Daibo Liu 1 Daibo Liu 1, Zhichao Cao 2, Xiaopei Wu 2, Yuan He 2, Xiaoyu Ji 3 and Mengshu Hou 1 ICDCS, 2015, Columbus TeleAdjusting: Using Path Coding and.

Slides:



Advertisements
Similar presentations
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Advertisements

Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
pTunes: Runtime Parameter Adaptation for Low-power MAC Protocols
TOPOLOGIES FOR POWER EFFICIENT WIRELESS SENSOR NETWORKS ---KRISHNA JETTI.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Walking down the STAIRS: Efficient Collision Resolution with Constructive Interference Xiaoyu Ji Xiaoyu Ji, Yuan He, Jiliang Wang, Wei Dong, Xiaopei Wu.
An Interest-Driven Approach to Integrated Unicast and Multicast Routing in MANETs Rolando Menchaca-Mendez J.J. Garcia-Luna-Aceves 280N Seminar: 4/28/2008.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirstrom, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science Presenter.
H-SPREAD: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks Wenjing Lou, Member, IEEE, and Younggoo Kwon.
KUASAR An efficient and light-weight protocol for routing and data dissemination in ad hoc wireless sensor networks David Andrews Aditya Mandapaka Joe.
More routing protocols Alec Woo June 18 th, 2002.
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks.
Focused Beam Routing protocol for Underwater Acoustic Networks Josep Miquel Jornet Montana, Milica Stojanovic, Michele Zorzi, Proc. WuWNet 2008.
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Opportunistic Routing Based Scheme with Multi-layer Relay Sets in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences.
1 Minimizing End-to-End Delay: A Novel Routing Metric for Multi- Radio Wireless Mesh Networks Hongkun Li, Yu Cheng, Chi Zhou Department of Electrical and.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Ad Hoc Wireless Routing COS 461: Computer Networks
Introduction to networking (Yarnfield) Introduction to routing.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Reliable, Robust Data Collection in Sensor Networks Murali Rangan Russell Sears Fall 2005 – Sensornet.
Introduction to networking (Yarnfield) Introduction to routing.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Efficient Network-Coding-Based Opportunistic Routing Through Cumulative Coded Acknowledgments Dimitrios Koutsonikolas, Chih-Chun Wang and Y. Charlie Hu.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Voice over the Dins: Improving Wireless Channel Utilization with Collision Tolerance Xiaoyu Ji Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, Yunhao.
Wireless Sensor Networks COE 499 Energy Aware Routing
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Secure and Energy-Efficient Disjoint Multi-Path Routing for WSNs Presented by Zhongming Zheng.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks I-Hong Hou.
Data Collection and Dissemination. Learning Objectives Understand Trickle – an data dissemination protocol for WSNs Understand data collection protocols.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Branislav Kusy, Christian Richter, Wen Hu, Mikhail Afanasyev, Raja Jurdak, Michael Brunig, David Abbott,
Design, Implementation and Tracing of Dynamic Backpressure Routing for ns-3 José Núñez-Martínez Research Engineer Centre Tecnològic de Telecomunicacions.
Department of Computer Science and Engineering UESTC 1 RxLayer: Adaptive Retransmission Layer for Low Power Wireless Daibo Liu 1, Zhichao Cao 2, Jiliang.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Low Power, Low Delay: Opportunistic Routing meets Duty Cycling Olaf Landsiedel 1, Euhanna Ghadimi 2, Simon Duquennoy 3, Mikael Johansson 2 1 Chalmers University.
Opportunistic Flooding in Low-Duty- Cycle Wireless Sensor Networks with Unreliable Links Shuo Goo, Yu Gu, Bo Jiang and Tian He University of Minnesota,
Toward a Packet Duplication Control for Opportunistic Routing in WSNs Georgios Z. Papadopoulos, Julien Beaudaux, Antoine Gallais, Periklis Chatzimisios,
On Reducing Mesh Delay for Peer- to-Peer Live Streaming Dongni Ren, Y.-T. Hillman Li, S.-H. Gary Chan Department of Computer Science and Engineering The.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Self-stabilizing energy-efficient multicast for MANETs.
Broadcast-Free Collection Protocol Daniele Puccinelli , Marco Zuniga , Silvia Giordano , Pedro Jos’e Marr’onj   University of Applied Sciences of.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Trading Structure for Randomness in Wireless Opportunistic Routing Szymon Chachulski, Michael Jennings, Sachin Katti and Dina Katabi MIT CSAIL SIGCOMM.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Toward Reliable and Efficient Reporting in Wireless Sensor Networks Authors: Fatma Bouabdallah Nizar Bouabdallah Raouf Boutaba.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Structure-Free Data Aggregation in Sensor Networks.
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Max do Val Machado Raquel A. F. Mini Antonio A. F. Loureiro DCC/UFMG DCC/PUC Minas DCC/UFMG IEEE ICC 2009 proceedings Advisor : Han-Chieh Chao Student.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Frame counter: Achieving Accurate and Real-Time Link Estimation in Low Power Wireless Sensor Networks Daibo Liu, Zhichao Cao, Mengshu Hou and Yi Zhang.
Routing Metrics for Wireless Mesh Networks
Routing Metrics for Wireless Mesh Networks
COF: Exploiting Concurrency for Low Power Opportunistic Forwarding
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing Metrics for Wireless Mesh Networks
A Routing Protocol for WLAN Mesh
Presentation transcript:

Daibo Liu 1 Daibo Liu 1, Zhichao Cao 2, Xiaopei Wu 2, Yuan He 2, Xiaoyu Ji 3 and Mengshu Hou 1 ICDCS, 2015, Columbus TeleAdjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs University of Electronic Science and Technology of China 1 University of Electronic Science and Technology of China Tsinghua University 2 Tsinghua University Hong Kong University of Science and Technology 3 Hong Kong University of Science and Technology 1

Outline Motivation Related works and our approach Design of TeleAdjusting Implementation and Evaluation Summary of this work 2

Motivation 3 Practical experience – CitySee: city-wide urban sensing system – Predefined configurations VS. changes of network – Expensive manual maintenance Remote control in duty cycled WSNs – Key technique for network management – Challenge to achieve energy efficiency and reliability

Outline Motivation Related works and our approach Design of TeleAdjusting Implementation and Evaluation Summary of this work 4

Related Works Remote control protocols in WSNs – Unstructured approaches Network-wide flooding Energy and bandwidth waste, reliability guarantee Drip, Deluge, Gloosy – Structured approaches Along a predefined path Energy efficiency Susceptible to network dynamics, hard to guarantee reliability E.g., RPL, ORPL 5 Can we achieve a remote control approach guaranteeing both reliability and efficiency?

Forward through an Optimal Area The problems: – For each node, generating the optimal path from sink to it in distributed manner – Forward downwards along the predefined optimal path – Nodes around the optimal path help to forward – Guarantee both efficiency and reliability 6 Forwarding downwards means forwarding from sink to an individual node

Our weapons 7 Path coding – Encoded optimal path from sink to each node – Binary string implies the relationship between paths – Prefix-matching process for forwarding selection Opportunistic forwarding – Closer and earlier wake-up nodes help to forward

Outline Motivation Related works and our approach Design of TeleAdjusting Implementation and Evaluation Summary of this work 8

Design of TeleAdjusting Overview of design – Generating path code – Exploiting opportunistic forwarding 9 Upstream node denotes the next node in the path from it to the sink, and upstream nodes denote all nodes in the path from it to the sink.

Encoding Path Concept of path code – Reverse path address – 0-1 bit string with valid code length – Encoding certain relationship with other nodes – Parent’s code is the prefix of children nodes’ codes 10 One valid bit A and M are S’s children nodes, they set S’s valid codes as the prefix of their path codes. The same prefix The same prefix also indicates they are with the same parent.

