Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004.

Slides:



Advertisements
Similar presentations
Deluge TinyOS Network Programming The real way to program your motes
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
Distributed Assignment of Encoded MAC Addresses in Sensor Networks By Curt Schcurgers Gautam Kulkarni Mani Srivastava Presented By Charuka Silva.
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Digital Fountain Codes V. S
A Distributed Security Framework for Heterogeneous Wireless Sensor Networks Presented by Drew Wichmann Paper by Himali Saxena, Chunyu Ai, Marco Valero,
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Trickle: Code Propagation and Maintenance Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Philip Levis UC Berkeley.
CSE 5392By Dr. Donggang Liu1 CSE 5392 Sensor Network Security Introduction to Sensor Networks.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirstrom, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science Presenter.
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols.
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
Mica: A Wireless Platform for Deeply Embedded Networks Jason Hill and David Culler Presented by Arsalan Tavakoli.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
Incremental Network Programming for Wireless Sensors IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Transport Protocols II.
Generic Sensor Platform for Networked Sensors Haywood Ho.
1 Deluge: Data Dissemination for Network Programming at Scale Jonathan Hui UC Berkeley NEST Retreat June 3, 2004.
1 Network Reprogramming at Scale NEST Retreat January, 2004 Jonathan Hui Jaein Jeong Gilman Tolle.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
Intel ® Research mote Ralph Kling Intel Corporation Research Santa Clara, CA.
Key management in wireless sensor networks Kevin Wang.
FBRT: A Feedback-Based Reliable Transport Protocol for Wireless Sensor Networks Yangfan Zhou November, 2004 Supervisors: Dr. Michael Lyu and Dr. Jiangchuan.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
Rateless Coding with Feedback Andrew Hagedorn, Sachin Agarwal, David Starobinski, and Ari Trachtenberg Department of ECE, Boston University, MA, USA IEEE.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
TRICKLE: A Self-Regulating Algorithm for Code Propagation and Maintenance in Wireless Sensor Networks Philip Levis, Neil Patel, Scott Shenker and David.
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Roh, Yohan October.
A Remote Code Update Mechanism for Wireless Sensor Networks Thanos Stathopoulos, John Heidemann and Deborah Estrin CEG 790 Presentation By: Trevor Smith.
FEC coding scheme in Multi-hop Wireless Networks Koh Choi Networked Media Laboratory Dept. of Information & Communications Gwangju Institute of.
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
Yufeng Shan, Su Yi, Shivkumar Kalyanaraman and John W. Woods
An Adaptive Energy-Efficient and Low- Latency MAC for Data Gathering in Wireless Sensor Networks Gang Lu, Bhaskar Krishnamachari, and Cauligi S. Raghavendra.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Computer Science Division
Speaker: Yi-Lei Chang Advisor: Dr. Kai-Wei Ke 2012/05/15 IPv6-based wireless sensor network 1.
KAIS T Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Network Wei Ye, John Heidemann, Deborah Estrin 2003 IEEE/ACM TRANSACTIONS.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
Autonomous prototype sensors (motes) 4 MHz, 8bit MCU, 4 KB RAM, 8KB ROM short-range (1-10ft.) radio light and other sensors LED and serial port outputs.
0.1 IT 601: Mobile Computing Wireless Sensor Network Prof. Anirudha Sahoo IIT Bombay.
1 Software Reliability in Wireless Sensor Networks (WSN) -Xiong Junjie
Building Wireless Efficient Sensor Networks with Low-Level Naming J. Heihmann, F.Silva, C. Intanagonwiwat, R.Govindan, D. Estrin, D. Ganesan Presentation.
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
MAC Protocols for Sensor Networks
Sensor network routing protocol for underground robot remote control Demonstration picture (IDF)
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
MAC Protocols for Sensor Networks
Trickle: Code Propagation and Maintenance
Extending IP to Low-Power, Wireless Personal Area Networks
Tarun Banka Department of Computer Science Colorado State University
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Presentation transcript:

Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004

Motivation Current situation:  Sensor network are application specific  Nodes are hard-wired to perform a specific task Problem:  Many details only become obvious after the deployment. Changes in the environment and the application. Scalability, expansion of the network. Testing and debugging cycle

Goal Flexible sensor node hardware suitable for most sensor network applications. Capability for re-tasking on location.  In network reprogramming.  No need for redeployment.

Hardware MICA2 Hardware resources:  Atmel ATmega128L microcontroller:  Internal flash: 128KB  External flash: 512KB  Configuration EEPROM: 4KB  SRAM: 4KB Possibility to program the internal flash memory with data from external flash.

