Simulation in Large Scale Sensor Networks
|
|
- Arleen Chapman
- 6 years ago
- Views:
Transcription
1 Simulation in Large Scale Sensor Networks Barney Maccabe University of New Mexico The University of New Mexico Santa Fe, New Mexico 17 Oct 2006
2 I have finally reached the point in my career where I can live on the results of my graduate students Collaborators UNM sensor network systems software James Horey, PhD Student Jean-Charles Tournier, Postdoc Eric Nelson, MS student LANL sensor network system simulation Sean Brennan, MTS (& UNM PhD student) Angela Mielke, project lead SNL multi-scale system simulation for MPPs Rolf Riesen Keith Underwood
3 Multiscale Simulation for Systems Software Use simulation to study systems software approaches fault tolerance: simulate a large system and inject faults impact and viability of systems software at scale: how does it work More emulation than simulation, for now Traditional use of simulation in sensor networks application testing ad-hoc routing protocols
4 Basic simulation tools ns-2 network simulation packet level simulation, great for studying changes to TCP/IP plug-ins for wireless protocols ad-hoc wireless routing protocols Simple Scalar processor simulation instruction set simulation great for studying branch prediction and out-oforder execution Mambo
5 More Tiny OS simulation (TOSSIM) develop applications, small number of nodes EmStar sensor networks involving Linux-based platforms SWANS like ns2, better scalability, Java apps and a whole host of others...
6 Sensor Network Environment s sensing Stargate Stargate Stargate 1,000 s limited compute, communication and, power Stargates compute 100 s more compute, memory, power, and communication Computation in the network
7 Software Stack Composability Application Spreadsheet Programming Active Management Kensho Kaizen Micro Services Hardware Language Mapping policy Mapping mechanism Quality of service Hardware abstraction Programming writing the functions that will run on the nodes of a sensor network Tasking distributing functions to the nodes of a sensor network Groups Static and dynamic Collective operations
8 Basic Simulation Goal: evaluate software stack Kensho API library Each sensor simulated by a process (linked with the Kensho library) Wireless communication provided by a broadcast daemon Sensor reads come from environment simulator Kensho Node Kensho Node Broadcast Send Message Read Sensor Kensho Node Environment Kensho Node
9 Fire Detection: Group Operations smaller groups: higher resolution, more communication
10 The University of New Mexico Motion Tracking: Dynamic Groups Group is defined by magnetometer activation Tracking Accuracy Fig. 6. The object starts at position (5, 5) and moves at a velocity of 1.35 units per time interval. The circles indicate the triggered by the presence of the object. The horizontal line in the right figure represents the normalized path of the object, indicate how far from the actual object the algorithm predicted the object to be. Fig. 6. The object starts at position (5, 5) and moves at a velocity of 1.35 units per time interval. The circles indicate the sensors th triggered by the presence of the object. The horizontal line in the right figure represents the normalized path of the object, while the indicate how far from the actual object the algorithm predicted the object to be. osition (5, 5) and moves at a velocity of 1.35 units per time interval. The circles indicate the sensors that are
11 N-Sim: Scalable Simulation Goal: run large scale sensor network applications without modification Be able to control communication and node faults Order of magnitude speedup Initial focus on typical software stack: TinyOS and Linux Long term will be used to study the Kensho/ Kaizen stack
12 Virtualization using Xen Xen provides base level virtualization sharing CPU between multiple OSes Dom 0 provides access to other resources (e.g., network) Type 1 para-virtualization Dom 0 Host OS 1 Virtual Machines App App App App Host OS 2 Xen Virtualization Layer Hardware Host OS 3 Host OS 4
