dof- duplicate detectable opportunistic forwarding-slides

21
DOF: Duplicate Detectable Opportunistic Forwarding in Duty- Cycled Wireless Sensor Networks Daibo Liu 1 , Zhichao Cao 2 , Jiliang Wang 3 , Yuan He 3 Mengshu Hou 1 , Yunhao Liu 3 1 University of Electronic Science and Technology of China 2 Hong Kong University of Science and Technology 3 Tsinghua University 1

Upload: ngocthanhdinh

Post on 16-Jan-2016

13 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DOF- Duplicate Detectable Opportunistic Forwarding-slides

DOF: Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks

Daibo Liu1, Zhichao Cao2, Jiliang Wang3, Yuan He3 Mengshu Hou1, Yunhao Liu3

1 University of Electronic Science and Technology of China

2 Hong Kong University of Science and Technology 3 Tsinghua University

1

Page 2: DOF- Duplicate Detectable Opportunistic Forwarding-slides

CitySee

2

Page 3: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Protocols

• Routing – Collection Tree Protocol (CTP) (SenSys’09)

• Duty-cycled media access – X-MAC

3

t …… ……

I wake up periodically. If I hear nothing, I will go back to sleep!

…… ……

I prepare send a packet. I will not stop sending until the ACK comes!

Page 4: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Drawback

• Waiting long time for the deterministic forwarder wake-up – Longer delay

– Energy waste

4

Page 5: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Opportunistic Forwarding S

R1R4

R3R2

Reliable Link

Bursty Link

5

t S

R1

R2

R3

R4 Take first wake-up and successfully received opportunity.

Page 6: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Drawback

6 6

S

R1R4

R3R2

Reliable Link

Bursty Link

S

R1

R2

R3

R4

Data Data A

Data

Data

Data

A

A

A

R1, R2, and R3 are all active

R1

R2 R3

Shorten the lifetime Traffic jam

Page 7: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Existing Techniques

• Overhearing – Not scalable

– Lossy link

• Coordination – Extra control overhead

7

How to mitigate the influence of the duplicate in a light-weight and efficient way?

Page 8: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Temporal Diversity of ACK

• Split the Acknowledgment (ACK) waiting interval into multiple slot

• Distinguish all potential forwarders by their different ACK time slot

8

0 1 2 3 4 5 6 7

t

ACK Waiting Interval

Probe

Page 9: DOF- Duplicate Detectable Opportunistic Forwarding-slides

DOF Overview

9

S

R1

R2

R3

R4

p p A A0 1 2 3 Data

Data0 A

A

p

p

p

A

A

A

04 1 2 3 S

R1R4

R3R2

Reliable Link

Bursty Link

• Probe (P): detecting available forwarders

• ACK (A): acknowledge the probe in different time slot

• Data: send the data to the forwarder R2

R1

R2 R3

Page 10: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Slot Assignment

10

0 1

0 1 2 ... 9 10 11 12 ... 19 20 21 22 ... 29

Zone 0 Zone 1 Zone 2

Hash

Priority

sequence

Routing progress: D

ACK slot 2 3 4 5 6 7 8 9

Routing progress

Mapping to priority sequence

Mapping to an ACK slot with randomness

Page 11: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Slot Inference

11

• The slot Ks of the received ACK as :

- : preconfigured slot size

slotbasersTTTK /)(

slotT

P Sender P

1T

P A

2T

A

3T

12TTT

base

13TTT

r

the earliest ACK at slot 0 the received ACK

Page 12: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Slot Size

• Large Slot Size – Less ACK slots

– Robust

• Small Slot Size – More ACK slots

– Vulnerable

• Experiments in office environment – Tslot = 0.2ms

12 12

Page 13: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Retransmission

• Data transmission failure – Link failure

– Mismatch of slot information

• Experiments in office environment – link failure is rare

• Link initiated by probe is temporally available

– Maximum number of data transmission is 2

13

Page 14: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Tunnel Transmission

14

S

R1R4

R3R2

Send

Queue

Take the benefit of the probe transmission of the first packet.

Page 15: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Evaluation

• Indoor Testbed with 20

Telosb nodes

• Different traffic loads – Inter Packet Interval (IPI) of

each node is set as 1s, 2s, 4s,

8s and 16s.

• ORW (IPSN’12) – Opportunistic Routing in Wireless

sensor networks

• A-MAC (SenSys’10) + CTP – Receiver initiated duty-cycled

media access

15 15

Page 16: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Duplicate

16

IPI <= 2s, the duplicate ratio ORW: > 80% DOF: < 10%

Page 17: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Packet Reception Ratio

17

IPI <= 2s, the average PRR DOF: > 46.5% improvement

Page 18: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Energy and Delay

18 18

Energy: radio duty cycle DOF : > 21.4% improvement

Delay: average preamble count DOF : as low as ORW

Page 19: DOF- Duplicate Detectable Opportunistic Forwarding-slides

19

DOF is a practical opportunistic forwarding technique tailored

to duty-cycled WSNs.

Conclusion

19

• Exploiting the temporal diversity of ACK

Key design

• Indoor testbeds

• Good performance under various traffic loads

Evaluation

• Large-scale test

• Different hardware

Future works

Page 20: DOF- Duplicate Detectable Opportunistic Forwarding-slides

20

Thank you! Question?

20

Page 21: DOF- Duplicate Detectable Opportunistic Forwarding-slides

Slot Assignment Function

• Fixed slot assignment – Avoid the ACK slot collision

– Extra control overhead

– Lose some opportunities

21