SlideShare a Scribd company logo
1 of 16
Introduction
The Purpose of Flooding
General forms
Typical Issues of Flooding
Another Issue in WSNs
POFA
Motivation
Key Idea
RA-MPR
RA-MPR Selection
Retransmission Policy
Numerical Result
Flooding Efficiency
Achieving the target Reliability
Conclusions
2Mobile Networking and Computing Lab.
3Mobile Networking and Computing Lab.
The primary
Propagates a message throughout a networks for certain purpose
To make sure that all the nodes in a network receive the same
NOT Routing
Source
Relay
Destination
The application
Routing
Bridging
4Mobile Networking and Computing Lab.
Blind flooding
All the nodes rebroadcast / relays / forwards the received message
An general form, also called as Simple Flooding
More transmission occurred, as the node density increases
Source
Relay
Destination
Advanced Flooding schemes
Probability-based
Area-based
Neighbor Knowledge Method-based / Topology-based / Tree-based
5Mobile Networking and Computing Lab.
Efficiency or Reliability
Source
Relay
Destination
Tradeoff Relation
If # of the predetermined relay nodes is reduced, they could fail to receive a broadcast packet
If # of the predetermined relay nodes is increased, they could incur Broadcast Storm
6Mobile Networking and Computing Lab.
Nasty Wireless Links
Hard to achieve high reliability
Retransmissions are needed / exploited
Source
Relay
New Question
How many times
Which node
7Mobile Networking and Computing Lab.
Multipoint Relay (MPR) Selection
Algorithm used to solve MCDS problem, in OSLR
Known as optimum solution
Me
1-hop Nbr
2-hop Nbr
MPR
Every link presumed to be error-free
Not guarantee Reliability
8Mobile Networking and Computing Lab.
Limitations of MPR Selection
Do not Aware Link error rates
Can not assure Reliability
Proposed scheme
to assure Reliability r
More 1-hop neighbors like MPR
More transmission (Retransmission / Rebroadcast)
9Mobile Networking and Computing Lab.
Expected Delivery Probability (EDP)
𝑙𝑖𝑗 : Error Rate of the Link i to j
as 1 times
m
s
1 − 𝑙 𝑠𝑚 𝑖𝑓 𝑚 ∈ 𝑁1
m
Me
1-hop Nbr
2-hop Nbr
1 −
𝑘∈𝑁1
1 − 1 − 𝑙 𝑠𝑘 1 − 𝑙 𝑘𝑚 𝑖𝑓 𝑚 ∈ 𝑁2
𝐸𝐷𝑃𝑚 =
𝐸𝐷𝑃𝑚
𝑛
=
1 − 𝑙 𝑠𝑚
𝑛
𝑖𝑓 𝑚 ∈ 𝑁1
1 −
𝑘∈𝑁1
1 − 1 − 𝑙 𝑠𝑘
𝑛
1 − 𝑙 𝑘𝑚 𝑖𝑓 𝑚 ∈ 𝑁2
as n times
𝐸𝐷𝑃𝑚
𝑛
=
1 − 𝑙 𝑠𝑚
𝑛
𝑖𝑓 𝑚 ∈ 𝑁1
1 −
𝑘∈𝑁 𝑅
1 − 1 − 𝑙 𝑠𝑘
𝑛
1 − 𝑙 𝑘𝑚 𝑖𝑓 𝑚 ∈ 𝑁2
10Mobile Networking and Computing Lab.
Reliability-aware multipoint relay (RA-MPR) Selection
To achieve a given Reliability
not to cover all 2-hop neighbors
𝐸𝐷𝑃 𝑛
RA-MPR Selection Algorithm
Me iteratively selects an RA-MPR among non-RA-MPR neighbors so as to increase the EDP most
Until the EDP satisfies the target reliability R
Me
1-hop Nbr
2-hop Nbr
0.2
0.12
0.02
0.1
0.14
0.1
0.07
1) R = 0.4
2) R = 0.95
=
𝑚∈𝑁1 𝑜𝑟 𝑁2
𝐸𝐷𝑃𝑚
𝑛
𝑁1 + 𝑁2
11Mobile Networking and Computing Lab.
The result of the real world
either a success or a failure in contrast to the probabilistic calculation like 0.3141592…
The number of the received packet MUST be a Natural Number
ms
Opportunistic Retransmission
Overhearing / BACK(Broadcast ACK) handling
ms
Stop!
Online EDP : Recalculated EDP with Real Result
Implicit ACK explicit ACK
Success : 𝑙 𝑠𝑖 → 0
Failure : 𝑙 𝑠𝑖 → 1 − 𝑃 𝑀 𝐴 ,
𝑃 𝑀 ∩ 𝐴
𝑃 𝐴
=
=
𝑘=1
𝑛
𝑛
𝑘
1 − 𝑙 𝑘
𝑙 𝑛
=
𝑘=0
𝑛
𝑛
𝑘
1 − 𝑙 𝑘
𝑙 𝑛
= 1 −
𝑙 𝑛
𝑃 𝐴
12Mobile Networking and Computing Lab.
Link Error Rate
Can be controlled (?)
13Mobile Networking and Computing Lab.
NTP
The total # of broadcasts divided by the # of nodes
As the link error rate increases
Not only a node, but also its 1-hop and 2-hop neighbors, probably, retransmit the packet more times
But can achieve high reliability (?)
14Mobile Networking and Computing Lab.
ATR
The achieved Reliability divided by the target reliability
As the link error rate increases
if including all one-hop neighbors as RA-MPRs cannot make the EDP greater than the target reliability
A sender increments the # of transmissions
Optimum Efficiency
15Mobile Networking and Computing Lab.
Predetermining Technique
The Predetermined RA-MPRs only can forwards the received packets the Predetermined time(s)
But retransmits opportunistically (but little)
The opportunistic transmission
In ExOR, MORE and SOAR, any node amongst Forwarder Candidate can forward it
Future work
Contribution Level based Opportunistic Flooding for Wireless Multihop Networks, 2015. 6
– 1 time revised
Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links, 2014.11
- 16 times revised
Mobile Networking and Computing Lab.