Position allocation Encoding Path 11 Allocate a unique position to each children node Parent node’s path code Position space Path code = Prefix code + bit string position – Prefix code: valid path code of parent node – Position: uniquely allocated by parent node Generating path code

Encoding Path 12 Position allocation – Deterministic allocation – Against allocation data loss/new joining child node Position request and allocation acknowledgement – Position maintenance – Space extension Allocating a unique position to each children node Parent node’s path code Position space Generating path code

Opportunistic Forwarding Opportunistic forwarding in TeleAdjusting – Earlier wake-up & closer to destination will assist to forward – Metrics : prefix length (logical distance to destination) Information attached in control packet – Expected relay (E) and the valid path code length (L), the appointed destination (D) and its path code (π D ) Formalization – π: path code – F(π A, π B ): the identical prefix length of the path codes of A and B 13

Opportunistic Forwarding Forwarding condition: S will relay the overheard control packet IF any one of the three is satisfied – S == E, where E is the expected relay – F(π S, π D )> F(π E, π D ) – F(π N, π D )> F(π E, π D ), N is a neighbor of S Forwarding strategies – Along the predefined path – Exploiting available opportunities Earlier wake-up relay Closer to the destination – Backtrack if a node cannot forward downwards – Against unreachable problem 14

Forwarding Strategy 12 Along the predefined path – Without exploiting opportunistic forwarding – Traveling along the encoded path Encoded path Traveling path

Forwarding Strategy 16 Exploiting available opportunities Encoded path Traveling path – Relay in the encoded path but closer than the expected relay to the destination – Relay around the encoded path – At least one of the relay’s neighbors is closer to the destination and in the encoded path Efficiency: Opportunistic forwarding could exploit the earlier wake-up relays to forward control packet. Reliability: Exploiting opportunistic forwarding will increase the ability of resisting network dynamics.

Forwarding Strategy 17 Backtrack – If a node (E) can’t further forward towards the destination Operation: Set its potential relays (C and D) to unreachable Set itself to unreachable to the destination – If unreachable It will not actively forward the control packet – Reset to reachable if any potential relay is reachable Backtrack strategy will eventually find a path to the destination, otherwise, sink will set itself to unreachable.

Forwarding Strategy 18 Against unreachable problem – Sink node is set to unreachable – Report to the controller – Controller selects a neighbor (K) of the destination Maximum prefix difference – Sink forwards control packet to the appointed K – K forwards the control packet to the destination by unicast forwarding

19 TeleAdjusting in protocol stack Beneath application layer Above MAC layer Connecting with link estimator and network layer Integrate TeleAdjusting into protocol stack

Outline Motivation Related works and our approach Design of TeleAdjusting Implementation and Evaluation Summary of this work 20

Implementation and Evaluation 21 Implementation of TeleAdjusting – TinyOS – Built upon LPL – Interface for application la yer Evaluation: – Large-scale simulation in TOSSIM – Indoor testbed, 40 TelosB nodes – Performance: reliability, efficiency – Comparison with Drip, quasi-RPL

Testbed Settings TelosB sensor nodes – 22 nodes on the testbed board – 18 nodes scattered around the testbed Multi-hop networks 512ms wakeup interval Periodical remote control packet (10 minutes)

Simulation results 23 Path code length almost increases linearly with hop count, no matter tinght-grid or sparse- linear. Simulation setup – Sparse-linear: 5×45 grids with low gain – Tight-grid: 15x15 grids with high gain – Network topology construction: CTP+Trickle

Simulation results 24 Convergent time = Path code generated time – routing found time Reverse path hop count vs. CTP hop count Nodes can quickly generate its path code and associate different positions to children nodes almost without exceeding 20 beacons time. For each node, the reverse hop count is very close to its CTP routing hop count.

Evaluation Results 25 Remote packet delivery ratio – Two scenarios: interfered (WIFI) channel and clear channel – Comparison with Drip (reliability guarantee), quasi-RPL – Re-Tele is TeleAdjusting dealing with unreachable problem Structured approach (RPL) is susceptible to network dynamics, unstructured approach (Drip) guarantees the reliability of remote packet delivery. The reliability of TeleAdjusting is close to Drip.

Evaluation Results 26 Transmission hop count vs. CTP hop count Average network-wide transmission count

Outline Motivation Related works and our approach Design of TeleAdjusting Implementation and Evaluation Summary of this work 27

Summary Ready-to-use remote control protocol; Distributed coding based addressing scheme that encodes path information from sink to individual nodes; Exploiting opportunistic forwarding to guarantee both reliability and efficiency; Implementation of TeleAdjusting in TinyOS; Simulation and real testbed evaluation. 28

29 Thank you! Q&A Q&A