Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Analysis of WSN Routing Protocols for Multiple Traffic Patterns.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Is There Light at the Ends of the Tunnel? Wireless Sensor Networks for Adaptive Lighting in Road Tunnels IPSN 2011 Sean.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Transmission Power Control in Wireless Sensor Networks CS577 Project by Andrew Keating 1.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
pTunes: Runtime Parameter Adaptation for Low-power MAC Protocols
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
1 Distributed Adaptive Sampling, Forwarding, and Routing Algorithms for Wireless Visual Sensor Networks Johnsen Kho, Long Tran-Thanh, Alex Rogers, Nicholas.
Topology Control Presenter: Ajit Warrier With Dr. Sangjoon Park (ETRI, South Korea), Jeongki Min and Dr. Injong Rhee (advisor) North Carolina State University.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirstrom, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science Presenter.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
On the Energy Efficient Design of Wireless Sensor Networks Tariq M. Jadoon, PhD Department of Computer Science Lahore University of Management Sciences.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Daibo Liu 1 Daibo Liu 1, Zhichao Cao 2, Xiaopei Wu 2, Yuan He 2, Xiaoyu Ji 3 and Mengshu Hou 1 ICDCS, 2015, Columbus TeleAdjusting: Using Path Coding and.
Decentralized Scattering of Wake-up Times in Wireless Sensor Networks Amy L. Murphy ITC-IRST, Trento, Italy joint work with Alessandro Giusti, Politecnico.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
Scalable Data Aggregation for Dynamic Events in Sensor Networks Kai-Wei Fan Kai-Wei Fan, Sha Liu, and Prasun.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
Tufts University. EE194-WIR Wireless Sensor Networks. March 3, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Implementation of Collection Tree Protocol in QualNet
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Improving Link Quality by Exploiting Channel Diversity in Wireless Sensor Networks Manjunath D, Mun Choon Chan, and Ben Leong National University of Singapore.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Versatile Low Power Media Access for Wireless Sensor Networks Sarat Chandra Subramaniam.
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Wireless Sensor Network (WSN). WSN - Basic Concept WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Branislav Kusy, Christian Richter, Wen Hu, Mikhail Afanasyev, Raja Jurdak, Michael Brunig, David Abbott,
Department of Computer Science and Engineering UESTC 1 RxLayer: Adaptive Retransmission Layer for Low Power Wireless Daibo Liu 1, Zhichao Cao 2, Jiliang.
1 An Energy-efficient MAC protocol for Wireless Sensor Networks Wei Ye, John Heidemann, Deborah Estrin IEEE infocom /1/2005 Hong-Shi Wang.
Toward a Packet Duplication Control for Opportunistic Routing in WSNs Georgios Z. Papadopoulos, Julien Beaudaux, Antoine Gallais, Periklis Chatzimisios,
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Self-stabilizing energy-efficient multicast for MANETs.
Broadcast-Free Collection Protocol Daniele Puccinelli , Marco Zuniga , Silvia Giordano , Pedro Jos’e Marr’onj   University of Applied Sciences of.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
AUTO-ADAPTIVE MAC FOR ENERGY-EFfiCIENT BURST TRANSMISSIONS IN WIRELESS SENSOR NETWORKS Romain Kuntz, Antoine Gallais and Thomas No¨el IEEE WCNC 2011 Speaker.
Building Wireless Efficient Sensor Networks with Low-Level Naming J. Heihmann, F.Silva, C. Intanagonwiwat, R.Govindan, D. Estrin, D. Ganesan Presentation.
Max do Val Machado Raquel A. F. Mini Antonio A. F. Loureiro DCC/UFMG DCC/PUC Minas DCC/UFMG IEEE ICC 2009 proceedings Advisor : Han-Chieh Chao Student.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
Why does it need? [USN] ( 주 ) 한백전자 Background Wireless Sensor Network (WSN)  Relationship between Sensor and WSN Individual sensors are very limited.
Sensor network routing protocol for underground robot remote control Demonstration picture (IDF)
In the name of God.
Data Collection and Dissemination
Presentation by Andrew Keating for CS577 Fall 2009
Data Collection and Dissemination
Collection Tree Protocol
Network Architecture for General-purpose Sensor Networks
Presentation transcript:

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Analysis of WSN Routing Protocols for Multiple Traffic Patterns Presenter: Rizwan Mumtaz University of Trento, Italy & RWTH Aachen University Germany In collaboration with Fondazione Bruno Kessler (FBK) Supervisor: Prof. Gian Pietro Picco, Unitn Trento Second reader: Prof. Klaus Wehrle, RWTH Aachen Adviser: Dr. Amy L. Murphy, FBK

