1 Deluge: Data Dissemination for Network Programming at Scale Jonathan Hui UC Berkeley NEST Retreat June 3, 2004.

Slides:



Advertisements
Similar presentations
Deluge TinyOS Network Programming The real way to program your motes
Advertisements

Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Remote Programming Dissemination Collection Network Management Gilman Tolle (also speaking for Jonathan Hui)
TDMA Scheduling in Wireless Sensor Networks
Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.
CLUSTERING IN WIRELESS SENSOR NETWORKS B Y K ALYAN S ASIDHAR.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
S-MAC Sensor Medium Access Control Protocol An Energy Efficient MAC protocol for Wireless Sensor Networks.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Towards a Sensor Network Architecture: Lowering the Waistline Culler et.al. UCB.
Computer Science 1 ShapeShifter: Scalable, Adaptive End-System Multicast John Byers, Jeffrey Considine, Nicholas Eskelinen, Stanislav Rost, Dmitriy Zavin.
Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirstrom, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science Presenter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Reactive Discovery of Point-to-Point Routes in Low Power and Lossy Networks draft-ietf-roll-p2p-rpl-04 Mukul Goyal University of Wisconsin Milwaukee.
Receiver Based Forwarding for Wireless Sensor Networks Rodrigo Fonseca OASIS Retreat January 2005 Joint work with Ana Sanz Merino, Ion Stoica.
Incremental Network Programming for Wireless Sensors NEST Retreat June 3 rd, 2004 Jaein Jeong UC Berkeley, EECS Introduction Background – Mechanisms of.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Node-level Representation and System Support for Network Programming Jaein Jeong.
June 2008 WEI short course - L9 trickle 1 Wireless Embedded InterNet working Foundations of Ubiquitous Sensor Networks - Trickle - Polite Reliable Responsive.
Incremental Network Programming for Wireless Sensors IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS.
Generic Sensor Platform for Networked Sensors Haywood Ho.
1 Network Reprogramming at Scale NEST Retreat January, 2004 Jonathan Hui Jaein Jeong Gilman Tolle.
1 Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye Fabio Silva John Heidemann Presented by: Ronak Bhuta Date: 4 th December 2007.
Findings in Reliable Bulk Data Transfer Experiments GGB project Sukun Kim, David Culler, James Demmel, Gregory Fenves, Steve Glaser, Shamim Pakzad NEST.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Power saving technique for multi-hop ad hoc wireless networks.
Empirical Analysis of Transmission Power Control Algorithms for Wireless Sensor Networks CENTS Retreat – May 26, 2005 Jaein Jeong (1), David Culler (1),
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
University University of Virginia 1 Flash Flooding: Exploiting the Capture Effect for Rapid Flooding in Wireless Sensor Networks Infocom ’ 09 Rio de Janeiro,
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Topic 1: Sensor Networks (Long Lecture) Jorge J. Gómez.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo and David Culler University of California at Berkeley Intel Research ACM SIGMOBILE.
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.
TinyOS By Morgan Leider CS 411 with Mike Rowe with Mike Rowe.
CCNA 1 Module 10 Routing Fundamentals and Subnets.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
Crowd Management System A presentation by Abhinav Golas Mohit Rajani Nilay Vaish Pulkit Gambhir.
TRICKLE: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks Philip Levis, Neil Patel, Scott Shenker and David.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
A Remote Code Update Mechanism for Wireless Sensor Networks Thanos Stathopoulos, John Heidemann and Deborah Estrin CEG 790 Presentation By: Trevor Smith.
CROSS-LAYER OPTIMIZATION PRESENTED BY M RAHMAN ID:
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
Energy conservation in Wireless Sensor Networks Sagnik Bhattacharya, Tarek Abdelzaher University of Virginia, Department of Computer Science School of.
Main Issues Three major issues that we are concerned with in sensor networks are – Clustering Routing and Security To be considered against the backdrop.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
1 Reprogramming/Re-tasking in Wireless Sensor Networks Part of slides are from Jonathon Hui, David A. Olsen and Jaein Jeong.
Presenter - Bob Kinicki Internet of Things Fall 2015
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
A Few Random IoT Thoughts PEDS Seminar PEDS Seminar November 23, 2015 November 23, 2015.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
1 Software Reliability in Wireless Sensor Networks (WSN) -Xiong Junjie
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
Why does it need? [USN] ( 주 ) 한백전자 Background Wireless Sensor Network (WSN)  Relationship between Sensor and WSN Individual sensors are very limited.
Data Collection and Dissemination
Trickle: Code Propagation and Maintenance
Data Collection and Dissemination
Subject Name: Adhoc Networks Subject Code: 10CS841
Presentation transcript:

1 Deluge: Data Dissemination for Network Programming at Scale Jonathan Hui UC Berkeley NEST Retreat June 3, 2004

2 Deluge: What’s new? A lot has happened in 6 months Real (and useable) implementation Reduced RAM consumption by 90% Density-awareness Page-level CRCs for data integrity Multiple image support Integration with network programming Large-scale simulation analysis Real-world testing Demonstration with real applications Exploration with use of geometric information

3 Why Network Programming? Traditional approach Use a physical link to download binary Instead, use radio link for code propagation Embedded nature of sensor networks Network scales reaching thousands of nodes A necessity in debugging and testing cycle Always nice to have the ability to download the binary itself Don’t want to touch the nodes!

4 Deluge Protocol Disseminate program code over a multi- hop sensor network Problems Constrained storage hierarchy Packet (32 bytes) << RAM (4K) << program (128K) < external flash (512K) 100% reliability Rapid propagation Propagation must be a continuous effort Scalability

5 Deluge Overview Epidemic State-machine strictly local rules Nodes advertise, request data, and broadcast Considers many subtle issues Density-awareness Robust to asymmetric links Dynamic adjustment of advertisements Minimize set of concurrent data broadcasts Spatial multiplexing Maintain Request Transmit

6 Data Representation Each version has a unique version number Program image divided into contiguous pages, each consisting of N packets. Page structure advantages Reduced RAM requirements for maintaining state of which packets are needed Allows for spatial multiplexing Program Image Packets 1234N

7 Maintain Advertise Contains version and fraction of image complete Nodes request pages in sequential order Use Trickle Duplicate suppression Dynamically adjust advertisement rate Transition to: Transmit on receiving a request Request on receiving an advertisement with newer data (i.e. from a node with a larger fraction of the complete image) Unless a request or data packet was recently overheard Request Transmit Maintain

8 Request Transmit a request Using a random backoff Suppress if any similar requests are overheard during backoff period Not receiving a data packet for some time Minimize senders by unicasting requests to the node that advertised Transition to Maintain After receiving all packets of a page After k requests to protect against asymmetric links Maintain Transmit Request

9 Transmit Transmit all requested packets May receive requests when transmitting C-SCAN schedule to provide fairness Transition to Maintain when all requested packets are transmitted Maintain Request Transmit

10 Other Details Page level CRCs Redundant data integrity checks at packet and page level Multiple image support Not limited to the dissemination of a single object Allows multiple programs to exist in the network Great for debugging! O 1 External Flash

11 Properties Epidemic  eventual consistency Strictly local rules No neighbor table management Density-aware Spatial multiplexing Robust to asymmetric links High reliability

12 Methodology Simulation (TOSSIM) Up to 400 nodes Empirically derived loss rates Very pessimistic in interference model Highly sensitive to simulation parameters, but helps in guiding development Real world deployment in office building (mica2dots) Up to 77 nodes Limited in scale Not able to see effects shown in simulation

13 Simulation Analysis Pipelining improves performance Linear with size Time increases with density

14 Simulation (10x10)

15 Simulation (20x20)

16 Hidden Terminal Problem Node(2,2) Node(5,5)

17 Slow Down Propagation Slowing down traffic reduces contention But also slows down overall! Original Quarter Request Rate Half Request Rate

18 Simulation Analysis What about starting in the middle? Only reduces time by 25% Doesn’t take advantage of the quick edges Investigation of ways to avoid negative density effects later this session

19 Simulation Analysis (2x76) Pipelining improves performance Linear with size Time decreases with density

20 Empirical Results 77 mica2dot nodes ~5 hops Linear with program size ~ 4 minutes / 10 KB Don’t see edge effects An artifact of simulation? Downloaded image correct every time

21 Where Does the Time Go? Nodes can transmit at ~40 packets/sec Pipelining Broadcast nature of wireless places fundamental limit of 33% from hypothetical Selective and delayed retransmission Implemented in Deluge as suppression mechanisms Required to avoid congestion collapse How can we speed it up? Later in this session Future Work Working on establishing a lower bound Extreme Scaling NEST Demo Long, linear structures; multiple sources

22 Deluge and Reprogramming Deluge for propagation Component to write boot image in correct format Moves complexity out of bootloader Portability NetProg interface for network programming command NetProg.reboot(uint8_t imgID); Saves TOS_LOCAL_ADDRESS, TOS_GROUP_ID, imgID, etc. in internal flash Program Image 0 External Flash Program Image 1

23 Current Status Requirements 159 bytes of RAM (with support for 4 images) 3.5 KB of ROM Currently in tinyos-1.x/beta/Deluge Deluge operates on top of GenericComm Just wire StdControl! Use start and stop to control Deluge Some issues: NetProg.init() should be first (loads TOS_LOCAL_ADDRESS, etc.) Periodic advertisements Requires nodes to be always on when downloading Can have concurrent tasks, but wireless communication performance can be significantly reduced Integration with various small apps without problems

24 Demo Tonight! Deluge – Bulk data dissemination With network programming Crickets (courtesy of Gilman Tolle) MintRoute – Many-to-one tree building/routing Interactive display – Showing progress of download Drip – Reliable command dissemination Time synchronization Auditory feedback  All at the same time!

25 The End Questions?

26 What We Also Tried Suppression of control messages is crucial Suppression of neighboring senders Reduces contention, but also reduces coverage More sophisticated sender selection Did not perform significantly better than choosing node which most recently advertised Forward error-correction Best when link qualities are known What we want are rateless codes