RT-QoS for Wireless ad-hoc Networks of Embedded Systems



Similar documents
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

CSMA/CA. Information Networks p. 1

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

A Transport Protocol for Multimedia Wireless Sensor Networks

How To Make A Multi-User Communication Efficient

Enhanced Power Saving for IEEE WLAN with Dynamic Slot Allocation

Mac Protocols for Wireless Sensor Networks

- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

Performance Monitoring and Control in Contention- Based Wireless Sensor Networks

Halmstad University Post-Print

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Lecture 17: Wireless Networking"

Demystifying Wireless for Real-World Measurement Applications

Real-Time (Paradigms) (51)

Adaptive DCF of MAC for VoIP services using IEEE networks

Dynamic Load Balance Algorithm (DLBA) for IEEE Wireless LAN

Mobile Computing/ Mobile Networks

Latency on a Switched Ethernet Network

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

An experimental test bed for the evaluation of the hidden terminal problems on the IEEE standard

Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks

Wireless Sensor Network: Improving the Network Energy Consumption

... neither PCF nor CA used in practice

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

;l ~~! I!July 1993 Doc: IEEE P /94a. Power Management. The importance of Power Management provisions in the MAC. By: Wim Diepstraten NCR.

Wireless Sensor Networks Chapter 3: Network architecture

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

Energy Optimal Routing Protocol for a Wireless Data Network

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

Can I add a VoIP call?

Lecture 14: Data transfer in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 6, Thursday

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE b Networks

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE

A Mobility Tolerant Cluster Management Protocol with Dynamic Surrogate Cluster-heads for A Large Ad Hoc Network

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet

Real-Time Traffic Support in Heterogeneous Mobile Networks

Improved Digital Media Delivery with Telestream HyperLaunch

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

VoIP in Mika Nupponen. S Postgraduate Course in Radio Communications 06/04/2004 1

Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1

ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

CS263: Wireless Communications and Sensor Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance analysis and simulation in wireless mesh networks

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

How To Analyze The Security On An Ipa Wireless Sensor Network

TCP in Wireless Networks

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

SYSTEM DESIGN ISSUES IN SINGLE-HOP WIRELESS SENSOR NETWORKS

Communication Networks. MAP-TELE 2011/12 José Ruela

On Backoff Mechanisms for Wireless. Mobile Ad Hoc Networks

Energy Constrained Resource Scheduling for Cloud Environment

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

MAC Algorithms in Wireless Networks

Versatile Low Power Media Access for Wireless Sensor Networks

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Wireless LAN Concepts

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

EPL 657 Wireless Networks

ECE/CS 372 introduction to computer networks. Lecture 13

Video Transmission over Wireless LAN. Hang Liu

Chapter 6: Medium Access Control Layer

THE development of media access control (MAC) protocols

Assessing trade-offs between energy consumption and security in sensor networks: simulations or testbeds?

IEEE Ad Hoc Networks: Performance Measurements

A survey on Spectrum Management in Cognitive Radio Networks

Introduction VOIP in an Network VOIP 3

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

A Security Architecture for. Wireless Sensor Networks Environmental

Security in Ad Hoc Network

TCP Behavior across Multihop Wireless Networks and the Wired Internet

A SURVEY OF MAC PROTOCOLS FOR SENSOR NETWORKS

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Metrics for Detection of DDoS Attacks

CSC 774 Advanced Network Security. Outline. Related Work

Figure 1. The Example of ZigBee AODV Algorithm

QoS issues in Voice over IP

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Transcription:

RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results for embedded systems: Implicit contention & RI-EDF for single hop scenario Real-time chains for multi-hop scenario 2 1

an we deploy a WSN that reacts in real-time (RT-WSNs WSNs)? Example of multi-hop scenario for RT-WSNs Whenever an event of interest is detected, create a RT cluster around it. The cluster should provide 1) high bandwidth, 2) soft real-time guarantee RT-cluster Geographic Forwarding (GF) routing protocol can be used to establish a communication flow between the RT cluster and the sink. NRT prio2 A notion of priority is needed to properly schedule the shared wireless channel among different real-time flows. RT-WSNs will support audio/video streaming and enhance existing sensor network applications such as surveillance, environmental monitoring, etc. RT-cluster prio1 sink 3 hallenges when providing RT-QoS Important attributes when providing temporal QoS in wireless ad-hoc networks of embedded systems prioritization of Medium Access robustness power awareness dynamic handling of mobile nodes scalability (multi-hop) adaptation to dynamic workloads Two main challenges need to be addressed: a) Mitigate/avoid packet collisions on wireless channel, b) Avoid unbounded priority inversions when accessing wireless medium. 4 2

Some new ideas and results for embedded systems We developed RI-EDF protocol for the single-hop case. Major strengths are robustness, high bandwidth, soft RT guarantee, and low jitter We introduced the novel idea of Real-Time hain for the multi-hop case. It allows to establish multi-hop soft real-time data flows on-demand. Real-Time hains: are characterized by a priority, are compatible with IEEE 802.15.4 (after a minor modification to the standard). do not require synchronized clocks or regular network structure. support slow mobility (lifetime of existing routes is of the order of seconds); 5 RT Wireless: assumptions for the single hop case Most existing wireless protocols make the underlying assumption that the network traffic is intrinsically random this assumption usually does not hold in real-time networks! e.g.: nodes do not randomly connect with or download files (ftp) from remote nodes. Traffic is rather predictable Assumptions (single hop scenario): clocks are not synchronized nodes are fully linked (proven to be conflict free! low probability of collisions & graceful degradation if network is not fully-linked if a node fails, it cannot use its transceiver an attacker can jam the medium but cannot alter packet s content Requirements: robustness against node failures, packet losses, and transient jamming 6 3

Robust Implicit EDF RI-EDF is a robust asynchronous real-time Medium Access protocol B A A A B B A A A B B A A A B B 0 4 8 12 16 20 24 nodes use implicit contention: periodic nature of sensor data streams, once initialized, allows for EDF scheduling via implicit contention no contention phase, no conflicts, no backoff it provides resource reclaiming of spare bandwidth (budget exchange) no single point of failure: no matter what node fails, communication is always recovered by the other nodes 7 Implicit prioritized medium access using RI-EDF Distributed scheduling among fully linked nodes EDF scheduler is replicated at each node Static priority node message length period A 3 8 B 1 6 1 8 1 4 max packet length (blocking time) j Msg # j,1 " j " n! T k = 1 k k $ + T j " 1 This table is stored in each node Message set is schedulable! B A A A B B 0 4 8 A A A B 12 B 16 A A A 20 B B 8 24 4

Implicit prioritized medium access using RI-EDF What s new? Two level packet scheduling EDF packet schedule (normal operation) Static priority scheduling (recovery) Variable packet length power awareness no clock synchronization It recovers the EDF schedule in spite of packet loss, node failures EDF schedule Static priority node message length period A 3 8 B 1 6 1 8 1 4 This table is stored in each node B A A A B B A A A B B A A A B B 9 0 4 8 12 16 20 24 Bandwidth reservation for QoS provisioning Due to lack of clock synchronization, the transmission time is budgetted to avoid bandwidth stealing/starvation. Variable packets size and early completions are handled by means of forwarded budget 10 5

Schedule Recovery No matter what node fails, each alive node has the capability to recover the schedule (there is no single point of failure) distributed state Highest priority node has the shortest recovery timer Each successful packet reception is a synchronization point in the schedule 11 Power awareness Drawback of basic RI-EDF: channel is always fully utilized! The following set of rules extends RI-EDF to be power aware: Nodes divided among sources and sinks (sinks collect & process source data). An example of source is a sensor node. Packet header has information whether the transmitter is a source or sink. Sinks have higher static priority compared to sources Sinks send periodically a beacon to solicit data from sources If a source node N does recovery, its recovery mechanism is disabled, it can still send P data packets before transmission is completely disabled. Recovery and normal transmission are re-enabled upon reception of a sink s packet. Sink nodes don t disable their recovery mechanism unless they sleep 12 6

Power awareness Nodes can arbitrarily go to sleep and periodically wake up. The recovery mechanism efficiently fills up the gaps in the EDF packet schedule The described set of rules provides the following features: Sink nodes can disable source nodes if they are not interested in actual transmitted data. If a source node is out of the range of all sinks, its transmission capability will temporarily be disabled. Sinks can suspend their normal communication (sleeping mode), transmitting only a beacon periodically. Even if the real-time packet schedule is suspended, the periodic beacon can reactivate it on demand. 13 Experiments with Berkeley Motes omparison of current consumption 5 sources generated random real-time traffic Throughput ranging from 200 to 1000 bytes/sec Each source disabled its radio between transmission requests RI-EDF 14 7

Relaxing RI-EDF assumptions & hidden node problem In adverse environment, RI-EDF faces the hidden node problem The medium is not anymore conflict free, but RI-EDF exploits the notion of Recovery Group to achieve robustness and low probability of conflicts 15 Dynamic schedule update It uses a packet train reservation at end of hyperperiod Prioritization of medium access during schedule update handshake: Schedule announcement after join request (highest static priority for leader) Schedule update requests and Join requests (new priority level) Unrequested schedule announcement (driven by standard recovery priorities) Static priority reservation reservation reservation 16 8

