3. Cyber Physical Systems Flashcards
What are the characteristics of a cyber-physical system?
- Computing capabilities
- Interconnected
- Interaction with the physical world
What are the requirements of cyber-physical systems?
- Energy-efficiency
- Sensor density / efficient communication
- Low bandwidth
- Multi-hop: adressing + routing
- Scalability
- Security / privacy
- Reliability
- Low delay/latency
What are the main components in a node regarding energy consumption?
CPU and Radio
Name two examples for proactive routing and how does it work?
Optimized link state routing (OLSR):
- Broadcast local links to neighbors
- Broadcast is only forwarded by multipoint relays:
- Minimum set of neighbors, such that each two hop neighbor is connected to at least one multipoint relay
Destination Sequence Distance Vector (DSDV):
- Periodically send full route updates
- On topology change, send incremental route updates
- Unstable route updates are delayed
- Add aging information to route information propagated by distance
vector exchanges; helps to avoid routing loops
Name a reactive routing protocol and explain it
Dynamic Source Routing (DSR):
- Broadcast a routing request to all neighbors
- Neighbors add their ID to the route request and continue the broadcast
- First request to reach the destination gets replied with the route of that request
How is the Expected Transmission Count calculated?
Forward delivery ratio (FDR): probability that data packet is successfully transmitted to recipient - d_f
Reverse delivery ratio (RDR): The probability an ACK is successfully received - d_r
Expected Transmission Count ETX = 1 / (d_f * d_r)
What is Beacon Vector Routing (BVR)?
- Routing based on virtual coordinates relative to beacons
- Beacons are randomly selected nodes
- A tree graph is created for each beacon to determine the distance from the node
- Coordinates are broadcasted to neighbors
- Routing is done by minimizing the distance between source and destination
- 3 different modes of routing: greedy, fallback, scoped flooding
How do the different approaches in BVR work?
Greedy: Form the tuple (d+,d-) for each neighbor such that:
d+ = sum of distances to destination for beacons closer to destination than source
d- = sum of distance to destination for beacons closer to source than destination
First try to find a neighbor with a lower d+, then d- and finally proceed with fallback
Fallback: Forward packets towards the next beacon and proceed with greedy routing
Scoped flooding: Flood message with TTL = distance
What are the steps to setup and operate a 6LoWPAN device?
- Commissioning: Setup, link-layer connectivity to other devices
- Bootstrapping: Network layer address configuration, discovery of neighbors
- Route initialization: Routing algorithm sets-up path
- Repeat 2-3
Why is the standard IPv6 neighbor discovery not feasible for LoWPAN?
- Heavy use of multicast traffic would flood the network
- Assumption that nodes are always on
- Assumption that each router manages its own IPv6 subnet prefix
What is CoAP?
- Constrained Application Protocol
- RESTful
- Messages: CON, ACK, NON, RST
What is observation in CoAP?
Only send data on state change