Wireless Sensor Networks for High Fidelity Sampling Sukun Kim Electrical Engineering and Computer Sciences University of California at Berkeley Committee:

Slides:



Advertisements
Similar presentations
1 CS 194: Distributed Systems Process resilience, Reliable Group Communication Scott Shenker and Ion Stoica Computer Science Division Department of Electrical.
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Investigating Mac Power Consumption in Wireless Sensor Network
PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou, Michael. R. Lyu, Jiangchuan Liu † and Hui Wang The Chinese.
More routing protocols Alec Woo June 18 th, 2002.
Metrics for Performance Evaluation Nelson Fonseca State University of Campinas.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Gentian Jakllari, Stephan Eidenbenz, Nick Hengartner, Srikanth V. Krishnamurthy & Michalis Faloutsos Paper in Infocom 2008 Link Positions Matter: A Non-Commutative.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
Findings in Reliable Bulk Data Transfer Experiments GGB project Sukun Kim, David Culler, James Demmel, Gregory Fenves, Steve Glaser, Shamim Pakzad NEST.
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks Yi Lu, Weichao Wang, Bharat Bhargava CERIAS and Department of Computer Sciences Purdue.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Networks Sukun Kim †#, Rodrigo Fonseca †, Prabal Dutta †, Arsalan Tavakoli †, David Culler.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
Distributed Structural Health Monitoring A Cyber-Physical System Approach Chenyang Lu Department of Computer Science and Engineering.
Eric Rozner - ETX.ppt1 A High-Throughput Path Metric for Multi-Hop Wireless Routing Douglas S.J. Couto Daniel Aguayo John Bicket Robert Morris Presented.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo and David Culler University of California at Berkeley Intel Research ACM SIGMOBILE.
UNIVERSITY OF SOUTHERN CALIFORNIA Embedded Networks Laboratory 1 A Wireless Sensor Network For Structural Monitoring (Wisden) Collaborators: Ning Xu, Krishna.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Localization using DOT3 Wireless Sensors Design & Implementation Motivation Wireless sensors can be used for locating objects: − Previous works used GPS,
Improving Capacity and Flexibility of Wireless Mesh Networks by Interface Switching Yunxia Feng, Minglu Li and Min-You Wu Presented by: Yunxia Feng Dept.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
ESRT: Event to Sink Reliable Transport in Sensor Networks Yogesh S., O. Akan, I. Akyildiz (GaTech) ECE 256 Spring 2009.
RELAX : An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks Bashir Yahya, Jalel Ben-Othman University of Versailles, France ICC.
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
PIP: A Connection-Oriented, Multi- Hop, Multi-Channel TDMA-based MAC for High Throughput Bulk Transfer Sensys2010.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presenter: Abhishek Gupta Dept. of Electrical and Computer Engineering
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks I-Hong Hou.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang †, Kaifei Chen ‡, Nissanka Bodhi Priyantha †, Jie.
Differential Ad Hoc Positioning Systems Presented By: Ramesh Tumati Feb 18, 2004.
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Ben Miller.  A distributed algorithm is a type of parallel algorithm  They are designed to run on multiple interconnected processors  Separate parts.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 11: Mobile Transport Layer Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
1 A Coordinate-Based Approach for Exploiting Temporal-Spatial Diversity in Wireless Mesh Networks Hyuk Lim Chaegwon Lim Jennifer C. Hou MobiCom 2006 Modified.
A unifying link abstraction for wireless sensor networks Joseph Polastre, Jonathan Hui, Philip Levis, Jerry Zhao, David Culler, Scott Shenker, and Ion.
MAC Protocols for Sensor Networks
MAC Protocols for Sensor Networks
Data Collection and Dissemination
Ramakrishna Gummadi, Ramesh Govindan, Konstantinos Psounis
Structural Health Monitoring
Acoustic Monitoring using Wireless Sensor Networks
Data Collection and Dissemination
Investigating Mac Power Consumption in Wireless Sensor Network
Presentation transcript:

Wireless Sensor Networks for High Fidelity Sampling Sukun Kim Electrical Engineering and Computer Sciences University of California at Berkeley Committee: David Culler, Ion Stoica, and Gregory Fenves Dissertation Talk May 14, 2007

High Fidelity Sampling  Three categories of WSN applications Monitoring environments  Great duck island [11], Redwood forest [12]  Focus on low-duty cycle and low power consumption Monitoring objects – High Fidelity Sampling  machine health monitoring [13], condition-based monitoring, earthquake monitoring [14], structural health monitoring [15]  Focus on fidelity (quality) of sample Interactions with space and objects  Lighting control [16]  Focus on control

