium Access Control for Wireless Sensor Network

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Data Communications. Data Link Layer Protocols Wireless LANs

Implementation of a Wake-up Radio Cross-Layer Protocol in OMNeT++ / MiXiM

SESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC

Principles of Wireless Sensor Networks

Ad hoc and Sensor Networks Chapter 5: Medium access control protocols

Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

Research Article An Energy and Latency Aware WSN MAC Protocol for Bidirectional Traffic in Data Collection

Routing for IoT and Sensor Systems

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

SESAM: A Semi -Synchronous, Energy Savvy, Application-Aware Aware MAC SESAM. Outline. Michael Welzl

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May ISSN

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Fuzzy Duty Cycle Adaption Algorithm for IEEE Star Topology Networks

ABSTRACT. JANG, BEAKCHEOL. Wireless MAC Protocol Design and Analysis. (Under the direction of Professor Mihail L. Sichitiu).

Sl.No Project Title Year

The MAC layer in wireless networks

CMPE 257: Wireless and Mobile Networking

UNIT IV. Data link layer protocols. Prof.Prasad S.Halgaonkar

Wireless Sensor Networks, energy efficiency and path recovery

TMMAC: A TDMA Based Multi-Channel MAC Protocol using a Single. Radio Transceiver for Mobile Ad Hoc Networks

Multi-Channel Wireless Sensor Networks

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

MAC protocol for volcano monitoring using a wireless sensor network

An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks

CS 410/510 Sensor Networks Portland State University

Optimal Beacon Interval for TDMA-based MAC in Wireless Sensor Networks

Volume 1, Number 1, 2015 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

FTA-MAC: Fast Traffic Adaptive energy efficient MAC protocol for Wireless Sensor Networks

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Lecture 16: QoS and "

Mobile Communications Chapter 7: Wireless LANs

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

The MAC layer in wireless networks

Simulation Analysis of IEEE Non-beacon Mode at Varying Data Rates

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Etiquette protocol for Ultra Low Power Operation in Sensor Networks

Embedded Internet and the Internet of Things WS 12/13

Transcription:

Réseaux de capteurs sans fil: comment fournir la qualité de service tout en économisant l énergie Ye-Qiong SONG LORIA - Université de Lorraine song@loria.fr Ecole d été temps réel 2013 Toulouse 30/08/2013

Context and motivation WSAN (Wireless Sensor and Actuator Networks)! CPS (Cyber-Physical Systems) Need of QoS for interacting with the physical world Need to minimize energy consumption since battery-powered wireless device Need self-adaptation protocols since highly dynamic multi-hop networks

Agenda State of the art low-power MAC protocols (duty-cycle) iqueue-mac: a queue length-aware hybrid CSMA and TDMA MAC protocol for traffic adaptive duty-cycle Introduction to energy-aware QoS routing

Fixed duty-cycled MAC protocol IEEE802.15.4 standard, Beacon-enabled mode CAP CSMA/CA active CFP GTS SD=960x2 SO x16 inactive BI = 960x2 BO x16 CAP CFP active - Hierarchic: coordinator and simple nodes - Duty-cycle fixed at configuration (SO and BO), not self-adaptive to the traffic variation - Static topology (Star, may be extended to clustertree but need beacon scheduling), not scalable - Rendezvous time between neighboring nodes is not natively supported, needs synchronization - There are works on scheduling GTS slots or generally active periods (see P. Minet s presentation) inactive t

Adaptive duty-cycled MAC protocols A new key issue in duty-cycled MAC (unlike other non dutycycled MAC): finding rendezvous time between a sender and its receiver (or next hop forwarder) Most representative ones are: S-MAC and its improvement T-MAC, known as synchronous MAC, which are with explicit synchronization mechanism of rendezvous time (i.e., both in active period) between a sender and its receiver, in order to forward its packet B-MAC and X-MAC, know as asynchronous MAC, which use LPL (low power listening) to find rendezvous time (sender-initiated) RI-MAC, which is also asynchronous MAC, but uses receiverinitiated LPP (low power probing) to find rendezvous time

S-MAC - Each node listens, then broadcasts its own active/inactive schedule! Synchronizer and followers in a cluster - CSMA/CA with RTS/CTS (802.11) + adaptive listening - Fixed duty-cycle, so does not self-adaptive - high overheads: SYNC, RTS/CTS, active period > clock drift, all nodes of a cluster must be active but not only sender-receiver " idle listening problem. C ()*+$,%-./+)0$1 23$$' 2678 4.5. 2(99: 8;?52 852 2DE2?52 852 4.5..8F 4.5..8F 8;?52 852 A B C D 8 4 852!"#$%&'?52 852 Figure from Huang et al. [7]

