48
IN4316 IN4316 – Lecture 2 Lecture 2 Ad Ad-hoc and Sensor Networks hoc and Sensor Networks IN4316 IN4316 – Lecture 2 Lecture 2 Ad Ad-hoc and Sensor Networks hoc and Sensor Networks Ad Ad hoc and Sensor Networks hoc and Sensor Networks Ad Ad hoc and Sensor Networks hoc and Sensor Networks Koen Langendoen Koen Langendoen Philipp Philipp Glatz Glatz, , Venkat Venkat Iyer Iyer Andreas Andreas Loukas Loukas, , Anrei Anrei Pruteanu Pruteanu, Matthias , Matthias Woehrle Woehrle

IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

IN4316 IN4316 –– Lecture 2Lecture 2AdAd--hoc and Sensor Networkshoc and Sensor Networks

IN4316 IN4316 –– Lecture 2Lecture 2AdAd--hoc and Sensor Networkshoc and Sensor NetworksAdAd hoc and Sensor Networkshoc and Sensor NetworksAdAd hoc and Sensor Networkshoc and Sensor Networks

Koen LangendoenKoen LangendoenPhilipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Andreas Andreas LoukasLoukas, , AnreiAnrei PruteanuPruteanu, Matthias , Matthias WoehrleWoehrle

Page 2: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

O tli di i t f i lOutline: discuss impact of wireless

• Ad-hoc networks– link layer: medium access control– link layer: medium access control– network layer: routing– transport layer: TCP/IP– transport layer: TCP/IP

• Sensor networks– localization– data processingdata processing– deployments

Page 3: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Ad h t kAd-hoc networks

• Each node is willing to forward data• NO dedicated routing hardware• NO dedicated routing hardware

– resilient to node/link failures

Page 4: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Wi l d h t kWireless ad-hoc networks

• Mobile Ad-Hoc Networks (MANETS)• Mesh Networks (e g MIT roofnet)• Mesh Networks (e.g., MIT roofnet)• Sensor Networks

Page 5: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Wi l i b d t diWireless is a broadcast medium

• Pictures are misleading– communication links are 3D– communication links are 3D– transmissions may interfere

Page 6: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Si l ti Signal propagation ranges

• Transmission range– communication is possiblecommunication is possible– low error rate

• Detection range senderDetection range– detection of the signal– no communication

transmission

• Interference range– signal may not be detected

distancedetection

interferenceg m y– signal adds to the background noise

Page 7: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

F bit t k tFrom bits to packets

• Physical layer– coded modulated bitstream– coded, modulated bitstream– BER: Bit-Error-Rate– RSSI: Received Signal Strength Indicator– RSSI: Received Signal Strength Indicator

bl t t l CRCd t l dMAC hdCC1000/TinyOS/B-MAC

• Link layer– packets: header + data payload + CRC

preamble8

start2

len1

CRC2

data payloadup to 29

MAC hdr4

packets header data payload CRC– PER: Packet-Error-Rate

Page 8: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Li k l ti Link-layer propagation ranges

2200

2300

RSSI = 1/distα1

1.2

e

2100

SI

0.8

eptio

n ra

te

EYES node1900

2000

RS

0.4

0.6

acke

t rec

e

EYES node

1700

1800

0

0.2Pa

17000 5 10 15 20 25 30 35 40

Distance (metre)

00 5 10 15 20 25 30 35 40

Distance (metre)

Gray area effect [Zhao:2003]

Page 9: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Li k l & lti th f diLink-layer & multipath fading

CC2420 @ 2.4 GHz, power = -1dBm, 2am

0 50.6

0.70.8

0.9

100

0 0.1 0.2 0 3 0 10.2

0.30.4

0.5

0

50% goody (lambda)

0.3 0.4 0.5 0.6 0.7 0.8 0.90

0.1

x (lambda)

[Robert Poor, Ember corp.]

Page 10: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Medium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access ControlMedium Access Controlbackgroundbackgroundbackgroundbackground

Page 11: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

M di A C t lMedium Access Control

Control access to the shared radio channel• avoid interference between transmissions• avoid interference between transmissions• mitigate effects of collisions (retransmit)

History 802.11

ALOHACSMA MACA

MACAW S-MACS MAC1970 1980 1990 2000 2010

Page 12: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

M di A C t lMedium Access Control

Control access to the shared radio channel• avoid interference between transmissions• avoid interference between transmissions• mitigate effects of collisions (retransmit)

Approachest ti b d di ti • contention-based: no coordination

• schedule-based: central authority (access pt)

Page 13: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

C lli i b d MAC t lCollision-based MAC protocols

ALOHA :• packet radio networks• packet radio networks• send when ready• 18-35% channel utilization

CSMA (C i S M lti l A )CSMA (Carrier Sense Multiple Access):• “listen before talk”• 50-80% channel utilization

Page 14: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Hidd t i l blHidden terminal problem

A B C

Tim

cs

mecs

csCarrier sense at sender may not sender may not prevent collision at receiver

Page 15: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

CSMA/CA C lli i A idCSMA/CA: Collision Avoidance

A B C

MACA:• Request To Send

Tim

csRequest To Send• Clear To Send• DATA

mecs

BDATA

MACAW (Wireless)

Blocked( )• additional ACK

Page 16: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

E d t i l blExposed terminal problem

A B C D

Parallel CSMA Tim

csParallel CSMA Parallel CSMA transfers

mecsParallel CSMA

transfers are serialized by B

cs

yCSMA/CA

Collision avoidance

Blocked

Collision avoidance can be too restrictive!restrictive!