Structural Health Monitoring  High Fidelity Data  High Frequency Sampling with Low Jitter  Time Synchronized Sampling  Large-scale Multi-hop Network  Reliable Command Dissemination  Reliable Data Collection FTSP [8] Mint [9] Broadcast [10] Challenges

Table of Contents  Introduction  Flush: A Reliable Bulk Transport Protocol Algorithm Implementation Evaluation Discussion Related Work Conclusion  Deployment at the Golden Gate Bridge  Data from the Golden Gate Bridge  Conclusion With Rodrigo Fonseca, Prabal Dutta, Arsalan Tavakoli, David Culler, Philip Levis, Scott Shenker and Ion Stoica

Overview  Target applications Where transfer completion time is more important than latency of each data point Structural health monitoring, volcanic activity monitoring, bulk data collection  One flow at a time Reasonable restriction for target applications Remove inter-path interference Easier to optimize for intra-path interference

Table of Contents  Introduction  Flush: A Reliable Bulk Transport Protocol Algorithm Implementation Evaluation Discussion Related Work Conclusion  Deployment at the Golden Gate Bridge  Data from the Golden Gate Bridge  Conclusion

Algorithm  Receiver-initiated  Selective-NACK  Rate Control  Separation of Concerns Correctness (all packets are delivered) Performance (achieve high bandwidth)

Reliability , 4, 5 4, 9

Rate Control: Conceptual Model Rate: Assuming disk model N: Number of nodes, I: Interference range

Rate Control d 8 = δ 8 + H 7 = δ 8 + δ 7 + f 7 = δ 8 + δ 7 + δ 6 + δ 5 1. At each node, Flush attempts to send as fast as possible without causing interference at the next hop along the flow 2. A node’s sending rate cannot exceed the sending rate of its successor

Interference Range > Reception Range However, Signal Strength Noise Floor + SNR Threshold Noise Floor + 2 X SNR Threshold SNR Threshold – minimum SNR to decode a packet Jammer – a node which can conflict with the transmission, but cannot be heard JammerVulnerable to JammerNo problem to Jammer

Identifying the Interference Set Fraction of Nodes CDF of the difference between the received signal strength from a predecessor and the local noise floor A large fraction of interferers are detectable and avoidable

Table of Contents  Introduction  Flush: A Reliable Bulk Transport Protocol Algorithm Implementation Evaluation Discussion Related Work Conclusion  Deployment at the Golden Gate Bridge  Data from the Golden Gate Bridge  Conclusion

Implementation  RSSI is measured by snooping  Information is also snooped δ, f, D are put into packet header, and exchanged through snooping δ, f, D take 1 byte each, 3 bytes total  Cutoff A node i considers a successor node (i− j) an interferer of node i+1 if, for any j > 1, rssi(i+1) − rssi(i−j) < 10 dBm The threshold of 10 dBm was chosen after empirically evaluating a range of values

Implementation  16-deep Rate-limited Queue Enforces departure delay D(i) When a node becomes congested (depth 5), it doubles the delay advertised to its descendants  But continues to drain its own queue with the smaller delay until it is no longer congested

Table of Contents  Introduction  Flush: A Reliable Bulk Transport Protocol Algorithm Implementation Evaluation Discussion Related Work Conclusion  Deployment at the Golden Gate Bridge  Data from the Golden Gate Bridge  Conclusion

Packet Throughput of Different Fixed Rates Effective Throughput (pkt/s) Packet throughput of fixed rate streams over different hop counts The optimal fixed rate depends on the distance from the sink

Packet Throughput of Flush Effective Throughput (pkt/s) Effective packet throughput of Flush compared to the best fixed rate at each hop Flush tracks the best fixed packet rate

Bandwidth of Flush Effective Bandwidth (B/s) Effective bandwidth of Flush compared to the best fixed rate at each hop Flush’s protocol overhead reduces the effective data rate

Fraction of Data Transferred in Different Phases Fraction of data transferred from the 6th hop during the transfer phase and acknowledgment phase Greedy best-effort routing is unreliable, and exhibits a loss rate of 43.5%. A higher than sustainable rate leads to a high loss rate

Amount of Time Spent in Different Phases Fraction of time spent in different stages A retransmission during the acknowledgment phase is expensive, and leads to a poor throughput

Packet Throughput at Transfer Phase Effective Goodput (pkt/s) Effective goodput during the transfer phase Flush provides comparable goodput as a lower loss rate which reduces the time spent in the expensive acknowledgment phase, which increases the effective bandwidth

Packet Rate over Time for a Source Source is 7 hops away, Data is smoothed by averaging 16 values Flush approximates the best fixed rate with the least variance

Maximum Queue Occupancy across All Nodes for Each Packet Flush exhibits more stable queue occupancies than Flush-e2e