13 N-sim: Scalable simulation for sensors Simulate each sensor or stargate using a separate virtual machine Direct execution of applications On modified operating systems Simulation daemon runs in Dom 0 network and sensing Dom 0 Daemon Virtual Stargates App App App Xeno Xeno Linux Linux Linux Linux Xen Virtualization Layer Hardware Tiny Tiny OS OS wedge Virtual s App Tiny Tiny OS OS wedge
14 Scaling: Cluster of nodes Use multiple cluster nodes Simulation Daemons coordinate and exchange communications MPI for communicaiton and coordination Daemon Daemon Daemon Daemon Daemon
15 Full system simulation for MPP design Network Simulator Library Process Library Process Library Process
16 Multiscale issues Want full, cycle accurate, simulation from detailed processor simulation device drivers to large scale application including all software layers impact of changing implementation of services Also want simple, proof of concept simulation fast, clean and simple
17 Thanks LANL & NNSA SSL UNM Prof Patrick Bridges Postdocs Patricia Crowley (now at Gonzaga) Patrick Widener
Sensors Network Simulators
Sensors Network Simulators Sensing Networking Qing Fang 10/14/05 Computation This Talk Not on how to run various network simulators Instead What differentiates various simulators Brief structures of the
More informationSIDnet - SWANS. Outline. Prof. Peter Scheuermann EECS /10/2008 Presenter: Oliviu C. Ghica
SIDnet - SWANS Prof. Peter Scheuermann EECS 510 11/10/2008 Presenter: Oliviu C. Ghica Outline JiST/SWANS motivation The JiST engine SWANS SIDnet References 1 Motivation Real-world sensor networks are large
More informationMDHIM: A Parallel Key/Value Store Framework for HPC
MDHIM: A Parallel Key/Value Store Framework for HPC Hugh Greenberg 7/6/2015 LA-UR-15-25039 HPC Clusters Managed by a job scheduler (e.g., Slurm, Moab) Designed for running user jobs Difficult to run system
More informationTest Automation to the Limit
Test Automation to the Limit Arie van Deursen Delft University of Technology Test Automation Day, 23 June, 2011 1 Outline 1. Background Joint work with Ali Mesbah (UBC), Danny Roest (TU Delft) Michaela
More informationREAL-TIME ANALYTICS WITH APACHE STORM
REAL-TIME ANALYTICS WITH APACHE STORM Mevlut Demir PhD Student IN TODAY S TALK 1- Problem Formulation 2- A Real-Time Framework and Its Components with an existing applications 3- Proposed Framework 4-
More informationIdentifying the Sources of Latency in a Splintered Protocol
Identifying the Sources of Latency in a Splintered Protocol Wenbin Zhu, Arthur B. Maccabe Computer Science Department The University of New Mexico Albuquerque, NM 87131 Rolf Riesen Scalable Computing Systems
More informationServices in the Virtualization Plane. Andrew Warfield Adjunct Professor, UBC Technical Director, Citrix Systems
Services in the Virtualization Plane Andrew Warfield Adjunct Professor, UBC Technical Director, Citrix Systems The Virtualization Plane Applications Applications OS Physical Machine 20ms 20ms in in the
More informationModeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review
Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review R. Sinde Nelson Mandela African Institution of Science and Technology School of
More informationCycle Sharing Systems
Cycle Sharing Systems Jagadeesh Dyaberi Dependable Computing Systems Lab Purdue University 10/31/2005 1 Introduction Design of Program Security Communication Architecture Implementation Conclusion Outline
More informationI/O virtualization. Jiang, Yunhong Yang, Xiaowei Software and Service Group 2009 虚拟化技术全国高校师资研讨班
I/O virtualization Jiang, Yunhong Yang, Xiaowei 1 Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,
More informationSUSE OpenStack Cloud Production Deployment Architecture. Guide. Solution Guide Cloud Computing.
