RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang †, Kaifei Chen ‡, Nissanka Bodhi Priyantha †, Jie.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Chapter Thirteen: Multiplexing and Multiple- Access Techniques.
SoNIC: Classifying Interference in Sensor Networks Frederik Hermans et al. Uppsala University, Sweden IPSN 2013 Presenter: Jeffrey.
Xiaolong Zheng, Zhichao Cao, Jiliang Wang, Yuan He, and Yunhao Liu SenSys 2014 ZiSense Towards Interference Resilient Duty Cycling in Wireless Sensor Networks.
Surviving Wi-Fi Interference in Low Power ZigBee Networks Chieh-Jan Mike Liang, Nissanka Bodhi Priyantha, Jie Liu, Andreas Terzis Johns Hopkins University,
TDMA Scheduling in Wireless Sensor Networks
Real-time Wireless Sensor Networks CSC536 Spring 2005 Meng Wan 05/09/2005.
Medium Access Control in Wireless Sensor Networks.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Efficient Network Flooding and Time Synchronization with Glossy
1 Multi-channel Interference Measurement and Modeling in Low-Power Wireless Networks Guoliang Xing 1, Mo Sha 2, Jun Huang 1 Gang Zhou 3, Xiaorui Wang 4,
1/24 Passive Interference Measurement in Wireless Sensor Networks Shucheng Liu 1,2, Guoliang Xing 3, Hongwei Zhang 4, Jianping Wang 2, Jun Huang 3, Mo.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
1 C-MAC: Model-driven Concurrent Medium Access Control for Wireless Sensor Networks Mo Sha ; Guoliang Xing ; Gang Zhou ; Shucheng Liu ; Xiaorui Wang City.
1 Experimental Study of Concurrent Transmission in Wireless Sensor Networks Dongjin Son, Bhaskar Krishnamachari (USC/EE), and John Heidemann (USC/ISI)
IEEE INFOCOM 2005, Miami, FL RID: Radio Interference Detection in Wireless Sensor Networks Gang Zhou, Tian He, John A. Stankovic, Tarek F. Abdelzaher Computer.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Energy-Efficient Design Some design issues in each protocol layer Design options for each layer in the protocol stack.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
A Transmission Control Scheme for Media Access in Sensor Networks Presented by Jianhua Shao.
II. Medium Access & Cellular Standards. TDMA/FDMA/CDMA.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Versatile low power media access for wireless sensor networks Joseph PolastreJason HillDavid Culler Computer Science Department University of California,Berkeley.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
BMWnet Wshnt.kuas.edu.tw Mesh Networks Prof. W.S. Hwang.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo and David Culler University of California at Berkeley Intel Research ACM SIGMOBILE.
Understanding the Real-World Performance of Carrier Sense MIT Computer Science and Artificial Intelligence Laboratory Networks and Mobile Systems
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang †, Kaifei Chen ‡, Nissanka Bodhi Priyantha †, Jie.
Stochastic sleep scheduling (SSS) for large scale wireless sensor networks Yaxiong Zhao Jie Wu Computer and Information Sciences Temple University.
Chapter 12 Multiple Access Figure 12.1 Data link layer divided into two functionality-oriented sublayers Figure 12.2 Taxonomy of multiple-access protocols.
RT-Link: A Time-Synchronized Link Protocol for Energy-Constrained Multi- hop Wireless Networks Anthony Rowe, Rahul Mangharam and Raj Rajkumar CMU SECON.
Marginal Value of Multiple Channels in Real World WSNs Jorge Ortiz and David Culler CS262B Final Project.
MAC Protocols In Sensor Networks.  MAC allows multiple users to share a common channel.  Conflict-free protocols ensure successful transmission. Channel.
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Modified OSI Architecture for Low-Power Wireless Networks Jay Bruso Mike Matranga.
MBStar: A Real-time Communication Protocol for Wireless Body Area Networks Xiuming Zhu, Song Han, Pei-Chi Huang, Al Mok Deji Chen.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan Networks and Mobile Systems Group MIT Computer Science and.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
Junfeng Xu, Keqiu Li, and Geyong Min IEEE Globecom 2010 Speak: Huei-Rung, Tsai Layered Multi-path Power Control in Underwater Sensor Networks.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Branislav Kusy, Christian Richter, Wen Hu, Mikhail Afanasyev, Raja Jurdak, Michael Brunig, David Abbott,
SenProbe: Path Capacity Estimation in Wireless Sensor Networks Tony Sun, Ling-Jyh Chen, Guang Yang M. Y. Sanadidi, Mario Gerla.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Lecture 4 Spread Spectrum.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Multiple Access Techniques.
RM-MAC: A Routing-Enhanced Multi-Channel MAC Protocol in Duty-Cycle Sensor Networks Ye Liu, Hao Liu, Qing Yang, and Shaoen Wu In Proceedings of the IEEE.
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
FD-MMAC: Combating Multi-channel Hidden and Exposed Terminals Using a Single Transceiver Yan Zhang, Loukas Lazos, Kai Chen, Bocan Hu, and Swetha Shivaramaiah.
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
Chapter 13 Multiple Access.
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
MAC Protocols for Sensor Networks
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
MAC Protocols for Sensor Networks
Sensor Networks Katia Obraczka Winter 2005 MAC II
SENSYS Presented by Cheolki Lee
Multiple Access Problem: When two or more nodes transmit at the same time, their frames will collide and the link bandwidth is wasted during collision.
Wireless Sensor Networks 5th Lecture
Multiple Access Methods
RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang†, Kaifei Chen‡, Nissanka Bodhi Priyantha†, Jie Liu†,
Collection Tree Protocol
Chapter 12 Media Access Control (MAC)
Presentation transcript:

