A Transport Protocol for Multimedia Wireless Sensor Networks



Similar documents
Transport Layer Protocols

Ethernet. Ethernet. Network Devices

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Final for ECE374 05/06/13 Solution!!

Transport and Network Layer

Computer Networks. Chapter 5 Transport Protocols

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008)

Mobile Computing/ Mobile Networks

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network Abstract

Access Control: Firewalls (1)

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Based on Computer Networking, 4 th Edition by Kurose and Ross

Figure 1.Block diagram of inventory management system using Proximity sensors.

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Question: 3 When using Application Intelligence, Server Time may be defined as.

Distributed Systems 3. Network Quality of Service (QoS)

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

Easy H.264 video streaming with Freescale's i.mx27 and Linux

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Communication Systems Internetworking (Bridges & Co)

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

High-Level Data Link Control

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

RT-QoS for Wireless ad-hoc Networks of Embedded Systems

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: wireless embedded network

Measure wireless network performance using testing tool iperf

TCP for Wireless Networks

RF Monitor and its Uses

CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013

Network Security TCP/IP Refresher

First Midterm for ECE374 03/09/12 Solution!!

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Ad hoc and Sensor Networks Chapter 13: Transport Layer and Quality of Service

AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Strategies. Addressing and Routing

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Frequently Asked Questions

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Introduction VOIP in an Network VOIP 3

Wireless Sensor Networks Chapter 3: Network architecture

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

How To Analyze The Security On An Ipa Wireless Sensor Network

Advanced Computer Networks Project 2: File Transfer Application

UPPER LAYER SWITCHING

The OSI & Internet layering models

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

Transport Layer. Chapter 3.4. Think about

IP address format: Dotted decimal notation:

Disfer. Sink - Sensor Connectivity and Sensor Android Application. Protocol implementation: Charilaos Stais (stais AT aueb.gr)

How To Design A Layered Network In A Computer Network

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Protocols. Packets. What's in an IP packet

Lecture Computer Networks

Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago

Internet Packets. Forwarding Datagrams

Dynamic Source Routing in Ad Hoc Wireless Networks

Network Attached Storage. Jinfeng Yang Oct/19/2015

Protocol Security Where?

IP - The Internet Protocol

Network Simulation Traffic, Paths and Impairment

Computer Networks. Data Link Layer

Effect of Packet-Size over Network Performance

The BSN Hardware and Software Platform: Enabling Easy Development of Body Sensor Network Applications

Outline. TCP connection setup/data transfer Computer Networking. TCP Reliability. Congestion sources and collapse. Congestion control basics

Computer Networks CS321

[Prof. Rupesh G Vaishnav] Page 1

TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

This sequence diagram was generated with EventStudio System Designer (

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Protocols and Architecture. Protocol Architecture.

Computer Networks - Xarxes de Computadors

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

The Problem with TCP. Overcoming TCP s Drawbacks

How To Understand The Internet Of S (Netware)

What is LOG Storm and what is it useful for?

6LoWPAN Technical Overview

TCP in Wireless Mobile Networks

Firewall Implementation

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Transcription:

A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless Sensor Networks Typically a high number of autonomous nodes with sensors and RF communications. Cooperate in a common task retrieving sensor data such as: temperature, humidity, light, image, video, etc. Data is normally forwarded wirelessly to a sink node Used in surveillance and security, industrial process control, military applications, domotics, monitoring, etc. Other networks Mobile devices 2 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Motivation Protection of critical infrastructures, namely electrical energy distribution infrastructures Multimedia data from cameras is routed multi-hop to the sink WSN advantages: ease of installation, configuration, flexibility, low power TCP: end-to-end, loss assumed as congestion, RTT delays New transport protocol tailored for WSN: DTSN. 3 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Objectives Transport protocol for WSN with the following characteristics: Adapted to embedded systems Battery operated Runs on Linux Support reliability Optimize multimedia data transfers, particularly real-time video Support several simultaneous applications Support security mechanisms Ease of use through an API 4 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Transport Protocols for WSN Purpose: Reliability Guarantee and/or Congestion Control Several different characteristics and mechanisms: upstream/downstream communication Loss feedback through: ACK, NACK, iack Lost segment detection: sequence number continuity or timers for each segment end-to-end or hop-by-hop recovery Two types of target applications: sending events or sending large data volumes 5 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks DTSN Sessions identified by a Session Number, Application ID, source and destination addresses Feedback when requested by the source through an Explicit Acknowledgement Request (EAR) Losses detected through the sequence number continuity Selective Repeat retransmission hopby-hop: intermediate nodes cache packets t EAR Timeout Flow Control Timeout Node 1 Node 2 Node 3 DATA 0 DATA 1 DATA 2 DATA 3 DATA 4 DATA 5 DATA 6 DATA 7 + EAR DATA 8 DATA 9 DATA 10 DATA 11 DATA 12 DATA 13 DATA 14 DATA 15 + EAR EAR 15 DATA 0 DATA 1 DATA 8 DATA 15 EAR 15 DATA 16 DATA 17 DATA 18 DATA 19 DATA 20 DATA 21 NACK 0, <0,1,8,15> NACK 7, <> DATA 2 DATA 3 DATA 4 DATA 5 DATA 6 DATA 7 + EAR DATA 9 DATA 10 DATA 11 DATA 12 DATA 13 DATA 14 EAR 15 DATA 0 DATA 1 DATA 8 DATA 15 EAR 15 6 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks NACK 0, <0,1,2> NACK 0, <0,1,2,8,9,15> NACK 7, <8,12> DATA 3 DATA 4 DATA 5 DATA 6 DATA 7 + EAR DATA 3 DATA 10 DATA 11 DATA 12 DATA 13 DATA 14 EAR 15 DATA 10 DATA 12 DATA 2 DATA 9 DATA 2 DATA 9 DATA 0 DATA 1 DATA 15 EAR 15 DATA 10 DATA 8 DATA 12 DATA 8 DATA 12 DATA 16 DATA 17 DATA 18 DATA 19 DATA 16 DATA 17 DATA 18 DATA 19 NACK 0, <0,1,2,3> NACK 0, <0,1,2,8,9,10,12,15> NACK 7, <8,10,12> Node 4

Probabilistic Model Expected number of links crossed: Success probability: Expected number of transmissions per packet: Generalized formulas for different losses in each link: 7 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Probabilistic model 2 Expected number of transmissions when packets are cached with 50% probability: 8 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Development Platform The protocol is generic: can work over several wireless technologies and hardware The Silex SX-560 was used. Supports Wi-Fi 802.11a/b/g. 200 MHz 32-bit ARM processor 16 MB RAM 8MB Flash Runs Linux 792 mw average power 49.6 x 34.3 x 9.65 mm Developer s daughtercard with USB, serial, SPI, GPIO, Ethernet, power 9 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks General Architecture DTSN implemented as a single daemon process for all node types: source, receiver and intermediate nodes. Clients use the protocol through a library that connects to the daemon through UNIX sockets Several configuration parameters may be adjusted in a configuration file 10 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

API Dynamic library Interface similar to the Unix sockets interface Simple operation, with most work done centrally in the daemon The application can receive asynchronous events Threads, blocking and exclusive access implemented through the pthread library 11 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks DTSN Sessions 1 Header present in all packets: Bit Flag 0 ACK 1 NACK 2 EAR 3 DATA 4 RESEND 5 ENDSESSION 6 (not used 7 (not used) Soft unidirectional sessions, identified by <App ID, Session No, Src Addr, Dest Addr>. No connection establishment: the applications just creates the session and start sending packets A complete session description is maintained with buffers, timers, ID, mode, etc. The session can be kept internally after being closed by the application 12 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

