IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

Similar documents
Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

Papers. Ad Hoc Routing. Outline. Motivation

Wireless Internet Routing. IEEE s

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

More Efficient Routing Algorithm for Ad Hoc Network

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Medium Access Control

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

CS434/534: Topics in Networked (Networking) Systems

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

IN Wireless Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

ICT 5305 Mobile Communications. Lecture - 4 April Dr. Hossen Asiful Mustafa

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

Mobile Computing. Chapter 3: Medium Access Control

Impact of Radio Irregularity on Wireless Sensor Networks

Ad-Hoc Networks and New GPS Measurement Techniques for Robotic Follower Applications

Jinbao Li, Desheng Zhang, Longjiang Guo, Shouling Ji, Yingshu Li. Heilongjiang University Georgia State University

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks

Chapter 3 : Media Access. Mobile Communications. Collision avoidance, MACA

Medium Access Control Protocol for WBANS

A Wireless Communication System using Multicasting with an Acknowledgement Mark

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Cooperation in Random Access Wireless Networks

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Lecture on Sensor Networks

Wireless Networked Systems

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Survey of MANET based on Routing Protocols

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Jamming Wireless Networks: Attack and Defense Strategies

Wireless Sensor Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

Applied to Wireless Sensor Networks. Objectives

Modelling the Localization Scheme Integrated with a MAC Protocol in a Wireless Sensor Network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Mobile Communications

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)

IEEE P Wireless Personal Area Networks

WUR-MAC: Energy efficient Wakeup Receiver based MAC Protocol

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Achieving Network Consistency. Octav Chipara

Medium Access Schemes

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

Wireless Mesh Networks

1. Introduction 1.2 Medium Access Control. Prof. JP Hubaux

Fiber Distributed Data Interface

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

All Beamforming Solutions Are Not Equal

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

CS649 Sensor Networks IP Lecture 9: Synchronization

ETSI work on IoT connectivity: LTN, CSS, Mesh and Others. Josef BERNHARD Fraunhofer IIS

Seminar on Low Power Wide Area Networks

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Wireless TDMA Mesh Networks

Exercise Data Networks

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Part I: Introduction to Wireless Sensor Networks. Alessio Di

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

Local Area Networks NETW 901

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

SourceSync. Exploiting Sender Diversity

Transcription:

IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer: routing transport layer: TCP/IP Sensor networks localization data processing deployments

Ad-hoc networks Each node is willing to forward data NO dedicated routing hardware resilient to node/link failures

Wireless ad-hoc networks Mobile Ad-Hoc Networks (MANETS) Mesh Networks (e.g., MIT roofnet) Sensor Networks

Wireless is a broadcast medium Pictures are misleading communication links are 3D transmissions may interfere

Signal propagation ranges Transmission range communication is possible low error rate Detection range detection of the signal no communication Interference range signal may not be detected signal adds to the background noise sender transmission detection interference distance

From bits to packets Physical layer coded, modulated bitstream BER: Bit-Error-Rate RSSI: Received Signal Strength Indicator CC1000/TinyOS/B-MAC Link layer preamble 8 start 2 packets: header + data payload + CRC PER: Packet-Error-Rate len 1 MAC hdr 4 data payload up to 29 CRC 2

Link-layer propagation ranges 2300 1.2 Packet reception RSSI rate 22001 2100 0.8 2000 0.6 1900 0.4 1800 0.2 RSSI = 1/dist α EYES node 17000 0 5 10 15 20 25 30 35 40 Distance (metre) Gray area effect [Zhao:2003]

Link-layer & multipath fading CC2420 @ 2.4 GHz, power = -1dBm, 2am % good 100 50 0 0 0.1 0.2 0.3 0.4 x (lambda) 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.5 0.6 0.7 0 0.8 0.9 y (lambda) [Robert Poor, Ember corp.]

Medium Access Control background

Medium Access Control Control access to the shared radio channel avoid interference between transmissions mitigate effects of collisions (retransmit) History 802.11 ALOHA CSMA MACA MACAW S-MAC 1970 1980 1990 2000 2010

Medium Access Control Control access to the shared radio channel avoid interference between transmissions mitigate effects of collisions (retransmit) Approaches contention-based: no coordination schedule-based: central authority (access pt)

Collision-based MAC protocols ALOHA : packet radio networks send when ready 18-35% channel utilization CSMA (Carrier Sense Multiple Access): listen before talk 50-80% channel utilization

Hidden terminal problem A B C Carrier sense at sender may not prevent collision at receiver cs DATA Time DATA cs

CSMA/CA: Collision Avoidance A B C MACA: Request To Send Clear To Send DATA MACAW (Wireless) additional ACK cs Time RTS CTS DATA ACK Blocked

Exposed terminal problem A B C D Parallel CSMA transfers are serialized by CSMA/CA Collision avoidance can be too restrictive! cs Time RTS CTS DATA ACK Blocked RTS cs

IEEE 802.11 Operation infrastructure mode (access point) ad-hoc mode Power save mechanism; not for multi-hop Protocol carrier sense collision avoidance (optional)

IEEE 802.11 DIFS Sender RTS SIFS DATA Receiver Others SIFS CTS NAV(CTS) NAV(RTS) SIFS ACK DIFS Contention Window Network Allocation Vector (NAV) collision avoidance overhearing avoidance: other nodes may sleep

