UC Berkeley, EECS Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee.

Slides:



Advertisements
Similar presentations
Improving TCP over Wireless by Selectively Protecting Packet Transmissions Carla F. Chiasserini Michele Garetto Michela Meo Dipartimento di Elettronica.
Advertisements

Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli University of Calif, Berkeley and Lawrence Berkeley National Laboratory SIGCOMM.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Restricted Slow-Start for TCP William Allcock 1,2, Sanjay Hegde 3 and Rajkumar Kettimuthu 1,2 1 Argonne National Laboratory 2 The University of Chicago.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
1 Crosslayer Design for Distributed MAC and Network Coding in Wireless Ad Hoc Networks Yalin E. Sagduyu Anthony Ephremides University of Maryland at College.
MAC Layer (Mis)behaviors Christophe Augier - CSE Summer 2003.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
More routing protocols Alec Woo June 18 th, 2002.
TCP Congestion Control TCP sources change the sending rate by modifying the window size: Window = min {Advertised window, Congestion Window} In other words,
Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee Ruzena Bajcsy Motivation Congestion Control Background Simulation.
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
UC Berkeley, EECS Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Background  sensor motes route data back to base.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Network Topologies.
Reliable, Robust Data Collection in Sensor Networks Murali Rangan Russell Sears Fall 2005 – Sensornet.
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
NetSim ZigBee Simulation Code Walkthrough in 10 steps
COM594 TCP and Wireless: Unforeseen Consequences.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
1 SmartGossip: An Adaptive Broadcast Service for Wireless Sensor Networks Presented By Thomas H. Hand Duke University Adapted from: “ SmartGossip: An Adaptive.
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
1 REED: Robust, Efficient Filtering and Event Detection in Sensor Networks Daniel Abadi, Samuel Madden, Wolfgang Lindner MIT United States VLDB 2005.
Energy-Efficient Monitoring of Extreme Values in Sensor Networks Loo, Kin Kong 10 May, 2007.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Energy and Latency Control in Low Duty Cycle MAC Protocols Yuan Li, Wei Ye, John Heidemann Information Sciences Institute, University of Southern California.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Localized Algorithm for Aggregate Fairness in Wireless Sensor Networks Authors : Shigang Chen, Zhan Zhang CISE university of Florida CISE university of.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
A Survey on Sensor Networks Hussein Alzoubi Rami Alnamneh
KAIS T Distributed cross-layer scheduling for In-network sensor query processing PERCOM (THU) Lee Cheol-Ki Network & Security Lab.
Maximizing Lifetime per Unit Cost in Wireless Sensor Networks
Tufts University. EE194-WIR Wireless Sensor Networks. February 17, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Aggregation and Secure Aggregation. Learning Objectives Understand why we need aggregation in WSNs Understand aggregation protocols in WSNs Understand.
Active Message Application: CONNECT Presented by Xiaozhou David Zhu Oommen Regi July 6, 2001.
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
Aggregation and Secure Aggregation. [Aggre_1] Section 12 Why do we need Aggregation? Sensor networks – Event-based Systems Example Query: –What is the.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
1 Transport Bandwidth Allocation 3/29/2012. Admin. r Exam 1 m Max: 65 m Avg: 52 r Any questions on programming assignment 2 2.
Computer Networking Lecture 16 – Reliable Transport.
Dzmitry Kliazovich, Fabrizio Granelli, University of Trento, Italy
Dzmitry Kliazovich, Fabrizio Granelli, University of Trento, Italy
SmartGossip: A Reliable Broadcast Service for Wireless Sensor Networks
Trickle: Code Propagation and Maintenance
Ramakrishna Gummadi, Ramesh Govindan, Konstantinos Psounis
Javad Ghaderi, Tianxiong Ji and R. Srikant
TCP Congestion Control
Aggregation.
Chapter 3 outline 3.1 Transport-layer services
Presentation transcript:

UC Berkeley, EECS Congestion Control and Fairness for Many-to-One Routing in Sensor Networks Cheng Tien Ee

UC Berkeley, EECS Presentation Outline Background Problems Congestion control Fairness Results Conclusion