SUSE OpenStack Cloud Production Deployment Architecture Guide Solution Guide Cloud Computing Table of Contents page Introduction... 2 High Availability Configuration...6 Network Topography...8 Services
More informationLoad Balancing with McAfee Network Security Platform
Load Balancing with McAfee Network Security Platform Optimizing intrusion prevention system performance 1 Load Balancing with McAfee Network Security Platform Load Balancing with McAfee Network Security
More informationTransforming XenServer into a proper open-source project
Transforming XenServer into a proper open-source project James Bulpin CTO, XenServer, Citrix About the speaker James Bulpin Head of technology for XenServer group in Citrix; member of the Citrix CTO office
More informationAccelerating Parallel Analysis of Scientific Simulation Data via Zazen
Accelerating Parallel Analysis of Scientific Simulation Data via Zazen Tiankai Tu, Charles A. Rendleman, Patrick J. Miller, Federico Sacerdoti, Ron O. Dror, and David E. Shaw D. E. Shaw Research Motivation
More informationTOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set
Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science
More informationMobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma
Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction
More informationXen Community Update. Ian Pratt, Citrix Systems and Chairman of Xen.org
Xen Community Update Ian Pratt, Citrix Systems and Chairman of Xen.org 1 Outline Project Status Xen Client Initiative Xen Cloud Platform New Xen 4.0 Features 2 Announcement The Xen Advisory Board is excited
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationA Configuration Management Model on the High-speed Networks
A Configuration Management Model on the High-speed Networks Jie Huang, Lin Chen 1 School of Computer, National University of Defense Technology, Chang Sha, China huangjie@nudt.edu.cn Abstract. The infiniband-based
More informationOpen Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010
Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced
More informationDevelopment of Emulation Projects for Teaching Wireless Sensor Networks 1
Development of Emulation Projects for Teaching Wireless Sensor Networks Deepesh Jain T. Andrew Yang University of Houston Clear Lake Houston, Texas Abstract In recent years research and development in
More informationBİL 542 Parallel Computing
BİL 542 Parallel Computing 1 Chapter 1 Parallel Programming 2 Why Use Parallel Computing? Main Reasons: Save time and/or money: In theory, throwing more resources at a task will shorten its time to completion,
More informationVirtualizing Oracle 11g/R2 RAC Database on Oracle VM: Methods/Tips
Virtualizing Oracle 11g/R2 RAC Database on Oracle VM: Methods/Tips Saar Maoz, RACPack RAC Development, Oracle Kai Yu, Oracle Solutions Engineering, Dell Inc About Authors Saar Maoz Consulting Software
More informationTypes of Virtualization. Types of virtualization
Types of Virtualization Emulation VM emulates/simulates complete hardware Unmodified guest OS for a different PC can be run Bochs, VirtualPC for Mac, QEMU Full/native Virtualization VM simulates enough
More informationSystem Energy Efficiency Lab seelab.ucsd.edu
Motivation Embedded systems operate in, interact with, and react to an analog, real-time world Interfacing with this world is not easy or monolithic Sensors: provide measurements of the outside world Actuators:
More informationHow to develop and validate a scalable mesh routing solution for IEEE sensor networks Altran Benelux
How to develop and validate a scalable mesh routing solution for IEEE 802.15.4 sensor networks Altran Benelux Leuven, 29 October 2015 Daniele Lacamera picotcp The reference
More informationNGN Progress Report. Table of Contents
NGN Progress Report Title: Simulator Scalability Testing Prepared by: Richard Nelson Date: 08 February, 2006 Table of Contents Introduction...2 Simulators...2 Test Method...2 Simulation Model...2 CPU Utilisation...2
More informationMobile Application Development
Mobile Application Development The principal goal of education is to create men and women who are capable of doing new things, not simply repeating what other generations have done. -Jean Piaget Mobile
More informationCommercial Real-time Operating Systems An Introduction. Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory
Commercial Real-time Operating Systems An Introduction Swaminathan Sivasubramanian Dependable Computing & Networking Laboratory swamis@iastate.edu Outline Introduction RTOS Issues and functionalities LynxOS
More informationSimulation Of Computer Systems. Prof. S. Shakya
Simulation Of Computer Systems Prof. S. Shakya Purpose & Overview Computer systems are composed from timescales flip (10-11 sec) to time a human interacts (seconds) It is a multi level system Different
More informationUsing Xen For Router Virtualisation
July 2007 Using Xen For Router Virtualisation Adam Greenhalgh, Mark Handley,Tim Schooley University College of London Norbert Egi, Mickaël Hoerdt, Laurent Mathy University of Lancaster Evaluating Xen for
More informationAdapted from: TRENDS AND ATTRIBUTES OF HORIZONTAL AND VERTICAL COMPUTING ARCHITECTURES
Adapted from: TRENDS AND ATTRIBUTES OF HORIZONTAL AND VERTICAL COMPUTING ARCHITECTURES Tom Atwood Business Development Manager Sun Microsystems, Inc. Takeaways Understand the technical differences between
More informationSANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION
SANDPIPER: BLACK-BOX AND GRAY-BOX STRATEGIES FOR VIRTUAL MACHINE MIGRATION Timothy Wood, Prashant Shenoy, Arun Venkataramani, and Mazin Yousif * University of Massachusetts Amherst * Intel, Portland Data
More informationAn Extensible Message-Oriented Offload Model for High-Performance Applications
An Extensible Message-Oriented Offload Model for High-Performance Applications Patricia Gilfeather and Arthur B. Maccabe Scalable Systems Lab Department of Computer Science University of New Mexico pfeather@cs.unm.edu,
More informationDependable services, built on group communication systems, providing fast access to huge volumes of data in distributed systems
Dependable services, built on group communication systems, providing fast access to huge volumes of data in distributed systems PhD Thesis Extended abstract PhD Student ing. Adrian Coleșa Scientic advisor
More informationIntegration of Wireless Sensor Network Services into other Home and Industrial networks
Integration of Wireless Sensor Network Services into other Home and Industrial networks using Device Profile for Web Services (DPWS) Ayman Sleman Automation and Process Control Engineering, University
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationHuawei CloudFabric and VMware Collaboration Innovation Solution in Data Centers
Huawei CloudFabric and ware Collaboration Innovation Solution in Data Centers ware Data Center and Cloud Computing Solution Components Extend virtual computing to all applications Transform storage networks
More informationSystem Management and Infrastructure
System Management and Infrastructure WP 28 Accelerator Controls Conceptual Design Report CDR Meeting December, 14 th 2009, DESY - Tim Wilksen System Management 2 Hardware Management Management xtca Systems
More informationAlleviating Scalability Issues of Checkpointing
Rolf Riesen, Kurt Ferreira, Dilma Da Silva, Pierre Lemarinier, Dorian Arnold, Patrick G. Bridges 13 November 2012 Alleviating Scalability Issues of Checkpointing Protocols Overview 2 3 Motivation: scaling
More information-Presented By : Rajeshwari Chatterjee Professor-Andrey Shevel Course: Computing Clusters Grid and Clouds ITMO University, St.
-Presented By : Rajeshwari Chatterjee Professor-Andrey Shevel Course: Computing Clusters Grid and Clouds ITMO University, St. Petersburg Introduction File System Enterprise Needs Gluster Revisited Ceph
More informationDistributed Systems COMP 212. Lecture 18 Othon Michail
Distributed Systems COMP 212 Lecture 18 Othon Michail Virtualisation & Cloud Computing 2/27 Protection rings It s all about protection rings in modern processors Hardware mechanism to protect data and
More informationBSIT 1 Technology Skills: Apply current technical tools and methodologies to solve problems.
Bachelor of Science in Information Technology At Purdue Global, we employ a method called Course-Level Assessment, or CLA, to determine student mastery of Course Outcomes. Through CLA, we measure how well
More informationVIProf: A Vertically Integrated Full-System Profiler
VIProf: A Vertically Integrated Full-System Profiler NGS Workshop, April 2007 Hussam Mousa Chandra Krintz Lamia Youseff Rich Wolski RACELab Research Dynamic software adaptation As program behavior or resource
More informationCertified Network Security Open Source Software Developer VS-1145
Certified Network Security Open Source Software Developer VS-1145 www.vskills.in Certified Network Security Open Source Software Developer Certified Network Security Open Source Software Developer Certification
More informationJiST Java in Simulation Time An efficient, unifying approach to simulation using virtual machines
JiST Java in Simulation Time An efficient, unifying approach to simulation using virtual machines Rimon Barr, Zygmunt Haas, Robbert van Renesse rimon@acm.org haas@ece.cornell.edu rvr@cs.cornell.edu. Cornell
More informationLIA. Large Installation Administration. Virtualization
LIA Large Installation Administration Virtualization 2 Virtualization What is Virtualization "a technique for hiding the physical characteristics of computing resources from the way in which other systems,
More informationReal-Time Internet of Things
Real-Time Internet of Things Chenyang Lu Cyber-Physical Systems Laboratory h7p://www.cse.wustl.edu/~lu/ Internet of Things Ø Convergence of q Miniaturized devices: integrate processor, sensors and radios.
More informationPractical Experiment with KivaNS: A virtual Laboratory for Simulating IP Routing in Computer Networks Subjects.
