June 2008 WEI short course - L9 trickle 1 Wireless Embedded InterNet working Foundations of Ubiquitous Sensor Networks - Trickle - Polite Reliable Responsive.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Deluge TinyOS Network Programming The real way to program your motes
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Remote Programming Dissemination Collection Network Management Gilman Tolle (also speaking for Jonathan Hui)
Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
EE 4272Spring, 2003 Chapter 10 Packet Switching Packet Switching Principles  Switching Techniques  Packet Size  Comparison of Circuit Switching & Packet.
More routing protocols Alec Woo June 18 th, 2002.
1-1 Topology Control. 1-2 What’s topology control?
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Network Dynamics Deepak Ganesan, Alec Woo, Bhaskar Krishnamachari.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
1 Deluge: Data Dissemination for Network Programming at Scale Jonathan Hui UC Berkeley NEST Retreat June 3, 2004.
1 Network Reprogramming at Scale NEST Retreat January, 2004 Jonathan Hui Jaein Jeong Gilman Tolle.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
A Topology Discovery Algorithm for Sensor Networks Go Suzuki CS691, SSNS Spring 2003.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha Presented by Ray Lam Oct 23, 2004.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
Jennifer Rexford Princeton University MW 11:00am-12:20pm Wide-Area Traffic Management COS 597E: Software Defined Networking.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
TinyOS By Morgan Leider CS 411 with Mike Rowe with Mike Rowe.
Mobile Routing protocols MANET
Mobile Ad hoc Networks Sleep-based Topology Control
ROUTING ALGORITHMS IN AD HOC NETWORKS
Module 8: Ethernet Switching
TRICKLE: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks Philip Levis, Neil Patel, Scott Shenker and David.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Computer Networks with Internet Technology William Stallings
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Remote Code Update Mechanism for Wireless Sensor Networks Thanos Stathopoulos, John Heidemann and Deborah Estrin CEG 790 Presentation By: Trevor Smith.
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
1 REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
1 Reprogramming/Re-tasking in Wireless Sensor Networks Part of slides are from Jonathon Hui, David A. Olsen and Jaein Jeong.
Presenter - Bob Kinicki Internet of Things Fall 2015
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Few Random IoT Thoughts PEDS Seminar PEDS Seminar November 23, 2015 November 23, 2015.
Self-stabilizing energy-efficient multicast for MANETs.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
7/9/2007 AIIT Summer Course - D# 1 Wireless Embedded Systems and Networking Foundations of IP-based Ubiquitous Sensor Networks Self-Organized Multihop.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
Fundamentals of Computer Networks ECE 478/578
Lecture 7. Building Forwarding Tables There are several methods Static Method Dynamic Methods Centralized Distributed Distance Vector Link State.
Oregon Graduate Institute1 Sensor and energy-efficient networking CSE 525: Advanced Networking Computer Science and Engineering Department Winter 2004.
KAIS T Location-Aided Flooding: An Energy-Efficient Data Dissemination Protocol for Wireless Sensor Networks Harshavardhan Sabbineni and Krishnendu Chakrabarty.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Introduction to Wireless Sensor Networks
Data Collection and Dissemination
A comparison of Ad-Hoc Routing Protocols
Net 435: Wireless sensor network (WSN)
Trickle: Code Propagation and Maintenance
David Culler Fall 2003 University of California, Berkeley
Data Collection and Dissemination
Viet Nguyen Jianqing Liu Yaqin Tang
Investigating Mac Power Consumption in Wireless Sensor Network
Adaptive Topology Control for Ad-hoc Sensor Networks
Presentation transcript:

June 2008 WEI short course - L9 trickle 1 Wireless Embedded InterNet working Foundations of Ubiquitous Sensor Networks - Trickle - Polite Reliable Responsive Dissemination and Consistency David E. Culler University of California, Berkeley

June 2008WEI short course - L9 trickle2 Network wide communication- Flood

June 2008WEI short course - L9 trickle3 The Problem Ni, S.Y., Tseng, Y.C., Chen, Y.S., Sheu, J.P.: The broadcast storm problem in a mobile ad hoc network. MobiCom'99The broadcast storm problem in a mobile ad hoc network Everybody responds!

