Lessons from Haggle iMote Experiments Erik Nordström Haggle meeting 9-10 January 2007.

Slides:



Advertisements
Similar presentations
Computer-System Structures Er.Harsimran Singh
Advertisements

IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Storing Data: Disk Organization and I/O
SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
ZebraNet Rolf Kristensen & Torben Jensen s s
Proximity Sensor Theremin Khoa Nguyen Walter Hudson Dennis Gilbert G. Hewage Thushara.
Overview: Chapter 7  Sensor node platforms must contend with many issues  Energy consumption  Sensing environment  Networking  Real-time constraints.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
OS2-1 Chapter 2 Computer System Structures. OS2-2 Outlines Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
Node-level Representation and System Support for Network Programming Jaein Jeong.
IEEE OpComm 2006, Berlin, Germany 18. September 2006 A Study of On-Off Attack Models for Wireless Ad Hoc Networks L. Felipe Perrone Dept. of Computer Science.
Random Testing of Interrupt-Driven Software John Regehr University of Utah.
Surrey Space Centre, University of Surrey, Guildford, Surrey, GU2 7XH ESA Wireless Sensor Motes Study George Prassinos, SSC, University of Surrey.
Manajemen Basis Data Pertemuan 2 Matakuliah: M0264/Manajemen Basis Data Tahun: 2008.
Generic Sensor Platform for Networked Sensors Haywood Ho.
Abhinav Kamra Computer Science, Columbia University 2.1 Operating System Concepts Silberschatz, Galvin and Gagne  2002 Chapter 2: Computer-System Structures.
TinyOS Software Engineering Sensor Networks for the Masses.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
Intel ® Research mote Ralph Kling Intel Corporation Research Santa Clara, CA.
WALRUS: Wireless Active Location Resolver with Ultrasound Tony Offer, Christopher Palistrant.
A+ Certification Guide Chapter 10 Mobile Devices.
The Microcomputer System In this presentation you will: Investigate the microprocessor Title Page.
General System Architecture and I/O.  I/O devices and the CPU can execute concurrently.  Each device controller is in charge of a particular device.
Pocket Switched Networks: Real-world Mobility and its Consequences for Opportunistic Forwarding Jon Crowcroft,Pan Hui (Ben) Augustin Chaintreau, James.
Wireless LAN Advantages 1. Flexibility 2. Planning 3. Design
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
CHAPTER 2: COMPUTER-SYSTEM STRUCTURES Computer system operation Computer system operation I/O structure I/O structure Storage structure Storage structure.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Chapter 2: Computer-System Structures
1 CSE Department MAITSandeep Tayal Computer-System Structures Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
How Small Labels create Big Improvements April Chan-Myung Kim
Example Distributed Sensor Network with TinyOS Motes RPI ECSE – 6965/4694 Daniel Casner 2007 April 13th.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks 20 January 2005.
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Replicating Memory Behavior for Performance Skeletons Aditya Toomula PC-Doctor Inc. Reno, NV Jaspal Subhlok University of Houston Houston, TX By.
ECE 497 Capstone Design.
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
1 CS.217 Operating System By Ajarn..Sutapart Sappajak,METC,MSIT Chapter 2 Computer-System Structures Slide 1 Chapter 2 Computer-System Structures.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Xiong Junjie Node-level debugging based on finite state machine in wireless sensor networks.
Interfacing External Sensors to Telosb Motes April 06,2005 Raghul Gunasekaran.
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
SYSTEM SOFTWARE DESIGN JAMES ZUROSKE Pet Proximity Sensor.
HETUS Pilot Group 8 Privacy procedures and ethical issues Kimberly Fisher, Centre for Time Use Research – co-ordinator External consultant Kai Ludwigs.
Low Power Management for CC2430 Jinho Son Real-Time System Lab.
Renesas Electronics Europe GmbH A © 2010 Renesas Electronics Corporation. All rights reserved. RL78 AD converter.
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Some Bluetooth Background
Hardware-rooted Trust for Secure Key Management & Transient Trust
IHP: Innovation for High Performance Microelectronics
Chapter 2: Computer-System Structures(Hardware)
Chapter 2: Computer-System Structures
Redundancy Control For PostgreSQL
Sega Dreamcast Visual Memory Unit FPGA Implementation
Insights into designing short range communication interface for IOT
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 2: Computer-System Structures Computer System Operation I/O Structure Storage.
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling
Module 2: Computer-System Structures
Presentation by Andrew Keating for CS577 Fall 2009
Module 2: Computer-System Structures
Chapter 2: Computer-System Structures
Chapter 2: Computer-System Structures
Module 2: Computer-System Structures
Module 2: Computer-System Structures
A Study of On-Off Attack Models for Wireless Ad Hoc Networks
Technical Training.
Presentation transcript:

Lessons from Haggle iMote Experiments Erik Nordström Haggle meeting 9-10 January 2007

3 Background Investigate contact patterns (human mobility) of users Intel motes handed out to participants at conferences – Bluetooth inquiry scan at regular interval – Record devices in proximity – Motes can only respond when not inquiring Two types of iMotes – Mobile mote (dental floss) carried by users – Stationary long range mote, more battery, external antenna Reset problems motivation for new experiment

4 The Intel Mote

5 Overview of iMote Experiments Experiment# NodesDuration# Contacts Intel94 days1 190 Cambridge125 days4 228 Hong Kong (school)235 days Hong Kong (city)375 days266 INFOCOM’05413 days INFOCOM’06984 days CoNEXT days88 262

6 Challenges iMote hardware is very restricted – ARM7TDMI at 12 MHz – 64 kB RAM – 512 kB permanent flash storage! – Integrated Bluetooth 1.1 (~30 m range) Software environment – Windows + Cygwin development – TinyOS implementation for iMote is experimental – Proprietary ARM compiler

7 Basic iMote Software Features Loop initiates a Bluetooth inquiry every 120 s Inquiry for 5 secs Add ±5 s to avoid synchronized inquiries on motes Sleep mode in-between inquiries Store “active contacts” in RAM Allow one skipped inquiry period Write to flash when a contact ends – Saves space – May loose contacts in RAM upon reset

8 iMote Software Problems Buffer overflow causing resets on nodes with many “active contacts” Risk of long term contacts never being recorded Bug in FlashFS implementation causing headaches Unseeded random function generator – Affects scanning de-synchronization Limitation in Bluetooth lower layers returning max 8 devices each scan – Hence the motivation for a non-standard 5 sec inquiry period? Inefficient timer operation – Fired every second even if nothing needed to be done – Drains battery?

9 Software Fixes Ended up rewriting most of the code Fixed buffer overflow – no software resets (that we know of) Fire timer every 120±5 secs and perform inquiry Seed random function with MAC address Write contact to flash when first seen - update with end time when it goes away – Protects against potentially lost contacts Increase limit on returned contacts to 100

10 Observations Few contacts were returned each inquiry scan Increased inquiry period returned more motes – Trade-off between scan time and overlapping scans – Drains battery? Differences between type of device – Motes are rarely recorded for more than around 1-4 periods – External devices are recorded for much longer periods Unclear effect of sleep mode MAC address corruptions (also in old experiments) – Noisy environment (70+ nodes in same node)

11 Implications on Collected Data Short mote contacts – May seriously impact mobility pattern as it favors short contacts… – …or is this reality? – Long external contacts indicate hardware differences MAC address corruption – May also explain short contacts – False contacts?

12 Conclusions iMote hardware limitations? – Bluetooth radio weak, favoring external devices External contacts do not inquiry regularly – No listen while scanning – Impact of overlapping inquiries on sampling? Bi-mote, tri-mote experiments – Bundle two imotes, one inquiring one listening – Third imote only listens