Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue

Similar documents
Link Estimation and Tree Routing

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality

Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks

MAC LAYER. Murat Demirbas SUNY Buffalo

Routing protocols in WSN

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013

Research Directions in Low-Power Wireless Networks

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Summer 2008) Midterm. Date: June 12, 2008

Evaluation of a for Streaming Data in Ad-hoc Networks

Wireless Internet Routing. Learning from Deployments Link Metrics

Geographic Routing in Simulation: GPSR

Congestion Control in TCP

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC.

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

FINAL May 21, minutes

Congestion Control in TCP

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation

The Best Protocol for Real-time Data Transport

Ad Hoc Networks: Introduction

Congestion Control. COSC 6590 Week 2 Presentation By Arjun Chopra, Kashif Ali and Mark Obsniuk

Performance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

ICS 351: Today's plan. OSPF BGP Routing in general

Chapter 1. Introduction

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

Network Initialization in Low-Power Wireless Networks: A Comprehensive Study

Fig. 2: Architecture of sensor node

More wireless: Sensor networks and TCP on mobile hosts

The Effects of Asymmetry on TCP Performance

Congestion Control in TCP

Ad hoc and Sensor Networks Time Synchronization

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Reliable Stream Analysis on the Internet of Things

Housekeeping. Fall /5 CptS/EE 555 1

Arvind Krishnamurthy Fall 2003

A HOLISTIC APPROACH TO MULTIHOP ROUTING IN SENSOR NETWORKS ALEC LIK CHUEN WOO

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Abstract. 1. Introduction. 2. Theory DOSA Motivation and Overview

Characterizing the End-to-End Performance of Indoor Powerline Networks

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C

Outline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space

MC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks

Wireless Sensor Networks, energy efficiency and path recovery

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

WT-4000 Wireless System

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

CHAPTER 5 PROPAGATION DELAY

Lecture (08, 09) Routing in Switched Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. M.Sc. in Advanced Computer Science. Date: Monday 2 nd June 2008.

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Information Brokerage

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Module 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Pervasive and Mobile Computing

Employing Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller

TRANSMISSION CONTROL PROTOCOL

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

A Logical Group Formation and Management Mechanism Using RSSI for Wireless Sensor Networks *

PRACTICE QUESTIONS ON RESOURCE ALLOCATION

Reliable Routing Algorithm on Wireless Sensor Network

Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

CS321: Computer Networks Congestion Control in TCP

The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale

Congestion Control in TCP

Performance of UMTS Radio Link Control

Random Neural Networks for the Adaptive Control of Packet Networks

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)

THE USE of self-organizing techniques to engineer distributed

Location Awareness in Ad Hoc Wireless Mobile Neworks

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Increase-Decrease Congestion Control for Real-time Streaming: Scalability

Part I. Wireless Communication

Chapter 7 CONCLUSION

Congestion Control 3/16/09

Routing algorithms. Jan Lönnberg, 51101M. October 2, Based on G. Tel: Introduction to Distributed Algorithms, chapter 4.

An Analytical Model for Progressive Mesh Streaming. WEI TSANG OOI National University of Singapore

Announcements. CMPE 257: Wireless and Mobile Networking. Today. Location Management. Project status update 2. Graded exams. Hw 4 (?) Project report.

EECS 122: Introduction to Communication Networks Final Exam Solutions

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

Distributed STDMA in Ad Hoc Networks

The Emergence of Networking Abstractions and Techniques in TinyOS

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

CMPE 257: Wireless and Mobile Networking

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

Transcription:

Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks By Byron E. Thornton Objective We now begin to build a Wireless Sensor Network model that better captures the operational characteristics of the real world. Introduction A More Practical Model A brief recap of last week s RF Irregularities discussion and the Radio Irregularity Model (RIM). Spherical radio energy model. Non-Isotropic Asymmetric links The model used in many WSN simulations do not resemble real-world behavior. Introduction A More Practical Model Other components may also possess operational characteristics that differ drastically from the simulation model. Our goal is to develop a more representative model. Before We Begin Other Neglected Aspects of Sensor Networks Noise, Distortion and Interference. Transmission Bandwidth and Modulation Frequency. Signal to Noise Ratio (SNR) and probability bit error P e. Digital Quantization. Coherent encoding schemes (PSK, FSK, OOK, etc.) and how they might affect WSN. Modulation Schemes (ex. PCM, PAM) What affect might it have? Introduction The Issue We now realize that the simulation model does not in all cases adequately reflect real world conditions. Suppose the assumptions we make about routing and overall route quality are also invalid. How can we develop a more accurate routing model? 1

Items Covered Link Estimator. What is it? How is it used?. How to build and maintain a good subset of reliable links for routing. Routing Protocols A look at routing as it relates to the Estimator. A Look at Making Routing Decisions We ve assumed that choosing a route was a complicated process, but with a simple formula. But as per last week s RF Irregularities we now realize that non-isotropic-ness in Wireless Sensor networks is quite common. Take a better look at making routing decisions Up until now we ve allowed route quality judgement decisions to be made by the Routing Protocol strictly at the routing layer. Developing A Quality Metric An empirical look at network neighbors. What is the best criteria for judging the quality of a neighbor connection? Creating a list of quality neighbors a priori can greatly improve the ability of the routing protocol to make good routing decisions. Line of Discussion Insertion, eviction and reinforcement. An efficient neighborhood management algorithm. Routing Protocol We examine the routing protocol with respect to how it works with the Estimator. Evaluation. A comparison of various Distance Vector Protocols with Link Estimation. Empirical Observation Defining Link Quality Through Observation We start by developing an empirical model to derive a suitable metric for link quality. Our Approach: Design a network of mote sensors, collect test data and make some observations. 2