More Related Content

What's hot

Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Seung-gyu Byeon
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKScsandit
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movementtharindanv
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsSpiros Louvros
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
Lab 4 final report
Lab 4 final reportLab 4 final report
Lab 4 final reportKyle Villano
 
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
Lab Seminar 2009 06 17  Description Based Ad Hoc NetworksLab Seminar 2009 06 17  Description Based Ad Hoc Networks
Lab Seminar 2009 06 17 Description Based Ad Hoc Networkstharindanv
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 

What's hot (19)

Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-09-1주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
 
Opnet lab 1 solutions
Opnet lab 1 solutionsOpnet lab 1 solutions
Opnet lab 1 solutions
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
M045077578
M045077578M045077578
M045077578
 
20120140504014 2
20120140504014 220120140504014 2
20120140504014 2
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
Lab 4 final report
Lab 4 final reportLab 4 final report
Lab 4 final report
 
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
Lab Seminar 2009 06 17  Description Based Ad Hoc NetworksLab Seminar 2009 06 17  Description Based Ad Hoc Networks
Lab Seminar 2009 06 17 Description Based Ad Hoc Networks
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Tcp vs udp
Tcp vs udpTcp vs udp
Tcp vs udp
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Aa
AaAa
Aa
 
Can ppt
Can pptCan ppt
Can ppt
 

Similar to Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wireless sensor networks

Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference realUM
 
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Seung-gyu Byeon
 
A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksChandan Thakur
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networkscsandit
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 

Similar to Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wireless sensor networks (20)

D04622933
D04622933D04622933
D04622933
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference real
 
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
Mncs 16-08-3주-변승규-opportunistic flooding in low-duty-cycle wireless sensor ne...
 
enaam_olsr.pptx
enaam_olsr.pptxenaam_olsr.pptx
enaam_olsr.pptx
 
A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networks
 
A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols A Performance Comparison of TCP Protocols
A Performance Comparison of TCP Protocols
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
Data link control
Data link controlData link control
Data link control
 
A throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networksA throughput analysis of tcp in adhoc networks
A throughput analysis of tcp in adhoc networks
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Csit54201
Csit54201Csit54201
Csit54201
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Mncs 16-03-4주-변승규-a probabilistic and opportunistic flooding algorithm in wireless sensor networks

