IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and...
Transcript of IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and...
![Page 1: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/1.jpg)
IN4316 IN4316 –– Lecture 2Lecture 2AdAd--hoc and Sensor Networkshoc and Sensor Networks
IN4316 IN4316 –– Lecture 2Lecture 2AdAd--hoc and Sensor Networkshoc and Sensor NetworksAdAd hoc and Sensor Networkshoc and Sensor NetworksAdAd hoc and Sensor Networkshoc and Sensor Networks
Koen LangendoenKoen LangendoenPhilipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer
Andreas Andreas LoukasLoukas, , AnreiAnrei PruteanuPruteanu, Matthias , Matthias WoehrleWoehrle
![Page 2: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/2.jpg)
O tli di i t f i lOutline: discuss impact of wireless
• Ad-hoc networks– link layer: medium access control– link layer: medium access control– network layer: routing– transport layer: TCP/IP– transport layer: TCP/IP
• Sensor networks– localization– data processingdata processing– deployments
![Page 3: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/3.jpg)
Ad h t kAd-hoc networks
• Each node is willing to forward data• NO dedicated routing hardware• NO dedicated routing hardware
– resilient to node/link failures
![Page 4: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/4.jpg)
Wi l d h t kWireless ad-hoc networks
• Mobile Ad-Hoc Networks (MANETS)• Mesh Networks (e g MIT roofnet)• Mesh Networks (e.g., MIT roofnet)• Sensor Networks
![Page 5: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/5.jpg)
Wi l i b d t diWireless is a broadcast medium
• Pictures are misleading– communication links are 3D– communication links are 3D– transmissions may interfere
![Page 6: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/6.jpg)
Si l ti Signal propagation ranges
• Transmission range– communication is possiblecommunication is possible– low error rate
• Detection range senderDetection range– detection of the signal– no communication
transmission
• Interference range– signal may not be detected
distancedetection
interferenceg m y– signal adds to the background noise
![Page 7: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/7.jpg)
F bit t k tFrom bits to packets
• Physical layer– coded modulated bitstream– coded, modulated bitstream– BER: Bit-Error-Rate– RSSI: Received Signal Strength Indicator– RSSI: Received Signal Strength Indicator
bl t t l CRCd t l dMAC hdCC1000/TinyOS/B-MAC
• Link layer– packets: header + data payload + CRC
preamble8
start2
len1
CRC2
data payloadup to 29
MAC hdr4
packets header data payload CRC– PER: Packet-Error-Rate
![Page 8: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/8.jpg)
Li k l ti Link-layer propagation ranges
2200
2300
RSSI = 1/distα1
1.2
e
2100
SI
0.8
eptio
n ra
te
EYES node1900
2000
RS
0.4
0.6
acke
t rec
e
EYES node
1700
1800
0
0.2Pa
17000 5 10 15 20 25 30 35 40
Distance (metre)
00 5 10 15 20 25 30 35 40
Distance (metre)
Gray area effect [Zhao:2003]
![Page 9: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/9.jpg)
Li k l & lti th f diLink-layer & multipath fading
CC2420 @ 2.4 GHz, power = -1dBm, 2am
0 50.6
0.70.8
0.9
100
0 0.1 0.2 0 3 0 10.2
0.30.4
0.5
0
50% goody (lambda)
0.3 0.4 0.5 0.6 0.7 0.8 0.90
0.1
x (lambda)
[Robert Poor, Ember corp.]
![Page 10: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/10.jpg)
Medium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access Controlbackgroundbackgroundbackgroundbackground
![Page 11: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/11.jpg)
M di A C t lMedium Access Control
Control access to the shared radio channel• avoid interference between transmissions• avoid interference between transmissions• mitigate effects of collisions (retransmit)
History 802.11
ALOHACSMA MACA
MACAW S-MACS MAC1970 1980 1990 2000 2010
![Page 12: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/12.jpg)
M di A C t lMedium Access Control
Control access to the shared radio channel• avoid interference between transmissions• avoid interference between transmissions• mitigate effects of collisions (retransmit)
Approachest ti b d di ti • contention-based: no coordination
• schedule-based: central authority (access pt)
![Page 13: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/13.jpg)
C lli i b d MAC t lCollision-based MAC protocols
ALOHA :• packet radio networks• packet radio networks• send when ready• 18-35% channel utilization
CSMA (C i S M lti l A )CSMA (Carrier Sense Multiple Access):• “listen before talk”• 50-80% channel utilization
![Page 14: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/14.jpg)
Hidd t i l blHidden terminal problem
A B C
Tim
cs
mecs
csCarrier sense at sender may not sender may not prevent collision at receiver
![Page 15: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/15.jpg)
CSMA/CA C lli i A idCSMA/CA: Collision Avoidance
A B C
MACA:• Request To Send
Tim
csRequest To Send• Clear To Send• DATA
mecs
BDATA
MACAW (Wireless)
Blocked( )• additional ACK
![Page 16: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/16.jpg)
E d t i l blExposed terminal problem
A B C D
Parallel CSMA Tim
csParallel CSMA Parallel CSMA transfers
mecsParallel CSMA
transfers are serialized by B
cs
yCSMA/CA
Collision avoidance
Blocked
Collision avoidance can be too restrictive!restrictive!
