“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.

Slides:



Advertisements
Similar presentations
Bandwidth Estimation for IEEE Based Ad Hoc Networks.
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
1 A Real-Time Communication Framework for Wireless Sensor-Actuator Networks Edith C.H. Ngai 1, Michael R. Lyu 1, and Jiangchuan Liu 2 1 Department of Computer.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Optimization of intrusion detection systems for wireless sensor networks using evolutionary algorithms Martin Stehlík Faculty of Informatics Masaryk University.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks Medium Access Control (MAC) 17 February 2005.
Kai Li, Kien Hua Department of Computer Science University of Central Florida.
A Transmission Control Scheme for Media Access in Sensor Networks Lee, dooyoung AN lab A.Woo, D.E. Culler Mobicom’01.
Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems Ting Liu and Margaret Martonosi Princeton University.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
1 An Approach to Real-Time Support in Ad Hoc Wireless Networks Mark Gleeson Distributed Systems Group Dept.
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Scalable Team Multicast in Wireless Ad hoc networks Exploiting Coordinated Motion Mario Gerla University of California, Los Angeles.
An Adaptive Data Forwarding Scheme for Energy Efficiency in Wireless Sensor Networks Christos Anagnostopoulos Theodoros Anagnostopoulos Stathes Hadjiefthymiades.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 11th Lecture Christian Schindelhauer.
IEEE INFOCOM 2005, Miami, FL RID: Radio Interference Detection in Wireless Sensor Networks Gang Zhou, Tian He, John A. Stankovic, Tarek F. Abdelzaher Computer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 5th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 13th Lecture Christian Schindelhauer.
DCL Concepts STL Concepts ContainerIteratorAlgorithmFunctorAdaptor What New Concepts are Needed for a “DCL”? (Distributed Computing Library) Distributed.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
Wireless Sensor Networks CS 4501 Professor Jack Stankovic Department of Computer Science Fall 2010.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo and David Culler University of California at Berkeley Intel Research ACM SIGMOBILE.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003) November.
: Data Communication and Computer Networks
1 Adaptive QoS Framework for Wireless Sensor Networks Lucy He Honeywell Technology & Solutions Lab No. 430 Guo Li Bin Road, Pudong New Area, Shanghai,
A File System for System Programming in Ubiquitous Computing Christian Decker, Michael Beigl, Albert Krohn TecO, University of Karlsruhe Institut for Telematics.
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
The Particle Computer System Christian Decker, Albert Krohn, Michael Beigl, Tobias Zimmer TecO, University of Karlsruhe Institut for Telematics Telecooperation.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Multiuser Receiver Aware Multicast in CDMA-based Multihop Wireless Ad-hoc Networks Parmesh Ramanathan Department of ECE University of Wisconsin-Madison.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Every Bit Counts – Fast and Scalable RFID Estimation
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
UNIT IV INFRASTRUCTURE ESTABLISHMENT. INTRODUCTION When a sensor network is first activated, various tasks must be performed to establish the necessary.
1 May-2014 Automotive Protocols & Standards. 2 CAN (Controller Area Network)  Overview Controller Area Network is a fast serial bus designed to provide.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
MAC Protocols for Sensor Networks
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology.
Lab 7 – CSMA/CD (Data Link Layer Layer)
Introduction to Wireless Sensor Networks
CS 457 – Lecture 6 Ethernet Spring 2012.
Mobile Communications Chapter 3 : Media Access
Figure 3.1 Internet model.
Information Sciences and Systems Lab
Presentation transcript:

“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität Karlsruhe

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS: research and application area  WSN (wireless sensor network) Battery powered Low computation capabilities  MANET (mobile ad hoc networks) Fast changing environment Devices frequently join and leave a group  BAN (body area network),  PAN (personal area networks) Sensors attached to people Many small devices  Ubiquitous and Pervasive Computing Settings with many devices (typically >100) Battery powered Mid computation capabilities

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS: Synchronous Distributed Jam Signalling What is SDJS?  Method for ultra fast estimation of a parameter of a group of devices  Novel transmission scheme  Extension of standard wireless ad hoc protocol  Synchronous, parallel, superimposing jam signals  Works infrastructure less  For highly mobile settings with high number of networked devices Example for this talk: “How many devices are present in the cell?”

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe Related Work Example:“How many devices are present in the cell?”  Budianu et al. 2003: Collect IDs from the Devices and do a Good-Turing estimation, can be done iteratively Targeted on large scale networks, not on speed Also probabilistic  Vogt 2002: For passive RFID Using a slotted aloha protocol, where tags randomly select a slot Adaptive frame size Time to estimate 200 nodes with 99% reliability > 3 sec. (assuming ISO RFID standard)  Normal “ping” on b: Around 5 seconds (best case) for 100 stations

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe Motivation Idea of SDJS Example:“How many devices are present in the cell?”  Traditional: Ping & HELO, OLEH Slow, each node answers Packet implosion, collisions High bandwidth necessary “deterministic” Generic functionality of data transport in the network Same mechanisms for all information flow  Novel: Specific solution for collecting data of the same context Reduce redundant overhead Reduce transported information to necessary minimum SDJS: include the physical layer Ultra Fast and efficient: typ. 1000x faster Probabilistic, but adjustable accuracy/reliability (trade-off)

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – Activity Flow  Slotted (framed) Aloha  Reduce Information to a single jam signal  Full distributed operation  Hardware Requirements?  Network Requirements?  Collisions? 1. Station B starts SDJS 2. Each node prepares its transmission vector 3. SDJS scheme is processed 4. Each node has a reception vector

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – The duck hunter problem  Estimation of the real number from a given number of signals (the reception vector)  Classical “Duck Hunter Problem”  Solution: surjective mapping, partition theory Group of hunters How many hunters were there? Example:“How many devices are present in the cell?”

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – The Estimation 1  Duck hunter problem; analogon in SDJS: s Slots k Devices sending one jam signal each a received jam signals => P(a|k) Distribution  No a-priori information: Maximum Likelihood k MLE =arg max k P(a|k)  With a-priori information: Maximum a-posteriori k MAP =arg max k P(a|k) P(k)

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – The Estimation 2  How is estimation done in practice? Start: count the number of received jam signals a 1.ML-Point estimation: Give an estimation For k (MLE) 2. MAP-Confidence interval: Give an interval, [k min,k max ] that contains the actual k with a given confidence (e.g. 90%) In both cases: look-up table that can be prepared (no computation on nodes necessary)

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – Accuracy and Noise  Accuracy vs. Speed trade-off: accuracy depends on number of slots s  Noise: false positives and detection errors during carrier sense affect the estimation

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – The Implementation  TecO’s particle computer  Wireless sensor platform with 8Bit 20 Mhz processor  4kRAM, 4MBit Flash  125kbit/s wireless communication  Customized ad hoc protocol Find a partner <20ms Low power Low collisions  Development tools  Over 1000 produced, large developer community all over the world

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – The Experiment  Setting in an office with up to 50 particle computer  Impressive prove of concept: theory and real world setting are nearly identical

Albert Krohn, Michael Beigl, Sabin Wendhack, TecO, Universität Karlsruhe SDJS – Conclusion  SDJS is An extension to wireless radio protocols Efficient group communication for very specific tasks Probabilistic by nature  SDJS can Efficiently and fast estimate parameters (1000x faster) Achieve adjustable accuracy (speed – accuracy trade off)  Overall performance of SDJS depends severely on the underlying technology

“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität Karlsruhe Thank you for your attention!