T-MAC improves S-MAC T-MAC (Timeout-MAC) extends S-MAC and provides improvements: - Shorten the listening period if no activity is detected - Use a timeout (TA) after each data packet transmission. So if more packets to transmit, they can be transmitted in a burst. - Adaptive duty-cycle - T-MAC saves more energy, but increases delay Delayed TX! Assume re-tx!

B-MAC and X-MAC B-MAC and X-MAC: principle LPL Sender LPL Check interval Receiver Periodic wake up X-MAC Sender X-MAC Receiver Periodic wake up Long preamble Extended waiting time Periodic wake up Short preambles with address (strobes) Periodic wake up A C K Send data Receive data Send early ACK Preamble > check interval Send data Receive data Listen for queued packets Periodic wake up t t t t

ContikiMAC ContikiMAC is similar to X-MAC and B-MAC, but repeatedly sends data packets instead of preamble strobes Sender Receiver Periodic wake up 2 CCA Repeated data packets until ACK data data data Rcv data A C K A C K Periodic wake up Periodic wake up 2 CCA t t Optimization through phase-lock: after a succesful tx, sender learned receiver s wake-up period (inspired from WiseMAC). Rmk:Broadcast is sent with repeated data packets for the full wake-up interval

Design consideration: sources of MAC energy wasting Overhearing: To receive a packet a neighboring node should keep waking up during long preamble in LPL, even if it is not the intended receiver. Overhearing results in wasted energy. Idle Listening: Another source of wasting energy occurs when a node has its radio on, listening to the medium while there are no transmissions. Collision: lead to useless transmissions, and retransmission of collided packets Control packet overheads (RTS/CTS, ACK, packet header) Low channel utilization (bad QoS): during collision avoidance of CSMA/CA, random backoff period reduces channel utilization and consumes energy (idle listening)

B-MAC and X-MAC B-MAC and X-MAC: discussions - Adaptive duty-cycle, more scalable than synchronous MAC (e.g. S-MAC and T- MAC) and less e2e delay - Energy efficiency - B-MAC: long preamble and overhearing problems - B-MAC: length of check interval (too long increases preamble, so overhearing, collision, delay; too short increases idle listening) - X-MAC: with slightly increased idle listening and Destination address embedded in preamble (strobes), it reduces preamble and overhearing, but prevent to send to multiple next hop nodes (less robust routing) - Preamble period prevents other neighboring nodes from transmission " low channel utilization and longer delay - Hidden node collisions still exist - Both suffer from intrinsic CSMA/CA low throughput when dealing with burst traffic

Problems of LPL (e.g. X-MAC): Low channel utilization & hidden node collision Figures from [Sun et al., RI-MAC, SenSys2008]

Improve throughput/delay with receiver-initiated LPP (Low Power Probing): RI-MAC principle Transmitter wakes up and waits silently for the intended receiver Each node periodically wakes up and broadcasts a beacon after sensing idle medium, with sleep intervals randomly chosen from [0.5 interval, 1.5 interval] for avoiding beacon collisions Upon receiving a beacon from intended receiver, the transmitter starts DATA transmission A beacon serves both as an acknowledgment to previously received DATA and as a request for the initiation of the next DATA transmission to this node (for queued other packets of the sender) Transmit upon receiving the acknowledgment beacon! " " " ;!%! " " ;!%! " "126.'/4(!/,+0. %&'()*+, -./.+0.,, S R B DATA B DATA B Dwell time B DATA B DATA B Send an acknowledgment beacon Figures from [Huang et al., IEEE communications survey and tutorials, 2013]

Improve throughput/delay in RI-MAC Reduces the time a pair of nodes occupy the medium to reach a rendezvous time Figures from [Sun et al., RI-MAC, SenSys2008] Reduces preamble collisions caused by hidden nodes

Problem of LPP: multi-sender collision At light traffic, only one sender has data to send following a receiver s beacon At heavy traffic, several senders may have data to send, provoking collisions just after a receiver s beacon S 1 Collision B DATA R B S 2 B DATA

RI-MAC for reducing multi-sender collision RI-MAC uses collision detection and sends BEB backoff window length in the next beacon Transmitters randomly select their backoffs within the BEB backoff window (BW) Figure from [Sun et al., RI-MAC, SenSys2008]

Collision detection in RI-MAC Collision detection is generally unfeasible in radio transmission due to the tx/rx exclusion (a turn around latency is also necessary between tx #" rx modes) In RI-MAC, collision detection is feasible The receiver knows that data should arrive during backoff window (set to a constant+random(0,0) at beginning) The receiver needs only detect the Start of Frame Delimiter (SFD) to learn of an incoming packet. If no SFD is detected in time (during BW), while some channel activity is detected by the CCA check, the receiver will decide that there was a collision, and will generate another beacon with a larger BW value

LPP vs LPL, and insufficiency RI-MAC has similar low duty cycle than X-MAC at light (or idle) traffic load RI-MAC outperforms X-MAC at heavy traffic load But the channel utilization (throughput) is still far from optimal one because of the use of random backoff window Wasted channel (collision + resolution) Figure from [Sun et al., RI-MAC, SenSys2008]

RI-MAC vs. X-MAC In general, receiver-initiated MAC (LPP) outperforms sender-initiated MAC(LPL) in presence of hidden terminals and high traffic, since the sender-initiated network is flooded with colliding data packets. But one can notice that RI-MAC still cannot reach the ideal throughput of TDMA! Received data (kbit/s) 10 1 Receiver-initiated (RI-MAC) Sender-initiated (X-MAC) 1 10 100 Transmitted data (kbit/s) re 2: Receiver-initiated MAC protocols outperform [Fig. from F. Osterlind et al., Strawman, IPSN2012]

Queue-MAC and iqueue-mac iqueue-mac is a queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks. It combines Queue-MAC and CoSenS [B. Nefzi, YQ. Song, Adhoc networks2012, S. Zhuo, YQ. Song et al, WFCS2012, SECON2013] Main ideas: - Use CSMA in light traffic, switch to TDMA in heavy traffic (similar to Z-MAC) - Designed for 2-level hierarchical (or cluster-tree) networks: routers and simple nodes - A simple node only wakes up when it has data to send, so in sleeping mode during most of time to save energy - Router (like receiver in RI-MAC) executes iqueue- MAC scheme

Basic background on CSMA and TDMA In general, CSMA is more efficient in light traffic, while TDMA is better in heavy traffic 100% throughput TDMA CSMA 100% load

iqueue-mac!*%&-$ /-$'*$'(-$"+*,(-. A'B*,"23/ +,-5-$E*."/+"! """""#$%&'()*"+*,(-. /+ 4?7*,8,%C*"&D&5* 0,%88(&"($&,*%6* )%,(%95*" 0123"7*,(-. :=< :;<! #$%&'()*"+*,(-. /+! )0123 /+ (>?*?*@23/ 45-'6"%55-&%'*."'-"67*&(8(&"6*$.*,6 In iqueue-mac, router (receiver) collects queue-length information of their associated simple nodes and dynamically allocates time slots to them (during variable length TDMA period). This allows to avoid the inherent low throughput problem of CSMA

iqueue-mac Piggybacking queue length to inform router,-.'/0-1 23%3%'45+4#"&*6!"#$%&'!"()*"+ Each router defines a superframe, with a subframe inside rand(0.5l, 1.5L) - B: Beacon broadcast to synchronize the simple nodes and announce slot allocation and when starts the CP - SP: sleeping period, with regular short wakeups to detect neighboring routers preamble (like X-MAC) - CP: contention period where each simple node may transmit only one packet. Router continue to listen with a time-out to allow other nodes to send if any (like T-MAC) - TP: transmission period: router sends its first packet with preamble, then in burst mode the following (like T-MAC and RI-MAC) to the forwarder router When there are data, simple node waits for beacon, sends during CP or TDMA 4?9F,%C*! 0123"65-'6 4+ /+ 0+

iqueue-mac Beacon structure:!"#$"% &'()*+,($"*+ -./'0*) &'()/1''(2#)0(3/'0*) Figure 4: Beacon structure Example: N1 has 4 and N2 has 5 packets 4"#2(3 &:;<=%#>"/9"%0($?(3)"3)0(3/9"%0($/@?9A 4"#2(3/2(3)#0303B/#/8.C1/*'()*/ *2D"$:'03B/'0*) 5 4. 1. 1 89 4.......,/6 4. 1 4...,/7 4.#)#/E#2F"). 1 1?G 4....

