dof- duplicate detectable opportunistic forwarding-slides
TRANSCRIPT
![Page 1: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/1.jpg)
DOF: Duplicate Detectable Opportunistic Forwarding in Duty-Cycled Wireless Sensor Networks
Daibo Liu1, Zhichao Cao2, Jiliang Wang3, Yuan He3 Mengshu Hou1, Yunhao Liu3
1 University of Electronic Science and Technology of China
2 Hong Kong University of Science and Technology 3 Tsinghua University
1
![Page 2: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/2.jpg)
CitySee
2
![Page 3: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/3.jpg)
Protocols
• Routing – Collection Tree Protocol (CTP) (SenSys’09)
• Duty-cycled media access – X-MAC
3
t …… ……
I wake up periodically. If I hear nothing, I will go back to sleep!
…… ……
I prepare send a packet. I will not stop sending until the ACK comes!
![Page 4: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/4.jpg)
Drawback
• Waiting long time for the deterministic forwarder wake-up – Longer delay
– Energy waste
4
![Page 5: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/5.jpg)
Opportunistic Forwarding S
R1R4
R3R2
Reliable Link
Bursty Link
5
t S
R1
R2
R3
R4 Take first wake-up and successfully received opportunity.
![Page 6: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/6.jpg)
Drawback
6 6
S
R1R4
R3R2
Reliable Link
Bursty Link
S
R1
R2
R3
R4
Data Data A
Data
Data
Data
A
A
A
R1, R2, and R3 are all active
R1
R2 R3
Shorten the lifetime Traffic jam
![Page 7: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/7.jpg)
Existing Techniques
• Overhearing – Not scalable
– Lossy link
• Coordination – Extra control overhead
7
How to mitigate the influence of the duplicate in a light-weight and efficient way?
![Page 8: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/8.jpg)
Temporal Diversity of ACK
• Split the Acknowledgment (ACK) waiting interval into multiple slot
• Distinguish all potential forwarders by their different ACK time slot
8
0 1 2 3 4 5 6 7
t
ACK Waiting Interval
Probe
![Page 9: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/9.jpg)
DOF Overview
9
S
R1
R2
R3
R4
p p A A0 1 2 3 Data
Data0 A
A
p
p
p
A
A
A
04 1 2 3 S
R1R4
R3R2
Reliable Link
Bursty Link
• Probe (P): detecting available forwarders
• ACK (A): acknowledge the probe in different time slot
• Data: send the data to the forwarder R2
R1
R2 R3
![Page 10: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/10.jpg)
Slot Assignment
10
0 1
0 1 2 ... 9 10 11 12 ... 19 20 21 22 ... 29
Zone 0 Zone 1 Zone 2
Hash
Priority
sequence
Routing progress: D
ACK slot 2 3 4 5 6 7 8 9
Routing progress
Mapping to priority sequence
Mapping to an ACK slot with randomness
![Page 11: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/11.jpg)
Slot Inference
11
• The slot Ks of the received ACK as :
- : preconfigured slot size
slotbasersTTTK /)(
slotT
P Sender P
1T
P A
2T
A
3T
12TTT
base
13TTT
r
the earliest ACK at slot 0 the received ACK
![Page 12: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/12.jpg)
Slot Size
• Large Slot Size – Less ACK slots
– Robust
• Small Slot Size – More ACK slots
– Vulnerable
• Experiments in office environment – Tslot = 0.2ms
12 12
![Page 13: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/13.jpg)
Retransmission
• Data transmission failure – Link failure
– Mismatch of slot information
• Experiments in office environment – link failure is rare
• Link initiated by probe is temporally available
– Maximum number of data transmission is 2
13
![Page 14: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/14.jpg)
Tunnel Transmission
14
S
R1R4
R3R2
Send
Queue
Take the benefit of the probe transmission of the first packet.
![Page 15: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/15.jpg)
Evaluation
• Indoor Testbed with 20
Telosb nodes
• Different traffic loads – Inter Packet Interval (IPI) of
each node is set as 1s, 2s, 4s,
8s and 16s.
• ORW (IPSN’12) – Opportunistic Routing in Wireless
sensor networks
• A-MAC (SenSys’10) + CTP – Receiver initiated duty-cycled
media access
15 15
![Page 16: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/16.jpg)
Duplicate
16
IPI <= 2s, the duplicate ratio ORW: > 80% DOF: < 10%
![Page 17: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/17.jpg)
Packet Reception Ratio
17
IPI <= 2s, the average PRR DOF: > 46.5% improvement
![Page 18: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/18.jpg)
Energy and Delay
18 18
Energy: radio duty cycle DOF : > 21.4% improvement
Delay: average preamble count DOF : as low as ORW
![Page 19: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/19.jpg)
19
DOF is a practical opportunistic forwarding technique tailored
to duty-cycled WSNs.
Conclusion
19
• Exploiting the temporal diversity of ACK
Key design
• Indoor testbeds
• Good performance under various traffic loads
Evaluation
• Large-scale test
• Different hardware
Future works
![Page 20: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/20.jpg)
20
Thank you! Question?
20
![Page 21: DOF- Duplicate Detectable Opportunistic Forwarding-slides](https://reader033.vdocuments.us/reader033/viewer/2022051401/55cf9001550346703ba237f8/html5/thumbnails/21.jpg)
Slot Assignment Function
• Fixed slot assignment – Avoid the ACK slot collision
– Extra control overhead
– Lose some opportunities
21