  • 1.
  • 2. Introduction The Purpose of Flooding General forms Typical Issues of Flooding Another Issue in WSNs POFA Motivation Key Idea RA-MPR RA-MPR Selection Retransmission Policy Numerical Result Flooding Efficiency Achieving the target Reliability Conclusions 2Mobile Networking and Computing Lab.
  • 3. 3Mobile Networking and Computing Lab. The primary Propagates a message throughout a networks for certain purpose To make sure that all the nodes in a network receive the same NOT Routing Source Relay Destination The application Routing Bridging
  • 4. 4Mobile Networking and Computing Lab. Blind flooding All the nodes rebroadcast / relays / forwards the received message An general form, also called as Simple Flooding More transmission occurred, as the node density increases Source Relay Destination Advanced Flooding schemes Probability-based Area-based Neighbor Knowledge Method-based / Topology-based / Tree-based
  • 5. 5Mobile Networking and Computing Lab. Efficiency or Reliability Source Relay Destination Tradeoff Relation If # of the predetermined relay nodes is reduced, they could fail to receive a broadcast packet If # of the predetermined relay nodes is increased, they could incur Broadcast Storm
  • 6. 6Mobile Networking and Computing Lab. Nasty Wireless Links Hard to achieve high reliability Retransmissions are needed / exploited Source Relay New Question How many times Which node
  • 7. 7Mobile Networking and Computing Lab. Multipoint Relay (MPR) Selection Algorithm used to solve MCDS problem, in OSLR Known as optimum solution Me 1-hop Nbr 2-hop Nbr MPR Every link presumed to be error-free Not guarantee Reliability
  • 8. 8Mobile Networking and Computing Lab. Limitations of MPR Selection Do not Aware Link error rates Can not assure Reliability Proposed scheme to assure Reliability r More 1-hop neighbors like MPR More transmission (Retransmission / Rebroadcast)
  • 9. 9Mobile Networking and Computing Lab. Expected Delivery Probability (EDP) 𝑙𝑖𝑗 : Error Rate of the Link i to j as 1 times m s 1 − 𝑙 𝑠𝑚 𝑖𝑓 𝑚 ∈ 𝑁1 m Me 1-hop Nbr 2-hop Nbr 1 − 𝑘∈𝑁1 1 − 1 − 𝑙 𝑠𝑘 1 − 𝑙 𝑘𝑚 𝑖𝑓 𝑚 ∈ 𝑁2 𝐸𝐷𝑃𝑚 = 𝐸𝐷𝑃𝑚 𝑛 = 1 − 𝑙 𝑠𝑚 𝑛 𝑖𝑓 𝑚 ∈ 𝑁1 1 − 𝑘∈𝑁1 1 − 1 − 𝑙 𝑠𝑘 𝑛 1 − 𝑙 𝑘𝑚 𝑖𝑓 𝑚 ∈ 𝑁2 as n times 𝐸𝐷𝑃𝑚 𝑛 = 1 − 𝑙 𝑠𝑚 𝑛 𝑖𝑓 𝑚 ∈ 𝑁1 1 − 𝑘∈𝑁 𝑅 1 − 1 − 𝑙 𝑠𝑘 𝑛 1 − 𝑙 𝑘𝑚 𝑖𝑓 𝑚 ∈ 𝑁2
  • 10. 10Mobile Networking and Computing Lab. Reliability-aware multipoint relay (RA-MPR) Selection To achieve a given Reliability not to cover all 2-hop neighbors 𝐸𝐷𝑃 𝑛 RA-MPR Selection Algorithm Me iteratively selects an RA-MPR among non-RA-MPR neighbors so as to increase the EDP most Until the EDP satisfies the target reliability R Me 1-hop Nbr 2-hop Nbr 0.2 0.12 0.02 0.1 0.14 0.1 0.07 1) R = 0.4 2) R = 0.95 = 𝑚∈𝑁1 𝑜𝑟 𝑁2 𝐸𝐷𝑃𝑚 𝑛 𝑁1 + 𝑁2
  • 11. 11Mobile Networking and Computing Lab. The result of the real world either a success or a failure in contrast to the probabilistic calculation like 0.3141592… The number of the received packet MUST be a Natural Number ms Opportunistic Retransmission Overhearing / BACK(Broadcast ACK) handling ms Stop! Online EDP : Recalculated EDP with Real Result Implicit ACK explicit ACK Success : 𝑙 𝑠𝑖 → 0 Failure : 𝑙 𝑠𝑖 → 1 − 𝑃 𝑀 𝐴 , 𝑃 𝑀 ∩ 𝐴 𝑃 𝐴 = = 𝑘=1 𝑛 𝑛 𝑘 1 − 𝑙 𝑘 𝑙 𝑛 = 𝑘=0 𝑛 𝑛 𝑘 1 − 𝑙 𝑘 𝑙 𝑛 = 1 − 𝑙 𝑛 𝑃 𝐴
  • 12. 12Mobile Networking and Computing Lab. Link Error Rate Can be controlled (?)
  • 13. 13Mobile Networking and Computing Lab. NTP The total # of broadcasts divided by the # of nodes As the link error rate increases Not only a node, but also its 1-hop and 2-hop neighbors, probably, retransmit the packet more times But can achieve high reliability (?)
  • 14. 14Mobile Networking and Computing Lab. ATR The achieved Reliability divided by the target reliability As the link error rate increases if including all one-hop neighbors as RA-MPRs cannot make the EDP greater than the target reliability A sender increments the # of transmissions Optimum Efficiency
  • 15. 15Mobile Networking and Computing Lab. Predetermining Technique The Predetermined RA-MPRs only can forwards the received packets the Predetermined time(s) But retransmits opportunistically (but little) The opportunistic transmission In ExOR, MORE and SOAR, any node amongst Forwarder Candidate can forward it Future work Contribution Level based Opportunistic Flooding for Wireless Multihop Networks, 2015. 6 – 1 time revised Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links, 2014.11 - 16 times revised
  • 16. Mobile Networking and Computing Lab.