UC Berkeley, EECS Background Sensor motes gather data and send to central mote (base station) Motes too far from base station requires intermediate motes to relay, or route, data Routing structure formed is a tree, rooted at the base station Base station sensor mote

UC Berkeley, EECS Problems motes closer to the base station has to transmit packets generated locally as well as those generated by downstream motes these motes likely to become bottlenecks in the system results in  more packets originating further away being dropped (unfairness)  loss of packets due to queue overflow and interference during transmission (congestion) unfairness may result in network not retrieving sufficient data from faraway motes to meet application requirements congestion wastes scarce energy resources

UC Berkeley, EECS Possible Solution 1. determine maximum application data generation rate 2. implement hop-by-hop Automatic Repeat Request (ARQ) why does this work?  since motes generate data at a rate network can handle, congestion (queue overflow) should not occur  ARQ ensures all packets ultimately reach the base station BUT  difficult to obtain maximum rate for every network configuration  underestimation of generation rate reduces effective bandwidth  what about transient congestion, eg. big metal truck goes by causing reflection etc. and thus interference  or temporary events that cause motes to generate more data than usual

UC Berkeley, EECS Congestion Control we want the network to adapt itself first, distinguish between 2 different rates:  data generation rate: rate at which data is passed from application  transmission rate: rate at which packets, both locally produced and from downstream motes, are transmitted upstream next, transmission rate of parent mote should ideally be greater than or equal to data generation rate of all motes downstream transmission rate ≥ 4 pkts/sec each mote’s data generation rate = 1 pkt/sec application transport network datalink physical data generation rate transmission rate

UC Berkeley, EECS basic idea: each mote  individually determines local maximum transmission rate  divide transmission rate by total number of downstream motes to give data generation rate  disseminate min ( own_rate, parent_rate ) downstream why do this at each mote, why not just the base station?  because each mote’s environment is different, may not be able to support parent mote’s rate due to, for instance, interference my transmission rate is 40 pkts/sec each mote should send ≤ 10 pkts/sec

UC Berkeley, EECS so we need to:  determine effective transmission rate  determine number of downstream motes  disseminate data generation rate downstream possibly several ways to determine effective transmission rate  MAC layer keeps transmitting until reception has been confirmed, for instance via ACK packet  transmission rate is then inverse of total effective time to send packet no ack, timeout data pkt no ack, timeout data pkt time ack pkt total effective time to send packet

UC Berkeley, EECS determine number of downstream motes  use data aggregation technique for counting motes (Sam Madden’s work)  each mote sums children’s count, adds 1 (for itself), then transmits count to parent disseminate data generation rate downstream  via control packets, or  piggy-backed on data packets

UC Berkeley, EECS Fairness to be fair  at base station, same number of packets received from each mote basic idea: within each period of time (or epoch), transmit number of packets from each subtree equal to size of that subtree subtree B size = 10 subtree C size = 1000 subtree A size = 1 within 1 epoch, send 1 from A, 10 from B, 1000 from C, and 1 from myself

UC Berkeley, EECS requires:  per child queue (does not depend on size of subtree, so can be small and constant)  FIFO queues  subtree size (obtained as before) proof of correctness (by induction): see paper for more details A B DE F C B’s queueC’s queue B E D F CA A’s queue

UC Berkeley, EECS Results simulated algorithms  wrote simulator program models interference packet-level simulation uses MACA as MAC protocol  check out results in paper also implemented on mica2dot motes  MAC protocol: MACA, with modified ACKs  10 motes deployed indoors, within 15 feet of one another  let motes arbitrarily construct routing tree (algorithm is independent of tree structure)  compare with round-robin servicing of queues

UC Berkeley, EECS BS BS Routing Topologies for Epoch-based Proportional Selection (EPS)for round-robin servicing of queues

UC Berkeley, EECS

UC Berkeley, EECS Conclusion network adapts itself automatically  impossible to manually configure 1000s of motes exact, same, simple code runs in each mote  reduces programming, debugging time very scalable  size of queues can be small, constant  state required increases linearly with number of neighbors congestion control and fairness can be implemented in transport layer, thus can be used with different MAC protocols  little or no modifications to MAC