15-441: Computer Networking Lecture 25: Wireless, Ad-Hoc Networks, Sensor Networks.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Improving TCP over Wireless by Selectively Protecting Packet Transmissions Carla F. Chiasserini Michele Garetto Michela Meo Dipartimento di Elettronica.
Hui Zhang, Fall Computer Networking TCP Enhancements.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Improving TCP Performance over MANETs by Exploiting Cross-Layer Information Awareness Xin Yu NYU Presented by: David Choffnes.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
15-441: Computer Networking Lecture 24: Mobile and Wireless Networking.
15-744: Computer Networking L-8 Wireless. L -8; © Srinivasan Seshan, Mobile Routing Mobile IP Ad-hoc network routing TCP on wireless links.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
CS 268: Wireless Transport Protocols Kevin Lai Feb 13, 2002.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
15-441: Computer Networking Lecture 22: Wireless, Ad-Hoc Networks, Sensor Networks, and Delay Tolerant Networks.
15-441: Computer Networking Lecture 19: Wireless, Ad-Hoc Networks As usual: thanks to Dave and Srini.
Winter CMPE 155 Week 9. Winter Project 8 Setting up wireless ad hoc network. Designing/implementing application- level neighbor discovery.
15-441: Computer Networking Lecture 21: Wireless Networking.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Ad Hoc Routing CMU David Andersen. Ad Hoc Routing Goal: Communication between wireless nodes –No external setup (self-configuring) –Often need.
Ad Hoc Wireless Routing COS 461: Computer Networks
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks.
Chapter 5 outline 5.1 Introduction and services
CIS 725 Wireless networks. Low bandwidth High error rates.
15-441: Computer Networking Lecture 26: Where do we go from here?
CS 640: Introduction to Computer Networks Aditya Akella Lecture 23 - CSMA/CA, Ad Hoc and Sensor Networks.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Recitation 8 Wireless Networks. Virtual carrier sensing First exchange control frames before transmitting data – Sender issues “Request to Send” (RTS),
Fair Sharing of MAC under TCP in Wireless Ad Hoc Networks Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
15-441: Computer Networking Lecture 23: Wireless Networking Copyright ©, Carnegie Mellon University.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
15-441: Computer Networking Lecture 23: Mobile and Wireless Networking.
Challenges to Reliable Data Transport Over Heterogeneous Wireless Networks.
15-744: Computer Networking L-18 Mobile Transport and Applications.
15-441: Computer Networking Lecture 24: Wireless Networking Copyright ©, Carnegie Mellon University.
Recitation 8 Wireless Networks.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Autonomous prototype sensors (motes) 4 MHz, 8bit MCU, 4 KB RAM, 8KB ROM short-range (1-10ft.) radio light and other sensors LED and serial port outputs.
Medium Access Control in Wireless networks
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
Fundamentals of Computer Networks ECE 478/578
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
MAC Protocols for Sensor Networks
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Ad-hoc Transport Layer Protocol (ATCP)
A comparison of Ad-Hoc Routing Protocols
Mobile and Wireless Networking
Routing in Mobile Ad-hoc Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

15-441: Computer Networking Lecture 25: Wireless, Ad-Hoc Networks, Sensor Networks

Lecture 25: Scenarios and Roadmap Point to point wireless networks Example: Your laptop to CMU wireless Challenges: Poor and variable link quality (makes TCP unhappy) Many people can hear when you talk Pretty well defined. Ad hoc networks (wireless++) Rooftop networks (multi-hop, fixed position) Mobile ad hoc networks Adds challenges: routing, mobility Some deployment + some research Sensor networks (ad hoc++) Scatter 100s of nodes in a field / bridge / etc. Adds challenge: Serious resource constraints Current, popular, research.

Lecture 25: Wireless Challenges (review) Need to share airwaves rather than wire Don’t know what hosts are involved Host may not be using same link technology No fixed topology of interconnection Interference Other hosts: collisions, capture, interference The environment (e.g., microwaves ) Mobility -> Things change often Environmental changes do too How do microwaves work? Relate to absorption. Other characteristics of wireless Noisy  lots of losses Slow Multipath interference

Lecture 25: Wireless Bit-Errors Router Computer 2Computer Loss  Congestion Wireless