Experiments with Berkeley Motes Berkeley Mica2 Motes:7 sources / 1 sink Network throughput and packet jitters are evaluated comparing RI-EDF with original MA protocol of TinyOS version 1.1.0 Packet jitters are evaluated by timestamping packets in the MA layer of the receiver. Packet overhead: RI-EDF uses 5 bytes for sender ID, schedule, and budget max. available payload 28 bytes. Overhead is two extra bytes 17 Experiments with Berkeley Motes throughput analysis RI-EDF allows 26% increase in Tx data Maximum Total: RI-EDF Total: TinyOS Data: RI-EDF Data: TinyOS 18 9

Experiments with Berkeley Motes Jitter analysis: 3 Motes are sending traffic at 30Hz, 30Hz, and 10Hz. We monitored the traffic of one of them. 19 Testbed for wireless distributed control Inverted pendulum uses a remote camera to track the cart position. Images are processed locally and cart position is transmitted by wireless Additional real-time flows can be guaranteed by means of RI-EDF Motes are used either as standalone units or as P transceiver See http://pertsserver.cs.uiuc.edu/~mcaccamo/ip/index.htm 20 10

Experiments with Berkeley Motes Quadratic Error Index: T 1 2 2 2 QEI = w x t w t w V t dt T! 1 " ( ) + 2"# ( ) + 3" ( ) 0 TinyOS MA protocol could only provide stable control at 30Hz. The default backoff period had to be reduced to provide stable control since the default value could not keep the inverted pendulum balanced. RI-EDF provides stable control at a lower frequency compared to TinyOS. 21 The multi-hop scenario: Real-Time hains Multi-hop scenario for RT-WSNs Real-time chains are prioritized real-time data flows (subject to soft real-time guarantee) that can coexist with non-realtime (SMA/A like) traffic. NRT RI-EDF prio1 Assumptions: network structure is NOT regular, nodes are statically located or slow moving (lifetime of existing routes is of the order of seconds); do not require synchronized clocks RI-EDF prio2 sink 22 11

The multi-hop scenario: Real-Time hains Each soft real-time flow is characterized by a priority Real-time packets as a group are given precedence over best effort traffic MA layer 8 fixed priorities (real-time traffic) SMA-A (IEEE 802.15.4) (background traffic) Base Station Help! 23 Background: Black-Burst contention scheme p 1 N 1 N 2 p 2 N 1 T_idle p 1 N 2 T_idle Senders synchronize on transition from busy to idle channel. Each sender transmits a BB with length proportional to its packet priority. The longest BB wins the contention. Transmissions using different priorities are collision-free in the absence of hidden nodes. Hidden nodes are avoided when sensing range (R S ), interference range (R I ) and communication range (R ) satisfy the following condition: R +R I R S J. L. Sobrinho and A. S. Krishna kumar. Quality-of-Service in ad hoc carrier sense multiple access networks. IEEE Journal on Selected Areas in ommunications, 17(8):1353 1368, August 1999. 24 12

MA & Real-Time: problem of unbounded priority inversion N 1 N 2 N 3 p 2 p p 3 2 N 1 N 2 p 3 p 1 N 3 t 0 t 1 t 2 blocking due to lower priority packets When p 2, p 3 end (at t 1,t 2, etc.), the channel is never idle for N 1 unbounded priority inversion Assumptions: work conserving policy that waits for idle channel before transmitting local knowledge about traffic, no future knowledge about packet arrivals. 25 MA & Real-Time: problem of unbounded priority inversion N 1 p 1 N 2 N 3 p 2 p p 3 2 N 2 N 1 p 3 p 1 N 3 t 1 t 2 blocking due to lower priority packets blocking due to higher priority packets N 2 should be blocked at t 1 to free the channel for N 1. Requirement for a real-time MA: N 1 should force a new synchronization point within bounded time. Real-time chains approximate this behavior. t 0 26 13

