• Aucun résultat trouvé

mercredi 27 novembre 2013 Routing

N/A
N/A
Protected

Academic year: 2022

Partager "mercredi 27 novembre 2013 Routing"

Copied!
126
0
0

Texte intégral

(1)

Routing

(2)

Routing

Classical flooding

Implosion

Resource management

Negociation based protocols

SPIN

Directed Diffusion

(3)

Negociation Based Protocols

SPIN: Sensor Protocols for Information via Negociation

• Information descriptors for negociation prior to data transmission

• Negociation relates to available energy

(4)

SPIN

ADV: advertize that new data is available and described

REQ: request to receive data

DATA: actual data

(5)

SPIN-PP

S R

(6)

SPIN-PP

S R

ADV

(7)

SPIN-PP

S R

ADV

REQ

(8)

SPIN-PP

S R

ADV

REQ

DATA

(9)

SPIN-EC

S R

(10)

SPIN-EC

S R

ADV

(11)

SPIN-EC

S R

ADV

REQ

(12)

SPIN-EC

S R

ADV

REQ

DATA

(13)

SPIN-EC

S R

(14)

SPIN-EC

S R

ADV

(15)

SPIN-EC

S R

ADV

R

(16)

SPIN-BC, SPIN-RL

S

R

R

R

(17)

SPIN-BC, SPIN-RL

S

R

R R

ADV

ADV

ADV

(18)

SPIN-BC, SPIN-RL

S

R

R

R

(19)

SPIN-BC, SPIN-RL

S

R

R R

REQ REQ

(20)

SPIN-BC, SPIN-RL

S

R

R

R

(21)

SPIN-BC, SPIN-RL

S

R

R R

DATA

DATA DATA

(22)

SPIN-BC, SPIN-RL

S

R

R

R

(23)

Directed Diffusion

• Destination-initiated (sink) reactive routing technique

• Data is named by an attribute-value pair

• Sensing tasks are initiated in order to match events interests

• All nodes maintain interest cache for each

requested interest

(24)

Interests

item name value

type four-legged animal

interval 20 ms

duration 10 s

rect [-100, 100, 200, 400]

(25)

Returned Data

item name value

type four-legged animal coordinates [125, 220]

intensity 0.6

confidence 0.85

timestamp 01:20:40

(26)

Directed Diffusion

N

N

N

N N

(27)

Directed Diffusion

N

N

N

N N

(28)

Directed Diffusion

N

N

N

N N

(29)

Directed Diffusion

N

N

N

N N

(30)

Directed Diffusion

N

N

N

N N

(31)

Directed Diffusion

N

N

N

N N

(32)

Directed Diffusion

N

N

N

N N

(33)

Directed Diffusion

N

N

N

N N

(34)

Interest Cache

• Periodically purged

• No information about sink

• Gradient table

rate per neighbor

timestamp

expiration

(35)

Interest Forwarding

• When new interest/task is received, add to cache

• Simplest policy: rebroadcast interest

• No way of distinguishing new interests from repeated ones

• Set up (very low rate) gradients between all

neighbors

(36)

Message propagation

• A node matching an interest generates replies at desired rate

• When receiving a reply, lookup interest cache

• Forward along given route(s) if found, drop otherwise

• Loop prevention

(37)

Directed Diffusion

E

N

N

N N

(38)

Directed Diffusion

E

N

N

N N

(39)

Directed Diffusion

E

N

N

N N

(40)

Directed Diffusion

E

N

N

N N

(41)

Directed Diffusion

E

N

N

N N

(42)

Directed Diffusion

E

N

N

N Reinforcement N

request

(43)

Directed Diffusion

E

N

N

N Reinforcement N

request

(44)

Directed Diffusion

E

N

N

N Reinforcement N

request

(45)

Directed Diffusion

E

N

N

N Reinforcement N

request

(46)

Directed Diffusion

E

N

N

N Reinforcement N

request

(47)

Reinforcement

• Sink can reissue the same request with a higher rate

• “Draw down” higher quality data from a particular neighbor

• Other nodes react when receiving

• “Outflow” increased, must reinforce

another node to increase “inflow”

(48)

Directed Diffusion

E

N

N

N S

(49)

Directed Diffusion

E

N

N

N S

(50)

Directed Diffusion

E

N

N

N S

(51)

