Predictability and Efficiency in Predictability and Efficiency in - - PowerPoint PPT Presentation

predictability and efficiency in predictability and
SMART_READER_LITE
LIVE PREVIEW

Predictability and Efficiency in Predictability and Efficiency in - - PowerPoint PPT Presentation

Predictability and Efficiency in Predictability and Efficiency in Wireless Sensor Networks Lothar Thiele Jan Beutel Federico Ferrari, Matthias Keller, Roman Lim, Andreas Meier, Clemens Moser, MustafaYuecel, Matthias Woehrle P


slide-1
SLIDE 1

Predictability and Efficiency in Predictability and Efficiency in Wireless Sensor Networks

Lothar Thiele

Jan Beutel Federico Ferrari, Matthias Keller, Roman Lim, Andreas Meier, Clemens Moser, MustafaYuecel, Matthias Woehrle

slide-2
SLIDE 2

P di t bilit d ffi i Predictability and efficiency

influences the whole life cycle, and is integrated into all abstraction layers and is integrated into all abstraction layers.

slide-3
SLIDE 3

Overview

  • Sensor Networks – A Critical Review
  • Predictability and Efficiency

– Testing and Verification – Protocols – Energy Scavenging

  • PermaSense

3

slide-4
SLIDE 4

Wireless Sensor Networks Visions

1991 1999 2000 1996 2003 2001 2004

Visions

1991 1999 2000 1996 2003 2001 2004 Ubiquitous Vision Scale Free Networks Smart Dust Directed Diffusion COTS Dust PicoRadio Wireless Paintable Terminodes

Applications

2004 2000 2003 2001 Overlay Computing Military Surveillance Argo Shooter Localization James Reserve ZebraNet Sensor Webs Duck Island

4

slide-5
SLIDE 5

Argo – Global Ocean Observation Strategy

  • Global array of temperature/salinity profiling floats

– Satellite data relay to data centers on shore – Operational since 2000 – Developed and maintained mainly by oceanographers

5

slide-6
SLIDE 6

Wireless Sensor Networks Visions

1991 1999 2000 1996 2003 2001 2004

Visions

1991 1999 2000 1996 2003 2001 2004 Ubiquitous Vision Scale Free Networks Smart Dust Directed Diffusion COTS Dust PicoRadio Wireless Paintable Terminodes

Applications

2004 2000 2003 2001 Overlay Computing

WSN Community

Military Surveillance Argo Shooter Localization James Reserve

Prototypes, Experiments

ZebraNet Sensor Webs Duck Island

and Research Demos

6

slide-7
SLIDE 7

“Proof-of-Concept” Deployment Experience

eley] ey] tta, UC Berke ta, UC Berkel [Prabal Dut [Prabal Dutt TU Delft] Berkeley] Langendoen, nn Tolle, UC B [Koen L [Gilman 7

slide-8
SLIDE 8

Promises

  • Sensor nodes are cheap, so we can have plenty of

p, p y them.

  • Nodes may be cheap, but deployment and

y p, p y maintenance is expensive.

  • Additional redundant nodes make the system fault
  • Additional redundant nodes make the system fault

tolerant automatically.

  • More nodes make the system more fragile
  • More nodes make the system more fragile.

8

slide-9
SLIDE 9

Overview

  • Sensor Networks – A Critical Review
  • Predictability and Efficiency

– Testing and Verification – Protocols – Energy Scavenging

  • PermaSense

9

slide-10
SLIDE 10

Today's WSN Design and Development Simulation

TOSSIM

TOSSIM [Levis2003] PowerTOSSIM [Shnayder2004] Avrora [Titzer2005]

Deployment Virtualization and Emulation

EmStar [Ganesan2004]

ale

Deployment

In-network reprogramming

[Levis2004,Hui2004]

C lib ti d V ifi ti EmStar [Ganesan2004]

BEE [Chang2003,Kuusilinna2003]

Sca

id

Calibration and Verification

[Szewczyk2004]

Trial-and-error [Mainwaring2004,

Hemingway2004,Cerpa2001]

Test Grids

moteLab [Werner-Allen2005] Emstar arrays [Cerpa03/04] Dependence on infrastructure

[Szewczyk2004]

Reality

Figure abridged from D. Estrin/J. Elson

Emstar arrays [Cerpa03/04]

Kansei [Dutta2005]

10

slide-11
SLIDE 11

DSN: Result Comparison and Research Questions

Platform Runtime Test success Tossim .5 minutes 80% DSN Testbed 11 minutes 0%

  • How can we formally

y specify tests (driver, monitor, evaluation)?