Current Approaches XNP Application  Simple java program from TinyOS distribution. Deluge Protocol  Software package designed specifically for in- network re-tasking of mica motes.  Will be released as part of TinyOS PSFQ Protocol  Research effort to develop an efficient data dissemination protocol for sensor networks.

XNP Application Very basic functionality:  No multi-hop.  No error correction, reliability of transmission techniques.  No image validation (CRC).

Deluge protocol Integrated Solution  Multi-hop routing  “Epidemic Propagation”  Reliability through ARQ, CRC  Golden Image Transport protocol influenced by PSFQ

Pump Slowly, Fetch Quickly Protocol (PSFQ) Data dissemination protocol.  Good for multicast. Pump Slowly:  Data is injected at base station at regular time intervals.  Allow time for propagation, packet loss recovery. Fetch Quickly:  In case of packet loss, data is fetched from neighboring nodes.

Problem ARQ schemes are inefficient for large data dissemination in sensor networks. Noisy communication channels:  Big increase in communication overhead with high packet loss rates. Multi-hop communication:  Big latency, low throughput on lengthy slow communication channels. Multicast:  High traffic incident at the source node.

Proposed Solution Rateless Forward Error Correction.  Low overhead in case of packet loss.  Unidirectional communication.  Great for multicast.

Background: Fountain Codes Idea:  Imagine filling a cup of water form a fountain. You do not care what exact drops of water get inside the cup, it is only important that a cup gets full. Two Properties: 1) A source can generate a potentially infinite supply of encoding packets from the original data. 2) A receiver can reconstruct a message of k packets in size, once any k encoding packets have been received.

Background: LT Codes First practical realization of rateless codes.  (published in 2002). Encoding: 1) Choose a degree d for the encoding symbol, according to a predetermined distribution. 2) Choose d distinct message symbols uniformly at random. 3) XOR all chosen symbols to produce the encoding symbol.

LT Codes (Continued) Main factor of decoding performance is the degree distribution.  Example: p(1) = 1 k * ln(k) packets needed.  Soliton distribution k + ε packets needed. O(k * ln(k)) decoding time.

LT Codes (Continued) Problems:  Degree is not constant. Decoding time for a single encoded packet is not known. Buffer size is not known. Can be up to the size of entire message. Does not fit into mica2 RAM.  Decoding time is O(k * ln(k)) Hard to decode packets on the fly.

Background: Raptor Codes Extend the idea of LT codes. Pre-code the message by encoding it with a fixed erasure code. (e.g. Tornado codes) Now, no need to recover all packets, just a constant fraction of packets. Consequence:  Degree can be bound by a constant.  Decoding time is linear.

Design: Base Station Components:  TOSBase  SerialForwarder  Control program in Java. No strict limitations for computational resources and energy consumption.  Favor asymmetric protocols that offload processing from the motes.

Design: Sensor Nodes Transport protocol:  Delivers program image.  Interacts with network protocol stack.  Verifies data integrity. Control program:  Integrates into primary application.  Application layer of protocol stack.  Handles control messages.  Puts mote into reprogramming mode.  Saves/restores TinyOS state. Boot time reprogramming routine:  Internal OS component.  Programs microcontroller flash memory.  Can choose between several boot images (e.g. Golden Image)

Network Protocol Stack Link Layer  ActiveMessage protocol. Routing  TinyOS multi-hop routing component.  Controlled flood.  Single node addressing by 16 bit mote ID.  Multicast using 8 bit group ID. Transport  Custom implementation using rateless FEC. addr 16bit type 8bit group 8bit length 8bit data 232bit crc 16bit

Implementation Development using TOSSIM. Problems with LT codes implementation. “All-At-Once distribution”: p(1) = 1 Packet format:  16 bit fragment number.  27 bytes data. ACK when entire image is received.

Results Current implementation:  Requires average of k*ln(k) packets.  Efficient for single hop communication. Transmit: 81mW Receive/Idle: 30mW  Slower than Deluge.

Future Work Implement transport protocol using Raptor codes. Compare performance with Deluge, PSFQ, XPN.

Conclusion Implementing rateless FEC in sensor nodes is hard, but not impossible. Great solution for multi-hop multicast and large data transfers. In-network reprogramming is awesome.

References Deluge: Dissemination Protocols for Network Programming at Scale Adam Chlipala, Jonathan W. Hui, and Gilman Tolle. Fall Advisor: Prof. David E. Culler, University of California, Berkeley. PSFQ: A Reliable Transport Protocol For Wireless Sensor Networks C. Y. Wan, A. T. Campbell, and L. Krishnamurthy. Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA 2002). LT codes. Michael Luby. In The 43rd Annual IEEE Symposium on Foundations of Computer Science, Raptor codes A. Shokrollahi. Preprint Available online at

Questions ?