Course Overview
|
|
|
Introduction |
|
Data in Wireless Cellular Systems |
|
Data in Wireless Local Area Networks |
|
Internet Protocols |
|
TCP over Wireless Link |
|
Ad-Hoc Networks, Sensor Networks |
|
Services and Service Discovery |
|
System Support for Mobile Applications |
Some References:
|
|
|
Some slides are from the Tutorial on
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues, prepared by Nitin
Vaidya, see http://www.crhc.uiuc.edu/wireless/tutorials.html |
|
Some slides are from the Tutorial on
Wireless Sensor Networks by Deborah Estrin, Akbar Sayeed, and Mani
Srivastava, see |
|
http://nesl.ee.ucla.edu/tutorials/mobicom02/ |
One Type of Wireless
Networks:
“Infrastructure-based”
|
|
|
|
Infrastructured wireless networks |
|
Cellular Networks and Wireless LAN |
|
Fixed, wired backbone and centralized
control |
|
Mobiles communicate directly with
access points (AP) |
|
Suitable for locations where APs can be
deployed |
Another Type of Wireless
Networks:
“Infrastructure-less”
|
|
|
|
(Mobile) Ad-Hoc Networks |
|
Neither pre-existing, wired backbone
nor centralized administration |
|
Peer-to-Peer and self-organizing
networks |
|
Each mobile serves as routers, not just
an end point. |
|
Mesh: has wireless infrastructure
(multihop wireless) |
|
Maintains separation between (mobile)
routers and end hosts |
|
Wireless Sensor Networks: mostly static
topology, no separation between routes and sensors, multihop wireless |
Manet: Mobile Ad-hoc
Networking
Ad hoc Networks
|
|
|
In Latin, “ad hoc” literally means
"for this purpose only” |
|
It can be regarded as a “spontaneous
network” |
|
A Mobile Ad-hoc NETwork (MANET) is a
collection of mobile nodes which communicate over radio and do not need any
pre installed communication infrastructure. |
|
Mobile, multihop wireless network
capable of autonomous operation |
|
Communication can be performed if two
nodes are close enough to exchange packets. |
Use of the Ad-Hoc
Technology for Military Communications
Ubiquitous Networking
Applications of Ad-Hoc
Networks
|
|
|
|
Application of the ad-hoc network
technology is appropriate when a network needs to be rapidly deployed without
prior planning and to provide reliable communication in harsh propagation
conditions. |
|
Examples: |
|
Military: for tactical communications |
|
National security: in times of natural
disaster or global war |
|
Rescue missions: in lieu of adequate
wireless coverage |
|
Law enforcement: similar to tactical
communications |
|
Commercial use: for setting up sales
presentations |
|
Education: wall-free (virtual)
classrooms |
|
Local Area Networks (LANs): for
limited-coverage communication |
|
Sensor Networks (more later) |
|
Embedded computing and networking
applications (ubiquitous computers with short-range interactions, vehicle
networks) |
|
Cellular range extension
(interoperability with infrastructured networks) |
|
Community Mesh Networks |
Wireless Mesh Community
Networks: Bridging the Broadband Divide
|
|
|
Next few Slides from Presentation at http://www.research.microsoft.com/mesh/, |
|
Keynote Presentation by V. Bahl |
Why Broadband?
|
|
|
|
The future is about rich multimedia
services and information exchange |
|
…possible only with wide-scale
availability of broadband Internet access |
|
|
|
but… |
|
|
|
Many people are still without broadband
service |
|
Up to 30% of America (32 million homes)
cannot get broadband service (rural areas, older neighbourhoods, poor
neighbourhoods) |
|
A large majority of the developing
world does not have broadband connectivity |
|
It is not economically feasible to
provide wired connectivity to these customers |
Density = Broadband
Broadband is Not Yet a
Reality
|
|
|
|
|
“For Internet access, there are 15 ISPs
for every 100K users, for Cable or DSL there are two providers for every 100K
users” |
|
- Consumer Federation of America, July
2002 |
|
“One reason often cited for low
penetration of broadband services is their high cost, typically $50 a month” |
|
- The Mercury News |
|
“[Broadband users] are much more likely
to create content for the Web or share files, telecommute, download music, or
game files, or enjoy streaming audio or video” |
|
- Cox News Service |
|
“Applications will drive broadband
access and justify the investment for citizens, businesses and government” |
|
-
Office of Technology Policy, US Dept. of Commerce, Sept., 2002 |
Broadband Access:
Wiring the Last Mile?
|
|
|
|
The Last Mile: Connection between a
home and local hub |
|
|
|
Scale & legacy make last mile
expensive |
|
~ 135 million housing units in the US
(U.S. Census Bureau 2001) |
|
POTS (legacy) network designed for
voice & built over 60 years |
|
Cable TV networks built over last 25
years |
|
|
|
The Truck Roll Problem: Touching each home incurs cost: customer
equipment; installation & servicing; and central office equipment
improvements |
|
|
|
|
|
In our (i.e., Microsoft Research’s)
estimate building an alternate, physical last mile replacement to hit 80% of
US homes will take 19 years and cost ~ US $60-150 billion |
|
|
Community Mesh
Network
The natural evolution of broadband connectivity
Why MOBILE Ad-Hoc
Networks?
|
|
|
|
|
Mesh, at first sight, as a rather
static, albeit multihop wireless network |
|
Mobility of hosts/routers => Dynamic
Topology |
|
Dynamic Topology however does not imply
Mobile Network: |
|
Nodes come and go |
|
Uncontrolled Interference |
|
Testbeds show that IEEE 802.11 links
are highly asymmetric due to different interference environment at receiver
and variable over time |
|
Personal Opinion: Mesh Community
Networks will have many of the same challenges and will benefit from same
solutions as MANETs |
|
Deal with dynamic topology |
|
Little to no configuration/peer-to-peer
operation |
Challenges in Ad-Hoc
Networks
|
|
|
|
The challenges in the design of Ad-Hoc
networks stem from the following facts: |
|
the lack of centralized entity Þ
self-organizing and distributed protocols |
|
the possibility of rapid platforms
movement (highly versatile topology) Þ efficient and robust protocols |
|
all communication is carried over the
wireless medium Þ power and spectrum efficient communications |
|
Compare this with the fixed (cellular)
networks … |
|
|
Ad-Hoc Networks vs.
Cellular Networks
|
|
|
|
The distinctive differences between
ad-hoc networks and cellular networks are: |
|
no fixed infrastructure is present |
|
multi-hop routing (network diameter
>> node transmission range) |
|
peer-to-peer operation |
|
frequent changes of associations |
|
|
Other Challenges of
Ad-Hoc Networks
|
|
|
|
Application/Market penetration |
|
is multihop technology
commercializable? |
|
Design/Implementation |
|
reliable, manageable, survivable, and
secure |
|
Operational/Business-related |
|
how to manage the network? how to bill
for services? |
|
|
Characteristics of Ad Hoc
Networks
|
|
|
|
Advantages |
|
Easy and rapid deployment |
|
Reduced administrative cost |
|
Disadvantages and Challenges |
|
Limited resources (power, transmission
range,…) |
|
Unstable wireless transmissions (higher
error rates and quality variability) |
|
Asymmetric wireless links |
|
Dynamic topology change |
|
Security hazard (easy of snooping on
wireless transmissions) |
|
A mobile ad hoc network is a promising
and neat technology platform, but there are still many technical and business
challenges to solve ! |
“Mobile Ad Hoc Networking
is a multi-layer problem !”