Page 17: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

IEEE 802 11IEEE 802.11

Operation• infrastructure mode (access point)infrastructure mode (access point)• ad-hoc mode

Power save mechanism; not for multi-hop

P t lProtocol• carrier sense• collision avoidance (optional)

Page 18: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

IEEE 802 11IEEE 802.11

RTS DATA

Sender

SIFSDIFS

Receiver( )

SIFS SIFS DIFSACKCTS

OthersNAV(RTS)NAV(CTS)

Contention Window

Network Allocation Vector (NAV)• collision avoidance• collision avoidance• overhearing avoidance: other nodes may sleep

Page 19: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

S h d l b d MAC t lSchedule-based MAC protocols

Communication is scheduled in advance• no contentionno contention• no overhearing• support for delay-bound traffic (voice)pp y ( )

Time-Division Multiple Accessi i di id d i l d f• time is divided into slotted frames

• access point broadcasts schedulec din ti n b t n c lls qui d• coordination between cells required

Page 20: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

TDMATDMAF F 2F 1Frame n Frame n+2Frame n+1

TC CPdownlink uplink

Typical WLAN setup

TC CPdownlink uplink

Typical WLAN setup• no direct communication between nodes• access point broadcast Traffic Control (TC) mapaccess point broadcast Traffic Control (TC) map• (new) nodes signal needs in Contention Period (CP)

Page 21: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R i t f S N t kRequirements for Sensor Networks

Handle scarce resources• CPU: 1 – 10 MHz• CPU: 1 – 10 MHz• memory: 2 – 4 KB RAM• radio: ~100 Kbps• radio: ~100 Kbps• energy: small batteries

Unattended operation• plug & play robustness

throughputlatency energyplug & play, robustness

• long lifetimefairness

WLAN WSN

Page 22: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

C i ti ttCommunication patterns

WSN applications:• local collaboration when • local collaboration when

detecting a physical phenomenon• periodic reporting to sink

local gossipperiodic reporting to sink

Characteristics:• low data rates• small messages

<1000 bps

~25 bytesg• fluctuations (in time and space)

convergecast[ lk 200 ]

y

[Kulkarni:2004]

Page 23: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Di ti lit i tDirectionality experiment

350

400

250

300

t m

sg/s

150

200

good

put

CSMA directed

CSMA random

100

150g

0

50

0 100 200 300 400 500 600 700 800 900 1000input msg/s

Page 24: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

LocalizationLocalizationLocalizationLocalizationLocalizationLocalizationLocalizationLocalizationintroductionintroductionintroductionintroduction

Page 25: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Th l li ti blThe localization problem

Scenario:• install nodes• install nodes• determine positions

Choices:i f t t d h

(0,0)

• infrastructure vs. ad-hoc• connectivity vs. ranging• centralized vs. distributed GPS

TargetTargetSynchronization channelRanging channel

Page 26: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Ad h l li tiAd-hoc localization

• Many nodes (> 100)• NO infrastructure• NO infrastructure• NO central processing• Sparse anchor nodes

– known position(0,0)

p

• Other nodes determine their position using– anchor locationsanchor locations– distance measurements

Page 27: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R i T h l iRanging Technologies

• Received Signal Strength Indicator (RSSI)– extremely noisy (reflections)extremely noisy (reflections)– calibration– omi-directional (sort of)

range: ~10 maccuracy: ~2-3 m ( )

• Ultrasonic time-of-flight g– (clock synchronization)– time-difference with RF range: ~10-30 m

accuracy: ~2 5 cm– lope-shape beam angle

accuracy: ~2-5 cm

Page 28: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R f l li tiRange-free localization

Algorithms:• Centroid [Bulusu2000]• Centroid [Bulusu2000]• Convex optimization [Doherty2001]• DV hop [Niculescu2001]• DV-hop [Niculescu2001]

Results:Results• many anchors needed • poor accuracy: > 5 Radio rangepoor accuracy: > .5 Radio range

t idcentroid

Page 29: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R b d l li tiRange-based localization

Algorithms:• Multihop lateration [Savvides2001]• Multihop lateration [Savvides2001]• Robust positioning [Savarese2002]• APS [Niculescu2001]• APS [Niculescu2001]

Lateration:Lateration• intersect circles, solve [Ax=b]• redundancy to handle errorsredundancy to handle errors

– range measurements– sparse anchor scenariosparse anchor scenario

Page 30: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

L li ti i t kLocalization in sensor networks

Algorithms must limit• processing• processing• communication

but fail to do sol t ti i li N N t i i t• lateration implies NxN matrix invert

• periodic beaconing or flooding overheads

Page 31: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

RoutingRoutingRoutingRoutingRoutingRoutingRoutingRoutingbackgroundbackgroundbackgroundbackground