Lecture 25: TCP Problems Over Noisy Links Wireless links are inherently error-prone Fading, interference, attenuation -> Loss & errors Errors often happen in bursts TCP cannot distinguish between corruption and congestion TCP unnecessarily reduces window, resulting in low throughput and high latency Burst losses often result in timeouts What does fast retransmit need? Sender retransmission is the only option Inefficient use of bandwidth

Lecture 25: Performance Degradation Time (s) Sequence number (bytes) TCP Reno (280 Kbps) Best possible TCP with no errors (1.30 Mbps) 2 MB wide-area TCP transfer over 2 Mbps Lucent WaveLAN

Lecture 25: Performance Degredation 2 Recall TCP throughput / loss / RTT rel: BW = MSS / (rtt * sqrt(2p/3)) = proportional to 1 / rtt * sqrt(p) == ouch! Normal TCP operating range: < 2% loss Internet loss usually < 1%

Lecture 25: Proposed Solutions Incremental deployment Solution should not require modifications to fixed hosts If possible, avoid modifying mobile hosts Reliable link-layer protocols Error-correcting codes (or just send data twice) Local retransmission End-to-end protocols Selective ACKs, Explicit loss notification Split-connection protocols Separate connections for wired path and wireless hop

Lecture 25: Approach Styles (Link Layer) More aggressive local rexmit than TCP protocols all do this. Receiver sends ACK after last bit of data. Faster; Bandwidth not wasted on wired links. Recover in a few milliseconds. Possible adverse interactions with transport layer Interactions with TCP retransmission Large end-to-end round-trip time variation Recall TCP RTO estimation. What does this do? FEC used in some networks (e.g., a) But does not work well with burst losses Wired linkWireless link ARQ/FEC

Lecture 25: Approach Styles (End-to-End) Improve TCP implementations Not incrementally deployable Improve loss recovery (SACK, NewReno) Help it identify congestion Explicit Loss/Congestion Notification (ELN, ECN), ACKs include flag indicating wireless loss Trick TCP into doing right thing  E.g. send extra dupacks if you know the network just burped (e.g., if you moved) Wired linkWireless link

Lecture 25: Next: CSMA/CD Does Not Work Recall Aloha from many lectures ago Wireless precursor to Ethernet. Carrier sense problems Relevant contention at the receiver, not sender Hidden terminal Exposed terminal Collision detection problems Hard to build a radio that can transmit and receive at same time A B C A B C D HiddenExposed

Lecture 25: RTS/CTS Approach Before sending data, send Ready-to-Send (RTS) Target responds with Clear-to-Send (CTS) Others who hear CTS defer transmission Packet length in RTS and CTS messages Why not defer on RTS alone? If CTS is not heard, or RTS collides Retransmit RTS after binary exponential backoff (There are lots of cool details embedded in this last part that went into the design of if you’re curious, look up the “MACAW” protocol).

Lecture 25: Ad Hoc Networks All the challenges of wireless, plus some of: No fixed infrastructure Mobility (on short time scales) Chaotically decentralized (:-) Multi-hop! Nodes are both traffic sources/sinks and forwarders The big challenge: Routing

Lecture 25: Ad Hoc Routing Find multi-hop paths through network Adapt to new routes and movement / environment changes Deal with interference and power issues Scale well with # of nodes Localize effects of link changes

Lecture 25: Traditional Routing vs Ad Hoc Traditional network: Well-structured ~O(N) nodes & links All links work ~= well Ad Hoc network N^2 links - but many stink! Topology may be really weird Reflections & multipath cause strange interference Change is frequent

Lecture 25: Problems using DV or LS DV loops are very expensive Wireless bandwidth << fiber bandwidth… LS protocols have high overhead N^2 links cause very high cost Periodic updates waste power Need fast, frequent convergence

Lecture 25: Proposed protocols Destination-Sequenced Distance Vector (DSDV) Dynamic Source Routing (DSR) Ad Hoc On-Demand Distance Vector (AODV) Let’s look at DSR

Lecture 25: DSR Source routing Intermediate nodes can be out of date On-demand route discovery Don’t need periodic route advertisements (Design point: on-demand may be better or worse depending on traffic patterns…)

Lecture 25: DSR Components Route discovery The mechanism by which a sending node obtains a route to destination Route maintenance The mechanism by which a sending node detects that the network topology has changed and its route to destination is no longer valid

Lecture 25: DSR Route Discovery Route discovery - basic idea Source broadcasts route-request to Destination Each node forwards request by adding own address and re-broadcasting Requests propagate outward until: Target is found, or A node that has a route to Destination is found