  • How can we proof the
  • How can we proof the

correctness of a test result (synchronization, ti ll d d partially ordered events)?

11

slide-12
SLIDE 12

Testbed Example: Deployment-Support Network (DSN) l S k Developer Deployment-Support Network

Temporary, minimal invasive Virtual connections to nodes

Developer Access

Virtual connections to nodes

Reliable, wireless, scalable

Target Sensor Network Network

12

slide-13
SLIDE 13

Testbed Example: The Deployment-Support Network Testbed Functions

Remote reprogramming

Remote reprogramming

Extraction of log data Analysis

R i t ti

Regression testing

Target Sensor Network Network

13

slide-14
SLIDE 14

DSN Architecture Details

14

slide-15
SLIDE 15

DSN Example –Test Case Generation

15

slide-16
SLIDE 16

DSN Example – Network Control

16

slide-17
SLIDE 17

DSN Example - Sniffer Three-Layer concept

  • WSN application
  • Spy-nodes listening
  • DSN for collecting

captured traffic captured traffic

Evaluation Tool for further l i analysis

17

slide-18
SLIDE 18

DSN Example - Sniffer

18

slide-19
SLIDE 19

DSN: Physical Characterization Architecture

  • Emulating the Environment...

– Temperature Cycle Testing (TCT) Temperature Cycle Testing (TCT)

  • ... and Resource Usage

– Different Power Sources: Batteries, rechargeable cells, Different Power Sources: Batteries, rechargeable cells, solar, fixed DC power...

19

slide-20
SLIDE 20

DSN: 4 Nodes – Long Term Power Profiling Details

20

slide-21
SLIDE 21

DSN: Formal Conformance Testing of Power Traces

21

slide-22
SLIDE 22

DSN: Formal Conformance Testing of Power Traces

  • Use of timed automata for conformance testing
  • Modular modeling of
  • Modular modeling of

– Hardware S ft – Software – Testing Environment – Trace

  • Complexity reduction by

p y y

– noise removal – abstraction and interval arithmetic

  • Testing by reachability analysis of the composed

model (UPPAAL)

22

model (UPPAAL)

slide-23
SLIDE 23

DSN: Formal Conformance Testing of Power Traces

  • Experiment

– TMOTE Sky (MSP 430 TI CC2420) running TinyOS2 TMOTE Sky (MSP 430, TI CC2420) running TinyOS2 – Harvester application, LPL MAC protocol – Besides testing a correct run (complex trace) several Besides testing a correct run (complex trace), several errors have been introduced (missing wake-up, inject error in low power scheduler, wrong low power state of p g p MC, specification error).

23

slide-24
SLIDE 24

DSN: Formal Conformance Testing of Power Traces H d M d l Hardware Model Trace Automaton

24

slide-25
SLIDE 25

DSN: Formal Conformance Testing of Power Traces Software Model Verification Results

25

slide-26
SLIDE 26

Conclusion

  • Deployment Support Network (DSN)

– integrated into continuous integration tool chain including regression test – enables design, early deployment and testing of distributed embedded systems

  • code distribution
  • distributed unit test
  • application control
  • application control
  • distributed trace analysis
  • physical parameter testing

26

slide-27
SLIDE 27

Overview

  • Sensor Networks – A Critical Review
  • Predictability and Efficiency

– Testing and Verification – Protocols – Energy Scavenging

  • PermaSense

27

slide-28
SLIDE 28

Motivation – Wireless fire-alarm system

  • Wiring a building is cumbersome/costly or not possible
  • Project collaboration with