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Background Wireless Sensor Networks (WSNs) are networks for collecting data from a large environments. Composed of spatially distributed miniature nodes equipped with various sensors e.g. temperature, pressure, sound, vibrations, light and motion sensors. Applications: – Sensing + CPU + Radio = Thousands of potential applications

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Some applications Habitat Monitoring Seismic structural Response Building Monitoring Agriculture A Generic WSN

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Challenges in WSNs Limited availability of sensor nodes’ resources in – Processing – Power – Memory – Storage Applications demands – High throughput requirements – Low power consumption/longer network life time How to handle these challenges? – Optimization needed across all layers of protocol stack Hardware Link Layer MAC Layer Routing Application

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Energy Efficiency and Routing in WSNs Multiple rate applications: A scenario

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University The Problem, Existing Solutions & their limitations Temp monitoring: Sampled at the order of one message in several mins. CTP, MultihopLQI,Dozer, CentRoute etc.. Surveillance systems: Sampled at the order of several messages per second. Wisden, QCRA, IRFC, RCRT etc.. Compressed accelerometer bulk data, 100k byte in 10 mins. Packet s inter-related. Single packet loss jeopardize the whole bulk. RBC, KOALA, RMST, FLUSH etc.. Limitations: – All protocols support uniform data rate. – In presence of multiple rate traffic the protocols use conservative approach for resource utilization. E.g: Temperature readings and accelerometer data on collected from the same network.

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Existing Solutions Low Rate E.g., temperature 1 msg per 10 min High Rate E.g., surveillance 3 msgs per sec Bulk Transfer E.g., accelerometer 100k (1422msgs) per 10 min CTP, MultihopLQI,Dozer, CentRoute etc Wisden, QCRA, IRFC, RCRT RBC, KOALA, RMST, FLUSH etc.. Limitations: – All protocols support uniform data rate. – In presence of multiple rate traffic the protocols use conservative approach for resource utilization. E.g: Temperature readings and accelerometer data on collected from the same network.

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Traffic Patterns in WSNs Low-rate data – Send and received in the order of minutes. E.g. temperature monitoring of a building High rate data – Send and received in the order of seconds/milliseconds. E.g. military surveillance systems Bulk Transfers – Long bursts of contiguous data packets inter-related to each other – Different from high-rate data in the sense that all packets of a particular burst must be received or otherwise the entire burst is useless – Loss of single packet jeopardizes the whole burst – E.g. Accelerometer data Multiple Traffic Patterns – Different combination of the above.

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Thesis Goals and Outline Understand and analyze how/when do low-rate protocols fail for bulk transfer. – Analysis of Collection Tree Protocol Investigate the performance of a protocol designed for multiple traffic patterns. – Analysis of PLEX Combined Analysis

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Outline Background of the topic Thesis Goals Experimental Methodology The Collection Tree Protocol – Analysis of Collection Tree Protocol PLEX: An alternate solution – Analysis of PLEX Conclusions Q & A

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Experimental Methodology Testbed at FBK TelosB motes RatLab at FBK 50 TelosB motes TinyOS 2.x system RatLab at FBK 50 TelosB motes TinyOS 2.x system Analysis of CTP Criteria for Analysis – Application packet delivery ratio – Burst delivery ratio – Power consumption Criteria for Analysis – Application packet delivery ratio – Burst delivery ratio – Power consumption

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Widely regarded as a reference protocol for performing data collection in WSNs Specifications provided in TinyOS 2.x platform Key Functionalities: – Provides “best effort anycast datagram communication to one of the collection roots in a network ” – Uses a tree based network topology to collect the data from the network at sink(s) – Uses broad cast beacons in an adaptive fashion (Trickle Algorithm) to discover topology rooted at one or more sink(s) – Build tree with good links – Uses ETX as a cost metric for routing paths – Repair broken links on demand Collection Tree Protocol (CTP) Collection Tree

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Case –I: Uniform data-rate Analysis Testbed Settings – 1 sink – 49 source nodes – Max diameter of network = 4 hops Experimental Settings – MAC Protocol CSMA Box-MAC with sleep intervals of 50ms, 250ms, 500msec – Application packet sending rate (Inter-Packet Interval (IPI): 10sec, 30sec, 5min Analysis of CTP

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University LPL = 250ms, IPI = 10sec Average Throughput Table: CTP Avg. Throughput Analysis of CTP CTP Delivery Ratio over time Time (sec) Avg. Delivery Ratio Fluctuating throughput but stays above 90% Control overhead and duty cycle details are in the thesis. Uniform rate

