SlideShare a Scribd company logo
SPEED: A Real Time Protocol
for Sensor Networks

Arjun P.K

Arjun P.K
PR12CS1009
Balasuresh A
PR12CS1011
George T Vadakkumcheril PR12CS1018
Gopal T
PR12CS1019
Jebakumar J
PR12CS1024
I M.Tech CSE - A
OVERVIEW
SPEED, A Real Time Communication Protocol for Sensor
Networks.
This protocol provides three types of communication services:
Real Time Unicast
Real Time Multicast
Real Time Anycast
INTRODUCTION
The main function of sensor networks is data delivery.
Three types of communication patterns associated with delivery of
data:
Unicast: It is often the case that one part of the network detects
some activity that it needs to report to a remote base station.
Multicast: Different routing service where one endpoint of the
route may be an area rather than an individual node.
Anycast: Sensors often measure highly redundant
information, in some situations it may be sufficient to have any
node in an area respond.
RELATED WORK
In sensor networks, location is more important than a specific node
ID.

For example, tracking applications only care where the target is
located, not the ID of the reporting node, such position-awareness
is necessary to make the sensor data meaningful.
Reactive routing algorithms such as AODV, DSR and TORA
maintain routing information for a small subset of possible
destinations, namely those currently in use.
If no route is available for a new destination, a route discovery
process is invoked.
DESIGNING
Stateless Architecture: The physical limitations of ad hoc
sensor networks, such as large scale, high failure rate, and
constrained memory capacity necessitate a stateless approach in
which routers do not maintain much information about network
topology and flow state.
Real-time guarantees: Sensor networks are commonly used to
monitor and control the physical world.
QoS routing and congestion management: Most reactive
routing protocols can find routes that avoid network hot spots
during the route acquisition phase. When a route becomes
congested, such protocols either suffer a delay or initiate another
round of route discovery.
Traffic load balancing. In sensor networks, the bandwidth is an
extremely scarce resource compared to a wired network. Because
of this, it is valuable to utilize several simultaneous paths to carry
packets from the source to the destination.
Localized behaviour: Pure localized algorithms are those in
which any action invoked by a node should not affect the whole
system.
SPEED PROTOCOL
The SPEED protocol consists of the following components:
Application API and Packet Format
Neighbour Beacon Exchange
Receive Delay Estimation
Application API and Packet Format
It provides four application level API calls:
AreaMulticastSend (position, radius, deadline, packet)
AreaAnyCastSend (position, radius, deadline, packet)
UnicastSend (Global_ID, deadline, packet)
Speed Receive ()

Packet format
PacketType
Global_ID
Destination area
TTL: Time To Live
Neighbour Beacon Exchange
SPEED relies on neighbourhood information to compute.
Every node broadcasts a beacon packet to its neighbours. Each beacon
packet has three fields:

(ID, Position, node receive delay)
First, a beacon provides a way to detect node failure. If a neighbour
entry is not refreshed after a certain time, it will be removed from the
neighbour table.
Second, through beaconing, each node obtains the location
information of its neighbours.
Third, denotes the load of a neighbour.
Receive Delay Estimation
Nodes will transmit their delay to neighbours via a beacon packet.
Each entry inside the neighbour table has the following fields:
(NeighbourID, Position, ReceiveFromDelay, SendToDelay, ExpireTime).

The SendToDelay is the delay value received from the beacon message
coming from neighbours and used to make routing decision.
ReceiveFromDelay is estimated by measuring the real delay
experienced by the data packet in the MAC layer of the sender plus a
propagation delay.
If the new node receive delay is larger or smaller than the previous
node receive delay by a certain threshold, then on-demand beacon will
be issued.

More Related Content

What's hot

DVRM
DVRMDVRM
Powerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationPowerpoint presentation on wireless communication
Powerpoint presentation on wireless communication
manish kumar
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithmslavanyapathy
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
Transweb Global Inc
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
Deepak John
 
sohini 130180107056(2140709)
sohini 130180107056(2140709)sohini 130180107056(2140709)
sohini 130180107056(2140709)
Sohini Vinod
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
syedhaiderraza
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
CYBERINTELLIGENTS
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
ShouvikDhali
 
Routing ppt
Routing pptRouting ppt
Routing ppt
ArpiSaxena1
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
Roshan Karunarathna
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
Nishant Munjal
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
Nitish Awasthi (anitish_225)
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
rajib_
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
university of Gujrat, pakistan
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Sushant Kushwaha
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 

What's hot (20)

DVRM
DVRMDVRM
DVRM
 
Powerpoint presentation on wireless communication
Powerpoint presentation on wireless communicationPowerpoint presentation on wireless communication
Powerpoint presentation on wireless communication
 
Routing table and routing algorithms
Routing table and routing algorithmsRouting table and routing algorithms
Routing table and routing algorithms
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
sohini 130180107056(2140709)
sohini 130180107056(2140709)sohini 130180107056(2140709)
sohini 130180107056(2140709)
 
Week14 lec2
Week14 lec2Week14 lec2
Week14 lec2
 
Day 8 1 introducing routing n
Day 8 1 introducing routing nDay 8 1 introducing routing n
Day 8 1 introducing routing n
 
Layer 3
Layer 3Layer 3
Layer 3
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
Routing ppt
Routing pptRouting ppt
Routing ppt
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Introduction to backwards learning algorithm
Introduction to backwards learning algorithmIntroduction to backwards learning algorithm
Introduction to backwards learning algorithm
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking Multiple Access Control Protocol (MAC Protocol) Networking
Multiple Access Control Protocol (MAC Protocol) Networking
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 

Similar to Speed: A Realtime Protocol

Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515IJRAT
 
P01754110117
P01754110117P01754110117
P01754110117
IOSR Journals
 
Network layer new
Network layer newNetwork layer new
Network layer new
reshmadayma
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
Sayed_Hossain
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
A41040105
A41040105A41040105
A41040105
IJERA Editor
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Sitamarhi Institute of Technology
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
Alexander Decker
 
Network Layer
Network LayerNetwork Layer
Network Layer
reshmadayma
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
ijcses
 
C017371624
C017371624C017371624
C017371624
IOSR Journals
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
iosrjce
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
ijeei-iaes
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
acijjournal
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
csandit
 

Similar to Speed: A Realtime Protocol (20)

Paper id 36201515
Paper id 36201515Paper id 36201515
Paper id 36201515
 
P01754110117
P01754110117P01754110117
P01754110117
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
Transport layer
Transport layer Transport layer
Transport layer
 
A41040105
A41040105A41040105
A41040105
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet11.a study of congestion aware adaptive routing protocols in manet
11.a study of congestion aware adaptive routing protocols in manet
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
C017371624
C017371624C017371624
C017371624
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKSA THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Speed: A Realtime Protocol

  • 1. SPEED: A Real Time Protocol for Sensor Networks Arjun P.K Arjun P.K PR12CS1009 Balasuresh A PR12CS1011 George T Vadakkumcheril PR12CS1018 Gopal T PR12CS1019 Jebakumar J PR12CS1024 I M.Tech CSE - A
  • 2. OVERVIEW SPEED, A Real Time Communication Protocol for Sensor Networks. This protocol provides three types of communication services: Real Time Unicast Real Time Multicast Real Time Anycast
  • 3. INTRODUCTION The main function of sensor networks is data delivery. Three types of communication patterns associated with delivery of data: Unicast: It is often the case that one part of the network detects some activity that it needs to report to a remote base station. Multicast: Different routing service where one endpoint of the route may be an area rather than an individual node. Anycast: Sensors often measure highly redundant information, in some situations it may be sufficient to have any node in an area respond.
  • 4. RELATED WORK In sensor networks, location is more important than a specific node ID. For example, tracking applications only care where the target is located, not the ID of the reporting node, such position-awareness is necessary to make the sensor data meaningful. Reactive routing algorithms such as AODV, DSR and TORA maintain routing information for a small subset of possible destinations, namely those currently in use. If no route is available for a new destination, a route discovery process is invoked.
  • 5. DESIGNING Stateless Architecture: The physical limitations of ad hoc sensor networks, such as large scale, high failure rate, and constrained memory capacity necessitate a stateless approach in which routers do not maintain much information about network topology and flow state. Real-time guarantees: Sensor networks are commonly used to monitor and control the physical world. QoS routing and congestion management: Most reactive routing protocols can find routes that avoid network hot spots during the route acquisition phase. When a route becomes congested, such protocols either suffer a delay or initiate another round of route discovery.
  • 6. Traffic load balancing. In sensor networks, the bandwidth is an extremely scarce resource compared to a wired network. Because of this, it is valuable to utilize several simultaneous paths to carry packets from the source to the destination. Localized behaviour: Pure localized algorithms are those in which any action invoked by a node should not affect the whole system.
  • 7. SPEED PROTOCOL The SPEED protocol consists of the following components: Application API and Packet Format Neighbour Beacon Exchange Receive Delay Estimation
  • 8. Application API and Packet Format It provides four application level API calls: AreaMulticastSend (position, radius, deadline, packet) AreaAnyCastSend (position, radius, deadline, packet) UnicastSend (Global_ID, deadline, packet) Speed Receive () Packet format PacketType Global_ID Destination area TTL: Time To Live
  • 9. Neighbour Beacon Exchange SPEED relies on neighbourhood information to compute. Every node broadcasts a beacon packet to its neighbours. Each beacon packet has three fields: (ID, Position, node receive delay) First, a beacon provides a way to detect node failure. If a neighbour entry is not refreshed after a certain time, it will be removed from the neighbour table. Second, through beaconing, each node obtains the location information of its neighbours. Third, denotes the load of a neighbour.
  • 10. Receive Delay Estimation Nodes will transmit their delay to neighbours via a beacon packet. Each entry inside the neighbour table has the following fields: (NeighbourID, Position, ReceiveFromDelay, SendToDelay, ExpireTime). The SendToDelay is the delay value received from the beacon message coming from neighbours and used to make routing decision. ReceiveFromDelay is estimated by measuring the real delay experienced by the data packet in the MAC layer of the sender plus a propagation delay. If the new node receive delay is larger or smaller than the previous node receive delay by a certain threshold, then on-demand beacon will be issued.