Empirical Analysis A good link quality metric should be: Statistically Stable. Empirically accurate and verifiable. Reproducible. Estimator compatible. Empirical Analysis The Experimental Model 200 nodes linearly configured with 2-foot spacing on an outdoor tennis court. Each node transmits 200 packets at a given power level (initially 50) at a rate of 8 packets/sec. Only one node transmits while all others attempt to receive. Receiving nodes count the number of packets received from the sender. Afterwards, the power is increased and the process rerun. Empirical Model Sensor Grid with Single Sender The Results of RF Power Varying and Sampling at various distances. Each node is 2 feet apart. Each node transmits 200 packets at 8 packets/s. Only one active transmitter at a time. All the rest act as receivers. Objective is to concoct a sampling space where both mean link quality and the variance in link quality are functions of the distance from sender to receiver. Key Observations For a given power setting there is a distance in which essentially all nodes have good connectivity. Increasing the transmitter power increases the effective region. As expected, the effective region is a function of the RF transmitter power. But what about the Transitional Region? Did the size of the TR increase with increasing RF transmitter power? Stability Before our observation can be acceptable we must ensure that the link quality is stable when the nodes are immobile over time. We fix a sender and observe affects on the receivers over a long period. 3

Stability Test Experiment Transmitting node positioned 15 feet from receiver in an indoor location. Nodes transmitted at 8 packets/sec for 20 minutes. Afterwards, sender is moved from 15 ft to 8 ft and transmission continues for 4 more hours. Conclusion Distance is a good representative metric for link quality. Stable Verifiable. Reproducible. We can use it as an estimator metric. Estimator Based on our empirical model we now proceed to design an algorithm that will be used to judge good link candidates. For each link record observed Associate a quality factor (or link probability) based on the mean and variance extracted from the empirical data. Use this link probability to drive the Estimator. About EWMA Estimators A maximum likelihood estimation scheme. Employs exponential data weighting. Widely used in many different areas and applications. Examples: Round Trip Time (RTT) for TCP congestion control. A Low Pass Filter Algorithm. Assumes conditionally normal collections. About EWMA Estimators (cont) Weighting factor determines the level of agility of the estimator in following abrupt changes in the data. Problem! Too much emphasis placed on extreme returns. 4

Exponentially Weighted Moving Average (EWMA) Estimator ( ω ) ek = ek where + ωo e = new estimation, a current average at sample k k ω = weighting factor o = current observation k 1 1 k Estimator Requirements Quick reaction to large changes in link quality. Stable. Small memory footprint. Simple to compute. Estimator with other components Estimator Collecting Link Statistics Broadcast and snooping used to collect link candidates. Estimator responsible for evaluating link candidates collected. But promiscuous packet sniffing is expensive. More cost effective methods may need to be investigated. Responsible for maintaining table of viable links as determined by the Estimator. Seeks to develop and maintain a table subset of neighbor links of the highest possible quality. Rationale Nodes have limited storage, especially for overhead. So efficient management of space is an absolute necessity. Information about reliable links needs to be known beforehand to improve overall network performance. Network volatility requires constant reassessment of routing choices. 5

Additional Considerations Less used links should be less valued. Higher rating for more frequently used. Also, a higher rating should be given to proven reliable links. Functions Eviction Removes records that are obsolete or to make room for a better candidate. Insertion Adds new candidate based on Estimator evaluation. Reinforcement Increases rating for proven entries. Key Design Points Neighbor table finite and limited. Only the best quality links should be collected. Periodic review of entries need to be conducted to ensure viability. Periodic messages (i.e., beacons) should be used versus non-control type packets. Frequent insertions, updates and deletions can seriously impact performance of the overall system. Eviction and Reinforcement Strategies Round Robin with no Reinforcement. FIFO LRH -- least recently heard. CLOCK Algorithm. FREQUENCY Algorithm. Least Frequently Used. Neighbor Manager Assessment Fixed-size table as cell density increases 1st 2nd 3rd # Good neighbors > Table size Freq always maintains 50% or more good neighbors in table Routing Protocol Estimation provides quality links to Routing Protocol prior to the route acquisition phase. Quality link selection improves overall route selection. 40 Number of Potential Neighbors 6

Routing Manager Parent Selection Routing Cost Metrics Packets snooped by the Estimator for viable neighbor link candidates. Neighbor Table manager maintains the neighbor table. Periodic updates by Parent Selection. Spawns periodic parent selection Protocol Evaluation Shortest Path (SP and SP(t)) Minimum Transmission (MT) Broadcast Destination Sequenced Distance Vector (DSDV) Evaluation Graph Analysis 400 Nodes organized as 20X20 grid, 8 ft spacing. Sink placed at corner for max. network depth. Routing Protocol Evaluation Measures routing depth of nodes throughout the network. Reflects end-to-end latency and energy usage Measures the product of link quality along the path from each node in the network. Approximated end-to-end reliability of a routing path. 7