Medium Access Control in
MANET
|
|
|
Some interesting issues, but skipped
here |
|
Most testbeds use IEEE 802.11x, which |
|
works in multihop environment, though
it |
|
was not designed for that scenario. |
Network Layer in MANET
|
|
|
Has been the focus of past research |
|
Particularly: Routing |
Main Issue – “Routing”
|
|
|
|
If there is NO direct link between a
source and a destination, multi-hop routing is needed to discover their
routes. |
|
Routing is a very challenging task in
mobile ad hoc networks. |
|
Mobility and link failure/repair may
cause frequent route changes. |
|
Routing protocol must be distributed,
with a minimal overhead. |
Ad hoc Routing Protocols
|
|
|
|
|
Routing problem has received a
significant interest in the research community, resulting in several
protocols proposed. |
|
Some have been invented specifically
for MANET. |
|
Others are adapted from traditional
routing protocols for wired networks (i.e., distance vector or link state
algorithms) |
|
These traditional protocols do not work
efficiently or fail completely. |
|
The main group of proposals comes from
the work of IETF’s MANET working group |
|
Designed for IP based, homogeneous,
mobile ad hoc networks. |
|
Focuses on fast route establishment and
maintenance with minimal overhead |
|
Number of hops is used as the only
route selection criteria. |
|
Other parameters, such as energy usage
or QoS, are not considered. |
Ad-Hoc Networking: MANET
|
|
|
|
Mobile Ad-hoc Networks (manet) at IETF:
http://www.ietf.org/html.charters/manet-charter.html |
|
A "mobile ad hoc network"
(MANET) is an autonomous system of mobile routers (and associated hosts)
connected by wireless links |
|
routers are free to move randomly and
organize themselves arbitrarily; thus, the network's wireless topology may
change rapidly and unpredictably |
|
The primary focus of the working group
is to develop and evolve MANET routing specification(s) and introduce them to
the Internet Standards track. The goal is to support networks scaling up to
hundreds of routers. |
MANET Routing Protocols
|
|
|
|
|
Protocols: |
|
On-demand protocols |
|
AODV (RFC 3561, July 2003) |
|
DSR (Draft 10, July 2004, currently
under review by IESG) |
|
Pro-active protocols |
|
OLSR (RFC 3626, Oct. 2003) |
|
TBRPF: Topology Dissemination Based on
Reverse-Path Forwarding (RFC 3684, February 2004) |
|
Mixed modes: |
|
Fisheye state routing |
|
Zone routing |
Routing Protocols -
Design
|
|
|
|
Proactive, Table-driven Approach |
|
Based on traditional link-state and
distance-vector routing protocols. |
|
Continuously update the topological
view of the network by periodically exchanging appropriate information among
the nodes. |
|
Determine routes independent of traffic
pattern |
|
Examples: DSDV, OLSR (Optimized Link
State), TBRPF etc. |
|
Reactive, On-demand Approach |
|
Discover and maintain routes only if
needed |
|
Do not continuously maintain the
overall network topology |
|
The network is flooded with “route
request” control packets when a new route is required. |
|
Examples: DSR, AODV, LAR, etc. |
|
Hybrid Approach |
|
Combine the two approaches above:
locally proactive, globally reactive ! |
|
Example: ZRP |
Trade-Off
|
|
|
|
Various simulation studies have shown
that reactive protocols perform better in mobile ad hoc networks than
proactive ones. |
|
However, no single protocol works well
in all environments. |
|
Which approach achieves a better
trade-off depends on the traffic and
mobility patterns. |
Leading MANET Contenders
|
|
|
|
DSR: Dynamic Source Routing |
|
Source routing protocol |
|
Complete path in packet header |
|
AODV: Ad-hoc On-demand Distance Vector
Routing |
|
“Hop-by-hop” protocol |
|
Uses only standard IP packets,
intermediate nodes maintain routing table |
|
Both are “on demand” protocols: route
information discovered only as needed |
|
Two phases: route discovery and route
maintenance |
|
Difference: in DSR, source controls
complete route, in AODV it only know the next hop |
|
Military: OLSR (Optimized Link State
Routing) |
|
Proactive routing protocol |
|
Similar to OSPF, but more efficient
link state updates |
AODV
|
|
|
|
Route Requests (RREQ) are forwarded via
flooding |
|
|
|
When a node re-broadcasts a Route
Request, it sets up a reverse path pointing towards the source |
|
AODV assumes symmetric (bi-directional)
links |
|
|
|
When the intended destination receives
a Route Request, it replies by sending a Route Reply |
|
|
|
Route Reply travels along the reverse
path set-up when Route Request is forwarded |
Route Requests in AODV
Route Requests in AODV
Route Requests in AODV
Reverse Path Setup in
AODV
Reverse Path Setup in
AODV
Reverse Path Setup in
AODV
Route Reply in AODV
Route Reply in AODV
|
|
|
|
An intermediate node (not the
destination) may also send a Route Reply (RREP) provided that it knows a more
recent path than the one previously known to sender S |
|
To determine whether the path known to
an intermediate node is more recent, destination sequence numbers are used |
|
The likelihood that an intermediate
node will send a Route Reply when using AODV not very high |
|
A new Route Request by node S for a
destination is assigned a higher destination sequence number. An intermediate
node which knows a route, but with a smaller sequence number, cannot send
Route Reply |
Forward Path Setup in
AODV
Data Delivery in AODV
Timeouts
|
|
|
|
|
|
A routing table entry maintaining a reverse
path is purged after a timeout interval |
|
timeout should be long enough to allow
RREP to come back |
|
|
|
A routing table entry maintaining a forward
path is purged if not used for a active_route_timeout interval |
|
if no is data being sent using a
particular routing table entry, that
entry will be deleted from the routing table (even if the route may actually
still be valid) |
Link Failure Reporting
|
|
|
|
|
A neighbor of node X is considered active
for a routing table entry if the neighbor sent a packet within active_route_timeout
interval which was forwarded using that entry |
|
|
|
When the next hop link in a routing
table entry breaks, all active neighbors are informed |
|
|
|
Link failures are propagated by means
of Route Error messages, which also update destination sequence numbers |
Route Error
|
|
|
When node X is unable to forward packet
P (from node S to node D) on link (X,Y), it generates a RERR message |
|
Node X increments the destination
sequence number for D cached at node X |
|
The incremented sequence number N is
included in the RERR |
|
When node S receives the RERR, it
initiates a new route discovery for D using destination sequence number at
least as large as N |
|
When node D receives the route request
with destination sequence number N, node D will set its sequence number to N,
unless it is already larger than N |
Link Failure Detection
|
|
|
Hello messages: Neighboring nodes
periodically exchange hello message |
|
|
|
Absence of hello message is used as an
indication of link failure |
|
|
|
Alternatively, failure to receive
several MAC-level acknowledgement may be used as an indication of link
failure |
Why Sequence Numbers in
AODV
|
|
|
|
To avoid using old/broken routes |
|
To determine which route is newer |
|
To prevent formation of loops |
|
|
|
|
|
|
|
|
|
Assume that A does not know about
failure of link C-D because RERR sent by C is lost |
|
Now C performs a route discovery for D.
Node A receives the RREQ (say, via path C-E-A) |
|
Node A will reply since A knows a route
to D via node B |
|
Results in a loop (for instance,
C-E-A-B-C ) |
Summary: AODV
|
|
|
|
Routes not included in packet headers |
|
|
|
Nodes maintain routing tables
containing entries only for routes that are in active use |
|
|
|
At most one next-hop per destination
maintained at each node |
|
Other protocols may maintain several
routes for a single destination |
|
|
|
Unused routes expire even if topology
does not change |
Proactive Routing: OLSR
Protocol
|
|
|
OLSR (Optimized Link State Routing
Protocol) |
|
Optimizes the link state flooding
mechanism |
|
Multipoint Relay (MPR) nodes achieve
the optimization |
|
A set of MPR nodes is chosen by each
node in the network |
|
The node’s view of the topology becomes
partial |
OLSR Protocol (2)
|
|
|
MPR nodes are chosen in such a way that
every 2-Hop neighbor can be reached by the MPRs |