Lecture 25: C Broadcasts Route Request to F A Source C G H Destination F E D B Route Request

Lecture 25: C Broadcasts Route Request to F A Source C G H Destination F E D B Route Request

Lecture 25: H Responds to Route Request A Source C G H Destination F E D B G,H,F

Lecture 25: C Transmits a Packet to F A Source C G H Destination F E D B FH,F G,H,F

Lecture 25: Forwarding Route Requests A request is forwarded if: Node is not the destination Node not already listed in recorded source route Node has not seen request with same sequence number IP TTL field may be used to limit scope Destination copies route into a Route-reply packet and sends it back to Source

Lecture 25: Route Cache All source routes learned by a node are kept in Route Cache Reduces cost of route discovery If intermediate node receives RR for destination and has entry for destination in route cache, it responds to RR and does not propagate RR further Nodes overhearing RR/RP may insert routes in cache

Lecture 25: Sending Data Check cache for route to destination If route exists then If reachable in one hop Send packet Else insert routing header to destination and send If route does not exist, buffer packet and initiate route discovery

Lecture 25: Discussion Source routing is good for on demand routes instead of a priori distribution Route discovery protocol used to obtain routes on demand Caching used to minimize use of discovery Periodic messages avoided But need to buffer packets How do you decide between links?

Lecture 25: Forwarding Packets is expensive Throughput of b =~ 11Mbits/s In reality, you can get about 5. What is throughput of a chain? A -> B -> C ? A -> B -> C -> D ? Assume minimum power for radios. Routing metric should take this into account

Lecture 25: ETX Measure each link’s delivery probability with broadcast probes (& measure reverse) P(delivery) = 1 / ( df * dr ) (ACK must be delivered too) Link ETX = 1 / P(delivery) Route ETX = sum of link ETX (Assumes all hops interfere - not true, but seems to work okay so far)

Lecture 25: Capacity of multi-hop network Assume N nodes, each wants to talk to everyone else. What total throughput (ignore previous slide to simplify things) O(n) concurrent transmissions. Great! But: Each has length O(sqrt(n)) (network diameter) So each Tx uses up sqrt(n) of the O(n) capacity. Per-node capacity scales as 1/sqrt(n) Yes - it goes down! More time spent Tx’ing other peoples packets… But: If communication is local, can do much better, and use cool tricks to optimize Like multicast, or multicast in reverse (data fusion) Hey, that sounds like … a sensor network!

Lecture 25: Sensor Networks - smart devices First introduced in late 90’s by groups at UCB/UCLA/USC Small, resource limited devices CPU, disk, power, bandwidth, etc. Simple scalar sensors – temperature, motion Single domain of deployment farm, battlefield, bridge, rain forest for a targeted task find the tanks, count the birds, monitor the bridge Ad-hoc wireless network

Lecture 25: Sensor System Types – Smart- Dust/Motes Hardware UCB motes 4 MHz CPU 4 kB data RAM 128 kB code 50 kb/sec 917 Mhz radio Sensors: light, temp., Sound, etc., And a battery.

Lecture 25: Sensors and power and radios Limited battery life drives most goals Radio is most energy-expensive part. 800 instructions per bit. 200,000 instructions per packet. (!) That’s about one message per second for ~2 months if no CPU. Listening is expensive too. :(

Lecture 25: Sensor nets goals Replace communication with computation Turn off radio receiver as often as possible Keep little state (4 KB isn’t your pentium 4 ten bazillion gigahertz with five ottabytes of DRAM).

Lecture 25: Power Which uses less power? Direct sensor -> base station Tx Total Tx power: distance^2 Sensor -> sensor -> sensor -> base station? Total Tx power: n * (distance/n) ^2 =~ d^2 / n Why? Radios are omnidirectional, but only one direction matters. Multi-hop approximates directionality. Power savings often makes up for multi-hop capacity These devices are *very* power constrained! Reality: Many systems don’t use adaptive power control. This is active research, and fun stuff.

Lecture 25: Example: Aggregation Find avg temp in 8th floor of Wean. Strawman: Flood query, let a collection point compute avg. Huge overload near the CP. Lots of loss, and local nodes use lots of energy! Better: Take local avg. first, & forward that. Send average temp + # of samples Aggregation is the key to scaling these nets. The challenge: How to aggregate. How long to wait? How to aggregate complex queries? How to program?