iqueue-mac performance (measurement on implementation)!"#$ %&'()* e 6: Sample experiment to Adverage Packet Delay - ms 10 x 104 9 8 7 6 5 4 3 2 1 CoSenS RI-MAC-MC iqueue-mac 0 15 14 13 12 11 10 9 8 Data Rate - 1 packet / X 100ms 7 6 5 4 3 2 1

iqueue-mac performance Received packet num 5000 4500 4000 3500 3000 2500 2000 1500 1000 500 CoSenS RI-MAC-MC iqueue-mac Average queue length 120 110 100 90 80 70 60 50 40 30 20 10 CoSenS RI-MAC-MC iqueue-mac 0 15 14 13 12 11 10 9 8 Data Rate - 1 packet / X 100ms 7 6 5 4 3 2 1 0 15 14 13 12 11 10 9 8 Data Rate - 1 packet / X 100ms 7 6 5 4 3 2 1 20 18

iqueue-mac performance 20 18 16 14 Duty cycle (%) 12 10 8 6 CoSenS RI-MAC-MC iqueue-mac 4 2 0 15 14 13 12 11 10 9 8 Data Rate - 1 packet / X 100ms 7 6 5 4 3 2 1

Average 4 iqueue-mac performance: burst 2 Two burst periods of 50 s: at 100 s and 500 s 0 0 100 200 300 400 500 600 700 800 900 iqueue-mac Time - s RI-MAC-MC CoSenS F igure 11: A verage delay comparison of second experimen Average delay - ms 12 x 104 10 8 6 4 iqueue-mac RI-MAC-MC CoSenS Average queue length 180 160 140 120 100 80 60 40 Online throughput iqueue-mac RI-MAC-MC CoSenS Time - s 2 20 0 0 100 200 300 400 500 600 700 800 900 Time - s igure 11: A verage delay comparison of second experime 0 0 100 70200 300 400 500 600 700 800 900 Figure 12: Average 60 queue length comparison of second -MAC Time - s iqueue-mac experiment

O 20 iqueue-mac performance: burst 0 100 200 300 400 500 600 700 800 900 10 0 Time - s Figure 13: Online throughput comparison of second experiment Online throughput 100 80 200 300 400 500 600 700 800 900 Time - iqueue-mac s 70 RI-MAC-MC CoSenS 1: Average delay comparison of second experiment 60 50 40 30 20 10 iqueue-mac RI-MAC-MC CoSenS Allocated slots num - iqueue-mac 70 60 50 40 30 20 10 iqueue-mac 0 0 100 200 300 400 500 600 700 800 900 70 Time - s 100 200 300 400 500 600 700 800 900 Time - s 0 0 100 200 300 400 500 600 700 800 900 Time - s Figure 14: Slots allocation in iqueue-m A C Figure 13 shows the measured throughput of each MA We clearly see that iqueue-mac sharply enhances throughput at the emergence of a burst period, wh

iqueue-mac performance: multi-hop case Table 2: Burst Periods During General Experiment Burst period 100s-120s 200s-220s 300s-320s 400s-420s 600s-620s Cluster Cluster_1 Cluster_2 Cluster_3 Cluster_4 All Clusters!"#$%&'(*!"#$%&'(+!"#$%&'(, -.#%&'(+ -.#%&'(, -.#%&'(* -.#%&'(/ 0123!"#$%&'() -.#%&'()

iqueue-mac performance: multi-hop case Online throughp er of the lab building and arranged into a 4 clusters 2.5 contains x 104 at most 4-hops transmission distance. iqueue-mac luster is placed in a lab RI-MAC-MC room and contains 10 -nodes CoSenS 2 and one router (parent) node. Data relaying re also fixed to factor out routing influence on ental results. Initially, all children-nodes generate Average delay - ms under 1.5 a light data rate of 1packet/5seconds. Then, late a series of urgent events, each cluster will nce a burst period adopting a higher data rate of 1 s/1s, as shown in Table 2. To evaluate a more scenario in the network, all children-nodes neously 0.5 switch to the burst state during the final he whole experiment lasts for 900 seconds. e 2: Burst Periods During General Experiment 0 0 100 200 300 400 500 600 700 800 900 100s-120s 200s-220s 300s-320s Time - s 400s-420s 600s-620s Cluster_1 Cluster_2 Cluster_3 Cluster_4 All Clusters Average queue length 15 10 5 iqueue-mac RI-MAC-MC CoSenS Time - s 0 0 100 200 300 400 500 600 700 800 900 Time - s Figure 17: Average queue length comparison of general experiment 70 iqueue-mac

iqueue-mac performance: multi-hop case 70 60 iqueue-mac RI-MAC-MC CoSenS Online throughput 50 40 30 20 10 0 0 100 200 300 400 500 600 700 800 900 Time - s