359 DTSN Sessions 2 Sliding windows mapped into circular buffers Both windows synchronized. Simple flow control by limiting the number of unconfirmed packets sender receiver Aplication Aplication DTSN 360 DTSN Where the next segment will be placed 367 368 369 370 365 366 364 363 364 365 366 368 369 370 371 372 360 361 362 363 371 372 373 374 367 361 362 373 375 376 374 375 376 358 359 358 Last segment received Oldest unconfirmed segment Last segment sent Next segment to be read by the application Next expected segment 13 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Cache Intermediate nodes participate in packet recovery Space uniformly divided through existing sessions Packets kept in linked lists FIFO for each session Other caching policies for future work Packets eliminated with ACK/NACK/ENDSESSION received if security is not used 14 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Timers There are 5 timers with different periods and purposes. There is always a single one active at each time for each session. sender receiver Activity Timeout: used when the sender window is not empty or full, and no new data is received from the application, to trigger sending an EAR. EAR Timeout: used when an EAR was sent and the sender is waiting for a NACK/ACK. Wait Timeout: used when the sender window is empty to destroy a session without activity. Flow control Timeout: Active when the sender window is full Receiver Activity Timeout: only timer used by the receiver, restarted every time a packet is received from the source. 15 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Security 1 Most WSN protocols ignore the security issues, assuming it is assured by lower layers (e.g. MAC). This may be energetically inefficient, as only some (important) packets require security Attacks possible by packet replication or injection Purpose: denial of service, data manipulation, reduce node lifetime Security requires some overhead, increasing energy spent Security is optional: the application decides The DTSN security extension uses symmetric cryptographic functions (HMAC based on the SHA-2 hash function). 16 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Security 2 Message Integrity Code (MIC) and key computation: ACK master key AppId per packet ACK key n <packet contents> masterkey HMAC HMAC ACK master key NACK master key HMAC HMAC K (n) ACK K (n) NACK HMAC HMAC MIC ACK (n) MIC NACK (n) NACK master key AppId per packet NACK key n <packet contents> Packet format: 17 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Multimedia M-DTSN functionality implemented, allows restarting a session. The following actions are performed: Discard all packets in the sender window and change the session nr. Intermediate nodes also discard cached packets The receiver eliminates data from the window and notifies the application A new session is implicitly started without additional overhead The idea is to give up on sending data from a frame after a temporal limit set by the application. 18 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Simulation A module to simulate a sensor network over a LAN was developed Routing is made based on DTSN addresses Arbitrary bit error rates can be configured A 1.95 MB file was transmitted over 7 hops 5 situations tested: 512 bytes payload with and without cache 512, 350 and 200 bytes payload with security and cache Single hop between a PC and a Silex to measure throughput 19 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Results 1 20 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Results 2 Comparing the 5 tested scenarios: 200 512 21 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Results 3 22 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Results 4 1.95 MB file transfer over a 10Mbps Ethernet 1 hop, no link errors Performance results: PC Silex Silex PC DTSN 10.36 s (1.51 Mbps) 8.03 s (1.94 Mbps) DTSN with security 10.97 s (1.42 Mbps) 8.22 s (1.90 Mbps) DTSN without delivery to application on Silex 4.69 s (3.33 Mbps) 8.03 s (1.94 Mbps) TFTP (UDP) 12.0 s (1.30 Mbps) 79.9 s (0.20 Mbps) FTP (TCP) 3.00 s (5.20 Mbps) 5.17 s (3.02 Mbps) High overhead in the communication between the protocol and application The security option impact on performance is not significant 23 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Results 5 Optimized version performance results: PC -> PC (Fast Ethernet) [Mbps] PC -> Silex (802.11b) [Mbps] Silex -> PC (802.11b) [Mbps] Silex -> Silex (802.11b) [Mbps] DTSN 83.20 2.36 3.21 2.69 DTSN with security 62.42 1.68 2.02 1.87 FTP 88.68 5.73 4.47 4.69 TFTP 10.96 0.34 0.29 0.17 Much better performance Silex CPU performance is a limitation 24 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks

Conclusion A transport protocol for real-time streaming in WMSN was successfully implemented and tested. Tests prove the correct operation and show that DTSN is efficient in reducing the number of transmissions in WMSN, thus saving energy. Future work: Dynamic parameters, such as timeouts, window and cache sizes New caching policies, for instance by storing packets with probability less than 1, according to the distance to destination, etc. raw sockets BeagleBoard 25 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks 26 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks