1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 25th Lecture 13.02.2007 Christian Schindelhauer.

Slides:



Advertisements
Similar presentations
Directed Diffusion for Wireless Sensor Networking
Advertisements

Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 25th Lecture Christian Schindelhauer.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 2nd Lecture Christian Schindelhauer.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 16th Lecture Christian Schindelhauer.
Mitigating routing misbehavior in ad hoc networks Mary Baker Departments of Computer Science and.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 15th Lecture Christian Schindelhauer.
CS335 Networking & Network Administration Tuesday, May 11, 2010.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 22nd Lecture Christian Schindelhauer.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Gursharan Singh Tatla Transport Layer 16-May
Ad Hoc Wireless Routing COS 461: Computer Networks
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 12: Data-centric and content-based networking Holger Karl.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Bootstrap and Autoconfiguration (DHCP)
1 Transport Layer Computer Networks. 2 Where are we?
CIS 725 Wireless networks. Low bandwidth High error rates.
Network Kernel Architectures and Implementation ( ) Naming and Addressing Chaiporn Jaikaeo Department of Computer Engineering.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
Network Kernel Architectures and Implementation ( ) Network Architecture Chaiporn Jaikaeo Department of Computer Engineering.
Lecture#1 on Internet. Internet Addressing IP address: pattern of 32 or 128 bits often represented in dotted decimal notation IP address: pattern of 32.
Mohmmad Khalily Dermany Islamic Azad University. Goal Apart from routing protocols that use a direct identifier of nodes (either unique id or position.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Computer Networks Group Universität Paderborn TANDEM project meeting Protocols, oversimplification, and cooperation or: Putting wireless back into WSNs.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
COP 5611 Operating Systems Spring 2010 Dan C. Marinescu Office: HEC 439 B Office hours: M-Wd 2:00-3:00 PM.
Network Kernel Architectures and Implementation ( ) Data-Centric and Content-Based Networking Chaiporn Jaikaeo Department of.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 7: Naming & Addressing Holger Karl.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Reliable Adaptive Lightweight Multicast Protocol Ken Tang, Scalable Network Technologies Katia Obraczka, UC Santa Cruz Sung-Ju Lee, Hewlett-Packard Laboratories.
Networking (Cont’d). Congestion Control l Is achieved by informing nodes along a route that congestion has occurred and asking them to reduce their packet.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
1. This section looks at non-standard options for denoting the senders/receivers of messages Traditional (fixed, wireless, ad hoc): Denote individual.
Wireless sensor and actor networks: research challenges Ian. F. Akyildiz, Ismail H. Kasimoglu
Chapter 9: Transport Layer
Ad hoc and Sensor Networks Chapter 12: Data-centric and content-based networking Holger Karl.
Instructor Materials Chapter 9: Transport Layer
Scaling the Network: The Internet Protocol
Introduction to Wireless Sensor Networks
CMPT 371 Data Communications and Networking
Ad hoc and Sensor Networks Chapter 13a: Protocols for dependable data transport Holger Karl Note: This chapter is missing a section on transport protocols.
Chapter 6: Transport Layer (Part I)
Internet Networking recitation #4
Net 435: Wireless sensor network (WSN)
Mobile and Wireless Networking
DARPA Proposer’s Day for
Viet Nguyen Jianqing Liu Yaqin Tang
Data-Centric Networking
Scaling the Network: The Internet Protocol
Wireless Sensor Networks and Internet of Things
Presentation transcript:

1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 25th Lecture Christian Schindelhauer

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Final Meeting (before the exams)  Meeting Point: Waldkirch, main station  Date: Tuesday :01 (Train departs Freiburg main station at 13:40)  Plan –Hike the Kastelburg –Picknick  BYOF –Order drinks on-line –Don‘t forget –Food –Umbrella –Matches

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Data-centric and content-based networking  Interaction patterns and programming model  Data-centric routing  Data aggregation  Data storage

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Data-centric storage  Problem: Sometimes, data has to be stored for later retrieval – difficult in absence of gateway nodes/servers  Question: Where/on which node to put a certain datum? –Avoid a complex directory service  Idea: Let name of data describe which node is in charge –Data name is hashed to a geographic position –Node closest to this position is in charge of holding data –Akin to peer-to-peer networking/distributed hash tables –Hence name of one approach: Geographic Hash Tables (GHT) –Use geographic routing to store/retrieve data at this “location” (in fact, the node)

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Geographic hash tables – Some details  Good hash function design  Nodes not available at the hashed location – use “nearest” node as determined by a geographic routing protocol –E.g., the node where an initial packet started circulating the “hole” –Other nodes around hole are informed about node taking charge  Handling failing and new nodes –Failure detected by timeout, apply similar procedure as for initially storing data  Limited storage per node –Distribute data to other nodes on same face Key location Timeout New key location

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Conclusion  Using data names or predicates over data to describe the destination of packets/data opens new options for networking  Networking based on such “data-centric addresses” nicely supports an intuitive programming model – publish/subscribe  Aggregation a key enabler for efficient networking  Other options – data storage, bradcasting aggregates – also well supportable

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Naming and Indexing  Non-standard options for denoting the senders/receivers of messages –Traditional (fixed, wireless, ad hoc): Denote individual nodes by their identity –WSN: Content-based addresses can be a good complement  When addresses are not given a priori, they have to be determined “in the field” –Some algorithms are discussed

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Names vs. addresses  Name: Denote/refer to “things” –Nodes, networks, data, transactions, … –Often, but not always, unique (globally, network-wide, locally) –Ad hoc: nodes – WSN: Data!  Addresses: Information needed to find these things –Street address, IP address, MAC address –Often, but not always, unique (globally, network-wide, locally) –Addresses often hierarchical, because of their intended use in, e.g., routing protocols  Services to map between names and addresses –E.g., DNS  Sometimes, same data serves as name and address –IP addresses are prominent examples

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Issues in address management  Address allocation: Assign an entity an address from a given pool of possible addresses –Distributed address assignment (centralized like DHCP [Dynamic Host Configuration Protocol] does not scale)  Address deallocation: Once address no longer used, put it back into the address pool –Because of limited pool size –Graceful or abrupt, depending on node actions  Address representation  Conflict detection & resolution (Duplicate Address Detection) –What to do when the same address is assigned multiple times? –Can happen e.g. when two networks merge  Binding –Map between addresses used by different protocol layers –E.g., IP addresses are bound to MAC address by ARP (Address Resolution Protocol)

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Distributed address assignment  Option 1: Let every node randomly pick an address –For given size of address space –risk of duplicate addresses  Option 2: Avoid addresses used in local neighborhood  Option 3: Repair any observed conflicts –Temporarily pick a random address from a dedicated pool and a proposed fixed address –Send an address request to the proposed address, using temporary address –If address reply arrives, proposed address already exists –Collisions in temporary address unlikely, as only used briefly  Option 4: Similar to 3, but use a neighbor that already has a fixed address to perform requests

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Content-based addresses  Recall: Paradigm change from id-centric to data-centric networking in WSN  Supported by content-based names/addresses –Do not described involved nodes (not known anyway), but the content itself the interaction is about  Classical option: Put a naming scheme on top of IP addresses –Done by some middleware systems

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Geographic addressing  Express addresses by denoting physical position of nodes –Can be regarded as a special case of content-based addresses –Attributes for x and y coordinates (and maybe z)  Options –Single point –Circle or sphere centered around given point –Rectangle by two corner points –Polygon/polytope by list of points –…

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No ISO/OSI 7-layer reference model (complete network)

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Protocols for dependable data transport  Dependability requirements  Delivering single packets  Delivering blocks of packets  Delivering streams of packets

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Dependability aspects  Coverage & deployment –Is there a sufficient number of nodes such that an event can be detected at all? Such that data can accurately measured? –How do they have to be deployed?  Information accuracy –Which of the measured data have to be transported where such that a desired accuracy is achieved? –How to deal with inaccurate measurements in the first place?  Dependable data transport –Once it is clear which data should arrive where, how to make sure that it actually arrives? –How to deal with transmission errors and omission errors/congestion?

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Dependability: Terminology  “Dependable” is an umbrella term  Main numerical metrics –(Steady state) availability – probability that a system is operational at any given point in time Assumption: System can fail and will repair itself –Reliability at time t – Probability that system works correctly during the entire interval [0,t) Assumption: It worked correctly at system start t=0 –Responsiveness – Probability of meeting a deadline Even in presence of some – to be defined – faults –Packet success probability – Probability that a packet (correctly) reaches its destination Related: packet error rate, packet loss rate –Bit error rate – Probability of an incorrect bit Channel model determines precise error patterns

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Dependability constraints  Wireless sensor networks (WSN) have unique constraints for dependable data delivery –Transmission errors over a wireless channel –Limited computational resources in a WSN node –Limited memory –Limited time (deadlines) –Limited dependability of individual nodes  Standard mechanisms: Redundancy –Redundancy in nodes, transmission –Forward and backward error recovery –Combinations are necessary!

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Dependable data transport – context  Items to be delivered –Single packet –Block of packets –Stream of packets  Level of guarantee –Guaranteed delivery –Stochastic delivery  Involved entities –Sensor(s) to sink –Sink to sensors –Sensors to sensors 50% delivered

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Constraints  Energy –Send as few packets as possible –Send with low power ! high error rates –Avoid retransmissions –Short packets ! weak FEC –Balance energy consumption in network  Processing power –Only simple FEC schemes –No complicated algorithms (coding)  Memory –Store as little data as briefly as possible

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Overview  Dependability requirements  Delivering single packets –Single path –Multiple paths –Gossiping-based approaches –Multiple receivers  Delivering blocks of packets  Delivering streams of packets

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Delivering single packets – main options  What are the intended receivers? –A single receiver? –Multiple receivers? In close vicinity? Spread out? –Mobile?  Which routing structures are available? –Unicast routing along a single path? –Routing with multiple paths between source/destination pairs? –No routing structure at all – rely on flooding/gossiping?

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Single packet to single receiver over single path  Single, multi-hop path is giving by some routing protocol  Issues: Which node –Detects losses (using which indicators)? –Requests retransmissions? –Carries out retransmissions?

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Detecting & signaling losses in single packet delivery  Detecting loss of a single packet: Only positive acknowledgements (ACK) feasible –Negative acks (NACK) not an option – receiver usually does not know a packet should have arrived, has no incentive to send a NACK  Which node sends ACKs (avoiding retransmissions)? –At each intermediate node, at MAC/link level Usually accompanied by link layer retransmissions Usually, only a bounded number of attempts –At the destination node Transport layer retransmissions Problem: Timer selection

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Carrying out retransmissions  For link layer acknowledgements: Neighboring node  For transport layer acknowledgements: –Source node ! end-to-end retransmissions

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Example schemes: HHR and HHRA  Hop-by-hop reliability (HHR) –Idea: Locally improve probability of packet transmission, but do not use packet retransmission –Instead, simply repeat packet a few times – a repetition code –Choose number of repetitions per node such that resulting end-to-end delivery probability matches requirements  Hop-by-hop reliability with Acknowledgements (HHRA) –Node sends a number of packets, but pauses after each packet to wait for acknowledgement –If received, abort further packet transmissions

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Multiple paths  Types of : disjoint or braided  Usage: default and alternative routes  Usage: simultaneous –Send same packet –Send redundant fragments  Example: ReInForM

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Multiple paths: Disjoint or braided Source Sink Disjoint paths Primary path Secondary path Source Sink Braided paths Primary path

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Using multiple paths  Alternating use –Send packet over the currently “selected” path –If path breaks, select alternative path –Or/and: repair original path locally  Simultaneous use –Send the complete packet over some or all of the multiple paths simultaneously –Send packet fragments over several paths But endow fragments with redundancy Only some fragments suffice to reconstruct original packet

University of Freiburg Institute of Computer Science Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks Lecture No Conclusion  Transport protocols have considerable impact on the service rendered by a wireless sensor networks  Various facets – no “one size fits all” solution in sight  Still a relatively unexplored areas  Items not covered –Relation to coverage issues –TCP in WSN? Gateways? –Aggregation? In-network processing?

30 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Thank you and thanks to Holger Karl for the slides Wireless Sensor Networks Christian Schindelhauer 26th Lecture