Real-time chains for multi-hop ad-hoc wireless Design choices driven by experimental data: a) Since the condition R +R I R S holds, the hidden node problem wasn t a main concern A MA protocol like Black-Burst eliminates packet collisions under the assumption that two different nodes do not try to contend for the channel with the same priority at the same time. During our experimental testing of intersecting real-time chains, we did not experience collisions due to the hidden node problem. Remark: Even when R +R I > R S, the number of potential hidden nodes is expected to be limited and only due to intersecting chains contending on the same channel (more experiments are needed!). 27 Real-time chains for multi-hop ad-hoc wireless Design choices driven by experimental data: b) Both sensing and interference ranges were much larger than what commonly assumed, Sensing range was about 7 times larger than the reliable communication range. (we tested low power, 802.15.4 compliant transceiver of MIAz) channel reuse was extremely low and flow bandwidth could not be higher than B/8 unless multiple channels were used (no more than one intermediate node every 8 could simultaneously transmit) 28 14

Real-time chains for multi-hop ad-hoc wireless What is a real-time chain? a) it uses a set of channels reserved for real-time traffic: [1,..,] b) Each chain has a real-time priority (we have an implementation with 4 distinct priorities) c) All best effort traffic shares channel 0; hence, best effort traffic cannot interfere with real-time traffic. 29 Real-time chains for multi-hop ad-hoc wireless What is a real-time chain? d) The chain opening request is transmitted on channel 0 using the BB scheme: it has higher priority over best effort traffic (SMA/A of 802.15.4) and it uses geographic forwarding as routing protocol. e) Nodes used by a chain are not available for other real-time/non real-time communication until the chain is closed. f) it allows good spatial reuse of the wireless medium by exploiting multiple channels g) MIAz transceiver can support three groups of chain channels [1-5], [6-10], [11-15] at most 12 different chains can co-exist within the same region without conflicting. 30 15

Real-time chains for multi-hop ad-hoc wireless Real-time chain is compatible with IEEE 802.15.4 (after a minor modification to the IEEE standard) Each node with best effort traffic must sense idle channel for a long interframe spacing t long > t med before having the right of transmitting. This modification ensures that real-time packets as a group are given precedence over best effort traffic. 31 Real-time chains for multi-hop ad-hoc wireless Example of a single real-time chain Whenever the buffer is empty, the node listens on its reception channel and immediately acknowledges any packet sent to it. If the id of the received packet is greater than the counter, its value is updated and the packet is copied in the buffer. Upon copying a packet in the buffer, the node switches to its transmission channel and uses the BB contention scheme to transmit the packet. While the buffer is full, the node does not acknowledge any packet sent to it. If the node receives an AK after winning a BB contention and sending the packet, it removes it from the buffer and switches back to listening. Otherwise, it contends again on 32 the transmission channel until it correctly receives an AK. 16

Real-time chains for multi-hop ad-hoc wireless Starvation problem during chain opening Heuristic to mitigate starvation problem: If N i perceives the channel busy for more than t max, it jams channel 0 with a high-power jamming signal. The signal lasts for t max and the power is high enough that it is reliably perceived by all nodes that N i is able to sense. After the jamming signal, all communication within the neighborhood of N i should have stopped. In the absence of higher priority packets, N i wins the channel contention and transmits the packet. 33 Real-time chains for multi-hop ad-hoc wireless A timeout mechanism together with Signal and lose states allow to detect and quickly recover a failed chain (e.g. conflicting priorities, disconnected route, etc.) A node transitions to Signal state upon receiving a close AK from next node; it then tries to send a close AK to previous node and switches to ch0. Upon failure, the chain is automatically closed by signaling to the source or by timeout; then, a new opening phase reestablishes the chain through a new route or by using different set of channels 34 17

Soft real-time guarantee If priority and route of each existing flow is known, we can easily compute the flows throughput by building a set of linear constraints in ρ 1,..., ρ m as follows For each active flow: " k! r k For each set of flows belonging to an interference point I: ( %! * ) + " ' $ max max k & 1! l /! l #! k l-i, l> k Solve the system by individually maximizing each flow rate starting from the highest priority ρ 35 m to the lowest priority ρ 1 subject to all constraints. Real-time chains for multi-hop ad-hoc wireless Some experimental results: we tested upto 20 hops outdoor we were able to carry low quality audio sampled at about 4KHz 36 18

Real-time chains for multi-hop ad-hoc wireless Some experimental results: 37 onclusions RT-WSNs will support audio/video streaming and enhance existing sensor network applications such as surveillance and environmental monitoring. RI-EDF (single-hop) allows for high throughput, soft real-time guarantee and power awareness in spite of node failures and in absence of clock synchronization Real-time chains are prioritized real-time data flows (subject to soft realtime guarantee) that can coexist with non-realtime (SMA/A like) traffic. Future work: Apply this research to other classes of devices (IEEE 802.11a compatible?) Define a notion of real-time capacity for the multi-hop case 38 19