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Control Overhead LPL = 250ms, IPI = 10sec Retransmissions rate Analysis of CTP application vs control pkts Time (sec) No. of Retransmissions IPI No. of Beacons Time (sec) No. of messages No. of Retransmissions Node ID Control overhead Node 10 has a poor link to parent Adaptive beaconing rate at startup and on demand Uniform rate

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Energy Consumption (Duty Cycle) Observations: Duty cycle is higher for smaller IPI decreases with increased sleep intervals Observations: Duty cycle is higher for smaller IPI decreases with increased sleep intervals Avg. Duty Cycles Analysis of CTP Uniform rate

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Case –II Multiple Traffic Patterns Testbed Settings – 1 sink – 49 source nodes – Max diameter of network = 4 hops Experimental Settings – Box-MAC with sleep interval = 250ms – IPI for low rate data = 60sec – Burst after every 90sec – Burst size = 50 packets – Number of Burst generating sources: 0, 4, 8, ……… – All other nodes as low rate sources. Analysis of CTP

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Burst Delivery Ratio Avg. Delivery Ratio Analysis of CTP Overall packet delivery ratio Normal/Bursty Avg. Delivery Ratio (%) Normal/Bursty Very good overall throughput 0% packet loss 2% packet loss 4% packet loss 6% packet loss 8% packet loss Poor Burst delivery CTP fails for burst transfer..!!! Multiple rate

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University CTP Control Overhead LPL = 250ms, IPI = multiple Analysis of CTP Normal/Bulky No. of messages Normal/Bulky) No. of messages Total no. of messages generatedNo of control messages Control Overhead increases with increase in bulk sources Multiple rate

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Duty Cycle per node Total No. of messages per node Analysis of CTP Power Consumption (Duty Cycle) Node ID No. of messages Duty cycle (%) Node ID Normal/Bulky Duty cycle (%) Min. duty cycle is constant Min. Duty Cycle Avg. Duty Cycle Avg. duty cycle grows with increasing bulk sources Multiple rate

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Discussion: What CTP fails at? Provides very good data yield but does not scale well for burst data transfers. Tends to lose application packets at regular intervals – Jeopardizing the burst transfers Power consumption is inefficient. – Radio duty cycling on a network-wide basis according to high rate demand. – Power wastage on nodes sending only a single message during long intervals of time.

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University PLEX Developed by D3S group at University of Trento, Italy and Fondazione Bruno Kessler ( Implemented in TinyOS Real world deployments: TRITon Project. Key Functionalities: – Aims to provides reliable routing solution for multiple traffic patterns on top of single routing tree – Broadcast tree building messages (beacons) at startup and after a configurable fixed amount of time. – Uses LQI as a cost metric for routing paths – Repair broken links after fixed amount of time.

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Salient features supporting burst transfers Avoid parent change on a path forwarding burst traffic Hop-by-hop Packet Recovery Congestion Control Different sleep intervals for nodes part of burst traffic Parent change for burst nodes Hop-by-hop Packet Recovery

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Analysis of PLEX Average Throughput PLEX Table: PLEX Avg. Throughput different experiments PLEX Avg. Delivery Ratio over time Time (sec) Avg. Delivery Ratio Avg. duty cycle fluctuctuates

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University PLEX Burst Delivery Ratio Burst Delivery Ratio PLEX Time (sec) Avg. Delivery Ratio Burst Delivery Ratio 0% packet loss 2% packet loss 4% packet loss 6% packet loss 8% packet loss Poor Burst delivery

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University PLEX Control Overhead Tree building messages PLEX Tree building msgs only at startup and at fixed intervals Normal/Bulky No. of messages Normal/Bulky) No. of messages Normal/Bulky No. of messages Recoveries Congestions Total messages Huge number of recovery messages

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Did PLEX fail?? What is good? – PLEX is the presentation of new concepts to deal burst traffic. – The ideas are promissing What is bad? – The current implementation fails. How to proceed? – Thorough code debugging needed. – Investigate each novel feature separately – Check PLEX core design – Test PLEX ideas by integrating it into a stable protocol

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Integrate PLEX Features into CTP Stick to same parent for an extra fraction of time Implement hop-by-hop recovery mechanism Integrate Congestion Control method Need-based approach for nodes’ duty cycling

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Conclusions CTP – provides a very good PDR but fails for burst transfers. – is inefficient in terms of resources utilization in presence of multiple rate traffic. PLEX – uses a different approach to treat burst in a special manner. – provides an optimal approach for resource utilization. – verification of concepts required. Integration of PLEX features into CTP – integrate individual concepts of PLEX into CTP.

Rizwan Mumtaz RWTH Aachen University 2 nd COST0804 Training School Balearic Island University Questions! Thanks for your attention!