Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue
|
|
- Opal Kerry Shepherd
- 5 years ago
- Views:
Transcription
1 Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks By Byron E. Thornton Objective We now begin to build a Wireless Sensor Network model that better captures the operational characteristics of the real world. Introduction A More Practical Model A brief recap of last week s RF Irregularities discussion and the Radio Irregularity Model (RIM). Spherical radio energy model. Non-Isotropic Asymmetric links The model used in many WSN simulations do not resemble real-world behavior. Introduction A More Practical Model Other components may also possess operational characteristics that differ drastically from the simulation model. Our goal is to develop a more representative model. Before We Begin Other Neglected Aspects of Sensor Networks Noise, Distortion and Interference. Transmission Bandwidth and Modulation Frequency. Signal to Noise Ratio (SNR) and probability bit error P e. Digital Quantization. Coherent encoding schemes (PSK, FSK, OOK, etc.) and how they might affect WSN. Modulation Schemes (ex. PCM, PAM) What affect might it have? Introduction The Issue We now realize that the simulation model does not in all cases adequately reflect real world conditions. Suppose the assumptions we make about routing and overall route quality are also invalid. How can we develop a more accurate routing model? 1
2 Items Covered Link Estimator. What is it? How is it used?. How to build and maintain a good subset of reliable links for routing. Routing Protocols A look at routing as it relates to the Estimator. A Look at Making Routing Decisions We ve assumed that choosing a route was a complicated process, but with a simple formula. But as per last week s RF Irregularities we now realize that non-isotropic-ness in Wireless Sensor networks is quite common. Take a better look at making routing decisions Up until now we ve allowed route quality judgement decisions to be made by the Routing Protocol strictly at the routing layer. Developing A Quality Metric An empirical look at network neighbors. What is the best criteria for judging the quality of a neighbor connection? Creating a list of quality neighbors a priori can greatly improve the ability of the routing protocol to make good routing decisions. Line of Discussion Insertion, eviction and reinforcement. An efficient neighborhood management algorithm. Routing Protocol We examine the routing protocol with respect to how it works with the Estimator. Evaluation. A comparison of various Distance Vector Protocols with Link Estimation. Empirical Observation Defining Link Quality Through Observation We start by developing an empirical model to derive a suitable metric for link quality. Our Approach: Design a network of mote sensors, collect test data and make some observations. 2
3 Empirical Analysis A good link quality metric should be: Statistically Stable. Empirically accurate and verifiable. Reproducible. Estimator compatible. Empirical Analysis The Experimental Model 200 nodes linearly configured with 2-foot spacing on an outdoor tennis court. Each node transmits 200 packets at a given power level (initially 50) at a rate of 8 packets/sec. Only one node transmits while all others attempt to receive. Receiving nodes count the number of packets received from the sender. Afterwards, the power is increased and the process rerun. Empirical Model Sensor Grid with Single Sender The Results of RF Power Varying and Sampling at various distances. Each node is 2 feet apart. Each node transmits 200 packets at 8 packets/s. Only one active transmitter at a time. All the rest act as receivers. Objective is to concoct a sampling space where both mean link quality and the variance in link quality are functions of the distance from sender to receiver. Key Observations For a given power setting there is a distance in which essentially all nodes have good connectivity. Increasing the transmitter power increases the effective region. As expected, the effective region is a function of the RF transmitter power. But what about the Transitional Region? Did the size of the TR increase with increasing RF transmitter power? Stability Before our observation can be acceptable we must ensure that the link quality is stable when the nodes are immobile over time. We fix a sender and observe affects on the receivers over a long period. 3
4 Stability Test Experiment Transmitting node positioned 15 feet from receiver in an indoor location. Nodes transmitted at 8 packets/sec for 20 minutes. Afterwards, sender is moved from 15 ft to 8 ft and transmission continues for 4 more hours. Conclusion Distance is a good representative metric for link quality. Stable Verifiable. Reproducible. We can use it as an estimator metric. Estimator Based on our empirical model we now proceed to design an algorithm that will be used to judge good link candidates. For each link record observed Associate a quality factor (or link probability) based on the mean and variance extracted from the empirical data. Use this link probability to drive the Estimator. About EWMA Estimators A maximum likelihood estimation scheme. Employs exponential data weighting. Widely used in many different areas and applications. Examples: Round Trip Time (RTT) for TCP congestion control. A Low Pass Filter Algorithm. Assumes conditionally normal collections. About EWMA Estimators (cont) Weighting factor determines the level of agility of the estimator in following abrupt changes in the data. Problem! Too much emphasis placed on extreme returns. 4
5 Exponentially Weighted Moving Average (EWMA) Estimator ( ω ) ek = ek where + ωo e = new estimation, a current average at sample k k ω = weighting factor o = current observation k 1 1 k Estimator Requirements Quick reaction to large changes in link quality. Stable. Small memory footprint. Simple to compute. Estimator with other components Estimator Collecting Link Statistics Broadcast and snooping used to collect link candidates. Estimator responsible for evaluating link candidates collected. But promiscuous packet sniffing is expensive. More cost effective methods may need to be investigated. Responsible for maintaining table of viable links as determined by the Estimator. Seeks to develop and maintain a table subset of neighbor links of the highest possible quality. Rationale Nodes have limited storage, especially for overhead. So efficient management of space is an absolute necessity. Information about reliable links needs to be known beforehand to improve overall network performance. Network volatility requires constant reassessment of routing choices. 5
6 Additional Considerations Less used links should be less valued. Higher rating for more frequently used. Also, a higher rating should be given to proven reliable links. Functions Eviction Removes records that are obsolete or to make room for a better candidate. Insertion Adds new candidate based on Estimator evaluation. Reinforcement Increases rating for proven entries. Key Design Points Neighbor table finite and limited. Only the best quality links should be collected. Periodic review of entries need to be conducted to ensure viability. Periodic messages (i.e., beacons) should be used versus non-control type packets. Frequent insertions, updates and deletions can seriously impact performance of the overall system. Eviction and Reinforcement Strategies Round Robin with no Reinforcement. FIFO LRH -- least recently heard. CLOCK Algorithm. FREQUENCY Algorithm. Least Frequently Used. Neighbor Manager Assessment Fixed-size table as cell density increases 1st 2nd 3rd # Good neighbors > Table size Freq always maintains 50% or more good neighbors in table Routing Protocol Estimation provides quality links to Routing Protocol prior to the route acquisition phase. Quality link selection improves overall route selection. 40 Number of Potential Neighbors 6
7 Routing Manager Parent Selection Routing Cost Metrics Packets snooped by the Estimator for viable neighbor link candidates. Neighbor Table manager maintains the neighbor table. Periodic updates by Parent Selection. Spawns periodic parent selection Protocol Evaluation Shortest Path (SP and SP(t)) Minimum Transmission (MT) Broadcast Destination Sequenced Distance Vector (DSDV) Evaluation Graph Analysis 400 Nodes organized as 20X20 grid, 8 ft spacing. Sink placed at corner for max. network depth. Routing Protocol Evaluation Measures routing depth of nodes throughout the network. Reflects end-to-end latency and energy usage Measures the product of link quality along the path from each node in the network. Approximated end-to-end reliability of a routing path. 7
Link Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationA Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality
Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get
More informationTaming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks
Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks Alec Woo, Terence Tong, David Culler {awoo, terence, culler}@cs.berkeley.edu Computer Science Division Intel Research: Berkeley
More informationMAC LAYER. Murat Demirbas SUNY Buffalo
MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationEnergy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks
Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern
More informationAdvanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013
Advanced Computer Networks 263-3501-00 Exercise Session 4 Qin Yin Spring Semester 2013 1 Administration If you haven't received any email about your submission We got your solutions for A1 & A2 About solutions
More informationResearch Directions in Low-Power Wireless Networks
Research Directions in Low-Power Wireless Networks Behnam Dezfouli [ dezfouli@ieee.org ] November 2014 1 q OBSERVING AND CHARACTERIZING THE EFFECT OF ENVIRONMENT ON WIRELESS COMMUNICATIONS For example,
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Summer 2008) Midterm. Date: June 12, 2008
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Summer 2008) Midterm Date: June 12, 2008 Name: Student number: Instructions: Examination time: 120 minutes. Write your name
More informationEvaluation of a for Streaming Data in Ad-hoc Networks
Evaluation of 802.11a for Streaming Data in Ad-hoc Networks Samip Bararia, Shahram Ghandeharizadeh,, Shyam Kapadia Computer Science Department University of Southern California Los Angeles 90089 bararia@usc.edu,shahram@usc.edu,kapadia@usc.edu
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationGeographic Routing in Simulation: GPSR
Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops
More informationCongestion Control in TCP
Congestion Control in TCP Antonio Carzaniga Faculty of Informatics University of Lugano May 6, 2005 Outline Intro to congestion control Input rate vs. output throughput Congestion window Congestion avoidance
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More information6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC.
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2005 Quiz II There are 17 questions and 10 pages in this quiz
More informationECE 610: Homework 4 Problems are taken from Kurose and Ross.
ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose
More informationFINAL May 21, minutes
CS 421: COMPUTER NETWORKS SPRING 2004 FINAL May 21, 2004 160 minutes Name: Student No: 1) a) Consider a 1 Mbits/sec channel with a 20 msec one-way propagation delay, i.e., 40 msec roundtrip delay. We want
More informationCongestion Control in TCP
Congestion Control in TCP Antonio Carzaniga Faculty of Informatics University of Lugano November 11, 2014 Outline Intro to congestion control Input rate vs. output throughput Congestion window Congestion
More informationPacket-Level Diversity From Theory to Practice: An based Experimental Investigation
Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems
More informationThe Best Protocol for Real-time Data Transport
The Definitive Guide to: The Best Protocol for Real-time Data Transport Assessing the most common protocols on 6 important categories Identifying the Best Protocol For strategic applications using real-time
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationCongestion Control. COSC 6590 Week 2 Presentation By Arjun Chopra, Kashif Ali and Mark Obsniuk
Congestion Control COSC 6590 Week 2 Presentation By Arjun Chopra, Kashif Ali and Mark Obsniuk Topics Congestion control TCP and the internet AIMD congestion control Equation Based congestion control Comparison
More informationPerformance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks
Performance Evaluation of Link Quality Estimation Metrics for Static Multihop Wireless Sensor Networks Tao Liu, Ankur Kamthe, Lun Jiang and Alberto Cerpa Computer Science and Engineering, University of
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationICS 351: Today's plan. OSPF BGP Routing in general
ICS 351: Today's plan OSPF BGP Routing in general link-state routing in distance-vector (Bellman-Ford, Ford-Fulkerson, RIP-style) routing, each router distributes its routing table to its neighbors an
More informationChapter 1. Introduction
Chapter 1 Introduction In a packet-switched network, packets are buffered when they cannot be processed or transmitted at the rate they arrive. There are three main reasons that a router, with generic
More informationCS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning
CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive
More informationNetwork Initialization in Low-Power Wireless Networks: A Comprehensive Study
The Computer Journal Advance Access published July 21, 2013 The British Computer Society 2013. All rights reserved. For Permissions, please email: journals.permissions@oup.com doi:10.1093/comjnl/bxt074
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationMore wireless: Sensor networks and TCP on mobile hosts
More wireless: Sensor networks and TCP on mobile hosts CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) Outline Routing in sensor networks
More informationThe Effects of Asymmetry on TCP Performance
The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry
More informationCongestion Control in TCP
Congestion Control in TCP Outline Overview of RENO TCP Reacting to Congestion SS/AIMD example CS 640 1 TCP Congestion Control The idea of TCP congestion control is for each source to determine how much
More informationAd hoc and Sensor Networks Time Synchronization
Ad hoc and Sensor Networks Time Synchronization Goals of this chaper Understand the importance of time synchronization in WSNs Understand typical strategies for time synchronization and how they are applied
More informationGeographical Routing Algorithms In Asynchronous Wireless Sensor Network
Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-
More informationReliable Stream Analysis on the Internet of Things
Reliable Stream Analysis on the Internet of Things ECE6102 Course Project Team IoT Submitted April 30, 2014 1 1. Introduction Team IoT is interested in developing a distributed system that supports live
More informationHousekeeping. Fall /5 CptS/EE 555 1
Housekeeping Lab access HW turn-in Jin? Class preparation for next time: look at the section on CRCs 2.4.3. Be prepared to explain how/why the shift register implements the CRC Skip Token Rings section
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationA HOLISTIC APPROACH TO MULTIHOP ROUTING IN SENSOR NETWORKS ALEC LIK CHUEN WOO
A HOLISTIC APPROACH TO MULTIHOP ROUTING IN SENSOR NETWORKS by ALEC LIK CHUEN WOO B.S. in University of California, Berkeley 1998 M.S. in University of California, Berkeley 2001 A dissertation submitted
More informationAssignment 7: TCP and Congestion Control Due the week of October 29/30, 2015
Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationAbstract. 1. Introduction. 2. Theory DOSA Motivation and Overview
Experiences with Implementing a Distributed and Self-Organizing Scheduling Algorithm for Energy-Efficient Data Gathering on a Real-Life Sensor Network Platform Yang Zhang, Supriyo Chatterjea, Paul Havinga
More informationCharacterizing the End-to-End Performance of Indoor Powerline Networks
Characterizing the End-to-End Performance of Indoor Powerline Networks Presentation by: David Kleinschmidt Paper By: Rohan Murty, Jitendra Padhye, Ranveer Chandra, Atanu Roy Chowdhury, and Matt Welsh School
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationWashington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) A B C
Washington State University CptS 455 Sample Final Exam (corrected 12/11/2011 to say open notes) Your name: This exam consists 13 numbered problems on 6 pages printed front and back on 3 sheets. Please
More informationOutline. Lecture 16: Wireless Networking. Physical Layer (Layer 1) Ethernet: Wireless is Different. Attenuation Over Space
Outline Lecture 16: Wireless Networking Wireless physical layer challenges - Signal, noise, modulation - A little bit of EE goes a long way Wireless link layers - Hidden terminals, exposed terminals -
More informationMC-LMAC: A Multi-Channel MAC Protocol for Wireless Sensor Networks
: A Multi-Channel MAC Protocol for Wireless Sensor Networks Özlem Durmaz Incel, Pierre Jansen, Sape Mullender University of Twente Department of Computer Science Enschede, The Netherlands {durmazo, jansen,
More informationWireless Sensor Networks, energy efficiency and path recovery
Wireless Sensor Networks, energy efficiency and path recovery PhD dissertation Anne-Lena Kampen Trondheim 18 th of May 2017 Outline Introduction to Wireless Sensor Networks WSN Challenges investigated
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationWT-4000 Wireless System
WT-4000 Wireless System Best Practices WT-BAC-IP Code No. LIT-12012551 Issued July 2017 Background and Wireless Network Components Refer to the QuickLIT website for the most up-to-date version of this
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationPoonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)
An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationLecture (08, 09) Routing in Switched Networks
Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.
More informationA Survey on Path Weight Based routing Over Wireless Mesh Networks
A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. M.Sc. in Advanced Computer Science. Date: Monday 2 nd June 2008.
