Practical Asynchronous Neighbor Discovery and Rendezvous for Mobile Sensing Applications Prabal Dutta and David Culler Computer Science Division University.

Slides:



Advertisements
Similar presentations
Solving connectivity problems parameterized by treewidth in single exponential time Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk Jesper Nederlof, Dagstuhl.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
5/5/20151 Mobile Ad hoc Networks COE 549 Transmission Scheduling II Tarek Sheltami KFUPM CCSE COE
CS710 : Special issues in Computer Architecture 1/22 Power-Saving Protocols for IEEE Based Multi-Hop Ad Hoc Networks Yu-chee tseng et. al National.
KAIST Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks Suho Yang (CS710: November 4, 2008) Kyle Jamieson, Hari Balakrishnan, Y.C. Tay LNCS.
Computability and Complexity
Doc: IEEE Submission December 2012 Marco Hernandez (NICT)Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Good afternoon everyone.
Hello: A Generic Flexible Protocol for Neighbor Discovery Wei Sun, Zheng Yang, Keyu Wang and Yunhao Liu CSE, Hong Kong University of Science and Technology.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
Expected Quorum Overlap Sizes of Optimal Quorum Systems with the Rotation Closure Property for Asynchronous Power-Saving Algorithms in Mobile Ad Hoc Networks.
1 Practical Asynchronous Neighbor Discovery and Rendezvous for Mobile Sensing Applications Prabal Dutta and David Culler Computer Science Division University.
1 Quick Convergecast in ZigBee/IEEE Tree-Based Wireless Sensor Networks Yu-Chee Tseng and Meng-Shiung Pan Department of Computer Science National.
1 Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network Prof. Yu-Chee Tseng Department of Computer Science National Chiao-Tung University.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
UCLA ENGINEERING Computer Science School of EECS, Peking University On Heterogeneous Neighbor Discovery in Wireless Sensor Networks Lin Chen † ♠, Ruolin.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Mobility Limited Flip-Based Sensor Networks Deployment Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic.
Lifetime and Coverage Guarantees Through Distributed Coordinate- Free Sensor Activation ACM MOBICOM 2009.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
A Simple Neighbor Discovery Procedure for Bluetooth Ad Hoc Networks Miklós Aurél Rónai and Eszter Kail GlobeCom 2003 Speaker: Chung-Hsien Hsu Presented.
1 Cross-Layer, Energy-Efficient Design for Supporting Continuous Queries in Wireless Sensor Networks A Quorum-Based Approach Chia-Hung Tsai, Tsu-Wen Hsu,
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
1 Mobile-Assisted Localization in Wireless Sensor Networks Nissanka B.Priyantha, Hari Balakrishnan, Eric D. Demaine, Seth Teller IEEE INFOCOM 2005 March.
1 Deterministic Collision-Free Communication Despite Continuous Motion ALGOSENSORS 2009 Saira Viqar Jennifer L. Welch Parasol Lab, Department of CS&E TEXAS.
Continuous Variables Write message update equation as an expectation: Proposal distribution W t (x t ) for each node Samples define a random discretization.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
Bounded relay hop mobile data gathering in wireless sensor networks
A Cooperative Lifetime Extension MAC Protocol in Duty Cycle Enabled Wireless Sensor Networks Hongzhi Jiaot, Mary Ann Ingram, Frank Y. Li Milcom 2011.
Chih-Min Chao and Yao-Zong Wang Department of Computer Science and Engineering National Taiwan Ocean University, Taiwan IEEE WCNC 2010 A Multiple Rendezvous.
Chinese Remainder Theorem. How many people What is x? Divided into 4s: remainder 3 x ≡ 3 (mod 4) Divided into 5s: remainder 4 x ≡ 4 (mod 5) Chinese Remainder.
Fast and Reliable Route Discovery Protocol Considering Mobility in Multihop Cellular Networks Hyun-Ho Choi and Dong-Ho Cho Wireless Pervasive Computing,
A Wakeup Scheme for Sensor Networks: Achieving Balance between Energy Saving and End-to-end Delay Xue Yang, Nitin H.Vaidya Department of Electrical and.
Yu Gu and Tian He Minnesota Embedded Sensor System (MESS) Department of Computer Science & Engineering This work is supported by.
SEA-MAC: A Simple Energy Aware MAC Protocol for Wireless Sensor Networks for Environmental Monitoring Applications By: Miguel A. Erazo and Yi Qian International.
An Adaptive, High Performance MAC for Long-Distance Multihop Wireless Networks Sergiu Nedevschi *, Rabin K. Patra *, Sonesh Surana *, Sylvia Ratnasamy.
Decentralized Energy-Conserving and Coverage-Preserving Protocols for Wireless Sensor Networks Chi-Fu Huang, Li-Chu Lo, Yu-Chee Tseng, and Wen-Tsuen Chen.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
SenSys 2003 Differentiated Surveillance for Sensor Networks Ting Yan Tian He John A. Stankovic Department of Computer Science, University of Virginia November.
GholamHossein Ekbatanifard, Reza Monsefi, Mohammad H. Yaghmaee M., Seyed Amin Hosseini S. ELSEVIER Computer Networks 2012 Queen-MAC: A quorum-based energy-efficient.
Fen Hou 、 Lin X. Cai, University of Waterloo Xuemin Shen, Rutgers University Jianwei Huang, Northwestern University IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
Quorum-based Power-Saving Multicast Protocols in the Asynchronous Ad Hoc Network Yu-Chen Kuo Department of Computer Science and Information Management.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
4 Introduction Carrier-sensing Range Network Model Distributed Data Collection Simulation 6 Conclusion 2.
Younghwan Yoo† and Dharma P. Agrawal‡ † School of Computer Science and Engineering, Pusan National University, Busan, KOREA ‡ OBR Center for Distributed.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Power-Efficient Rendez- vous Schemes for Dense Wireless Sensor Networks En-Yi A. Lin, Jan M. Rabaey Berkeley Wireless Research Center University of California,
A Low Interference Channel Assignment Algorithm for Wireless Mesh Networks Can Que 1,2, Xinming Zhang 1, and Shifang Dai 1 1.Department of Computer Science.
A Coverage-Preserving and Hole Tolerant Based Scheme for the Irregular Sensing Range in WSNs Azzedine Boukerche, Xin Fei PARADISE Research Lab Univeristy.
Max do Val Machado Raquel A. F. Mini Antonio A. F. Loureiro DCC/UFMG DCC/PUC Minas DCC/UFMG IEEE ICC 2009 proceedings Advisor : Han-Chieh Chao Student.
CS480 Cryptography and Information Security
Wireless Sensor Networks Wake-up Receivers
Prof. Yu-Chee Tseng Department of Computer Science
The Importance of Communities for Learning to Influence
Introduction to Cryptography
Survey on Coverage Problems in Wireless Sensor Networks - 2
Presentation transcript:

Practical Asynchronous Neighbor Discovery and Rendezvous for Mobile Sensing Applications Prabal Dutta and David Culler Computer Science Division University of California, Berkeley ACM SenSys 2008

Outline  Introduction  Related Work  Proposed Method  Simulation  Conclusion

Introduction  Challenge for asynchronous neighbor discovery: Awake infrequently Co-located discover each other Without any prior knowledge of their potential encounters Without external assistance

Introduction  Two requirements Low-power operation Active vigilance These are at odds with each other since optimizing for one may come at the expense of the other.

Related Work  Prior Work in asynchronous neighbor discovery: Stochastic  McGlynn and Borbash proposed “Birthday Protocols” Quorum  Tseng et al. propose a quorum-based protocol for multihop ad hoc networks Combinatorial  For asymmetric duty cycles, the approach reduces to an NP- complete minimum vertex cover problem requiring a centralized solution.

Goal  Discovery can be quite valuable in mobile networks  Discovery should be a fundamental and continuous service in both mobile and static networks  “Disco” addresses a more general set of neighbor discovery problems and avoids the need for a randomized protocol by using pairs of primes

Proposed method – using Chinese Remainder Theorem Choosing a prime Starting counting at reference period Two nodes, i and j, pick two numbers, m i and m j, such that m i and m j are relatively prime (coprimes)

Example Node ix ≡ 1 (mod 3) Node jx ≡ 2 (mod 5) prime Starting counting period

Chinese Remainder Theorem if x 0 is one such solution, then an integer x satisfies the congruences if and only if x is of the form x = x 0 + km for some integer k. One x 0 is: The goal is to find an x such that c i |m i and c j |m j. We can express this as a pair of simultaneous congruences There is exactly one such overlapping period every m = mimj periods. Letting x represent the reference period number, we have where the solution is unique (mod m) for m = m i m j, and where b i and b j must satisfy the congruences

Duty cycle Duty Cycle (DC) = 1/m i Node ix ≡ 1 (mod 3) Node jx ≡ 2 (mod 5) DC = 1/3 =33% DC = 1/5 =20%

Coprimes are not enough  The moduli cannot be chosen independently by the nodes Such choices could lead to values of m i and m j that are not coprimes.  Restricting the moduli to coprimes is not scalable There are only a handful numbers that can satisfy both the target duty cycle and coprime requirement.  If m i = m j, then node i and j may never discover each if they wake up with the same period but different phase.

Example x cici cjcj Node ix ≡ 1 (mod 3) Node jx ≡ 2 (mod 3)

Coprimes are not enough (cont.)  To require each node i to pick two primes, p i 1 and p i 2, such that p i 1 ≠ p i 2 ex: Duty Cycles are 97 and 103 (1/97 + 1/103 = 2%)  For every pair of nodes i and j, there will be at least one pair in the set {(p i 1, p j 1 ), (p i 1, p j 2 ), (p i 2, p j 1 ), (p i 2, p j 2 )} that are relatively prime ex: (p i 1, p i 2 ) = (30, 77) and (p j 1, p j 2 ) = (35, 66) x = 30k and x = 77k, for all k ∈ Z + x = 35k + 1 and x = 66k + 1, for all k ∈ Z +

Choosing Primes  Low discovery times are possible: one of the primes is very close to the reciprocal of the duty cycle the other prime is a much larger number  The limit of the ratio between the auspicious and unfortunate worst-case latencies is Node i : (53, 883) Node j : (97, 103) 883 × 103 = × 97 = 5141

Slot Non-Alignment  To maximize the likelihood that overlapping slots result in discovery, Disco transmits a beacon at both the beginning and end of a slot.

Duty Cycle form Discovery Latency Maximum discovery latency: t disco, Without loss of generality, p = p i 1 = p j 1 The minimum duty cycle, DC, must satisfy the following inequality The minimum required beacon rate:

Simulation Study Programming languagenesC Operating SystemTinyOS Empirical Sensor NodeTelos Wiress sensor node

Discover Latency Comparison

Discovery Latency: A Deeper Look prime pairs: (23,157), (29, 67), (31, 59), (37, 34)

Impact of Duty Cycle Asymmetry

Latency-Driven Discovery

Empirical Evaluation

Conclusion  This paper presents a practical solution to the low- power asynchronous neighbor discovery problem.  This simple protocol achieves discovery faster than other discovery protocols for a given duty cycle, allows nodes to independently select their own duty cycle.

Thank you