Directed Diffusion

E

N

E

N N

(52)

Directed Diffusion

E

N

E

N N

(53)

Directed Diffusion

E

N

E

N N

(54)

Directed Diffusion

E

N

N

N N

(55)

Directed Diffusion

E

N

N

N N

(56)

Directed Diffusion

E

N

N

N N

(57)

Directed Diffusion

E

N

N

N N

(58)

Directed Diffusion

E

N

N

N N

(59)

Directed Diffusion

E

N

N

N N

(60)

Directed Diffusion

Local algorithm policies

Propagating interests

• flood, cache information, GPS

Setting up gradients

• first heard neighbor, highest energy

neighbor

(61)

Directed Diffusion

Local algorithm policies

Data transmission

• single path, striped multi-path, multiple sources, etc.

Reinforcement

• observer losses, resources levels, etc.

(62)

Energy Aware Routing

• Similar to Directed Diffusion

• destination initiated

• initial flooding to discover routes

• several sub-optimal paths can be used

(with a probabilistic distribution)

(63)

Energy Aware Routing

E

N

N

N N

(64)

Energy Aware Routing

E

N

N

N N

(65)

Energy Aware Routing

E

N

N

N N

0.3 0.3 0.4

1 1

1

1

(66)

Medium Access

Control

(67)

Classical Approaches

FDMA: Frequency division multiple access

TDMA: Time division multiple access

CDMA: Code division multiple access

CSMA: Carrier sense multiple access

CD: Collision detection

CA: Collision avoidance

(68)

Classical Approaches

FDMA: Frequency division multiple access

TDMA: Time division multiple access

CDMA: Code division multiple access

CSMA: Carrier sense multiple access

CD: Collision detection

CA: Collision avoidance

One frequency available

(69)

Classical Approaches

FDMA: Frequency division multiple access

TDMA: Time division multiple access

CDMA: Code division multiple access

CSMA: Carrier sense multiple access

CD: Collision detection

CA: Collision avoidance

One frequency available

One code available

(70)

Classical Approaches

FDMA: Frequency division multiple access

TDMA: Time division multiple access

CDMA: Code division multiple access

CSMA: Carrier sense multiple access

CD: Collision detection

CA: Collision avoidance

One frequency available

One code available

Can’t listen while transmitting

(71)

Hidden Terminal problem

S1 R S2

(72)

Hidden Terminal problem

S1 R S2

(73)

Hidden Terminal problem

S1 R S2

(74)

Hidden Terminal problem

S1 R S2

(75)

Hidden Terminal problem

S1 R S2

(76)

Exposed Terminal Problem

R1 S1 S2 R2

(77)

Exposed Terminal Problem

R1 S1 S2 R2

(78)

Exposed Terminal Problem

R1 S1 S2 R2

(79)

Exposed Terminal Problem

R1 S1 S2 R2

(80)

Exposed Terminal Problem

R1 S1 S2 R2

(81)

IEEE 802.11 RTS/CTS

S R

(82)

IEEE 802.11 RTS/CTS

S R

ADV RTS

(83)

IEEE 802.11 RTS/CTS

S R

ADV

REQ

RTS

CTS

(84)

IEEE 802.11 RTS/CTS

S R

ADV

REQ

DATA

RTS

CTS

(85)

IEEE 802.11 RTS/CTS

S1 R S2

(86)

IEEE 802.11 RTS/CTS

S1 R S2

(87)

IEEE 802.11 RTS/CTS

S1 R S2

(88)

IEEE 802.11 RTS/CTS

S1 R S2

(89)

IEEE 802.11 RTS/CTS

S1 R S2

(90)

IEEE 802.11 RTS/CTS

S1 R S2

(91)

IEEE 802.11 RTS/CTS

S1 R S2

(92)

IEEE 802.11 RTS/CTS

S1 R S2

(93)

IEEE 802.11 RTS/CTS

S1 R S2

(94)

IEEE 802.11 RTS/CTS

R1 S1 S2 R2

(95)

IEEE 802.11 RTS/CTS

R1 S1 S2 R2

(96)

IEEE 802.11 RTS/CTS

R1 S1 S2 R2

(97)

IEEE 802.11 RTS/CTS

R1 S1 S2 R2

(98)

IEEE 802.11 RTS/CTS

R1 S1 S2 R2

(99)

IEEE 802.11 RTS/CTS

R1 S1 S2 R2

(100)

IEEE 802.11 RTS/CTS

R1 S1 S2 R2

(101)

Duty Cycling

Reduces idle listening time

• Sensors switch between sleep and active mode

Suits low traffic networks

• If data rate is very low, it is not necessary to keep sensors listening all the time

(102)

Duty Cycling

Sleeping Listening

1 second

(103)

Duty Cycling

Sleeping Listening 1 second

Data sampling

(104)

Duty Cycling

Sleeping Listening 1 second

Data sampling

Extra Latency

(105)

Duty Cycling

Sleeping Listening

Sleeping Listening

A

B

(106)

Duty Cycling

Sleeping Listening

Sleeping Listening

A

B

Message Sending

(107)

Duty Cycling

Sleeping Listening

Sleeping Listening

A

B

Message Sending Extra Latency

(108)

Duty Cycling

Sleeping Listening

Sleeping Listening

A

B

Sleeping Listening

Listening Sleeping

(109)

Duty Cycling

Sleeping Listening

A Sleeping Listening

Sleeping Listening

B Sleeping Listening

(110)

Duty Cycling

Sleeping Listening

A Sleeping Listening

Sleeping Listening

B Sleeping Listening

long period

(duty period * #of hops)

(111)

Time Synchronization

(112)

Time Synchronization

(113)

Time synchronization

Definition: providing a common time scale for local clocks of nodes in the

network

• Stamp event, duration between events, order events

• No global clock of shared memory

(114)

Time Synchronization

C p (t) = a p t + d p a p : clock frequency

d p : offset

(115)

Remote Clock Reading

B

A T 0 T 1

T B

(116)

Remote Clock Reading

B

A T 0 T 1

T B

T B (T 1 ) = T B + T 1 − T 0

2

(117)

Time Transmission

B

A

T 1

T 1 T 2

T 2

T n

T n

R 1 R 2 R n

(118)

Time Transmission

B

A

T 1

T 1 T 2

T 2

T n

T n R 1 R 2 R n

T B (R n ) = R n

� 1 n

� n

R i − 1 n

� n

T i

+ d

(119)

Offset Delay Estimation

B

A T 0

T 0

T 1 T 2

T 3

T 0 , T 1 , T 2

(120)

Offset Delay Estimation

B

A T 0

T 0

T 1 T 2

T 3

T 0 , T 1 , T 2

∆ = (T 1 − T 0 ) − (T 3 − T 2 )

2

(121)

Offset Delay Estimation

B

A T 0

T 0

T 1 T 2

T 3

T 0 , T 1 , T 2

∆ = (T 1 − T 0 ) − (T 3 − T 2 )

2 d = (T 1 − T 0 ) + (T 3 − T 2 )

2

(122)

Set Valued Estimation

B

A T 0

T B

T r

(123)

Set Valued Estimation

B

A T 0

T B

T r

(t) = (t) +

(124)

Set Valued Estimation

B

A T 0

T B

T r

(t) = (t) +

T 0 < a AB T B + d AB T r > a AB T B + d AB

(125)

Conclusion

(126)

Sensor Networks

• Driven by applications

• Connexion between Computer Science and Biology, Environment, Rescue, etc.

• Hard problems yet to be solved

Références

Documents relatifs

With the dimension shrink and the clock frequency increase, power consumption, delay time and parasitic crosstalk level require a strong decrease in order to maintain

In addition we establish new bounds for the effective conductivity, which are asymptotically optimal for mixtures of three isotropic phases among a certain class of

In outdoor tests nodes were spread across several acres of rugged terrain with an average density of 1 mote per 10,000 sq ft and at full radio power. Statistical analysis across

Thus each mathematical symbol (G, L,. .) has a single definite meaning inside each exercise, but might have different meanings from an exercise to another.. It is not required to

Jiang, “enhancing the security of mobile applications by using tee and (u)sim,” in Proceedings of the 2013 IEEE 10th International Con- ference on Ubiquitous Intelligence

This second definitional strategy means that these artists think of their artistic practice as belonging simultaneously to two artistic fields: in this case, music and one

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

In a response to our critique, Rockström and colleagues described their ideas ‘ in a nutshell, if the tipping point is the cliff, the planetary boundary is the fence near the