June 2008WEI short course - L9 trickle4 Flood Dynamics Experimental Setup –13x13 grid of nodes –separation 2ft –flat open surface –Identical length antennas, pointing vertically upwards. –Fresh batteries on all nodes –Identical orientation of all nodes –The region was clean of external noise sources. Range of signal strength settings Log many runs Ganesan, Krishnamachari, Woo, Culler, Estrin and Wicker, Complex Behavior at Scale: An Experimental Study of Low-Power Wireless Sensor Networks, UCLA Computer Science Technical Report UCLA/CSD-TR Complex Behavior at Scale: An Experimental Study of Low-Power Wireless Sensor Networks

June 2008WEI short course - L9 trickle5 Recast the problem The goal is NOT to flood The goal is to bring the network to a new consistent state –all nodes have the same piece of information –All nodes receive the same command –All nodes form a spanning tree »DHCP delegation »Multihop Router Advertisements Respond rapidly to a change Quiesce to very low communication rate Never stomp on each other High scalability –Extent AND density

June 2008WEI short course - L9 trickle6 A first step Grow the tree slowly Avoid Contention at every transmission Avoid Redundant Transmissions Adapt to huge range of density Make sure it eventually gets to everyone –Even if they are not listening –Or arrive late With very simple mechanism

June 2008WEI short course - L9 trickle7 Selective Retransmission Schemes Probabilistic Retransmission –Fixed prob. –What would be the right choice? Counter –When hear msg, start random delay –If hear C msgs during wait, don’t retransmit Distance –If nearest node from which msg is heard is less than some threshold, don’t retransmit Location –If portion of cell not covered by transmitting neighbors is less than some threshold, don’t retransmit Cluster-based –Partition graph into cluster heads, gateways, and members –Members don’t transmit

June 2008WEI short course - L9 trickle8 Adaptive BCAST rate Upon first msg –Start random delay –If new msg arrives during delay »Filter message (eg., discard if signal strength below threshold) »If passes filter, Utilize message »Start new delay Upon expiration of delay –Complete local processing »E.g., pick lowest depth node with strongest signal as parent –Retransmit Delay is proportion to cell density –Wait till ngbrs go quiet before transmit –=> Approx uniform transmissions per unit area, regardless of node density Exploit long links when appropriate

June 2008WEI short course - L9 trickle9 Trickle – better than flood Want the communication rate per unit area to be constant, regardless of the density of nodes –Lots of nodes, transmit infrequently –Few node, transmit more frequently Nodes listen before transmitting Estimate density based on how many nodes you hear from –Arrival during timer wait extends timer If new value is disseminated by others, no need for you to transmit it. Increase delay over time so ambient rate approaches zero. Shorten delay when new epoch appears.

June 2008WEI short course - L9 trickle10 Epidemic NW protocols Goal: scalable, robust communication algorithms that adapt to changing conditions with little state or protocol Basic operation: –From time to time (based on local state and what you’ve heard) transmit a packet of information to whomever hears the message –From time to time, hear a packet which causes an update to local state –Continuous process to ensure full reliability Adapt to density, coverage, interference, loss, schedule, …

June 2008WEI short course - L9 trickle11 Trickle – till consisten

June 2008WEI short course - L9 trickle12 Solution: Trickle “Every once in a while, broadcast what data you have, unless you’ve heard some other nodes broadcast the same thing recently.” Behavior (simulation and deployment): –Maintenance: a few sends per hour –Propagation: less than a minute –Scalability: thousand-fold density changes Instead of flooding a network, establish a trickle of packets, just enough to stay up to date. As long as each node communicates with others, inconsistencies will be found Either reception or transmission is sufficient

June 2008WEI short course - L9 trickle13 Algorithm Define a desired detection latency,  Choose a redundancy constant k –k = (receptions + transmissions) –In an interval of length  Trickle keeps the rate as close to k/  as possible Choose timer t random in (  If inconsistent broadcast is heard before t, reset  to  min. If c < k consistent broadcasts are heard by t, broadcast Otherwise suppress and double  up to  max. When there is nothing new to say, stay quiet

June 2008WEI short course - L9 trickle14 Example: K=1

June 2008WEI short course - L9 trickle15 Work is logarithmic with loss rate

June 2008WEI short course - L9 trickle16 Short-Listen effect – why  /2 With unsynchronized intervals and no min, some nodes get small t and broadcast even though they are hearing enough to suppress

June 2008WEI short course - L9 trickle17 Impact of listen-only period

June 2008WEI short course - L9 trickle18 Numerous Applications Eliminates the “voodoo constants” in advertisement, route update, and the like. Extends to dissemination of large object