MPR Computation
|
|
|
MPRs optimize the classical flooding
mechanism |
|
Each node selects its own MPRs from its
1-hop symmetric neighbours |
|
Through the MPRs all symmetric strict
2-hop neighbours must be reached |
|
Recalculated when symmetric
neighbourhoods change (1-hop or strict 2-hop) |
|
|
MPR Computation (2)
|
|
|
MPRs are signalled as MPR neighbour
type, inside Hello messages |
|
MPR Selector (MPRS) set is populated
when any node is signalled as a MPR neighbour |
|
MPRs are computed per interface. |
|
MPR candidate nodes must have
willingness different from Will_Never |
MPR Computation (3)
|
|
|
MPR set = Ø |
|
MPR += 1-hop neighbors with
willingness=Will_always |
|
MPR += 1-hop neighbors that are the
only ones reaching a 2-hops neighbor |
|
Remove the 2-hop neighbors reached by
the MPRs |
|
Add 1-hop nodes (to the MPR set)
providing maximum reachability of 2-hop neighbors UNTIL reaching all 2-hop
neighbors. |
Routing Table
|
|
|
|
Each node maintains its own routing
table |
|
Based on the Link and Topology sets. |
|
Recalculated (without transmitting any
message) when a change is detected in either: |
|
Link set |
|
Neighbor set |
|
2-hop neighbor set |
|
Topology set |
|
Multiple interface association set. |
Multicast: Motivation
|
|
|
Many applications for ad hoc networks
require one-to-many and many-to-many communication |
|
Multicast protocols are intended to
efficiently support such communication patterns |
|
Multicasting well researched in fixed
networks (i.e., the Internet), building efficient distribution structures
(typically a multicast tree) |
|
Ad hoc networks: dynamic topology makes
it harder to maintain distribution structure with low overhead |
Motivation (cont.)
|
|
|
|
MANET specific protocols are being
proposed |
|
MAODV: multicast extensions for AODV,
establishes shared tree |
|
ODMRP: new multicast protocol, based on
per-source mesh |
|
ADMR: completely on-demand, per-source
tree |
|
Own study done at CRC last year: |
|
Study multicasting protocols |
|
Develop a protocol that achieves high
packet delivery ratio with low overhead |
Multicast Protocol
Performance
|
|
|
Multicast protocols perform poorly
(packet delivery ratio below 90%) as network topology changes more often
(nodes move with higher speed and/or pause less) |
|
Multicast protocols also often do not
scale well with number of multicast senders and/or number of multicast
receivers |
|
Open question how to build efficient
multicast routing protocols in a MANET (tree vs. mesh, single tree vs.
source-based tree, etc.) |
|
Quite a bit of work on efficient
broadcast protocols, rather than simplistic flooding approach, as
broadcasting control messages inherent part of many routing protocols |
Are Multicast Protocols
Right Choice?
|
|
|
|
Broadcast protocols only explored for
broadcast purposes, but can also be employed for multicasting |
|
Another alternative is to use
unicasting, creating appropriate number of 1-to-1 communication pairs |
|
Own study: |
|
Compare unicast, multicast, and
broadcast protocols under same scenarios |
|
Evaluate under one-to-many and
many-to-many communication patterns |
Simulation Results:
Summary I
Simulation Results:
Summary II
Broadcast Protocols
Competitive
|
|
|
Broadcast protocols work well. BCAST
and FLOOD are almost always as good as or better than other protocols, though
sometimes impose higher packet latency. |
|
Protocol overhead lower/competitive
with best multicast protocol |
|
For a single multicast sender, FLOOD is
the obvious choice, for increasing number of multicast senders BCAST has the
edge over FLOOD |
|
ADMR performs very well in the presence
of many multicast senders, (is optimal choice in two scenarios under low
mobility), with BCAST being runner-up. All other protocols perform poorly in
these scenarios. |
|
The choice of an optimal multicasting
solution is largely independent of the mobility rate. |
Many Challenges Yet to be
Addressed
|
|
|
|
Issues other than routing have received
much less attention |
|
Comment from one conference: “there is,
yet again, another routing paper, oh no…..” J |
|
However: there are still
interesting problems as well (some of my PhD students work on specific issues
too) |
|
Other interesting problems: |
|
Applications for MANET |
|
Address assignment, node configuration à network management |
|
Support for real-time multimedia
traffic (QoS) |
|
Security and access control |
|
Service discovery |
|
Improving interaction between protocol
layers (cross-layer design) |
|
Integration with other wireless/wired
technologies |
Wireless Sensor
Networks
(aka Embedded Networked Sensors)
Embedded Networked
Sensing Potential
|
|
|
|
Micro-sensors, on-board processing, and
wireless interfaces all feasible at very small scale |
|
can monitor phenomena “up close” |
|
Will enable spatially and temporally
dense environmental monitoring |
|
Embedded Networked Sensing will reveal
previously unobservable phenomena |
Sensor Applications
|
|
|
|
|
IEEE Computer, August 2004: special
issue on sensor networks |
|
Classification of Applications |
|
Monitoring Space |
|
Habitat monitoring, precision
agriculture, surveillance, treaty verification, indoor climate control, …. |
|
Monitoring Things |
|
Structural monitoring, ecophysiology,
medical diagnostics, urbain terrain mapping, …. |
|
Monitoring interaction of Things with
each other and surrounding Space |
|
Wildlife habitat, disaster management,
pervasive computing, asset tracking, manufacturing process flow, …. |
Sensor Applications (IEEE
Computer)
|
|
|
|
GlacsWeb project, University of
Southampton |
|
Monitor subglacial bed deformation |
|
Particular challenge: collect data from
sensors in remote locations |
|
Radiation Detection, Los Alamos
National Labs and University of New Mexico |
|
Distributed sensor network to detect
vehicles that could potentially transport radioactive isotopes (I.e., dirty
bomb) |
|
PinPtr, Vanderbilt University |
|
Detecting and locating a sniper in a
challenging environment such as a complex urban terrain |
App#1: Seismic
|
|
|
|
Interaction between ground motions and
structure/foundation response not well understood. |
|
Current seismic networks not spatially
dense enough to monitor structure deformation in response to ground motion,
to sample wavefield without spatial aliasing. |
|
Science |
|
Understand response of buildings and
underlying soil to ground shaking |
|
Develop models to predict structure
response for earthquake scenarios. |
|
Technology/Applications |
|
Identification of seismic events that
cause significant structure shaking. |
|
Local, at-node processing of waveforms. |
|
Dense structure monitoring systems. |
|
ENS will provide field data at
sufficient densities to develop predictive models of structure, foundation,
soil response. |
Field Experiment
Research Challenges
|
|
|
|
Real-time analysis for rapid response. |
|
Massive amount of data ® Smart,
efficient, innovative data management and analysis tools. |
|
Poor signal-to-noise ratio due to
traffic, construction, explosions, …. |
|
Insufficient data for large earthquakes
®
Structure response must be extrapolated from small and moderate-size
earthquakes, and force-vibration testing. |
|
First steps |
|
Monitor building motion |
|
Develop algorithm for network to
recognize significant seismic events using real-time monitoring. |
|
Develop theoretical model of building
motion and soil structure by numerical simulation and inversion. |
|
Apply dense sensing of building and
infrastructure (plumbing, ducts) with experimental nodes. |
|
|
App#2: Contaminant
Transport
|
|
|
|
Science |
|
Understand intermedia contaminant
transport and fate in real systems. |
|
Identify risky situations before they
become exposures. Subterranean deployment. |
|
Multiple modalities (e.g., pH, redox
conditions, etc.) |
|
Micro sizes for some applications
(e.g., pesticide transport in plant roots). |
|
Tracking contaminant “fronts”. |
|
At-node interpretation of potential for
risk (in field deployment). |
ENS Research Implications
|
|
|
|
Environmental Micro-Sensors |
|
Sensors capable of recognizing phases
in air/water/soil mixtures. |
|
Sensors that withstand physically and
chemically harsh conditions. |
|
Microsensors. |
|
Signal Processing |
|
Nodes capable of real-time analysis of
signals. |
|
Collaborative signal processing to
expend energy only where there is risk. |
App#3: Ecosystem
Monitoring
|
|
|
Science |
|
Understand response of wild populations (plants and
animals) to habitats over time. |
|
Develop in situ observation of species
and ecosystem dynamics. |
|
|
|
Techniques |
|
Data acquisition of physical and
chemical properties, at various spatial and temporal scales, appropriate to
the ecosystem, species and habitat. |
|
Automatic identification of
organisms
(current techniques involve close-range
human observation). |
|
Measurements over long period of
time,
taken in-situ. |
|
Harsh environments with extremes in
temperature, moisture, obstructions, ... |
Field Experiments
|
|
|
|
Monitoring ecosystem processes |
|
Imaging, ecophysiology, and
environmental sensors |
|
Study vegetation response to climatic
trends and diseases. |
|
Species Monitoring |
|
Visual identification, tracking, and
population measurement of birds and other vertebrates |
|
Acoustical sensing for identification,
spatial position, population estimation. |
|
Education outreach |
|
Bird studies by High School Science
classes (New Roads and Buckley Schools). |
ENS Requirements for
Habitat/Ecophysiology Applications
|
|
|
|
Diverse sensor sizes (1-10 cm), spatial
sampling intervals (1 cm - 100 m), and temporal sampling intervals (1 ms -
days), depending on habitats and organisms. |
|
Naive approach ® Too many
sensors ®Too many data. |
|
In-network, distributed signal
processing. |
|
Wireless communication due to climate,
terrain, thick vegetation. |
|
Adaptive Self-Organization to achieve
reliable, long-lived, operation in dynamic, resource-limited, harsh
environment. |
|
Mobility for deploying scarce resources
(e.g., high resolution sensors). |
Transportation and Urban
Monitoring
Slide 75
Enabling Technologies
Sensors
|
|
|
|
Passive elements: seismic, acoustic,
infrared, strain, salinity, humidity, temperature, etc. |
|
Passive Arrays: imagers (visible, IR),
biochemical |
|
Active sensors: radar, sonar |
|
High energy, in contrast to passive
elements |
|
Technology trend: use of IC technology
for increased robustness, lower cost, smaller size |
|
COTS adequate in many of these domains;
work remains to be done in biochemical |
Some Networked Sensor
Node Developments
Sensor Node Energy
Roadmap
Comparison of Energy
Sources
Communication/Computation
Technology Projection
"“The network is the..."
|
|
|
“The network is the sensor” |
|
(Oakridge National Labs) |
|
Requires robust distributed systems of thousands of
physically-embedded, unattended, and often untethered, devices. |
New Design Themes
|
|
|
|
Long-lived systems that can be
untethered and unattended |
|
Low-duty cycle operation with bounded
latency |
|
Exploit redundancy and heterogeneous tiered systems |
|
Leverage data processing inside the
network |
|
Thousands or millions of operations per
second can be done using energy of sending a bit over 10 or 100 meters |
|
Exploit computation near data to reduce
communication |
|
Self configuring systems that can be
deployed ad hoc |
|
Un-modeled physical world dynamics
makes systems appear ad hoc |
|
Measure and adapt to unpredictable
environment |
|
Exploit spatial diversity and density
of sensor/actuator nodes |
|
Achieve desired global behavior with
adaptive localized algorithms |
|
Can’t afford to extract dynamic state
information needed for centralized control |
From Embedded Sensing to
Embedded Control
|
|
|
|
|
Embedded in unattended “control
systems” |
|
Different from traditional Internet,
PDA, Mobility applications |
|
More than control of the sensor network
itself |
|
Critical applications extend beyond
sensing to control and actuation |
|
Transportation, Precision Agriculture,
Medical monitoring and drug delivery, Battlefied applications |
|
Concerns extend beyond traditional
networked systems |
|
Usability, Reliability, Safety |
|
|
|
Need systems architecture to manage
interactions |
|
Current system development: one-off,
incrementally tuned, stove-piped |
|
Serious repercussions for piecemeal
uncoordinated design: insufficient longevity, interoperability, safety,
robustness, scalability... |
Sample Layered
Architecture