vault backup: 2024-10-12 13:15:08
This commit is contained in:
parent
cb14ce6660
commit
12281d0131
10 changed files with 158 additions and 14 deletions
28
.obsidian/workspace.json
vendored
28
.obsidian/workspace.json
vendored
|
@ -13,7 +13,7 @@
|
|||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Autonomous Networking/notes/3 WSN.md",
|
||||
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
|
@ -85,7 +85,7 @@
|
|||
"state": {
|
||||
"type": "backlink",
|
||||
"state": {
|
||||
"file": "Autonomous Networking/notes/3 WSN.md",
|
||||
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||
"collapseAll": false,
|
||||
"extraContext": false,
|
||||
"sortOrder": "alphabetical",
|
||||
|
@ -102,7 +102,7 @@
|
|||
"state": {
|
||||
"type": "outgoing-link",
|
||||
"state": {
|
||||
"file": "Autonomous Networking/notes/3 WSN.md",
|
||||
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||
"linksCollapsed": false,
|
||||
"unlinkedCollapsed": true
|
||||
}
|
||||
|
@ -125,7 +125,7 @@
|
|||
"state": {
|
||||
"type": "outline",
|
||||
"state": {
|
||||
"file": "Autonomous Networking/notes/3 WSN.md"
|
||||
"file": "Autonomous Networking/notes/4 WSN pt. 2.md"
|
||||
}
|
||||
}
|
||||
},
|
||||
|
@ -177,7 +177,7 @@
|
|||
"state": {
|
||||
"type": "markdown",
|
||||
"state": {
|
||||
"file": "Autonomous Networking/notes/4 WSN2.md",
|
||||
"file": "Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||
"mode": "source",
|
||||
"source": false
|
||||
}
|
||||
|
@ -198,12 +198,18 @@
|
|||
},
|
||||
"active": "e23f9dfc04a75f51",
|
||||
"lastOpenFiles": [
|
||||
"Autonomous Networking/notes/4 WSN2.md",
|
||||
"Autonomous Networking/notes/3 WSN.md",
|
||||
"Autonomous Networking/slides/4 WSN2.pdf",
|
||||
"Untitled.md",
|
||||
"Autonomous Networking/notes/4 WSN pt. 2.md",
|
||||
"Autonomous Networking/images/Pasted image 20241011191033.png",
|
||||
"Autonomous Networking/images/Pasted image 20241011182343.png",
|
||||
"Autonomous Networking/images/Pasted image 20241011182036.png",
|
||||
"Autonomous Networking/images/Pasted image 20241011182031.png",
|
||||
"Autonomous Networking/images/Pasted image 20241011180413.png",
|
||||
"Autonomous Networking/images/Pasted image 20241011175026.png",
|
||||
"Autonomous Networking/notes/3 WSN.md",
|
||||
"Autonomous Networking/slides/3 WSN.pdf",
|
||||
"Autonomous Networking/notes/2 RFID.md",
|
||||
"Untitled.md",
|
||||
"BUCA/Queues.md",
|
||||
"BUCA",
|
||||
"Biometric Systems/slides/LEZIONE2_Indici_di_prestazione.pdf",
|
||||
|
@ -216,12 +222,6 @@
|
|||
"Autonomous Networking/images/Pasted image 20241002235555.png",
|
||||
"Autonomous Networking/images/Pasted image 20241002235259.png",
|
||||
"Autonomous Networking/images/Pasted image 20241002235016.png",
|
||||
"Autonomous Networking/images/Pasted image 20241002234319.png",
|
||||
"Autonomous Networking/images/Pasted image 20241002233803.png",
|
||||
"Biometric Systems/images/Pasted image 20241002181932.png",
|
||||
"Biometric Systems/images/Pasted image 20241002181936.png",
|
||||
"Biometric Systems/images/Pasted image 20241002135922.png",
|
||||
"Autonomous Networking/images/Pasted image 20241002114133.png",
|
||||
"Biometric Systems/final notes/1. Introduction.md",
|
||||
"Foundation of data science/slides/Untitled.md",
|
||||
"conflict-files-obsidian-git.md",
|
||||
|
|
BIN