COMP60242 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE M.Sc. in Advanced Computer Science Mobile Computing Date: Monday 2 nd June 2008 Time: 09:45 11:45 Please answer any THREE Questions
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationInformation Brokerage
Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,
More informationAd hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl
Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control
More informationModule 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth
Interconnection Networks Fundamentals Latency and bandwidth Router architecture Coherence protocol and routing [From Chapter 10 of Culler, Singh, Gupta] file:///e /parallel_com_arch/lecture37/37_1.htm[6/13/2012
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationPervasive and Mobile Computing
Pervasive and Mobile Computing 5 (29) 369 384 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc A data collection protocol for real-time
More informationEmploying Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller
1 Employing Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller Abstract: This paper discusses the use of wireless Bluetooth for controllerto-controller coordination (C 3 ) within industrial
More informationTRANSMISSION CONTROL PROTOCOL
COMP 635: WIRELESS & MOBILE COMMUNICATIONS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2017 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data link layer Physical
More informationETSF05/ETSF10 Internet Protocols Transport Layer Protocols
ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser
More informationA Logical Group Formation and Management Mechanism Using RSSI for Wireless Sensor Networks *
A Logical Group Formation and Management Mechanism Using RSSI for Wireless Sensor Networks * Jihyuk Heo, Jin Ho Kim, and Choong Seon Hong ** Department of Computer Engineering, Kyung Hee University, Sochen-ri,
More informationPRACTICE QUESTIONS ON RESOURCE ALLOCATION
PRACTICE QUESTIONS ON RESOURCE ALLOCATION QUESTION : Internet Versus Station Wagon A famous maxim, sometimes attributed to Dennis Ritchie, says Never underestimate the bandwidth of a station wagon full
More informationReliable Routing Algorithm on Wireless Sensor Network
International Journal of Engineering & Computer Science IJECS-IJENS Vol:12 No:06 26 Reliable Routing Algorithm on Wireless Sensor Network Jun-jun Liang 1, Zhen-Wu Yuna 1, Jian-Jun Lei 1 and Gu-In Kwon
More informationCapacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands
Capacity Planning for Next Generation Utility Networks (PART 1) An analysis of utility applications, capacity drivers and demands Utility networks are going through massive transformations towards next
More informationWireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013
Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing
More informationRequirements and best practices for enabling Enhanced PTT over Wi-Fi networks
Requirements and best practices for enabling Enhanced PTT over Wi-Fi networks The following guide is intended for users of Enhanced PTT to ensure that their Wi-Fi networks meet minimum requirements for
More informationCSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100
CSCI 1680 Computer Networks Fonseca Exam - Midterm Due: 11:50am, 15 Mar 2011 Closed Book. Maximum points: 100 NAME: 1. Sending Data - [12 pts] a. If TCP provides reliable, in-order delivery of bytes end-to-end,
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationCS321: Computer Networks Congestion Control in TCP
CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a
More informationThe Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale
The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale ABSTRACT To support network programming, we present Deluge, a reliable data dissemination protocol for propagating
More informationCongestion Control in TCP
Congestion Control in CP Antonio Carzaniga Faculty of Informatics University of Lugano Apr 7, 2008 2005 2007 Antonio Carzaniga 1 Intro to congestion control Outline Input rate vs. output throughput Congestion
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationRandom Neural Networks for the Adaptive Control of Packet Networks
Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.
More informationSynthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)
Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work
More informationTHE USE of self-organizing techniques to engineer distributed
360 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART A: SYSTEMS AND HUMANS, VOL. 35, NO. 3, MAY 2005 Using Feedback in Collaborative Reinforcement Learning to Adaptively Optimize MANET Routing Jim
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationIncrease-Decrease Congestion Control for Real-time Streaming: Scalability
Increase-Decrease Congestion Control for Real-time Streaming: Scalability Dmitri Loguinov City University of New York Hayder Radha Michigan State University 1 Motivation Current Internet video streaming
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationCongestion Control 3/16/09
Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if
More informationRouting algorithms. Jan Lönnberg, 51101M. October 2, Based on G. Tel: Introduction to Distributed Algorithms, chapter 4.
Routing algorithms Jan Lönnberg, 51101M October 2, 2002 Based on G. Tel: Introduction to Distributed Algorithms, chapter 4. 1 Contents Introduction Destination-based routing Floyd-Warshall (single processor)
More informationAn Analytical Model for Progressive Mesh Streaming. WEI TSANG OOI National University of Singapore
An Analytical Model for Progressive Mesh Streaming WEI TSANG OOI National University of Singapore 1 joint work with Cheng Wei National University of Singapore Sebastian Mondet Romulus Grigoras Geraldine
More informationAnnouncements. CMPE 257: Wireless and Mobile Networking. Today. Location Management. Project status update 2. Graded exams. Hw 4 (?) Project report.
CMPE 257: Wireless and Mobile Networking Spring 2003 Lecture 17 Announcements Project status update 2. Graded exams. Hw 4 (?) Project report. CMPE 257 Spring 2003 1 CMPE 257 Spring 2003 2 Today Location
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationA Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationThe Emergence of Networking Abstractions and Techniques in TinyOS
The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationCONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationImproving Reliable Transport and Handoff Performance in Cellular Wireless Networks
Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More information