Practical Experiment with KivaNS: A virtual Laboratory for Simulating IP Routing in Computer Networks Subjects. F.A. Candelas, P. Gil AUROVA Automatics, Robotics and Computer Vision Group http://www.aurova.ua.es
More informationExposure to Sensor Motes
Department of Computer Science Southern Illinois University Carbondale Exposure to Sensor Motes CS 441 WIRELESS & MOBILE COMPUTING Instructor Dr. Kemal Akkaya kemal@cs.siu.edu 1 Section 1: Introduction
More informationMonitor System Status
View Cluster Nodes Status, on page 1 View Hardware Status, on page 1 View Network Status, on page 2 View Installed Software, on page 2 View System Status, on page 2 View IP Preferences, on page 3 View
More informationPOWER: Planning and Deployment Platform for Wireless Sensor Networks *
POWER: Planning and Deployment Platform for Wireless Sensor Networks * Jinghao Li 1, Yuebin Bai 1, Haixing Ji 1, Jihong Ma 2, Yong Tian 1 and Depei Qian 1 1 School of Computer, Beihang University, Beijing,
More informationNETWORK SIMULATION USING NCTUns. Ankit Verma* Shashi Singh* Meenakshi Vyas*
NETWORK SIMULATION USING NCTUns Ankit Verma* Shashi Singh* Meenakshi Vyas* 1. Introduction: Network simulator is software which is very helpful tool to develop, test, and diagnose any network protocol.
More informationSystem Architecture Directions for Networked Sensors. Jason Hill et. al. A Presentation by Dhyanesh Narayanan MS, CS (Systems)
System Architecture Directions for Networked Sensors Jason Hill et. al. A Presentation by Dhyanesh Narayanan MS, CS (Systems) Sensor Networks Key Enablers Moore s s Law: More CPU Less Size Less Cost Systems
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationAgent based System Architecture for Wireless Sensor Networks
Agent based System Architecture for Wireless Sensor Networks Sajid Hussain, Elhadi Shakshuki, Abdul Wasey Matin Jodrey School of Computer Science Acadia University Wolfville, Nova Scotia, Canada B4P 2R6
More informationTowards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings
Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings By Lars Schor, Philipp Sommer, Roger Wattenhofer Computer Engineering and Networks Laboratory ETH Zurich, Switzerland
More informationFault tolerance in Grid and Grid 5000
Fault tolerance in Grid and Grid 5000 Franck Cappello INRIA Director of Grid 5000 fci@lri.fr Fault tolerance in Grid Grid 5000 Applications requiring Fault tolerance in Grid Domains (grid applications
More informationPresented by: Murad Kaplan
Presented by: Murad Kaplan Introduction. Design of SCP-MAC. Lower Bound of Energy Performance with Periodic Traffic. Protocol Implementation. Experimental Evaluation. Related Work. 2 Energy is a critical
More informationKVM CPU MODEL IN SYSCALL EMULATION MODE ALEXANDRU DUTU, JOHN SLICE JUNE 14, 2015
KVM CPU MODEL IN SYSCALL EMULATION MODE ALEXANDRU DUTU, JOHN SLICE JUNE 14, 2015 AGENDA Background & Motivation Challenges Native Page Tables Emulating the OS Kernel 2 KVM CPU MODEL IN SYSCALL EMULATION
More informationCPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Lecture 1
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 1 Overview of Distributed and Cloud Computing System Models and Enabling Technologies Based on the Chapter 1 Distributed System
More informationModule 1: Virtualization. Types of Interfaces
Module 1: Virtualization Virtualization: extend or replace an existing interface to mimic the behavior of another system. Introduced in 1970s: run legacy software on newer mainframe hardware Handle platform
More informationInternational Journal of Scientific Research and Modern Education (IJSRME) ISSN (Online): ( Volume I, Issue I,
EFFECTIVE LEARNING WITH USAGE OF SIMULATORS A CASE OF NCTUNS SIMULATOR IN COMPUTER NETWORKS Subrahmanya Bhat* & Dr. K. R. Kamath** * Department of Computer Application, Srinivas Institute of Management
More informationProject JXTA Technology Overview.
Project JXTA Technology Overview www.jxta.org The Time Is Right for P2P and Project JXTA Peer-to-Peer (P2P) is not new. However, the time is now right for the broad P2P applications deployment. The Project
More informationNVSG NVIDIA Scene Graph
NVSG NVIDIA Scene Graph Leveraging the World's Fastest Scene Graph Agenda Overview NVSG Shader integration Interactive ray tracing Multi-GPU support NVIDIA Scene Graph (NVSG) The first cross-platform scene
More informationCertified Cordova Developer VS-1124
VS-1124 Certified Cordova Developer Certification Code VS-1124 Vskills certification for Cordova Developer assesses the candidate as per the company s need for developing mobile applications which work
More informationSTRAW - An integrated mobility & traffic model for vehicular ad-hoc networks
STRAW - An integrated mobility & traffic model for vehicular ad-hoc networks David R. Choffnes & Fabián E. Bustamante Department of Computer Science, Northwestern University www.aqualab.cs.northwestern.edu
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationArrakis: The Operating System is the Control Plane
Arrakis: The Operating System is the Control Plane Simon Peter, Jialin Li, Irene Zhang, Dan Ports, Doug Woos, Arvind Krishnamurthy, Tom Anderson University of Washington Timothy Roscoe ETH Zurich Building
More informationUsing Charm++ to Support Multiscale Multiphysics
LA-UR-17-23218 Using Charm++ to Support Multiscale Multiphysics On the Trinity Supercomputer Robert Pavel, Christoph Junghans, Susan M. Mniszewski, Timothy C. Germann April, 18 th 2017 Operated by Los
More informationData Path acceleration techniques in a NFV world
Data Path acceleration techniques in a NFV world Mohanraj Venkatachalam, Purnendu Ghosh Abstract NFV is a revolutionary approach offering greater flexibility and scalability in the deployment of virtual
More informationA Generic Microservice Architecture for Environmental Data Management
A Generic Microservice Architecture for Environmental Data Management Clemens Düpmeier, Eric Braun, Thorsten Schlachter, Karl-Uwe Stucky, Wolfgang Suess KIT The Research University in the Helmholtz Association
More informationIO virtualization. Michael Kagan Mellanox Technologies
IO virtualization Michael Kagan Mellanox Technologies IO Virtualization Mission non-stop s to consumers Flexibility assign IO resources to consumer as needed Agility assignment of IO resources to consumer
More informationDistributing Application and OS Functionality to Improve Application Performance
Distributing Application and OS Functionality to Improve Application Performance Arthur B. Maccabe, William Lawry, Christopher Wilson, Rolf Riesen April 2002 Abstract In this paper we demonstrate that
More informationONOS: TOWARDS AN OPEN, DISTRIBUTED SDN OS. Chun Yuan Cheng
ONOS: TOWARDS AN OPEN, DISTRIBUTED SDN OS Chun Yuan Cheng OUTLINE - Introduction - Two prototypes - Conclusion INTRODUCTION - An open, vendor neutral, control-data plane interface such as OpenFlow allows
More informationPractical Aspects of CTI WSN Testbed
Practical Aspects of CTI WSN Testbed Dpt. of Computer Engineering and Informatics, University of Patras, Greece Research Academic Computer Technology Institute (CTI), Patras, Greece 2nd PROSENSE Meeting
More informationIWES st Italian Workshop on Embedded Systems Pisa September 2016
IWES 2016 1st Italian Workshop on Embedded Systems Pisa -- 19 September 2016 Research Group Overview Roberto Giorgi University of Siena, Italy http://www.dii.unisi.it/~giorgi Siena on Earth 2 Engineering
More informationVMware - VMware vsphere: Install, Configure, Manage [V6.7]
VMware - VMware vsphere: Install, Configure, Manage [V6.7] Code: Length: URL: EDU-VSICM67 5 days View Online This five-day course features intensive hands-on training that focuses on installing, configuring,
More informationLesson 9 Smart city Services And Monitoring. Chapter-12 L09: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 9 Smart city Services And Monitoring 1 Tech-Mahindra partnering with ThingWorx Smart City Solutions Smart traffic solutions Smart energy management Smart parking, Smart waste bins Smart street lighting
More informationWhat Is NetBeans? Free and open-source based > Open source since June, 2000 > Large community of users and developers
Page 1 Slide 1: title and presenter's name Slide 2: topic intro - what product/technology is Slide 3: topic intro - who is the target market (be very as specific as possible: e.g. geo, developer type,
More informationChecklist for VoIP Technology
How To Add Voice to Your Web Community Checklist for VoIP Technology Slava Borilin VoIP Products Director SPIRIT Why SPIRIT 10+ years, 120 people Focus on voice processing solutions Powers 80M voice channels
More informationXytech MediaPulse Equipment Guidelines (Version 8 and Sky)