Sending Rate at Lossy Link Both Flush and Flush-e2e adapt while the fixed rate overflows its queue Packets were dropped from hop 3 to hop 2 with 50% probability between 7 and 17 seconds

Queue Length at Lossy Link Flush and Flush-e2e adapt while the fixed rate overflows its queue

Route Change Experiment We started a transfer over a 5 hop path Approximately 21 seconds into the experiment forced the node 4 hops from the sink to switch its next hop Node 4’s next hop is changed, changing all nodes in the subpath to the root No packets were lost, and Flush adapted quickly to the change Flush adapts when the next hop changes suddenly 0 1a 2a 3a 1b 2b 3b 4 5

Scalability Test Effective Bandwidth (B/s) Effective bandwidth from the real-world scalability test where 79 nodes formed 48 hop network Flush closely tracks or exceeds the best possible fixed rate across at all hop distances that we tested

Table of Contents  Introduction  Flush: A Reliable Bulk Transport Protocol Algorithm Implementation Evaluation Discussion Related Work Conclusion  Deployment at the Golden Gate Bridge  Data from the Golden Gate Bridge  Conclusion

Discussion  High-power node reduces hop count and interference Not an option on the Golden Gate Bridge due to power and maintenance problems  Interactions with Routing Link estimator of a routing layer breaks down under heavy traffic

Related Work  Li et al – capacity of a chain of nodes limited by interference using  ATP, W-TCP – rate-based transmission in the Internet  Wisden – concurrent transmission without a mechanism for a congestion control  Fetch – single flow, selective-NACK, no mention about rate control

Conclusion  A reasonable assumption (single flow) simplifies a problem (eliminates inter-path congestion control)  Light-weight solution reduces complexity Overhearing is used to measure interference and to exchange information Two rules to determine a rate  At each node, Flush attempts to send as fast as possible without causing interference at the next hop along the flow  A node’s sending rate cannot exceed the sending rate of its successor

Table of Contents  Introduction  Flush: A Reliable Bulk Transport Protocol Algorithm Implementation Evaluation Discussion Related Work Conclusion  Deployment at the Golden Gate Bridge  Data from the Golden Gate Bridge  Conclusion With Shamim Pakzad, David Culler, James Demmel, Gregory Fenves, Steve Glaser, and Martin Turon

Node Layout (1 st phase)  Distance between nodes on the span is either 100ft or 50ft  Initially designed as 150ft Difference in MicaZ radio output power was up to 7.5dBm 8 nodes 56 nodes 1125 ft4200 ft 500 ft 246 ft SF (south) Sausalito (north)

Environment Fog Strong and salty wind Rapidly changing... high and scary

Node Node (Mote + Accelerometer Board) Battery (4 X 6V Lantern Battery) Bi-directional Patch Antenna

Node Extreme Rusting of C-clamp Zip tie around Antenna

Base Station Laptop Students At Work

Installation Hard Hat Harness Sharp Edge Ouch However… Crawling and Installing Done! Strong Wind

Table of Contents  Introduction  Flush: A Reliable Bulk Transport Protocol Algorithm Implementation Evaluation Discussion Related Work Conclusion  Deployment at the Golden Gate Bridge  Data from the Golden Gate Bridge  Conclusion

Reliable Data Collection at GGB Data is collected reliably over a 46-hop network, with a bandwidth of 441B/s at the 46th hop

Vibration Data of GGB The vertical modal properties match among (1) simulation model, (2) previous study, and (3) this study (1) (2) (3)

Conclusion  As a concrete example of HFS, SHM is designed, implemented and deployed  Requirements are identified and solutions are proposed  The system satisfied requirements, and provided meaningful data for the research of structural analysis

Bonus – Spectacular Views

Acknowledgement  David Culler  GGB – Shamim Pakzad, James Demmel, Gregory Fenves, Steve Glaser, and Martin Turon  Reliable Data Collection – Rodrigo Fonseca, Prabal Dutta, Arsalan Tavakoli, Philip Levis, Scott Shenker and Ion Stoica  Jaein Jeong, Xiaofan Jiang, Jay Taneja, Jorge Ortiz, Robert Szewczyk, Tom Oberheim, Anthony Joseph, Joe Polastre, Alec Woo, Kamin Whitehouse, Phil Buonadonna

Average Number of Transmissions per node for sending 1,000 packets

Bandwidth at Transfer Phase Effective Goodput (B/s) Effective goodput during the transfer phase Effective goodput is computed as the number of unique packets received over the duration of the transfer phase

Details of Queue Length for Flush-e2e

Memory and Code Footprint

The Golden Gate Bridge

More on Node Signal Splitter Antenna Cable To Base Station

(1) (2) (3) The torsional modal properties match among (1) simulation model, (2) previous study, and (3) this study

0 1a 2a 3a 1b 2b 3b 4 5