Autonomous Networking/images/Pasted image 20241011175026.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011175026.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 7.1 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011180413.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011180413.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 21 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011182031.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011182031.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 42 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011182036.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011182036.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 42 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011182343.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011182343.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 69 KiB |
BIN
Autonomous Networking/images/Pasted image 20241011191033.png
Normal file
BIN
Autonomous Networking/images/Pasted image 20241011191033.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 103 KiB |
144
Autonomous Networking/notes/4 WSN pt. 2.md
Normal file
144
Autonomous Networking/notes/4 WSN pt. 2.md
Normal file
|
@ -0,0 +1,144 @@
|
|||
### Communication patterns
|
||||
- **Broadcast**
|
||||
- a broadcast pattern is generally used by a base station (sink) to transmit information to all sensor nodes of the network
|
||||
- **Convergecast or data gathering (all/many to 1)**
|
||||
- all or a group of sensors comunicate to the sink
|
||||
- typically used to collect sensed data
|
||||
|
||||
We need to define a good MAC protocol for wireless sensor networks, the following attrivutes must be considered:
|
||||
- energy efficiency
|
||||
- scatability and adaptability to changes
|
||||
Latency, throughput and bandwidth utilization may be secondary, but desirable.
|
||||
|
||||
### Reasons of energy waste
|
||||
- Collision: they need to be discarded and retransmitted
|
||||
- Overhearing: node receiving packet destined to other nodes
|
||||
- Control-packet overhead
|
||||
- Idle listening
|
||||
- Overemitting: destination not ready
|
||||
|
||||
## S-MAC protocol
|
||||
S-MAC: Sleep MAC
|
||||
|
||||
As idle listening consumes significant energy (50-100% of the energy required for receiving), the solution is to periodic listen and sleep, with a listen duty cycle of about 10% (e.g. listen 200ms and sleep 2s).
|
||||
|
||||
![[Pasted image 20241011175026.png]]
|
||||
|
||||
- Duration of sleep and listen cycles are the same for all nodes
|
||||
- All nodes are free to choose their own listen/sleep schedules
|
||||
- to reduce control overhead, **neighbor nodes are syncronized together**
|
||||
- neighboring nodes form **virtual clusters** so as to set up a common sleep schedule
|
||||
- each node maintaines a table with neighbors’ schedule
|
||||
- table entries are filled when the node receives sync packets
|
||||
- SYNC packets are exchanged periodically to maintain schedule synchronization
|
||||
- they are sent every SINCHRONYZATION PERIOD
|
||||
- Receivers will adjust their timer counters immediately after they receive the SYNC packet
|
||||
|
||||
- If there are no neighbors, the node will chose a random schedule. These nodes will be called **synchronizers**, nodes who receive a schedule are called **followers**.