Page 32: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Th ti blThe routing problem

Find path between S and D• ad hoc network• ad-hoc network• unique node IDs

B

EF

S

• [mobile nodes] B

A

C

G D

H

I

Page 33: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Cl ifi ti f ti t lClassification of routing protocols

Table-driven (proactive)• Each node maintains a routing table (to all others)Each node maintains a routing table (to all others)• Topology changes are immediately propagated• DSDV, OSLR, WRP, CGSR, … maintenance vs discovery costDSDV, OSLR, WRP, CGSR, …

Source-initiated (reactive / on-demand)maintenance vs discovery cost

• Nodes maintain only information for active destinations• Explicit route discovery (flooding)• [Route maintenance procedure used to repair routes]• AODV, DSR, TORA, SSR, …

Page 34: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

AODVAd Hoc On-Demand Distance Vector Routing

• Now RFC 3561, based on DSDV• Source sends Route Request Packet (RREQ) • Source sends Route Request Packet (RREQ)

when a route has to be foundR t R l P k t (RREP) i t b k b • Route Reply Packet (RREP) is sent back by destination

• Route Error messages update routes

Page 35: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R t R t i AODVRoute Requests in AODV

Broadcast transmission

S

B

S EF

C

AH

C

G D

I

Represents transmission of RREQ

Page 36: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R t R t i AODVRoute Requests in AODV

S

B

S EF

C

AH

C

G D

I

Represents links on Reverse Path

Page 37: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R t R l i AODVRoute Reply in AODV

S

B

S EF

C

AH

DC

G

I

Represents links on path taken by RREP

Page 38: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R ti t bl i AODVRouting tables in AODVNextDistDest

NextDistDest

SC2GE3D

NextDistDest

D1DNextDistDest

F2D

B

S EF

C

D1D

AH

DC

G

I

Page 39: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R t i t i AODVRoute maintenance in AODV

S

S initiates new route discovery

B

S EF

C

AH

DC

G

I

Represents transmission of RERR

Page 40: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R ti i t k ?Routing in sensor networks?

Often not needed!• local gossip: broadcast• local gossip: broadcast• convergecast: spanning tree• sink-to-nodes: floodingRouting table has one entry (to-sink)g y ( )

Application level solutions (in band signaling)Application-level solutions (in-band signaling)

Page 41: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

R ti i t k !Routing in sensor networks!

Problem: dynamic environment• link/node failures• link/node failures• multiple/mobile sinks• node mobility

S l tiSolutions:• factor in link quality: ETX (Expected #hops) • factor in location info: geographical routing

Page 42: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

Presentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsPresentation basicsdos & don’tsdos & don’tsdos & don tsdos & don ts

Page 43: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

S k ’ i t tiSpeaker’s instructions

• Preparations– contact your special topic instructor contact your special topic instructor – browse recent literature– propose paper for presentation (-1 week)p p p p p ( )– prepare Powerpoint slides (-2 days)

P f• Performance– bring your own laptop OR a USB memory stick

OR send Koen an e-mail (before 10:30)OR send Koen an e-mail (before 10:30)– present paper + lead discussion

Page 44: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

L i Less is more

DO• max 6 bullets per slidemax 6 bullets per slide

DON’T• write full sentences (because that gets your audience

reading instead of paying attention to what you have to say, especially when you have to use a small font size to cramp it especially when you have to use a small font size to cramp it all on a single page!)

• use fancy fonts (sans serif is best)s fancy fonts (sans serif is best)• use animations (for experts only ☺)

Page 45: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

A i t i th th d dA picture is worth a thousand words

DO• use illustrations/graphs/tables (1 per slide)• use illustrations/graphs/tables (1 per slide)• use color

DON’Th d li ti• show code listings

• show mathematical proofs

Page 46: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

P ti k f tPractice makes perfect

DO• rehearse your talk (and timing)• rehearse your talk (and timing)

DON’Tit t t• recite your text

• run over time

Page 47: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

B d lBody language

DO• speak with your hands• speak with your hands• interact with your audience

DON’Tt t h /l t /• stare at your shoes/laptop/me

• turn your back to the audience when pointing at your slides

Page 48: IN4316 IN4316 ––Lecture 2Lecture 2 IN4316IN4316 IN4316 ––Lecture 2Lecture 2 Ad-hoc and Sensor Networks IN4316 Koen Langendoen Philipp Philipp GlatzGlatz, , VenkatVenkat IyerIyer

H kHome work

• Read “classic” MAC papers– S-MAC (contention-based)– S-MAC (contention-based)– LMAC (TDMA)

• Submit summary† via CPM– 300 500 words– 300-500 words– PDF format

deadline: September 21st 10:00 (day of each class)– deadline: September 21st, 10:00 (day of each class)

† it is forbidden to copy&paste complete † it is forbidden to copy&paste complete sentences out of the original articles