Schedule-based MAC protocols Communication is scheduled in advance no contention no overhearing support for delay-bound traffic (voice) Time-Division Multiple Access time is divided into slotted frames access point broadcasts schedule coordination between cells required

TDMA Frame n Frame n+1 Frame n+2 TC downlink uplink CP Typical WLAN setup no direct communication between nodes access point broadcast Traffic Control (TC) map (new) nodes signal needs in Contention Period (CP)

Requirements for Sensor Networks Handle scarce resources CPU: 1 10 MHz memory: 2 4 KB RAM radio: ~100 Kbps energy: small batteries Unattended operation plug & play, robustness long lifetime throughput latency fairness WLAN energy WSN

Communication patterns WSN applications: local collaboration when detecting a physical phenomenon periodic reporting to sink Characteristics: low data rates <1000 bps small messages ~25 bytes fluctuations (in time and space) local gossip convergecast [Kulkarni:2004]

Directionality experiment 400 350 goodput msg/s 300 250 200 150 100 50 CSMA directed CSMA random 0 0 100 200 300 400 500 600 700 800 900 1000 input msg/s

Localization introduction

The localization problem Scenario: install nodes determine positions Choices: (0,0) infrastructure vs. ad-hoc connectivity vs. ranging centralized vs. distributed GPS Target Synchronization channel Ranging channel

Ad-hoc localization Many nodes (> 100) NO infrastructure NO central processing Sparse anchor nodes known position (0,0) Other nodes determine their position using anchor locations distancemeasurements

Ranging Technologies Received Signal Strength Indicator (RSSI) extremely noisy (reflections) calibration omi-directional (sort of) range: ~10 m accuracy: ~2-3 m Ultrasonic time-of-flight (clock synchronization) time-difference with RF lope-shape beam angle range: ~10-30 m accuracy: ~2-5 cm

Range-free localization Algorithms: Centroid [Bulusu2000] Convex optimization [Doherty2001] DV-hop [Niculescu2001] Results: many anchors needed poor accuracy: >.5 Radio range centroid

Range-based localization Algorithms: Multihop lateration [Savvides2001] Robust positioning [Savarese2002] APS [Niculescu2001] Lateration: intersect circles, solve [Ax=b] redundancy to handle errors range measurements sparse anchor scenario

Localization in sensor networks Algorithms must limit processing communication but fail to do so lateration implies NxN matrix invert periodic beaconing or flooding overheads

Routing background

The routing problem Find path between S and D ad-hoc network unique node IDs [mobile nodes] B S C E F A H G D I

Classification of routing protocols Table-driven (proactive) Each node maintains a routing table (to all others) Topology changes are immediately propagated DSDV, OSLR, WRP, CGSR, maintenance vs discovery cost Source-initiated (reactive / on-demand) Nodes maintain only information for active destinations Explicit route discovery (flooding) [Route maintenance procedure used to repair routes] AODV, DSR, TORA, SSR,

AODV Ad Hoc On-Demand Distance Vector Routing Now RFC 3561, based on DSDV Source sends Route Request Packet (RREQ) when a route has to be found Route Reply Packet (RREP) is sent back by destination Route Error messages update routes

Route Requests in AODV Broadcast transmission S E B C F A H G D Represents transmission of RREQ I

Route Requests in AODV S E B C F A H G D Represents links on Reverse Path I

Route Reply in AODV S E A B H C G F D I Represents links on path taken by RREP

Routing tables in AODV Dest Dist Next Dest Dist Next D 2 F D 3 E Dest G 2 C S E D F B C D A G H I Dist 1 Next D

Route maintenance in AODV S initiates new route discovery S E A B H C G F D Represents transmission of RERR I

Routing in sensor networks? Often not needed! local gossip: broadcast convergecast: spanning tree sink-to-nodes: flooding Routing table has one entry (to-sink) Application-level solutions (in-band signaling)

Routing in sensor networks! Problem: dynamic environment link/node failures multiple/mobile sinks node mobility Solutions: factor in link quality: ETX (Expected #hops) factor in location info: geographical routing

Presentation basics dos & don ts

Speaker s instructions Preparations contact your special topic instructor browse recent literature propose paper for presentation (-1 week) prepare Powerpoint slides (-2 days) Performance bring your own laptop OR a USB memory stick OR send Koen an e-mail (before 08:30) present paper + lead discussion

Less is more DO max 6 bullets per slide DON T write full sentences (because that gets your audience reading instead of paying attention to what you have to say, especially when you have to use a small font size to cramp it all on a single page!) use fancy fonts (sans serif is best) use animations (for experts only )

A picture is worth a thousand words DO use illustrations/graphs/tables (1 per slide) use color DON T show code listings show mathematical proofs

Practice makes perfect DO rehearse your talk (and timing) DON T recite your text run over time

Body language DO speak with your hands interact with your audience DON T stare at your shoes/laptop/me turn your back to the audience when pointing at your slides

Home work Read classic MAC papers S-MAC (contention-based) LMAC(TDMA) Submit summary via CPM 300-500 words PDF format deadline: April 24 th, 08:30 (before class)