|
||||
|
||||
- In a large network we cannot guarantee that all nodes follow the same schedule
|
||||
- node on the border will follow both schedules
|
||||
- they need to broadcast packet twice, for schedule 1 and 2
|
||||
![[Pasted image 20241011180413.png]]
|
||||
|
||||
|
||||
#### Collision avoidance
|
||||
- RTS/CTS with duration is used (so NAV is used for backoff)
|
||||
- carrier sense before initiating a transmission
|
||||
- neighbor nodes of both sender and receiver sleeps during transmission to save power
|
||||
|
||||
- listen time is divided into minislots
|
||||
- sender selects a minislot to end carrier sense
|
||||
- if channel is free it transmits SYNC in the next minislot
|
||||
|
||||
### S-MAC Performance evaluation
|
||||
- Topology: Two-hop network with two sources and two sinks
|
||||
- Sources periodically generate a sensing message which is divided into fragments
|
||||
- Traffic load is changed by varying the inter-arrival period of the messages: (for inter-arrival period of 5s, a message is generated every 5s by each source. Here it varies between 1-10s)
|
||||
![[Pasted image 20241011182036.png]]
|
||||
|
||||
- In each test, there are 10 messages generated on each source node
|
||||
- Each message has 10 fragments, and each fragment has 40 bytes (200 data packets to be passed from sources to sinks)
|
||||
- The total energy consumption of each node is measured for sending this fixed amount of data
|
||||
![[Pasted image 20241011182343.png]]
|
||||
|
||||
- S-MAC consumes much less energy than 802.11-like protocol without sleeping
|
||||
- At heavy load, idle listening rarely happens, energy savings from sleeping is very limited
|
||||
- At light load, periodic sleeping plays a key role
|
||||
|
||||
Conclusions:
|
||||
- A mainly static network is assumed
|
||||
- Trades off latency for reduced energy consumption
|
||||
- Redundant data is still sent with increased latency
|
||||
|
||||
### Routing
|
||||
- routing technique is needed to establish multi-hop communication
|
||||
- the routing strategy should ensure
|
||||
- mminimun energy consumption
|
||||
- maximization of the network lifetime
|
||||
|
||||
#### Ad Hoc Routing Protocols – Classification
|
||||
- **network topology**
|
||||
- flat
|
||||
- hierarchical
|
||||
- **which data is used to identify nodes**
|
||||
- arbitrary identifier
|
||||
- the position of a node
|
||||
- can be used to assist in geographical routing problems to decide next hop
|
||||
- scalable and suitable for sensor networks
|
||||
|
||||
##### Flat routing protocols
|
||||
Three main categories
|
||||
|
||||
- Proactive protocols (table driven)
|
||||
- always tries to keep routing data up-to-date
|
||||
- active before tables are actually needed
|
||||
- routes are always already known
|
||||
- more bandwidth and energy usage
|
||||
- Reactive protocols
|
||||
- route determined only when needed
|
||||
- operates on demand
|
||||
- when a route is needed, a kind of global search is started
|
||||
- causes delays if routes are not already cached
|
||||
- Hybrid protocols
|
||||
- combination of these behaviors
|
||||
|
||||
### Destination Sequence Distance Vector (DSDV)
|
||||
- based on bellman-ford algorithm
|
||||
- proactive protocol
|
||||
- add aging information to avoid routing loops
|
||||
- on topology change, send incremental route updates
|
||||
- unstable route updates are delayed
|
||||
|
||||
![[Pasted image 20241011191033.png]]
|
||||
|
||||
- to avoid loops, DSDV adds a **sequence number** to each routing table entry which is periodically updated. Routes with higher sequence number are preferred
|
||||
|
||||
##### Reactive protocols
|
||||
|
||||
### Flooding
|
||||
- copies of incoming packets are sent by every link except the one by which the packet is arrived
|
||||
- generates a lot of superfluous traffic
|
||||
- flooding is a reactive technique, and does not require costly topology maintenance and complex route discovery algorithms
|
||||
|
||||
Characteristics:
|
||||
- derivery is guaranteed (e grazie al cazzo)
|
||||
- one copy will arrive by the quickest possible route (wow)
|
||||
|
||||
Drawbacks:
|
||||
- implosion: duplicated messages are broadcasted to the same node
|
||||
- overlap: if two nodes share the same under observation region, both of them may sense the same stimuli at the same time. As a result, neighbor nodes receive duplicated messages
|
||||
- resource blindness (no knowledge about the available resources)
|
||||
- does not take into consideration all the available energy resources
|
||||
- consumes a lot of energy
|
||||
|
||||
### Gossiping
|
||||
- nodes send the incoming packages to a randomly selected neighbor
|
||||
- avoids implosion, but it takes long to propagate the message
|
||||
|
||||
### Dynamic Source Routing (DSR)
|
||||
- Source routing: Each data packet sent carries in its header the complete, ordered list of nodes through which the packet will pass
|
||||
- The sender can select and control the routes used for its own packets and supports the use of multiple routes to any destination
|
||||
|
||||
|
||||
not finished yet
|
Loading…
Reference in a new issue