Energy-aware QoS routing In multi-hop WSN, transmitting data from source to destination within the deadline for real-time applications, but still saving energy source destination

Challenges and Goals Network characteristics Unreliable nature of wireless link Energy constraint (and duty-cycled nodes) QoS requirement Deadline Miss Ratio Energy efficiency

Common requirements of RT routing protocols For RT applications, routing is to find good metric capable of deciding which path is the best one For meeting deadline For minimizing energy consumption (or prolongating the network life time)! Real-Time Energy-Aware routing

Some Design approaches Most of existing routing protocols for WSN do not support RT Some specific RT routing protocols: SPEED, RPAR [Univ. Virginia] Two families of routing protocols General routing, e.g. AODV adopted by Zigbee Geographic routing and its extensions!rt QoS enhancement must be made

Geographic routing: principle Typical One: Greedy Perimeter Stateless Routing (GPSR): Closest to D" D" A" S" - Find neighbors who are the closer to the destination - Forward the packet to the neighbor closest to the destination - A node only needs to remember the location info of one-hop neighbors

Geographic routing: discussion Greedy forwarding does not always work Static obstacles (water pool, ) Dynamic network topology holes (due to energy depletion, or overload, or duty-cycle, ) Not robust:» link asymmetry between sender and receiver» Weak correlation between distance and quality of tx (Geographic proximity does not mean electromagnetic proximity!) Virtual coordinates may be used (as in RPL of IETF ROLL) SPEED protocol proposes a more robust metric: speed = Distance + delay estimation

Virtual coordinate: principle Each anchor brodcasts its ID and the hop count is incremented by fowarder Relative coordinates of node V are defined as a vector V 1, V 2,..., V N where Vi is the hop distance from the current node to anchor node i, and N the number of anchor nodes 1 Virtual distance between V and W may be defined as: D = N (V i W i ) 2 i=1 3 May be used to run gradient routing 2 [figure from Watteyne]

Gradient routing for convergecast Convergecast: MP2P R,3 R,2 3 2 F,2 C,2 H,2 V,3 S,3 Q,2 E,1 1 0 A,0 B,1 I,2 Y,3 P,2 N,1 G,1 K,3 T,3 U,3 O,2 M,1 D,1 L,2 [Figure from Wattenye11, IEEE com surveys&tutorials]

ETX in CTP ETX (Expected Transmission Count) is a link metric for setting up the gradient, used in CTP (collection tree protocol) ETX indicates the average delay (in hop counts) for successfully transmitting a packet from the node to the sink, including retransmissions upon link failures CTP uses beacon broadcast to maintain gradient. Beacon broadcast is regulated using Trickle algorithm (double beacon broadcast interval if no topology change)

IETF RPL of ROLL j 0ms, 4.0etx 20ms 1.4etx 20ms 2.5etx i 20ms 1.5etx 20ms 1.2etx 40ms 1.9etx g 60ms 2.7ms 60ms 1.0etx k 0ms 3.1etx 40ms 1.4etx 40ms 2.5etx c 10ms 1.2etx d 40ms 1.3etx 70ms 1.8etx f 40ms 1.7etx 120ms 3.7etx 80ms 1.9etx a 50ms 1.2etx 70ms 1.8etx b 80ms 2.5etx 40ms 1.8etx 90ms 2.5etx 80ms 1.3etx e 50ms 0.0etx 10ms 1.7etx [Figure from Wattenye11, IEEE com surveys&tutorials]

RPL principle Over IPv6 (or 6lowPAN) Building gradient tree: sink node builds DODAG (Destination Oriented Directed Acyclic Graph) using DIO (DODAG Information Object) message broadcast which contains ID of DODAG, version, Metric, sender s rank in DODAG Data packet routing based on neighbors rank Maintenance of DODAG using periodic DIO message exchanges with «trickle timer» [I m, 2 M xi m ] Trickle timer doubles its value if no network problem until 2 M xi m, re-initializes to I m if network problem (e.g. loose of parent) A threshold δ RC limits the number of DIO messages allowed to be sent since the beginning of a trickle period