![Page 17: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/17.jpg)
IEEE 802 11IEEE 802.11
Operation• infrastructure mode (access point)infrastructure mode (access point)• ad-hoc mode
Power save mechanism; not for multi-hop
P t lProtocol• carrier sense• collision avoidance (optional)
![Page 18: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/18.jpg)
IEEE 802 11IEEE 802.11
RTS DATA
Sender
SIFSDIFS
Receiver( )
SIFS SIFS DIFSACKCTS
OthersNAV(RTS)NAV(CTS)
Contention Window
Network Allocation Vector (NAV)• collision avoidance• collision avoidance• overhearing avoidance: other nodes may sleep
![Page 19: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/19.jpg)
S h d l b d MAC t lSchedule-based MAC protocols
Communication is scheduled in advance• no contentionno contention• no overhearing• support for delay-bound traffic (voice)pp y ( )
Time-Division Multiple Accessi i di id d i l d f• time is divided into slotted frames
• access point broadcasts schedulec din ti n b t n c lls qui d• coordination between cells required
![Page 20: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/20.jpg)
TDMATDMAF F 2F 1Frame n Frame n+2Frame n+1
TC CPdownlink uplink
Typical WLAN setup
TC CPdownlink uplink
Typical WLAN setup• no direct communication between nodes• access point broadcast Traffic Control (TC) mapaccess point broadcast Traffic Control (TC) map• (new) nodes signal needs in Contention Period (CP)
![Page 21: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/21.jpg)
R i t f S N t kRequirements for Sensor Networks
Handle scarce resources• CPU: 1 – 10 MHz• CPU: 1 – 10 MHz• memory: 2 – 4 KB RAM• radio: ~100 Kbps• radio: ~100 Kbps• energy: small batteries
Unattended operation• plug & play robustness
throughputlatency energyplug & play, robustness
• long lifetimefairness
WLAN WSN
![Page 22: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/22.jpg)
C i ti ttCommunication patterns
WSN applications:• local collaboration when • local collaboration when
detecting a physical phenomenon• periodic reporting to sink
local gossipperiodic reporting to sink
Characteristics:• low data rates• small messages
<1000 bps
~25 bytesg• fluctuations (in time and space)
convergecast[ lk 200 ]
y
[Kulkarni:2004]
![Page 23: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/23.jpg)
Di ti lit i tDirectionality experiment
350
400
250
300
t m
sg/s
150
200
good
put
CSMA directed
CSMA random
100
150g
0
50
0 100 200 300 400 500 600 700 800 900 1000input msg/s
![Page 24: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/24.jpg)
LocalizationLocalizationLocalizationLocalizationLocalizationLocalizationLocalizationLocalizationintroductionintroductionintroductionintroduction
![Page 25: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/25.jpg)
Th l li ti blThe localization problem
Scenario:• install nodes• install nodes• determine positions
Choices:i f t t d h
(0,0)
• infrastructure vs. ad-hoc• connectivity vs. ranging• centralized vs. distributed GPS
TargetTargetSynchronization channelRanging channel
![Page 26: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/26.jpg)
Ad h l li tiAd-hoc localization
• Many nodes (> 100)• NO infrastructure• NO infrastructure• NO central processing• Sparse anchor nodes
– known position(0,0)
p
• Other nodes determine their position using– anchor locationsanchor locations– distance measurements
![Page 27: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/27.jpg)
R i T h l iRanging Technologies
• Received Signal Strength Indicator (RSSI)– extremely noisy (reflections)extremely noisy (reflections)– calibration– omi-directional (sort of)
range: ~10 maccuracy: ~2-3 m ( )
• Ultrasonic time-of-flight g– (clock synchronization)– time-difference with RF range: ~10-30 m
accuracy: ~2 5 cm– lope-shape beam angle
accuracy: ~2-5 cm
![Page 28: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/28.jpg)
R f l li tiRange-free localization
Algorithms:• Centroid [Bulusu2000]• Centroid [Bulusu2000]• Convex optimization [Doherty2001]• DV hop [Niculescu2001]• DV-hop [Niculescu2001]
Results:Results• many anchors needed • poor accuracy: > 5 Radio rangepoor accuracy: > .5 Radio range
t idcentroid
![Page 29: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/29.jpg)
R b d l li tiRange-based localization
Algorithms:• Multihop lateration [Savvides2001]• Multihop lateration [Savvides2001]• Robust positioning [Savarese2002]• APS [Niculescu2001]• APS [Niculescu2001]
Lateration:Lateration• intersect circles, solve [Ax=b]• redundancy to handle errorsredundancy to handle errors
– range measurements– sparse anchor scenariosparse anchor scenario
![Page 30: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/30.jpg)
L li ti i t kLocalization in sensor networks
Algorithms must limit• processing• processing• communication
but fail to do sol t ti i li N N t i i t• lateration implies NxN matrix invert
• periodic beaconing or flooding overheads
![Page 31: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/31.jpg)
RoutingRoutingRoutingRoutingRoutingRoutingRoutingRoutingbackgroundbackgroundbackgroundbackground
![Page 32: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/32.jpg)
Th ti blThe routing problem
Find path between S and D• ad hoc network• ad-hoc network• unique node IDs
