Infrastructure for Autonomous Mobile Robots Communication and Coordination
|
|
- Rosamond Willis
- 5 years ago
- Views:
Transcription
1 90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa Catarina (UFSC) Florianópolis SC Brazil Abstract. Teams of mobile robots need to communicate using wireless medium to perform common tasks in a coordinated manner. Communications normally involve control, status, and possibly stream messages containing real-time and QoS requirements. It is often the case that mobile robots are deployed in unknown environments, requiring them to form an ad-hoc wireless network to establish connectivity. Moreover, a dynamic topology is also required due to the mobility of nodes. This work proposes a communication infrastructure to be used by mobile robots operating under the described conditions. It provides a convenient communication model to abstract from topology changes caused by movements of robots and assures, whenever possible, that messages are delivered in a timely manner, with application required QoS. 1. Introduction Applications using teams of mobile robots are currently used to perform tasks which are dangerous or impossible to be performed by human beings. Some application examples are pipe maintenance, search and rescue robot teams, and spatial exploration. Teams of mobile robots can be seen as sets of autonomous systems that communicate using wireless medium to perform coordinated tasks. They normally form an ad-hoc wireless network due to the fact that they are deployed in unknown environments, differently from infra-structured wireless networks that have access-points. Normally such applications exchange messages with real-time requirements, such as deadlines to deliver messages, temporal validity of data, and synchronization requirements (delay variation limits). Also, nodes mobility may establish and disrupt links dynamically, often changing the network topology, therefore demanding frequent routes updates. To make the problem more difficult, wireless networks are prone to transmission errors, making it potentially hard to guarantee the correctness of protocols. The adopted communication model must be appropriate to enable nodes to share sensor/status data and control information, making it transparent for them the location of the mobile nodes. Kaiser et al (2005) points out that it must reflect the requirements of a control system composed of such autonomous systems, what includes the spontaneous generation and dissemination of data and many-to-many communications to efficiently disseminate them. Another important point is that the communication infrastructure for such systems must be able to support messages delivery in a timely manner, with application required quality of service (QoS), and also to support the modifications of topology caused by movements of the robots. Moreover, the communication model is also an important issue to be considered. In this paper authors present a proposal to handle the mentioned aspects. To be
2 IX Workshop on Real-Time Systems 91 more specific, section 2 describes the fundamental problems under consideration and some related works. Section 3 explains the proposed infrastructure, including details concerning its foreseen mechanisms. Section 4 discusses preliminary results and presents the next steps of this research. 2. Fundamental Problems and Related Works A search and rescue application is used in our work to provide an overview of the existing communication problems on teams of autonomous mobile robots. To perform the exploration of an environment, according to Reich and Sklar (2006), a robot team faces some major difficulties related to: (i) their location in the environment, (ii) the acquiring of information about this environment, and (iii) the communication between the robots. Our work concentrates in item (iii), that is, in the communication infrastructure that must provide communication services to support robots coordination. A set of requirements for such infrastructure is described bellow: Routing: the routing function must forward messages through the network, to deliver them to all destination nodes, even if they change their locations. For the search and rescue application, the communication infrastructure must either keep the connectivity of the robots or deal with the disruption of links. The dynamic topology due to the mobility of nodes make it difficult, and even not feasible, to keep track of each node individually. Carzaniga and Wolf (2001) points out contentbased routing as a basic requirement for mobile devices networks. End-to-end timely delivery: messages must be delivered to all target nodes, wherever they are, respecting their time limits. This influences the routing, since paths are chosen according to transmission delay and temporal characteristics of the messages. As described by Hughes and Cahill (2004), it is clear that a resource reservation mechanism is needed to accomplish this, and that hop-to-hop timely delivery is a basic requirement. Also, some questions arise about what to do when it is not possible to reach some interested nodes whithin the time limit. Possible semantics are: simply exclude them from the delivery; refuse to deliver the message; or deliver it even if the message deadline is exceeded. Hop-to-hop timely delivery: the network layer needs a worst case time to transmit a message through the medium, as further described by Kaiser et al (2005) and Hughes and Cahill (2003). In wireless networks the medium is shared, requiring a medium access control function (MAC) to coordinate transmissions and avoid collisions. A time division of the medium is usually imposed to accomplish this requirement, allocating time slots to the nodes. The dynamic allocation of time slots needs a consensus of all involved nodes, what can be hard to obtain with a distributed approach, as shown by Facchinetti et al (2004). Anonymous communications: as the nodes are mobile and links can disrupt, it is better to deliver messages based on its contents rather than on node address. This is naturally associated with publisher-subscriber (P/S) protocols, as described by Kaiser et al (2005). The adoption of anonymous communications on the network layer could make it easier the implementation of P/S protocols in the upper layer. But for stream data to be transmitted between two nodes, some selection mechanism that does not conflict with the anonymous communication model must be implemented, like peer-to-peer (P2P).
3 92 Work in Progress Session Communication model: the communication model should be adequate for both many-to-many and point-to-point communications, due to both the dissemination of sensor/status data and streams transmission. Moreover, it must be compatible with anonymous communications. A P/S protocol, as already mentioned, matches smoothly these requirements, except for stream data, where the communication model needs to provide an appropriate way to establish a pipe between producer and consumer. In this case, a P2P protocol seems more appropriated. 3. The Proposed Communication Infrastructure To satisfy the requirements identified in section II, it is proposed a communication infrastructure with a three layer structure. On the top, the transport layer includes P/S and P2P protocols, providing communication models suited to uncoupled, anonymous, content based, and peer-to-peer communications. The network layer provides the timely delivery of messages to every location on the network, and deals with the mobility of the nodes. Finally, in the bottom, the link layer provides hop-to-hop timely delivery, implementing a deterministic MAC protocol. The Link Layer must satisfy the hop-to-hop timely delivery requirement - a worst case transmission time for a packet, what implies a deterministic MAC. It is not in the scope of this work to propose such MAC, but to adapt an existing one. Therefore, it will be investigated the adoption of a scheduling approach based on the IEEE e standard, as described by Demarch and Becker (2007). Their work defines a scheduler for guaranteed firm deadlines using the Hybrid Coordination Controlled Channel Access (HCCA). However, HCCA relies on a central coordinator, which is normally the access point (AP). Therefore it must be investigated if some or all robots could play this role of coordinator in the absence of an AP. The main purpose of the Network Layer is to perform routing. In our work some restrictions are imposed to the topology of the network and the roles of the robots. To reduce the complexity of a multi-hop network, robots are organized within clusters, which contains one responsible node called coordinator. The network layer also implements a key abstraction named Virtual Channel (VC) that resembles the concept of a virtual circuit, but allowing multiple senders and receivers. The VC abstraction intentionally brings anonymous communication to the network layer: it requires no node addresses, with all delivery based on the existence of active VCs in the clusters. In every coordinator a VC, if existing, can be active or pending. When a packet from a VC arrives in the coordinator, it is active it than forwards (repeats) this packet. An important issue on how to create a VC relates to how the coordinator becomes aware of the existing VCs. This is defined as responsibility of the producers and consumers of the VC: producers announce the creation of VCs to all the network, and consumers announce its acceptance. coordinators should be aware of that to activate the VC whenever one of its nodes is interested on that clusterthis provides a natural multipoint-to-multipoint communication service. This mechanism aims to create routes with smaller number of hops, just like a distance vector routing strategy. When there are more than one producer in a VC, which is a very probable situation, the question is how to define if a coordinator is part of the route for a producer. Here, two ideas are being considered: (i) each coordinator keeps a list of neighbor clusters for each producer, or (ii) each VC producer generates a sequence number for its messages, so a coordinator can repeat only the first occurrence of a message. Finally, to achieve end-to-end timely delivery, a QoS descriptor must be associated to a VC, and messages must be scheduled
4 IX Workshop on Real-Time Systems 93 according to their time limits. This is still an open issue. The transport layer should support both P/S and P2P protocol, providing. For the P/S, messages are identified by subject or content, with channel numbers or predicates. Channel numbers is the simplest case, and can be mapped directly to VC numbers in the network layer. Predicates are useful when the condition for reception of messages varies according to operational variables of the nodes, like geographical position. Here, predicates are thought as a composition of attributes in the content of the message, and attributes of target nodes. For the P2P protocol, some selection mechanism that does not conflict with the anonymous communication model must be developed. This looks contradictory, because it only makes sense to create a pipe between two known nodes. But it can be achieved without the need of addressing, being enough to maintain an identity or condition in the P2P layer. 4. Preliminary Results and Further Work The proposed infrastructure has a prototype implementation covering mainly the network layer and a subject based P/S protocol in the transport layer. It emphasizes the routing, more specifically the protocol for VCs management, and the transport layer. Currently, it is able to create and activate VCs and forward VC data. The mapping of channels in the P/S protocol and VCs in the network layer is defined, exploring the natural association between them: the creation of a VC is similar to a publishing, and the acceptance of a VC maps to a subscribing. It will be further investigated the integration of this proposal with an existing middleware named Cosmic, an event oriented middleware developed by Kaiser et al (2005). Cosmic has interesting features, such as a well defined P/S protocol, real-time event classes, a clock synchronization protocol and CAN network and TCP/IP support. This proposal could enable Cosmic to work with wireless networks, in scenarios composed by mobile devices. References Reich J. and Sklar, E. (2006) Robot Sensor Networks for Search and Rescue, In: IEEE International Workshop on Safety, Security and Rescue Robotics, USA. Kaiser, J., Brudna, C. and Mitidieri, C. (2005) COSMIC: A Real-Time Event-Based Middleware for the CAN Bus. In: The Journal of Systems and Softwares vol. 77, pp Hughes, B. and Cahill, V. (2003) Achieving Real-Time Guarantees in Mobile Ad Hoc Wireless Networks, In: Work in progress session, IEEE Real Time Systems Symposium, Mexico. Facchinetti, T. et al (2004) Real-Time Resource Reservation Protocol for Wireless Mobile Ad Hoc Networks, In: Proceedings of the 25th IEEE Real-Time Systems Symposium (RTSS 2004), Portugal. Carzaniga, A. and Wolf, A. (2001) Content-based networking: A New Communication Infrastructure, In: NSF Workshop on an Infrastructure for Mobile and Wireless Systems, USA. Demarch, D.D. and Becker, L. B. (2007) A Centralized Scheduling and Retransmission Proposal for Firm Real-time Traffic in IEEE e, In 25 th Simpósio Brasileiro de Redes de Computadores (SBRC). Belém, Brazil.
5 94 Work in Progress Session
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationES623 Networked Embedded Systems
ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationImplementation and simulation of OLSR protocol with QoS in Ad Hoc Networks
Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT
More informationFederating Heterogeneous Event Services
Federating Heterogeneous Event Services Conor Ryan, René Meier, and Vinny Cahill Distributed Systems Group, Department of Computer Science, Trinity College Dublin, Ireland cahryan@eircom.net, rene.meier@cs.tcd.ie,
More informationThe History and the layers of the OSI Model 30 - October
THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects
More informationEnhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization
Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationUNIT 1 Questions & Solutions
UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless
More informationComputer-based systems will be increasingly embedded in many of
Programming Ubiquitous and Mobile Computing Applications with TOTA Middleware Marco Mamei, Franco Zambonelli, and Letizia Leonardi Universita di Modena e Reggio Emilia Tuples on the Air (TOTA) facilitates
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #6: Medium Access Control QoS and Service Differentiation, and Power Management Tamer Nadeem Dept. of Computer Science Quality of Service (802.11e)
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationThe Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN
2017 5th International Conference on Enterprise Systems The Research of Long-Chain Wireless Sensor Network Based on 6LoWPAN Weilan Lin linweilan@gz.sia.cn Shuangfei Zi zishuangfei@gz.sia.cn Zhiyi Fan Department
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationChapter - 1 INTRODUCTION
Chapter - 1 INTRODUCTION Worldwide Interoperability for Microwave Access (WiMAX) is based on IEEE 802.16 standard. This standard specifies the air interface of fixed Broadband Wireless Access (BWA) system
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationIntroduction. The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs.
Introduction The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block Diagram Intro-1
More informationNetwork Models. Behrouz A. Forouzan Data communication and Networking Fourth edition
Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationRouting Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:
Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationLecture Computer Networks
Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Networks for Multimedia
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationproducts. OSI is an ISO Standard: OSI was officially adopted as an international standard by the International Organisation of Standards (ISO).