SPEED: principle - Beacon exchanges (periodic + on demand) between one-hop neighbors (Could be piggybacked into data packets to reduce control overhead) - to learn and update the neighbor nodes geographic position (x i, y i ). - to estimate the delay to its neighbors (like RTT estimation of TCP) - Backpressure beacon to inform the upstream forwarder that no route can be found - Neighborhood table (NeighborID, Position, SendToDelay, ExpireTime) - Select among nodes in forwarding set making progress toward the destination?3?a2%b, @ ; 3 3 V +(6* #=((1! E'()*!+,*!-+ G ; <-='(>,?! N#$/,! #$! NKFFA@! $1.,'! 9,,4! "&,! P,#% $? ;1-21

Enhancing geographic routing by exploring k-hop neighborhood information Simulated example comparing performance of 1-hop and 2-hop:

How long the lens of the telescope should focus? Asymptotic performance of k-hop

F 2 k A concrete design: two-hop based SPEED routing protocol m j i D N n F Two-hop neighborhood search without increasing control traffic (piggybacking) Energy aware probabilistic drop (near to sink packet has less drop probability) Energy consumption balance (possible to choose slower paths when allowed)

F 2 k Some definitions m j i D N n F

An example of Two-hop SPEED Delay S A =0.1s S Delay S C =0.09s A Delay S B =0.14s C Delay A E =0.06s E B Delay C I =0.04s I F Delay A F =0.08s G Delay B G =0.06s H Delay B H =0.05s J K d(e,d)=78 m d(f,d)=65 m d(a,d)=80 m d(s,d)=100 m d(g,d)=60 m d(b,d)=76 m d(c,d)=85 m d(h,d)=65 m d(i,d)=78 m D

Architecture Application TH-SPEED Two-hop based forwarding strategy Cost function for energy consumption balance Delay estimation Energy efficient probabilistic drop MAC Link quality model

Evaluation metrics Deadline miss ratio: DMR Average energy consumed per successfully transmitted packet : ECP

Simulation Results (1) 1 2 3 DMR,ECP vs. deadline, 1,2 with #node=200, 3 with #node=400, #source=10

Simulation Results (2) DMR and ECP vs. workload, #node=200,deadline=800ms

Simulation Results (3) SPEED TH-SPEED Routing Protocol SPEED TH-SPEED DMR 17% 0% ECP (ma*ms/packet) 2472.3 2486.8 Energy consumption distribution with cost function embedded, deadline is not rigorous, =3000ms

Conclusion and future directions Design of duty-cycled MAC protocols has been extensively investigated. Trend is to focus on adaptive duty-cycled MAC there is still design space for new higher performance, multi-channel ones which can self-adapt to dynamic traffic High performance MAC integrating energy harvesting components There exists few QoS routing protocols. RPL attracts more attention. How to take into account duty-cycle of underlying MAC to improve RPL? What enhancement for making it to support QoS routing? Need new QoS routing protocols? What types of QoS guarantee? SRT? probabilistic? (see J.D. Decotignie s presentation)

Main references P. Huang, L, Xiao, S. Soltani, M. Mutka, N.Xi. The evolution of MAC protocols in wireless sensor networks: a survey, Communications Surveys & Tutorials, IEEE, Volume: 15, Issue: 1, pp. 101-120, 2013. T. Watteyne, A. Molinaro, M.G. Richichi, M. Dohler, From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols, Communications Surveys & Tutorials, IEEE, Volume: PP, vol. 13, no. 4, pp. 688-707, 2011 S.G. Zhuo, Y.Q. Song, Z. Wang, Z.B. Wang, Queue-MAC: A queue-length aware hybrid CSMA/ TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks, IEEE WFCS2012. Zhuo S.G., Wang Z. Song Y.Q., Wang Z.B., Almeida L., iqueue-mac : a traffic adaptive dutycycled MAC protocol with dynamic slot allocation, IEEE SECON 2013. Li Y., Chen C.S., Song Y.Q., Wang Z. Sun Y., Enhancing real-time delivery in wireless sensor networks with two-hop information, IEEE Transactions on Industrial Informatics Vol.5, No.2 (May 2009), pp113-122.