Академический Документы
Профессиональный Документы
Культура Документы
CitySee
Protocols
Routing
Collection Tree Protocol (CTP) (SenSys09)
I prepare send a packet. I will not stop sending until the ACK comes!
3
Drawback
Waiting long time for the deterministic
forwarder wake-up
Longer delay
Energy waste
Opportunistic Forwarding
S
t
S
R1
R4
R1
R2
R3
R2
Reliable Link
Bursty Link
R3
R4
Drawback
S
R1
Data
Data
Data
R1
R1
R2
Data
R3
Data
R4
R3
R3
R2
R2
Reliable Link
Bursty Link
Traffic jam
6
Existing Techniques
Overhearing
Not scalable
Lossy link
Coordination
Extra control overhead
How to mitigate the influence of the duplicate in a lightweight and efficient way?
7
Probe
DOF Overview
S
R1
0 1 2 3 4
p
p
Data
R1
R1
R2
R3
R4
A 1 2 3 A 0
Data
R4
R3
R3
R2
R2
Reliable Link
Bursty Link
Slot Assignment
Routing progress
Routing progress: D
Mapping to
priority sequence
Hash
Priority
sequence
Zone 0
ACK slot
Zone 1
Zone 2
Mapping to an ACK
slot with randomness
10
Sender
P
T1
A
T2
Slot Inference
the received ACK
Tbase T 2 T1
A
T3
T r T3 T1
K s (T r T base ) / T slot
11
Slot Size
Large Slot Size
Less ACK slots
Robust
Retransmission
Data transmission failure
Link failure
Mismatch of slot information
13
Tunnel Transmission
Take the benefit of the probe transmission
of the first packet.
Send
Queue
R1
R4
R3
R2
14
Evaluation
Telosb nodes
ORW (IPSN12)
Duplicate
18
18
Conclusion
DOF is a practical opportunistic forwarding technique tailored
to duty-cycled WSNs.
Key design
Exploiting the temporal diversity of ACK
Evaluation
Indoor testbeds
Good performance under various traffic loads
Future works
Large-scale test
Different hardware
19
19
Thank you!
Question?
20
21