CBCN4103 Open Systems Interconnection (OSI) is a standard d description or "reference model" for how messages should be transmitted between any two points in a telecommunication network. Its purpose is
More informationMulti-Hop Simulator for Ad-Hoc IEEE e
Multi-Hop Simulator for Ad-Hoc IEEE 802.11e João M. Ferro, Fernando J. Velez, Member, IAENG Abstract This work addresses the development of a cross-layer wireless network simulator for IEEE 802.11e in
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationRelaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks
Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks 1 T.R.Gopalakrishnan Nair (SM-IEEE), 2 R. Selvarani, 3 Vaidehi M. 1 Director Research & Industry
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationCONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS
CONTENTION BASED PROTOCOLS WITH RESERVATION MECHANISMS Five-Phase Reservation Protocol A single-channel time division multiple access (TDMA)-based broadcast scheduling protocol. Nodes use a contention
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationDynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks
Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University
More informationDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationEvaluation of Information Dissemination Characteristics in a PTS VANET
Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission
More informationEnergy Management Issue in Ad Hoc Networks
Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationARPA Mobile Information Systems Applications Workshop December 7-8, Mobile Networking
ARPA Mobile Information Systems Applications Workshop December 7-8, 1995 Mobile Networking Randy H. Katz CS Division EECS Department University of California, Berkeley 1 Mobile Networking Middleware Reliable
More informationCCNA 1: Chapter 2 Exam Answer v %
1. Refer to the exhibit. Cell A at IP address 10.0.0.34 has established an IP session with IP Phone 1? at IP address 172.16.1.103. Based upon the graphic, which device type best describes the function
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationReview on an Underwater Acoustic Networks
Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationCross Clock-Domain TDM Virtual Circuits for Networks on Chips
Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationLast Lecture. Network Architecture: Layers. This Lecture. In the sending host (2) In the sending host
Chapter 7.B and 7.C Architecture: Layers Prof. Dina Katabi Last Lecture We learned how to share the network infrastructure between many connections/flows We also learned about the implications of the sharing
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Jan 18, 2011 Class #3 Wireless vulnerabilities and threats Announcement: Agenda 6 remaining survey slots, 12 students yet to sign up Vulnerabilities,
More informationECE 653: Computer Networks Mid Term Exam all
ECE 6: Computer Networks Mid Term Exam 16 November 004. Answer all questions. Always be sure to answer each question concisely but precisely! All questions have points each. 1. What are the different layers
More informationCHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING
CHAPTER 6 PILOT/SIGNATURE PATTERN BASED MODULATION TRACKING 6.1 TRANSMITTER AND RECEIVER Each modulated signal is preceded by a unique N bit pilot sequence (Manton, JH 2001). A switch in the transmitter
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationDelayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology
Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationYou have to remember that
Review You have to remember that Circuit Switched Network Packet Switched Network To install Dynagen & Dynamips To find a idlepc value To Set up a Router Various Command Contents IP Internetworking Internet
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationLocal Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.
Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationA Survey on Underwater Sensor Network Architecture and Protocols
A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi
More informationCROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION
CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering
More informationThe OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).
Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication
More informationMISB EG Motion Imagery Standards Board Engineering Guideline. 24 April Delivery of Low Bandwidth Motion Imagery. 1 Scope.
Motion Imagery Standards Board Engineering Guideline Delivery of Low Bandwidth Motion Imagery MISB EG 0803 24 April 2008 1 Scope This Motion Imagery Standards Board (MISB) Engineering Guideline (EG) provides
More informationMulticast Technology White Paper
Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission
More informationData Networks. Lecture 1: Introduction. September 4, 2008
Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationReliable and Efficient flooding Algorithm for Broadcasting in VANET
Reliable and Efficient flooding Algorithm for Broadcasting in VANET Vinod Kumar*, Meenakshi Bansal Mtech Student YCOE,Talwandi Sabo(india), A.P. YCOE, Talwandi Sabo(india) Vinod_Sharma85@rediffmail.com,
More informationLow-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission
Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Masashi Sugano 1, Ryo Fukushima 2, Masayuki Murata 2, Takayoshi Hayashi 3, Takaaki Hatauchi 3 1 School of Comprehensive
More informationDynamic Design of Cellular Wireless Networks via Self Organizing Mechanism
Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationIntroduction to Networking
Introduction to Networking The fundamental purpose of data communications is to exchange information between user's computers, terminals and applications programs. Simplified Communications System Block
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationEffects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationECE 333: Introduction to Communication Networks Fall 2001
ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed
More informationAn Algorithm for Dynamic SDN Controller in Data Centre Networks
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 04-08 www.iosrjen.org An Algorithm for Dynamic SDN Controller in Data Centre Networks Nirmala 1, Oliveruth 2, Varun 3 1
More informationDeveloping deterministic networking technology for railway applications using TTEthernet software-based end systems
Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Project n 100021 Astrit Ademaj, TTTech Computertechnik AG Outline GENESYS requirements
More informationArchna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationThe MAC Address Format
Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number
More informationCONCLUSIONS AND SCOPE FOR FUTURE WORK
Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this
More informationFast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services
Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr
More informationSERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT
SERVICE DISCOVERY IN MOBILE PEER-TO-PEER ENVIRONMENT Arto Hämäläinen Lappeenranta University of Technology P.O. Box 20, 53851 Lappeenranta, Finland arto.hamalainen@lut.fi Jari Porras Lappeenranta University
More informationAVC College of Engineering, Mayiladuthurai, India
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation
More informationChapter 11 in Stallings 10 th Edition
Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large
More informationRefer to the exhibit. Which set of devices contains only end devices? A,C,D B,E,G,H C,D,G,H,I,J D,E,F,H,I,J E,F,H,I,J
1. What is the purpose of the TCP/IP Network Access layer? path determination and packet switching data presentation the division of segments into packets network media control 2. Which characteristic
More information2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS
2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2.1 Real-Time and Control Computer based digital controllers typically have the ability to monitor a number of discrete and analog inputs, perform complex
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More information