Project collaboration with

– Large buildings requires scalable (multi-hop) solution

28

slide-29
SLIDE 29

Requirements for a Fire-Alarm System

  • 1. Event reporting1:

Al d l 10 d ( d t i k) – Alarm delay: ≤ 10 seconds (node to sink) – Robust and reliable

  • 2. Status monitoring1:

– Node failure report: ≤ 5 minutes (at the sink)

  • 3. Energy efficiency:

gy y

– Lifetime greater than 3 years (on 2xAA): < 1% duty cycle

→ Large deployments require multi hop solution → Large deployments require multi-hop solution

1 European Norm (EN) 54-25:2008-06, June 2008

29

European Norm (EN) 54 25:2008 06, June 2008

slide-30
SLIDE 30

Link Analysis – Distance vs. Packet Reception Rate (PRR)

Gray Area

30

slide-31
SLIDE 31

Link Analysis – Time vs. PRR (Link Stability)

88 % 88 % 12 % 12 %

31

slide-32
SLIDE 32

Dwarf Algorithm: Network Structure

  • Nodes are organized in rings

– according to their distance to the nearest sink

  • The neighbors of node u are divided into parents Nu

−, peers

Nu

0, and children Nu +

– depending on the ring they belong to

Towards sink

32

slide-33
SLIDE 33

Dwarf Algorithm: Node Observation

  • Exchange status messages

A) Detect node and link failures B) K k h d l d

May interfere with

B) Keep wake-up schedules up to date

  • Ring based status information aggregation

y alarm forwarding Ring based status information aggregation

– From the outer rings to towards the sink

33

slide-34
SLIDE 34

Dwarf Algorithm: Alarm Forwarding

  • Idea: Constrained flooding in combination with a delay-

Idea: Constrained flooding in combination with a delay aware nodes selection strategy

  • Alarm is forwarded to k neighbors

– Degree k: redundancy vs message complexity Degree k: redundancy vs. message complexity

S l t f di d di th i k ti d

  • Select forwarding nodes according their wake-up times and

relative positions

– Reduce alarm notification time Reduce alarm notification time

34

slide-35
SLIDE 35

Dwarf Algorithm: Performance Evaluation

  • 80 nodes based on real wired

placement

– provided by Siemens – 1-5 hops (3 on avg.) 2 fl – 2 floors

Verified by GloMoSim simulation

Sink

  • Verified by GloMoSim simulation

P t t d

Sink

  • Patented
  • Part of future product

35

slide-36
SLIDE 36

Conclusion

  • Problem: Safety critical alarm reporting requires

– Robustness and timeliness and energy efficiency and gy y monitoring

  • Protocol Solution: Dwarf

– Constrained flooding with delay-aware node selection – Ring based monitoring g g

  • Integrated with reliable link estimation and initialization.

36

slide-37
SLIDE 37

Overview

  • Sensor Networks – A Critical Review
  • Predictability and Efficiency

– Testing and Verification – Protocols – Energy Scavenging

  • PermaSense

37

slide-38
SLIDE 38

Motivation

[Heliomote: Srivastava] [Prometheus: Culler]

38 Computer Engineering and Networks Laboratory TIK

BTnode

slide-39
SLIDE 39

C

What is different?

Conventional energy management:

How do we save energy ?

Energy harvesting:

In addition: When do we use energy ? In addition: When do we use energy ?

[Sunergy: June 2006]

39 Computer Engineering and Networks Laboratory TIK
slide-40
SLIDE 40

System Model

Overview

40 Computer Engineering and Networks Laboratory TIK
slide-41
SLIDE 41

System Model

Optimization problem: finite horizon control

t current time t t current state (memory, battery, …) current environment (input power)

41 Computer Engineering and Networks Laboratory TIK
slide-42
SLIDE 42

System Model

Linear program (LP) specification (example)

Maximize minimal sensing rate

42 Computer Engineering and Networks Laboratory TIK
slide-43
SLIDE 43

System Model

Optimization problem: finite horizon control

t

43 Computer Engineering and Networks Laboratory TIK
slide-44
SLIDE 44

System Model

Optimization problem: finite horizon control

t

44 Computer Engineering and Networks Laboratory TIK
slide-45
SLIDE 45

Solving a linear program (LP) in a resource-constraint sensor node resource-constraint sensor node at each time step ?