June 2008WEI short course - L9 trickle19 Robust OTA Programming Every byte must (eventually) be correctly received by all nodes! Reliable Pipelined Epidemic Distribution of series of pages –Constrained storage hierarchy »Packet (32 bytes) << RAM (4K) << program (128K) < external flash (512K) –Lossy links, Critical Contention –Density-aware –Robust to asymmetric links –Dynamic adjustment of advertisements –Minimize set of concurrent data broadcasts –Spatial multiplexing Page Advertise, Request/Fix, Xfer –Density-aware suppression and snoop on each Packet CRC + Page CRC 159 Byte memory footprint flash … Maintain Request Transmit

June 2008WEI short course - L9 trickle20 OTA Programming Learn about the environment after deployment –sensing range, network characteristics, etc.

June 2008WEI short course - L9 trickle21 OTA Programming Learn about the environment after deployment –sensing range, network characteristics, etc.

June 2008WEI short course - L9 trickle22 OTA Programming Learn about the environment after deployment –sensing data, network characteristics, etc. Embedded nature of sensor networks Network scales reaching thousands of nodes A necessity in debugging and testing cycle

June 2008WEI short course - L9 trickle23 What is Deluge? A reliable data dissemination protocol for program images over a multihop network. Combined with a bootloader (TOSBoot)  Network Programming Program

June 2008WEI short course - L9 trickle24 Data Representation Program divided into pages, each consisting of N packets Program Packets 1234N Reduced RAM requirements Allows for spatial multiplexing

June 2008WEI short course - L9 trickle25 How Does Deluge Work? (Glossing over many details) Nodes periodically advertise –Suppress similar advertisements Version 2 here. I only have version 1.

June 2008WEI short course - L9 trickle26 How Does Deluge Work? (Glossing over many details) Neighboring nodes request data –Suppress similar requests Send me page 1!

June 2008WEI short course - L9 trickle27 How Does Deluge Work? (Glossing over many details) Requested data is broadcast Packet 12 of page 1!

June 2008WEI short course - L9 trickle28 How Does Deluge Work? (Glossing over many details) Dropped packets are NACKed Repeat packet 4 of page 1! Repeat packet 32 of page 1!

June 2008WEI short course - L9 trickle29 How Does Deluge Work? (Glossing over many details) Dropped packets are sent again Packet 4 of page 1!

June 2008WEI short course - L9 trickle30 How Does Deluge Work? (Glossing over many details) Advertise for propagation to next hop Version 2 here. I only have version 1.

June 2008WEI short course - L9 trickle31 Spatial Multiplexing Propagate in “waves” Exploit limited radio range for concurrent broadcasts. Reduced completion time o(d + S obj ) vs. o(d * S obj ) Page 0Page 1

June 2008WEI short course - L9 trickle32 Epidemic Propagation Epidemic propagation from one source

June 2008WEI short course - L9 trickle33 Epidemic Propagation Epidemic propagation from one source or many

June 2008WEI short course - L9 trickle34 Deluge Features Epidemic propagation from one source or many –Continuous propagation effort by all nodes –Turn on/off radios at will –Reach nodes with intermittent connectivity  Will find a path if it exists Aggressive message suppression –Scales with density –Ultra low quiescent traffic

June 2008WEI short course - L9 trickle35 Deluge Features Management –Multiple program images –Image metadata –User confirmation on expensive operations »Minimize operator error Robustness –Redundant CRCs –Golden Image with write protect –Load Golden Image »Watchdog trigger »Golden gesture TOSBoot –TOSBoot as isolated code –Verify CRCs –Verify system voltage ProgAProgBProgC Program Name Compile Time UserID Hostname Platform CRASH! CRC

June 2008WEI short course - L9 trickle36 Deluge - Lessons Learned Advantages –Ease of reprogramming 100’s-1000’s of nodes –Does not erase node IDs –Golden Image is immensely useful –Quickly switch between images –More reliable than uisp or msp430-bsl –Deluge over more efficient that ! Disadvantages –Ease of reprogramming 100’s-1000’s of nodes

June 2008WEI short course - L9 trickle37 Take-aways Many embedded network applications will be built as “application overlays” on UDP Use trickle as a “polite gossip” adaptive congestion control. Additional optimizations through scheduling