Xytech MediaPulse Equipment Guidelines (Version 8 and Sky) MediaPulse Architecture Xytech Systems MediaPulse solution utilizes a multitier architecture, requiring at minimum three server roles: a database
More informationEnabling innovation in the Internet: Main Achievements of the CHANGE Project. Felipe Huici, NEC Europe
Enabling innovation in the Internet: Main Achievements of the CHANGE Project Felipe Huici, NEC Europe EU FP7 CHANGE Project Info: Start in Oct. 2010, will end in December 2013 Partner Eurescom (Prime Contractor)
More informationDeveloping Enterprise Cloud Solutions with Azure
Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course
More informationSCORE: Smart-Grid Common Open Research Emulator
SCORE: Smart-Grid Common Open Research Emulator Song Tan, Wen-Zhan Song Department of Computer Science Georgia State University Atlanta, GA, USA stan6,wsong@cs.gsu.edu Qifen Dong College of Information
More informationBuilding Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey
Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom
More informationEnergy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network
Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering
More informationStavros Nikolaou. 413 Gates Hall URL: Ithaca, NY, 14853, USA Date of Birth: December, 1987
413 Gates Hall +1 6073795409 Department of Computer Science Cornell University email: snikolaou@cs.cornell.edu URL: www.cs.cornell.edu/~snikolaou Ithaca, NY, 14853, USA Date of Birth: December, 1987 Education
More informationVMware vsphere 6.5: Install, Configure, Manage (5 Days)
www.peaklearningllc.com VMware vsphere 6.5: Install, Configure, Manage (5 Days) Introduction This five-day course features intensive hands-on training that focuses on installing, configuring, and managing
More informationSensor-to-cloud connectivity using Sub-1 GHz and
Sensor-to-cloud connectivity using Sub-1 GHz and 802.15.4 Nick Lethaby, IoT, Ecosystem Manager, Texas Instruments Agenda Key design considerations for a connected IoT sensor Overview of the Sub-1 GHz band
More informationvirtual machine block storage with the ceph distributed storage system sage weil xensummit august 28, 2012
virtual machine block storage with the ceph distributed storage system sage weil xensummit august 28, 2012 outline why you should care what is it, what it does how it works, how you can use it architecture
More informationStarFinder Aire User Manual
Document No.: Document Type: Security Level: 270-UM-001 User Manual Open StarFinder Aire User Manual (Preliminary) Version 1.00 Dec. 05, 2015 Copyright Laipac Technology Inc. Release History Revision Date
More informationConcepts of Distributed Systems 2006/2007
Concepts of Distributed Systems 2006/2007 Introduction & overview Johan Lukkien 1 Introduction & overview Communication Distributed OS & Processes Synchronization Security Consistency & replication Programme
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-13 Sensor Networks Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are obtained from
More informationHP-UX 11i V3 Overview & Roadmap. IT-Symposium Robert Sakic - Vortrag 2H01 Senior Presales Consultant, HP.
HP-UX 11i V3 Overview & Roadmap Robert Sakic - Vortrag 2H01 Senior Presales Consultant, HP 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice
More informationConstrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral
Constrained Application Protocol (CoAP) Vilen Looga, M.Sc. Doctoral Student @dcs.aalto Outline Introduction CoAP at a glance Messages Observe Hardware Demo MAMMOTH Conclusions References 50 billion connected
More informationIntroduction to Virtualization and Containers Phil Hopkins
Introduction to Virtualization and Containers Phil Hopkins @twitterhandle Virtualization What is it? Introduction to Virtualization and Containers What the heck is a hypervisor? Why are there so many of
More informationPRAN (Physical Realization of Ad hoc Networks) 1 is a new
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 6, NO. 4, APRIL 2007 463 Design and Performance of PRAN: A System for Physical Implementation of Ad Hoc Network Routing Protocols Amit Kumar Saha, Khoa Anh To,
More informationCo-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud
571 Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud T.R.V. Anandharajan 1, Dr. M.A. Bhagyaveni 2 1 Research Scholar, Department of Electronics and Communication,
More informationACCELERATING THE PRODUCTION OF SYNTHETIC SEISMOGRAMS BY A MULTICORE PROCESSOR CLUSTER WITH MULTIPLE GPUS
ACCELERATING THE PRODUCTION OF SYNTHETIC SEISMOGRAMS BY A MULTICORE PROCESSOR CLUSTER WITH MULTIPLE GPUS Ferdinando Alessi Annalisa Massini Roberto Basili INGV Introduction The simulation of wave propagation
More information