B
EF
S
• [mobile nodes] B
A
C
G D
H
I
![Page 33: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/33.jpg)
Cl ifi ti f ti t lClassification of routing protocols
Table-driven (proactive)• Each node maintains a routing table (to all others)Each node maintains a routing table (to all others)• Topology changes are immediately propagated• DSDV, OSLR, WRP, CGSR, … maintenance vs discovery costDSDV, OSLR, WRP, CGSR, …
Source-initiated (reactive / on-demand)maintenance vs discovery cost
• Nodes maintain only information for active destinations• Explicit route discovery (flooding)• [Route maintenance procedure used to repair routes]• AODV, DSR, TORA, SSR, …
![Page 34: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/34.jpg)
AODVAd Hoc On-Demand Distance Vector Routing
• Now RFC 3561, based on DSDV• Source sends Route Request Packet (RREQ) • Source sends Route Request Packet (RREQ)
when a route has to be foundR t R l P k t (RREP) i t b k b • Route Reply Packet (RREP) is sent back by destination
• Route Error messages update routes
![Page 35: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/35.jpg)
R t R t i AODVRoute Requests in AODV
Broadcast transmission
S
B
S EF
C
AH
C
G D
I
Represents transmission of RREQ
![Page 36: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/36.jpg)
R t R t i AODVRoute Requests in AODV
S
B
S EF
C
AH
C
G D
I
Represents links on Reverse Path
![Page 37: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/37.jpg)
R t R l i AODVRoute Reply in AODV
S
B
S EF
C
AH
DC
G
I
Represents links on path taken by RREP
![Page 38: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/38.jpg)
R ti t bl i AODVRouting tables in AODVNextDistDest
NextDistDest
SC2GE3D
NextDistDest
D1DNextDistDest
F2D
B
S EF
C
D1D
AH
DC
G
I
![Page 39: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/39.jpg)
R t i t i AODVRoute maintenance in AODV
S
S initiates new route discovery
B
S EF
C
AH
DC
G
I
Represents transmission of RERR
![Page 40: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/40.jpg)
R ti i t k ?Routing in sensor networks?
Often not needed!• local gossip: broadcast• local gossip: broadcast• convergecast: spanning tree• sink-to-nodes: floodingRouting table has one entry (to-sink)g y ( )
Application level solutions (in band signaling)Application-level solutions (in-band signaling)
![Page 41: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/41.jpg)
R ti i t k !Routing in sensor networks!
Problem: dynamic environment• link/node failures• link/node failures• multiple/mobile sinks• node mobility
S l tiSolutions:• factor in link quality: ETX (Expected #hops) • factor in location info: geographical routing
![Page 42: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/42.jpg)
Presentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsdos & don’tsdos & don’tsdos & don tsdos & don ts
![Page 43: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/43.jpg)
S k ’ i t tiSpeaker’s instructions
• Preparations– contact your special topic instructor contact your special topic instructor – browse recent literature– propose paper for presentation (-1 week)p p p p p ( )– prepare Powerpoint slides (-2 days)
P f• Performance– bring your own laptop OR a USB memory stick
OR send Koen an e-mail (before 10:30)OR send Koen an e-mail (before 10:30)– present paper + lead discussion
![Page 44: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/44.jpg)
L i Less is more
DO• max 6 bullets per slidemax 6 bullets per slide
DON’T• write full sentences (because that gets your audience
reading instead of paying attention to what you have to say, especially when you have to use a small font size to cramp it especially when you have to use a small font size to cramp it all on a single page!)
• use fancy fonts (sans serif is best)s fancy fonts (sans serif is best)• use animations (for experts only ☺)
![Page 45: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/45.jpg)
A i t i th th d dA picture is worth a thousand words
DO• use illustrations/graphs/tables (1 per slide)• use illustrations/graphs/tables (1 per slide)• use color
DON’Th d li ti• show code listings
• show mathematical proofs
![Page 46: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/46.jpg)
P ti k f tPractice makes perfect
DO• rehearse your talk (and timing)• rehearse your talk (and timing)
DON’Tit t t• recite your text
• run over time
![Page 47: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/47.jpg)
B d lBody language
DO• speak with your hands• speak with your hands• interact with your audience
DON’Tt t h /l t /• stare at your shoes/laptop/me
• turn your back to the audience when pointing at your slides
![Page 48: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer](https://reader033.fdocuments.us/reader033/viewer/2022050117/5f4da8be4673135f02181901/html5/thumbnails/48.jpg)
H kHome work
• Read “classic” MAC papers– S-MAC (contention-based)– S-MAC (contention-based)– LMAC (TDMA)
• Submit summary† via CPM– 300 500 words– 300-500 words– PDF format
deadline: September 21st 10:00 (day of each class)– deadline: September 21st, 10:00 (day of each class)
† it is forbidden to copy&paste complete † it is forbidden to copy&paste complete sentences out of the original articles