45 Computer Engineering and Networks Laboratory TIK
slide-46
SLIDE 46

Multiparametric Linear Programming

Calculate optimal solution of the mp-LP

as an explicit function of the state vector p

46 Computer Engineering and Networks Laboratory TIK
slide-47
SLIDE 47

Online complexity of mp-LP

sometimes acceptable sometimes acceptable …

47 Computer Engineering and Networks Laboratory TIK
slide-48
SLIDE 48

O li l i f P Online complexity of mp-LP

9x7 matrices

sometimes not.

Bottleneck !!!

9x7 matrices

sometimes not. Bottleneck !!!

48 Computer Engineering and Networks Laboratory TIK
slide-49
SLIDE 49

Hierarchical Control Design

Benefits

The upper layer avoids depletion of the energy

pp y p gy storage and increases robustness of the system

The complexity of the online controller is reduced

The complexity of the online controller is reduced significantly

49 Computer Engineering and Networks Laboratory TIK

Reduction: 83.0 % 91.0 %

slide-50
SLIDE 50

Conclusion

Using methods from automatic control to achieve predictability and efficiency Cyberphysical Systems

50 Computer Engineering and Networks Laboratory TIK
slide-51
SLIDE 51

Overview

  • Sensor Networks – A Critical Review
  • Predictability and Efficiency

– Testing and Verification – Protocols – Energy Scavenging

  • PermaSense

51

slide-52
SLIDE 52

PermaSense – Aims and Vision With PermaSense, we aim to:

– provide long-term high-quality sensing in harsh environments – obtain measurements that have previously been impossible (high resolution in time and space) impossible (high resolution in time and space) – provide relevant information for research or decision making

Reliability, delivery of information in near real- time, and integration of diverse sensors are , g ingredients for the next generation of early- warning systems.

52

slide-53
SLIDE 53

PermaSense – The Matterhorn

  • Located in Zermatt, CH
  • 4478 m

4478 m

  • Site of recent rockfall due

to extreme warming to extreme warming (07/2003)

– 25 nodes – Mutliple sensors – −40 to +65° C R kf ll d i – Rockfall, snow and ice, avalanches – 30 min. duty-cycle y y – 3 years unattended lifetime

53

slide-54
SLIDE 54

PermaSense Site – The Deployment Region Hö li Rid Hörnli Ridge 3500 m asl

54

slide-55
SLIDE 55

PermaSense – Transport

55

slide-56
SLIDE 56

PermaSense – System Architecture

56

slide-57
SLIDE 57

PermaSense – Sensor Stations on the Mountain

57

slide-58
SLIDE 58

PermaSense – Base Station

  • Powerful embedded Linux
  • 4 GB storage, all data duplicated

g , p

  • Solar power (2x 90W, 100 Ah, ~3 weeks)
  • Backup modem
  • Backup modem

58

slide-59
SLIDE 59

Next Challenges

  • Seismic/resistivity tomography

actuation and i sensing

59

slide-60
SLIDE 60

Further Reading

60

http://www.btnode.ethz.ch

slide-61
SLIDE 61

P di t bilit d ffi i Predictability and efficiency

influences the whole life cycle, and is integrated into all abstraction layers and is integrated into all abstraction layers.

slide-62
SLIDE 62

Acknowlegement

  • People:

– Jan Beutel – Federico Ferrari, Matthias Keller, Roman Lim, Andreas Meier, Clemens Moser, Mustafa Yuecel, Nikolay Stoimenov, Matthias Woehrle Woehrle

Funding:

  • Funding:

– SNF Switzerland (via the NCCR MICS program) – BAFU BAFU – Competence Centre Environment and Sustainability (CCES) – Siemens Building Technologies – CTI: The Swiss Innovation Promotion Agency

62

slide-63
SLIDE 63