RushNet: Practical Traffic Prioritization for Saturated Wireless Sensor Networks Chieh-Jan Mike Liang †, Kaifei Chen ‡, Nissanka Bodhi Priyantha †, Jie Liu †, Feng Zhao † † Microsoft Research, ‡ University of California, Berkeley 1

Motivation  How to provide traffic prioritization over saturated radio medium? 2

Possible Solutions  Time Division Multiple Access (TDMA)  Synchronization overhead  Waste of resource for sporadic and unpredictable events  Frequency Division Multiple Access (FDMA)  Waste of resource for sporadic and unpredictable events  Cannot avoid external interference  Carrier Sense Multiple Access  Does not work for busy networks  Resource Reservation like RSVP  Setup overhead and delay 3

Our Solution: RushNet  a schedule-free and coordination-free wireless network stack on COTS transceivers that enables packet prioritization  Reserve the highest transmission power for high priority packets  Send high priority packets to preempt on-going normal packets  Cache normal packets by predicting whether they were preempted 4

Outline  Motivation and Approach  Naïve Preemption  Preemptive Packet Train  Interference Recovery Caching  Deployment and Evaluation 5

Naïve Preemption Experiment Lower-Power Packets Higher-Power Packets 100cm  COTS transceivers: Atmel RF231 and TI CC2420  Vary higher power levels  Measure packet reception ratio (PRR) of higher power packets at receiver 6 Lower Power Transmitter Higher Power Transmitter Receiver

Naïve Preemption Results Atmel RF231 Lower Power RSS TI CC2420 Lower Power RSS 7

Why Doesn’t Naïve Preemption Work?  Bit Spreading  Atmel RF231 and TI CC2420 have reception state machine 8

Bit Spreading PN n PN 1 SYNC Bit Spreading Low-Power Packets High-Power Packets Received Packets (Corrupted) pseudo-random noise (PN) sequences PN n PN 1 SYNC Bit Spreading Invalid PN sequence 9

Chip State Machine Low-Power Packets High-Power Packets SYNC Radio Chip States SYNC Listening Sync (Lock on the highest power packet) Reception (Not preempt-able) SYNC 10

Outline  Motivation and Approach  Naïve Preemption  Preemptive Packet Train  Interference Recovery Caching  Deployment and Evaluation 11

RushNet Solution  Naïve preemption doesn’t work  RushNet repeats the high priority packet and send back- to-back, which we call a preemptive packet train 12

RushNet Preemptive Packet Train SYNC Corrupted Noise SYNC Low-Power Packets A Repeatedly 2-packet High-Power Packet Train Received Packets (1 High Power Packet) Repeated packet 13

