Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014.

Slides:



Advertisements
Similar presentations
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Advertisements

20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Assume that a file is transferred from a node A to a node B. The file has been fragmented in 5 frames. Frame 0 is corrupted, the ACK of frame 1 is corrupted,
Surviving Wi-Fi Interference in Low Power ZigBee Networks Chieh-Jan Mike Liang, Nissanka Bodhi Priyantha, Jie Liu, Andreas Terzis Johns Hopkins University,
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Dynamic Bayesian Networks (DBNs)
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
Chapter 6 Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control.
Chapter 3: Channel Coding (part 1)
Data Link Layer – Part 1 V.T.Raja Oregon State University.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
The Data Link Layer Chapter 3. Position of the data-link layer.
EE 122: Error detection and reliable transmission Ion Stoica September 16, 2002.
Multiple Sender Distributed Video Streaming Thinh Nguyen, Avideh Zakhor appears on “IEEE Transactions On Multimedia, vol. 6, no. 2, April, 2004”
1 ITC242 – Introduction to Data Communications Week 10 Topic 16 Data link control.
UCB Error Control in TCP Jean Walrand U.C. Berkeley
Chapter 6: Errors, Error Detection, and Error Control
Spring 2004 EE4272 Direct Link Networks (I) Hardware Building Blocks (nodes & links) 5 Issues before Exchanging Packets  Encoding  Framing  Error Detection.
Chapter 14 Simulation. Monte Carlo Process Statistical Analysis of Simulation Results Verification of the Simulation Model Computer Simulation with Excel.
Chapter 6 Errors, Error Detection, and Error Control
Hamming Code Rachel Ah Chuen. Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted.
18-Aug-154/598N: Computer Networks Overview Direct link networks –Error detection - Section 2.4 –Reliable transmission - Section 2.5.
Low Density Parity Check (LDPC) Code Implementation Matthew Pregara & Zachary Saigh Advisors: Dr. In Soo Ahn & Dr. Yufeng Lu Dept. of Electrical and Computer.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
CS168 (and EE122) TAs past and present give you…..
1 Forward Error Correction in Sensor Networks Jaein Jeong, Cheng-Tien Ee University of California, Berkeley.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Data Link Layer Part I – Designing Issues and Elementary.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Errors, Error Detection, and Error Control
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Forward Error Correction vs. Active Retransmit Requests in Wireless Networks Robbert Haarman.
PPR: Partial Packet Recovery for Wireless Networks Kyle Jamieson and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory.
1 © Unitec New Zealand CRC calculation and Hammings code.
1 Error Detection and Correction Martin Weiss. Slide 2 Objectives of this Meeting u Describe the major error detection techniques u Describe forward error.
Data Transmission n Keep errors to an acceptable low probability n Bit-serial transmission n Parallel transmission.
Internet and Intranet Protocols and Applications The Internet: Delay, Errors, Detection February, 2002 Joseph Conron Computer Science Department New York.
Tufts University. EE194-WIR Wireless Sensor Networks. February 17, 2005 Increased QoS through a Degraded Channel using a Cross-Layered HARQ Protocol Elliot.
FEC Linear Block Coding
Channel Capacity. Techniques to reduce errors in digital communication systems Automatic repeat request (ARC) Forward error correction (FEC) Channel.
ECE 101 An Introduction to Information Technology Information Coding.
Transmission Errors Error Detection and Correction.
Huffman Coding (2 nd Method). Huffman coding (2 nd Method)  The Huffman code is a source code. Here word length of the code word approaches the fundamental.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Practical Session 10 Computer Architecture and Assembly Language.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
Digital Communications Chapter 6. Channel Coding: Part 1
Results and Conclusions
Wireless Communication
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
Computer Communication & Networks
Reliable Transmission
Data Link Layer Flow Control.
Sliding Window Protocol | Go-Back-N
Computer Architecture and Assembly Language
Cyclic Redundancy Check (CRC)
Data Transmission Keep errors to an acceptable low probability
Data Link Layer What does it do?
Rivier College CS575: Advanced LANs Chapter 6: Logical Link Control
Chapter 20 Network Layer: Internet Protocol
CS412 Introduction to Computer Networking & Telecommunication
Chapter Nine: Data Transmission
Chapter 4 Data Link Layer.
Computer Architecture and Assembly Language
Presentation transcript:

Recovering Data From Corrupt Packets SENSYS 2013 EWSN 2014

Typical procedure of transmission  Techniques for overcoming bit errors  ARQ : Automatic Repeat reQuest  FEC : Forward Error Correction  Or the combination : HARQ  Interesting things happened when it finds a corrupted packet during the CRC detection process!  All IS NOT LOST(ANL): a opportunistic approach  TVA: an novel method of CRC correcting

DSSS in Standard  A byte = 2 four-bit symbols  Echo symbol is finally represented by a 32-bit log chip sequence (i.e. the rightmost table)  What happened when takes noise into consideration ?  Corruption may happen

ANL : Observation  Deployment  16 nodes  One year from 2012 to 2013  Mutation Matrix:  Each entry denotes a mutation frequency  One Observation:  Mutations are not uniformly distributed

ANL : Recovering Data

ANL : Left questions  How to generate the mutation matrix?  Through Simulation  How to estimate p chip : using LQI  Is the actual sent word is assigned the highest rank?(95% of them are)

TVA-A reliable protocol  Procedure  Feature:  A novel method of CRC error correction  Compact and computationally efficient  Designed to correct the most common error patterns observed in WSNs

CRC error correction Theory ……CRC(e1)CRC(e2)CRC(e3)……......e1e2e3……

Reliability of TVA:verify ……CRC(e 2 )=c…… e2e2

Searching for Polynomials:results

Performance Comparison

Conclusion of two work  Solve the same issue  Recovering information from corrupt packet  Different method  ANL : a probabilistic approach  TVA : CRC error correcting  Combination Possibility?

谢谢!

Comparison with other protocol

Outline 1.All is not lost the distinct pattern of how packets are corrupted an probabilistically approach infers the original content of a corrupt packet 2.Unlocking the full power of the CRC a novel method of CRC error correction a protocol TVA making use of the error correcting ability of CRC

Comparision with ANL

Observations  Observation 1:Mutations are not uniformaly distributed  Observation 2:The most significant bit of a symbol is more stable than other bits  Observation 3:Symbols s0 to s7 are more stable than other symbols

Explanation

Exploitation COMPUTE A DISTRIBUTION: