vault backup: 2024-10-12 13:15:08
This commit is contained in:
parent
cb14ce6660
commit
12281d0131
10 changed files with 158 additions and 14 deletions
28
.obsidian/workspace.json
vendored
28
.obsidian/workspace.json
vendored
|
@ -13,7 +13,7 @@
|
||||||
"state": {
|
"state": {
|
||||||
"type": "markdown",
|
"type": "markdown",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Autonomous Networking/notes/3 WSN.md",
|
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||||
"mode": "source",
|
"mode": "source",
|
||||||
"source": false
|
"source": false
|
||||||
}
|
}
|
||||||
|
@ -85,7 +85,7 @@
|
||||||
"state": {
|
"state": {
|
||||||
"type": "backlink",
|
"type": "backlink",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Autonomous Networking/notes/3 WSN.md",
|
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||||
"collapseAll": false,
|
"collapseAll": false,
|
||||||
"extraContext": false,
|
"extraContext": false,
|
||||||
"sortOrder": "alphabetical",
|
"sortOrder": "alphabetical",
|
||||||
|
@ -102,7 +102,7 @@
|
||||||
"state": {
|
"state": {
|
||||||
"type": "outgoing-link",
|
"type": "outgoing-link",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Autonomous Networking/notes/3 WSN.md",
|
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||||
"linksCollapsed": false,
|
"linksCollapsed": false,
|
||||||
"unlinkedCollapsed": true
|
"unlinkedCollapsed": true
|
||||||
}
|
}
|
||||||
|
@ -125,7 +125,7 @@
|
||||||
"state": {
|
"state": {
|
||||||
"type": "outline",
|
"type": "outline",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Autonomous Networking/notes/3 WSN.md"
|
"file": "Autonomous Networking/notes/4 WSN pt. 2.md"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
@ -177,7 +177,7 @@
|
||||||
"state": {
|
"state": {
|
||||||
"type": "markdown",
|
"type": "markdown",
|
||||||
"state": {
|
"state": {
|
||||||
"file": "Autonomous Networking/notes/4 WSN2.md",
|
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||||
"mode": "source",
|
"mode": "source",
|
||||||
"source": false
|
"source": false
|
||||||
}
|
}
|
||||||
|
@ -198,12 +198,18 @@
|
||||||
},
|
},
|
||||||
"active": "e23f9dfc04a75f51",
|
"active": "e23f9dfc04a75f51",
|
||||||
"lastOpenFiles": [
|
"lastOpenFiles": [
|
||||||
"Autonomous Networking/notes/4 WSN2.md",
|
|
||||||
"Autonomous Networking/notes/3 WSN.md",
|
|
||||||
"Autonomous Networking/slides/4 WSN2.pdf",
|
"Autonomous Networking/slides/4 WSN2.pdf",
|
||||||
|
"Untitled.md",
|
||||||
|
"Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||||
|
"Autonomous Networking/images/Pasted image 20241011191033.png",
|
||||||
|
"Autonomous Networking/images/Pasted image 20241011182343.png",
|
||||||
|
"Autonomous Networking/images/Pasted image 20241011182036.png",
|
||||||
|
"Autonomous Networking/images/Pasted image 20241011182031.png",
|
||||||
|
"Autonomous Networking/images/Pasted image 20241011180413.png",
|
||||||
|
"Autonomous Networking/images/Pasted image 20241011175026.png",
|
||||||
|
"Autonomous Networking/notes/3 WSN.md",
|
||||||
"Autonomous Networking/slides/3 WSN.pdf",
|
"Autonomous Networking/slides/3 WSN.pdf",
|
||||||
"Autonomous Networking/notes/2 RFID.md",
|
"Autonomous Networking/notes/2 RFID.md",
|
||||||
"Untitled.md",
|
|
||||||
"BUCA/Queues.md",
|
"BUCA/Queues.md",
|
||||||
"BUCA",
|
"BUCA",
|
||||||
"Biometric Systems/slides/LEZIONE2_Indici_di_prestazione.pdf",
|
"Biometric Systems/slides/LEZIONE2_Indici_di_prestazione.pdf",
|
||||||
|
@ -216,12 +222,6 @@
|
||||||
"Autonomous Networking/images/Pasted image 20241002235555.png",
|
"Autonomous Networking/images/Pasted image 20241002235555.png",
|
||||||
"Autonomous Networking/images/Pasted image 20241002235259.png",
|
"Autonomous Networking/images/Pasted image 20241002235259.png",
|
||||||
"Autonomous Networking/images/Pasted image 20241002235016.png",
|
"Autonomous Networking/images/Pasted image 20241002235016.png",
|
||||||
"Autonomous Networking/images/Pasted image 20241002234319.png",
|
|
||||||
"Autonomous Networking/images/Pasted image 20241002233803.png",
|
|
||||||
"Biometric Systems/images/Pasted image 20241002181932.png",
|
|
||||||
"Biometric Systems/images/Pasted image 20241002181936.png",
|
|
||||||
"Biometric Systems/images/Pasted image 20241002135922.png",
|
|
||||||
"Autonomous Networking/images/Pasted image 20241002114133.png",
|
|
||||||
"Biometric Systems/final notes/1. Introduction.md",
|
"Biometric Systems/final notes/1. Introduction.md",
|
||||||
"Foundation of data science/slides/Untitled.md",
|
"Foundation of data science/slides/Untitled.md",
|
||||||
"conflict-files-obsidian-git.md",
|
"conflict-files-obsidian-git.md",
|
||||||
|
|
BIN
Autonomous Networking/images/Pasted image 20241011175026.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011175026.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 7.1 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011180413.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011180413.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 21 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011182031.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011182031.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 42 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011182036.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011182036.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 42 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011182343.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011182343.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 69 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011191033.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011191033.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 103 KiB |
144
Autonomous Networking/notes/4 WSN pt. 2.md
Normal file
144
Autonomous Networking/notes/4 WSN pt. 2.md
Normal file
|
@ -0,0 +1,144 @@
|
||||||
|
### Communication patterns
|
||||||
|
- **Broadcast**
|
||||||
|
- a broadcast pattern is generally used by a base station (sink) to transmit information to all sensor nodes of the network
|
||||||
|
- **Convergecast or data gathering (all/many to 1)**
|
||||||
|
- all or a group of sensors comunicate to the sink
|
||||||
|
- typically used to collect sensed data
|
||||||
|
|
||||||
|
We need to define a good MAC protocol for wireless sensor networks, the following attrivutes must be considered:
|
||||||
|
- energy efficiency
|
||||||
|
- scatability and adaptability to changes
|
||||||
|
Latency, throughput and bandwidth utilization may be secondary, but desirable.
|
||||||
|
|
||||||
|
### Reasons of energy waste
|
||||||
|
- Collision: they need to be discarded and retransmitted
|
||||||
|
- Overhearing: node receiving packet destined to other nodes
|
||||||
|
- Control-packet overhead
|
||||||
|
- Idle listening
|
||||||
|
- Overemitting: destination not ready
|
||||||
|
|
||||||
|
## S-MAC protocol
|
||||||
|
S-MAC: Sleep MAC
|
||||||
|
|
||||||
|
As idle listening consumes significant energy (50-100% of the energy required for receiving), the solution is to periodic listen and sleep, with a listen duty cycle of about 10% (e.g. listen 200ms and sleep 2s).
|
||||||
|
|
||||||
|
![[Pasted image 20241011175026.png]]
|
||||||
|
|
||||||
|
- Duration of sleep and listen cycles are the same for all nodes
|
||||||
|
- All nodes are free to choose their own listen/sleep schedules
|
||||||
|
- to reduce control overhead, **neighbor nodes are syncronized together**
|
||||||
|
- neighboring nodes form **virtual clusters** so as to set up a common sleep schedule
|
||||||
|
- each node maintaines a table with neighbors’ schedule
|
||||||
|
- table entries are filled when the node receives sync packets
|
||||||
|
- SYNC packets are exchanged periodically to maintain schedule synchronization
|
||||||
|
- they are sent every SINCHRONYZATION PERIOD
|
||||||
|
- Receivers will adjust their timer counters immediately after they receive the SYNC packet
|
||||||
|
|
||||||
|
- If there are no neighbors, the node will chose a random schedule. These nodes will be called **synchronizers**, nodes who receive a schedule are called **followers**.
|
||||||
|
|
||||||
|
- In a large network we cannot guarantee that all nodes follow the same schedule
|
||||||
|
- node on the border will follow both schedules
|
||||||
|
- they need to broadcast packet twice, for schedule 1 and 2
|
||||||
|
![[Pasted image 20241011180413.png]]
|
||||||
|
|
||||||
|
|
||||||
|
#### Collision avoidance
|
||||||
|
- RTS/CTS with duration is used (so NAV is used for backoff)
|
||||||
|
- carrier sense before initiating a transmission
|
||||||
|
- neighbor nodes of both sender and receiver sleeps during transmission to save power
|
||||||
|
|
||||||
|
- listen time is divided into minislots
|
||||||
|
- sender selects a minislot to end carrier sense
|
||||||
|
- if channel is free it transmits SYNC in the next minislot
|
||||||
|
|
||||||
|
### S-MAC Performance evaluation
|
||||||
|
- Topology: Two-hop network with two sources and two sinks
|
||||||
|
- Sources periodically generate a sensing message which is divided into fragments
|
||||||
|
- Traffic load is changed by varying the inter-arrival period of the messages: (for inter-arrival period of 5s, a message is generated every 5s by each source. Here it varies between 1-10s)
|
||||||
|
![[Pasted image 20241011182036.png]]
|
||||||
|
|
||||||
|
- In each test, there are 10 messages generated on each source node
|
||||||
|
- Each message has 10 fragments, and each fragment has 40 bytes (200 data packets to be passed from sources to sinks)
|
||||||
|
- The total energy consumption of each node is measured for sending this fixed amount of data
|
||||||
|
![[Pasted image 20241011182343.png]]
|
||||||
|
|
||||||
|
- S-MAC consumes much less energy than 802.11-like protocol without sleeping
|
||||||
|
- At heavy load, idle listening rarely happens, energy savings from sleeping is very limited
|
||||||
|
- At light load, periodic sleeping plays a key role
|
||||||
|
|
||||||
|
Conclusions:
|
||||||
|
- A mainly static network is assumed
|
||||||
|
- Trades off latency for reduced energy consumption
|
||||||
|
- Redundant data is still sent with increased latency
|
||||||
|
|
||||||
|
### Routing
|
||||||
|
- routing technique is needed to establish multi-hop communication
|
||||||
|
- the routing strategy should ensure
|
||||||
|
- mminimun energy consumption
|
||||||
|
- maximization of the network lifetime
|
||||||
|
|
||||||
|
#### Ad Hoc Routing Protocols – Classification
|
||||||
|
- **network topology**
|
||||||
|
- flat
|
||||||
|
- hierarchical
|
||||||
|
- **which data is used to identify nodes**
|
||||||
|
- arbitrary identifier
|
||||||
|
- the position of a node
|
||||||
|
- can be used to assist in geographical routing problems to decide next hop
|
||||||
|
- scalable and suitable for sensor networks
|
||||||
|
|
||||||
|
##### Flat routing protocols
|
||||||
|
Three main categories
|
||||||
|
|
||||||
|
- Proactive protocols (table driven)
|
||||||
|
- always tries to keep routing data up-to-date
|
||||||
|
- active before tables are actually needed
|
||||||
|
- routes are always already known
|
||||||
|
- more bandwidth and energy usage
|
||||||
|
- Reactive protocols
|
||||||
|
- route determined only when needed
|
||||||
|
- operates on demand
|
||||||
|
- when a route is needed, a kind of global search is started
|
||||||
|
- causes delays if routes are not already cached
|
||||||
|
- Hybrid protocols
|
||||||
|
- combination of these behaviors
|
||||||
|
|
||||||
|
### Destination Sequence Distance Vector (DSDV)
|
||||||
|
- based on bellman-ford algorithm
|
||||||
|
- proactive protocol
|
||||||
|
- add aging information to avoid routing loops
|
||||||
|
- on topology change, send incremental route updates
|
||||||
|
- unstable route updates are delayed
|
||||||
|
|
||||||
|
![[Pasted image 20241011191033.png]]
|
||||||
|
|
||||||
|
- to avoid loops, DSDV adds a **sequence number** to each routing table entry which is periodically updated. Routes with higher sequence number are preferred
|
||||||
|
|
||||||
|
##### Reactive protocols
|
||||||
|
|
||||||
|
### Flooding
|
||||||
|
- copies of incoming packets are sent by every link except the one by which the packet is arrived
|
||||||
|
- generates a lot of superfluous traffic
|
||||||
|
- flooding is a reactive technique, and does not require costly topology maintenance and complex route discovery algorithms
|
||||||
|
|
||||||
|
Characteristics:
|
||||||
|
- derivery is guaranteed (e grazie al cazzo)
|
||||||
|
- one copy will arrive by the quickest possible route (wow)
|
||||||
|
|
||||||
|
Drawbacks:
|
||||||
|
- implosion: duplicated messages are broadcasted to the same node
|
||||||
|
- overlap: if two nodes share the same under observation region, both of them may sense the same stimuli at the same time. As a result, neighbor nodes receive duplicated messages
|
||||||
|
- resource blindness (no knowledge about the available resources)
|
||||||
|
- does not take into consideration all the available energy resources
|
||||||
|
- consumes a lot of energy
|
||||||
|
|
||||||
|
### Gossiping
|
||||||
|
- nodes send the incoming packages to a randomly selected neighbor
|
||||||
|
- avoids implosion, but it takes long to propagate the message
|
||||||
|
|
||||||
|
### Dynamic Source Routing (DSR)
|
||||||
|
- Source routing: Each data packet sent carries in its header the complete, ordered list of nodes through which the packet will pass
|
||||||
|
- The sender can select and control the routes used for its own packets and supports the use of multiple routes to any destination
|
||||||
|
|
||||||
|
|
||||||
|
not finished yet
|
Loading…
Reference in a new issue