Preemptive Packet Train Experiment Setup  Same setup as naïve approach EXCEPT  Only use TI CC2420  Vary high power packet train length from 2 to 7 14 Lower-Power Packets Higher-Power Packets 100cm Lower Power Transmitter Higher Power Transmitter Receiver

Preemptive Packet Train Performance 15

What Happens to Normal Packets  Higher power packet train can preempt normal packets  What happens to these normal packets? 16

Outline  Motivation and Approach  Naïve Preemption  Preemptive Packet Train  Interference Recovery Caching  Deployment and Evaluation 17

Interference Recovery Caching  Memory size is limited  RushNet predicts most possibly destroyed normal packets using tail channel signal strength 18 Lower-Power Packets Higher-Power Packets Memory Lower Power Transmitter Higher Power Transmitter Receiver

Predict Packet Loss After Transmission Category 1Category 3 Channel SS Category 2 Channel SS Category 3 Channel SS Category 1: Very likely to be lost Category 2: Less likely to be lost Category 3: Unlikely to be lost Channel SS > threshold 19 CSS

Packet Caching Experiment Setup Lower-Power Packets Higher-Power Packets 50cm 20 Lower Power Transmitter Higher Power Transmitter Receiver 1700 Packets 1700 tail Channel Signal Strengths Reception Prediction Algorithm Compare output with Ground Truth at receivers

Packet Reception Prediction Correct Prediction: ~90% 21 Predict All Lost Predict All Received

Outline  Motivation and Approach  Naïve Preemption  Preemptive Packet Train  Interference Recovery Caching  Deployment and Evaluation 22

Office Deployment  41 TelosB motes (TI CC2420)  Run our WRAP protocol in SenSys’09 paper 1, which uses a tree topology and token-based multiple access  Each mote generates one normal packet per 15 seconds  We randomly send 100 higher power packets with train length 4 on a 5- hop branch over 10 minutes, and measure their latencies and PRRs Liang et al. RACNet: a high-fidelity data center sensing network. SenSys’09.

High Power Packet Latency and PRR 24

Limitations and Future Work  Power Consumption  Atmel RFR2 supports payload preemption/ receiver override 25

Conclusions  RushNet enables practical packet prioritization on wireless sensor network  It uses a back-to-back train of preemptive repeated high power packet to preempt normal packet, we can achieve 90% PRR with 4-packet train  It uses tail channel signal strength sampling to predict packet collision for better caching efficiency, we can achieve ~90% prediction accuracy 26

Thank you! 27

Motivation  Gateway mote connects to a station  Sensor motes form routing topology 28

Motivation  Gateway mote connects to a station  Sensor motes using any data collection protocol, e.g., CTP, RPL.  Only consider the scenario when motes saturate bandwidth on available channels 29

Motivation  Gateway mote connects to a station  Sensor motes form routing topology  They have mechanism to avoid collisions. For example example, a token. 30

Design Requirements  Minimize resource usage  Minimize control overhead 31

Capture Effect  FM radio transceiver, which can decode a stronger signal from one transmitter in the presence of a weaker signal from another transmitter.  TODO: show diagram for capture effect 32

Preemption on Chips  Hardware state machine  bit spreading  TODO: diagram for this two problems 33

Sufficient Power Difference 34

Preemption on Chips Low-Power Packets High-Power Packets SYNC 100cm SYNC 35

Preemption on Chips SYNC Bit Spreading SYNC Bit Spreading 36

Implementation  Maybe skip it or quickly go thru, unless we have open sourced platform  Do we talk about the tree protocol? Diff RPL  TODO: Need more understanding on Figure 5. what is a transport service (diff from transport layer), why LP has E2E reliability, why ack is in HP? Etc. 37

Outline  Motivation and Approach  Capture Effect  Preemptive Packet Train  Interference Discussion  Implementation  Evaluation 38

Evaluation  What should be the transmission power difference?  How long should HP train be?  What is the caching hit rate. 39

Preemption Support in Chips  TI CC2420 and Atmel AT86RF231 hides bit spreading information  ATmega2564/1284/644RFR2 supports payload preemption/ receiver override 40

Packet Caching Miss Rate 41