Visibility: A New Metric for Protocol Design
|
|
- Blaise Dixon
- 5 years ago
- Views:
Transcription
1 Visibility: A ew Metric for Protocol Design Megan Wachs, Jung Il Choi, Jung Woo Lee, Kannan Srinivasan, Zhe Chen*, Mayank Jain, & Philip Levis Stanford University, *Columbia University
2 Visibility What are we doing wrong?
3 Visibility It is difficult to observe what occurs deep within a sensor network. This is the direct result of energy constraints on a mote. This lack of visibility directly hinders development.
4 Contribution This talk is OT about a debugging tool This talk is about quantifying how easy it is to debug a protocol
5 Visibility Cost The energy required to diagnose the cause of a failure or behavior
6 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion
7 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion
8 What kinds of failures are observed in real deployments?
9 What kinds of failures are observed in real deployments? Identifiable Failures
10 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts
11 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts etwork Problems: Saturation & Congestion
12 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts etwork Problems: Saturation & Congestion Protocol Issues: Conflicts & Failures
13 What kinds of failures are observed in real deployments? Identifiable Failures System Interactions: software conflicts etwork Problems: Saturation & Congestion Protocol Issues: Conflicts & Failures Unknown Collisions? Interference? Buggy code? Hardware problems?
14 Effects of Failures on Deployment Performance Great Duck Island: 58% Peter Scott R. Szewczyk, J. Polastre, A. Mainwaring, and D. Culler. An analysis of a large scale habitat monitoring application. In Proceedings of the Second ACM Conference On Embedded etworked Sensor Systems (SenSys), 2004.
15 Effects of Failures on Deployment Performance Great Duck Island: 58% Redwoods : 40% G. Tolle, J. Polastre, R. Szewczyk, D. Culler,. Turner, K. Tu, S. Burgess, T. Dawson, P. Buonadonna, D. Gay,, and W. Hong. A macroscope in the redwoods. In Proceedings of the Third ACM Conference on Embedded etworked Sensor Systems (SenSys), 2005.
16 Effects of Failures on Deployment Performance Great Duck Island: 58% Redwoods : 40% Potato Field: 2% K. Langendoen, A. Baggio, and O. Visser. Murphy loves potatoes: Experiences from a pilot sensor network deployment in precision agriculture. In the Fourteenth Int. Workshop on Parallel and Distributed Real-Time Systems (WPDRTS), 2006.
17 Effects of Failures on Deployment Performance Great Duck Island: 58% Redwoods : 40% Potato Field: 2% Volcan Reventador: 68% G. Werner-Allen, K. Lorincz, J. Johnson, J. Leess, and M. Welsh. Monitoring volcanic eruptions with a wireless sensor network. In Proceedings of the Second European Workshop on Wireless Sensor etworks (EWS), 2005.
18 Management and Debugging Sympathy Lightweight RPC etwork Snooping Tools
19 Example Protocol: Collection Tree
20 Example Protocol: Possible Causes
21 Example Protocol: Possible Causes
22 Example Protocol: Possible Causes
23 Example Protocol: Possible Causes
24 Example Protocol: Possible Causes
25 Example Protocol: Decision Tree Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Duplicate Suppression? Duplicate Suppression Above Max Tx? Egress Drop Ingress Drop? Ingress Drop Link Layer Failure
26 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion
27 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior.
28 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Cause A Q1 Cause B Q2 Q3 Cause C Cause D
29 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Cause A Q1: cost = 0 Q2: cost = C Cause B Q3: cost = C Cause C Cause D
30 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Cause A Q1: cost = 0 Q2: cost = C Cause B Q3: cost = C Cause C Cause D
31 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A Q2: cost = C Cause B C Q3: cost = C Cause C Cause D
32 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A 0 Q2: cost = C Cause B C Q3: cost = C Cause C 2C Cause D 2C
33 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A Q2: cost = C Cause B 0.25 C Q3: cost = C Cause C C Cause D C
34 Visibility Metric Visibility Cost: The expected energy of traversing the decision tree to diagnose the cause of a behavior. Q1: cost = 0 Cause A Q2: cost = C Cause B 0.25 C Q3: cost = C Cause C C Cause D 0.25 Visibility Cost = 1.25 C 2C
35 Increasing Visibility Q1: cost = 0 Cause A Q2: cost = C Cause B 0.33 C Cause C 0.33 C Remove Leaves From the Tree Visibility Cost = 0.66 C
36 Increasing Visibility Q1: cost = 0 Cause A Q2: cost = Cause B Cause C Reduce Cost of Questions Visibility Cost = 0.00 C
37 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion
38 A Design Example: Pull Collection Protocol
39 Diagnosing Why Packets Were Lost Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Above Max Tx? Egress Drop Ingress Drop? Ingress Drop Link Layer Failure
40 Diagnosing Why Packets Were Lost Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Above Max Tx? Egress Drop Ingress Drop? Ingress Drop Link Layer Failure
41 Eliminating Egress Drops Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Ingress Drop? Ingress Drop Link Layer Failure
42 Eliminating Ingress Drops Traditional Rate Control
43 Eliminating Ingress Drops Traditional Rate Control
44 Eliminating Ingress Drops Traditional Rate Control
45 Eliminating Ingress Drops Pull-Based Rate Control
46 Eliminating Ingress Drops Pull-Based Rate Control
47 Eliminating Ingress Drops Pull-Based Rate Control
48 Eliminating Ingress Drops Pull-Based Rate Control
49 Eliminating Ingress Drops Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Ingress Drop? Ingress Drop Link Layer Failure
50 Eliminating Ingress Drops Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Link Layer Failure
51 PCP Decision Tree Receive o Packets? Disconnection/ Death Seq. # is zero? Reboot Jump in THLs? Duplicate Suppression Link Layer Failure Traverse the remainder with information included in packets, used by the protocol itself
52 Evaluating PCP 40-ode MoteLab Testbed PCP: sending as fast as possible. MultihopLQI: 1300ms, 800ms, and 20ms packet generation interval Interference-Aware SIGCOMM 2006 Fair Rate Control (IFRC): Results from Metrics: Reliability Fairness Throughput Visibility
53 PCP Performance Delivery Probability MultihopLQI 1300ms IFRC PCP MultihopLQI 800ms Throughput (pps)
54 PCP Fairness Fairness (JFI) PCP MultihopLQI1300ms MultihopLQI800ms MultihopLQI20ms IFRC
55 PCP Visibility MultihopLQI visibility cost at 800ms interval: 1.615C PCP visibility cost: 0.00 C
56 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion
57 Applying Visibility: Deluge Dissemination Protocol Advertises odes new binary with advertisement packets send requests for new binary from best neighbor Why does a node still have an out-of-date binary? Two expensive causes to diagnose: Suppressions Interference due to misbehaving nodes during binary transmission
58 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission
59 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission Request
60 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission Request
61 V-Deluge Suppressions Due to Misbehaving odes: Identify and ignore faulty nodes Interference during binary transmission
62 V-Deluge Visibility Deluge Visibility: 1.02 C V-Deluge Visibility: 1.00 C
63 Total Packets Sent (thousands) V-Deluge Performance Deluge V-Deluge Time (sec)
64 Percentage of odes with Full Binary V-Deluge Performance Deluge V-Deluge 100% 75% 50% 25% 0% Time (sec)
65 Outline Survey of Failures The Visibility Metric PCP: Clean Slate Design V-Deluge: Incremental Improvement Conclusion
66 Future Work Refining the visibility metric Visibility in networks with multiple protocols depends on isolation between protocols
67 Conclusions We should consider the visibility of a protocol along with traditional metrics The visibility metric provides a new way for thinking about and comparing protocols Visibility has broader implications: systems, languages
68 Comments & Questions?
69 Extra Slides
70 Management and Debugging Sympathy Receive o Packets? Seq. # is zero? Disconnection Reboot Duplicate Suppression? Above Max Tx? Alien Failure? Default Overload? Duplicates Egress Drop Ingress Drop? Ingress Drop Overload Gamma Ray? Alien Failure Deadlock Suppression? Alpha Radiation Flipped Bits Suppression Link Layer Failure
71 Management and Debugging Sympathy Receive o Packets? Disconnection Link Layer Failure
72 Increasing Visibility Q1: cost = 0 Cause A Q2: cost = C Cause B 0.33 C Cause C 0.10 C Reduce Probability of Expensive Causes Visibility Cost = 0.43 C
73 Conclusions Are we just changing the question: Why is the network dropping packets? becomes Why is a node not sending any packets?
Opening the Sensornet Black Box. Megan Wachs, Jung Woo Lee, Jung Il Choi, & Philip Levis Computer Systems Laboratory, Stanford University
Opening the Sensornet Black Box Megan Wachs, Jung Woo Lee, Jung Il Choi, & Philip Levis Computer Systems Laboratory, Stanford University The Sensornet Black Box It is difficult to observe what occurs deep
More informationVisibility: A New Metric For Protocol Design
Visibility: A ew Metric For Protocol Design Megan Wachs, Jung Il Choi, Jung Woo Lee, Kannan Srinivasan, Zhe Chen, Mayank Jain, and Philip Levis Computer Systems Laboratory, Stanford University, Stanford,
More informationOpening the Sensornet Black Box
Opening the Sensornet Black Box Jung Il Choi, Jung Woo Lee, Megan Wachs, and Philip Levis Computer Systems Laboratory Stanford University Stanford, CA 94305 Abstract We argue that the principal cause of
More informationAn Empirical Study of Data Collection Protocols for Wireless Sensor Networks
An Empirical Study of Data Collection Protocols for Wireless Sensor Networks Stephen Rothery stevekr@gmail.com Wen Hu wen.hu@csiro.au Peter Corke peter.corke@csiro.au Abstract In the past few years, numerous
More informationGranting Silence to Avoid Wireless Collisions
Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route
More informationDeployment of Sensor Networks: Problems and Passive Inspection. Matthias Ringwald, Kay Römer (ETH Zurich)
Deployment of Sensor Networks: Problems and Passive Inspection Matthias Ringwald, Kay Römer (ETH Zurich) Sensor Networks Ad hoc network of sensor nodes Perceive real world (sensors) Process data (microcontroller)
More informationRouting: Collection Tree Protocol. Original slides by Omprakash Gnawal
Routing: Collection Tree Protocol Original slides by Omprakash Gnawal Collection Anycast route to the sink(s) collects data from the network to a small number of sinks network primitive for other protocols
More informationStarburst SSD: An Efficient Protocol for Selective Dissemination
Starburst SSD: An Efficient Protocol for Selective Dissemination Tahir Azim Stanford University Stanford, California 9435 Email:tazim@cs.stanford.edu Qasim Mansoor National University of Sciences and Technology
More informationA Measurement-based Analysis of the Interaction between Network Layers in TinyOS
A Measurement-based Analysis of the Interaction between Network Layers in TinyOS Umberto Malesci 1,2, and Samuel Madden 1 1 MIT CSAIL Cambridge, MA 02139 {umberto, madden}@csail.mit.edu 2 Fluidmesh Networks,
More informationPassive Distributed Assertions for Sensor Networks
Passive Distributed Assertions for Sensor Networks Kay Römer Institute for Pervasive Computing ETH Zurich, Switzerland roemer@inf.ethz.ch Abstract When deployed in a real-world setting, many sensor networks
More informationCollection Tree Protocol
Collection Tree Protocol Omprakash Gnawali (Stanford University) with Rodrigo Fonseca (Brown University) Kyle Jamieson (University College London) David Moss (People Power Company) Philip Levis (Stanford
More informationOn Testing Wireless Sensor Networks
On Testing Wireless Sensor Networks Tomasz Surmacz, Bartosz Wojciechowski, Maciej Nikodem, and Mariusz Słabicki Abstract Testing wireless sensor networks (WSNs) is not a trivial task, due to the massively-parallel
More informationResearch Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks
Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless
More informationRealistic Sensing Area Modeling
Realistic Sensing Area Modeling Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim Department of Computer Science, University of Minnesota, Minneapolis {jhwang,yugu,tianhe,kyd}@cs.umn.edu Abstract Despite the
More informationWireless Sensor Networks: From Science to Reality. Kay Römer ETH Zurich
Wireless Sensor Networks: From Science to Reality Kay Römer ETH Zurich Sensor Networks Ad hoc network of sensor nodes Perceive (sensors) Process (microcontroller) Communicate (radio) Autonomous power supply
More informationMeasurement and Analysis on the Packet Delivery Performance in A Large Scale Sensor Network
Measurement and Analysis on the Packet Delivery Performance in A Large Scale Sensor Network Wei Dong, Yunhao Liu, Yuan He, Tong Zhu CS College, Zhejiang University; TNLIST, Tsinghua University; CSE Dept.
More informationData Discovery and Dissemination with DIP
Data Discovery and Dissemination with DIP Authors: Kaisen Lin, Philip Levis Speaker: Giannakakis Spyridon 10-937-548 ETH Zurich, D-INFK March 22, 2011 1 / 24 Problem How to efficiently distribute binaries
More informationEnergy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x
Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x Dhaval Patel, 1 Bijal Chawla, 2 Chandresh Parekh 3 12 PG Student, Department of Wireless Mobile Computing, Gujarat
More informationThe Internet vs. Sensor Nets
The Internet vs. Sensor Nets, Philip Levis 5/5/04 0 The Internet vs. Sensor Nets What they ve learned, Philip Levis 5/5/04 1 The Internet vs. Sensor Nets What they ve learned, and we ve forgotten. Philip
More informationThe Firecracker Protocol
The Firecracker Protocol Philip Levis and David Culler {pal,culler}@eecs.berkeley.edu EECS Department University of California, Berkeley Berkeley, CA 94720 ABSTRACT We propose the Firecracker protocol
More informationCollection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter
Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Protocols Why do we need collection protocols? Collecting data at a base station is a
More informationCollecting and processing data from wireless sensor networks
Collecting and processing data from wireless sensor networks Pavel Vajsar 1, Patrik Morávek 1, Petr Žoldoš 1 1 Faculty of Electrical Engineering and Communication Brno University of Technology Email: pavel.vajsar@phd.feec.vutbr.cz,
More informationPROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1
PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan
More informationApples, Oranges, and Testbeds
Apples, Oranges, and Testbeds Koen Langendoen Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology, The Netherlands K.G.Langendoen@tudelft.nl Abstract Research
More informationPractical Network Coding in Sensor Networks: Quo Vadis?
Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),
More informationExperiences from a Decade Development
Experiences from a Decade of Development Philip Levis Stanford University @OSDI 2012 1 2 Back to 1999... Information technology (IT) is on the verge of another revolution The use of EmNets [embedded networks]
More informationUnderstanding Routing Dynamics in a Large-scale Wireless Sensor Network
23 IEEE th International Conference on Mobile Ad-Hoc and Sensor Systems Understanding Routing Dynamics in a Large-scale Wireless Sensor Network Tong Zhu,2, Wei Dong 3, Yuan He 2, Qiang Ma 2, Lufeng Mo
More informationRethinking Multi-Channel Protocols in Wireless Sensor Networks
Rethinking Multi-Channel Protocols in Wireless Sensor Networks Chieh-Jan Mike Liang Department of Computer Science Johns Hopkins University cliang4@cs.jhu.edu Andreas Terzis Department of Computer Science
More informationA CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks
A CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College
More informationCTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks
CTP: An Efficient, Robust, and Reliable Collection Tree Protocol for Wireless Sensor Networks OMPRAKASH GNAWALI, University of Houston RODRIGO FONSECA, Brown University KYLE JAMIESON, University College
More informationSensorBench: Benchmarking Approaches to Processing Wireless Sensor Network Data
SensorBench: Benchmarking Approaches to Processing Wireless Sensor Network Data Ixent Galpin 1, Alan B. Stokes 2, George Valkanas 3, Alasdair J. G. Gray 4, Norman W. Paton 2, Alvaro A. A. Fernandes 2,
More informationWireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer
Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University
More informationImpact of Mobile Sink Speed on the Performance of Wireless Sensor Networks
Journal of Information & Communication Technology Vol. 1, No. 2, (Fall 2007) 49-55 ABSTRACT This paper investigates the impact of mobile sink speed on the performance of Wireless Sensor Networks (WSNs).
More informationEnergy-Directed Test Suite Optimization
Energy-Directed Test Suite Optimization Ding Li, Cagri Sahin, James Clause, and William G.J. Halfond Computer Science Department University of Southern California, Los Angeles, CA, USA Computer and Information
More informationNever replicate a successful experiment. -Fett's law.
Never replicate a successful experiment -Fett's law. Fidelity and Yield in a Volcano Monitoring Sensor Network Authors: Geoffrey Werner-Allen, Konrad Lorincz, and Matt Welsh Harvard University Jeff Johnson
More informationTowards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden
Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a
More informationArchitectural Principles of the Internet
TLEN7000/ECEN7002: Analytical Foundations of Networks Architectural Principles of the Internet Lijun Chen 11/27/2012 The Internet Protocol Stack TCP/IP was first proposed in 1973 The specifications are
More informationThe κ Factor: Inferring Protocol Performance Using Inter-link Reception Correlation
The κ Factor: Inferring Protocol Performance Using Inter-link Reception Correlation Kannan Srinivasan, Mayank Jain, Jung Il Choi, Tahir Azim, Edward S Kim, Philip Levis, and Bhaskar Krishnamachari {srikank,
More informationADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks
AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University
More informationWQM: Practical, Adaptive, and Lightweight Wireless Queue Management System
WQM: Practical, Adaptive, and Lightweight Wireless Queue Management System Basem Shihada Computer Science & Electrical Engineering CEMSE, KAUST University of Waterloo Seminar December 8 th, 2014 2 3 How
More informationReservation Packet Medium Access Control for Wireless Sensor Networks
Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for
More informationLink Estimation and Tree Routing
Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3, Issue 2, July- September (2012), pp. 470-477 IAEME: www.iaeme.com/ijcet.html Journal
More informationDesign of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri
Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve
More informationTechnical Report. A Framework for Programming Sensor Networks with Scheduling and Resource- Sharing Optimizations
www.hurray.isep.ipp.pt Technical Report A Framework for Programming Sensor Networks with Scheduling and Resource- Sharing Optimizations Vikram Gupta Eduardo Tovar Karthik Lakshmanan Ragunathan (Raj) Rajkumar
More informationLeveraging IP for Sensor Network Deployment
Leveraging IP for Sensor Network Deployment Simon Duquennoy, Niklas Wirström, Nicolas Tsiftes, Adam Dunkels Swedish Institute of Computer Science {simonduq,niwi,nvt,adam}@sics.se ABSTRACT Ease of deployment
More informationEnergy-Efficient Self-Organization for Wireless Sensor Networks
Energy-Efficient Self-Organization for Wireless Sensor Networks Thomas Watteyne CTTC, 22nd May 2007 Thomas Watteyne, PhD. candidate CITI Laboratory INRIA / INSA de Lyon France Telecom R&D Grenoble Advisor:
More informationWireless TCP Performance Issues
Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationA Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality
Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get
More informationMNP: Multihop Network Reprogramming Service for Sensor Networks 1
MNP: Multihop Network Reprogramming Service for Sensor Networks Sandeep S. Kulkarni Limin Wang Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan
More informationModeling Energy Consumption of Wireless Sensor Networks by SystemC
2010 Fifth International Conference on Systems and Networks Communications Modeling Energy Consumption of Wireless Sensor Networks by SystemC Wan Du, Fabien Mieyeville, and David Navarro Lyon Institute
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationBenchmarking for Wireless Sensor Networks
Benchmarking for Wireless Sensor Networks Jono Vanhie-Van Gerwen, Stefan Bouckaert, Ingrid Moerman, Piet Demeester Department of Information Technology (INTEC) Ghent University - IBBT Ghent, Belgium Email:
More informationEfficient Online Estimation of Bursty Wireless Links
Efficient Online Estimation of Bursty Wireless Links Muhammad Hamad Alizai, Hanno Wirtz, Georg Kunz, Benjamin Grap, Klaus Wehrle Communication and Distributed Systems (ComSys), RWTH Aachen University,
More informationWSN WIRELESS WSN WSN WSN. Application agriculture SENSOR. Application geophysical. Application agriculture NETWORK: 11/30/2016
WIRELESS SENSOR NETWORK: ENERGY CONSERVATION APPROACHES agriculture Localized environmental conditions varies over short distances. Yitian Shui agriculture Problems of traditional monitoring techniques
More informationTowards a Wireless Lexicon. Philip Levis Computer Systems Lab Stanford University 20.viii.2007
Towards a Wireless Lexicon Philip Levis Computer Systems Lab Stanford University 20.viii.2007 Low Power Wireless Low cost, numerous devices Wireless sensornets Personal area networks (PANs) Ad-hoc networks
More informationTowards Robust and Flexible Low-Power Wireless Networking
Towards Robust and Flexible Low-Power Wireless Networking Philip Levis (joint work with Leonidas Guibas) Computer Systems Lab Stanford University 3.vii.2007 Low Power Wireless Low cost, numerous devices
More informationApplication Aware Data Aggregation in Wireless Sensor Networks
Application Aware Data Aggregation in Wireless Sensor Networks Sangheon Pack, Jaeyoung Choi, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul,
More informationAn Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks
An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks Turkmen Canli, Zhihui Chen, Ashfaq Khokhar University of Illinois at Chicago Ajay Gupta Western Michigan University Abstract-This
More informationInterference avoidance in wireless multi-hop networks 1
Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices
More informationAn Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks
An Adaptive Algorithm for Fault Tolerant Re-Routing in Wireless Sensor Networks Abstract A substantial amount of research on routing in sensor networks has focused upon methods for constructing the best
More informationMinimization of Collision in Energy Constrained Wireless Sensor Network
Wireless Sensor Network, 2009, 1, 350-357 doi:10.4236/wsn.2009.14043 Published Online November 2009 (http://www.scirp.org/journal/wsn). Minimization of Collision in Energy Constrained Wireless Sensor Network
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationNetwork Scheduling for Data Archiving Applications in Sensor Networks
Network Scheduling for Data Archiving Applications in Sensor Networks Yong Yao S. M. Nazrul Alam Johannes Gehrke Sergio D. Servetto Department of Computer Science, School of Electrical and Computer Engineering
More informationA Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN
A Proposed Paper on Joint Priority Based Approach for Scheduling and Congestion Control in Multipath Multi-hop WSN Sweta A.Kahurke M.Tech(IV) Wireless communication & Computing G.H.Raisoni College Of Engineering
More informationCongestion Detection Approaches In Wireless Sensor Networks: -A Comparative Study
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 12, Issue 3 (March 2016), PP.59-63 Congestion Detection Approaches In Wireless Sensor
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationCrankshaft: An Energy-Efficient MAC-Protocol for Dense Wireless Sensor Networks
: An Energy-Efficient MAC-Protocol for Dense Wireless Sensor Networks G.P. Halkes and K.G. Langendoen Faculty of Electrical Engineering, Mathematics and Computer Science Delft University of Technology,
More informationAnnouncements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.
Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture
More informationCross Layering in MANETs Design: The MobileMAN Approach
National Research Council - Pisa - Italy Cross Layering in MANETs Design: The MobileMAN Approach Marco Conti Italian National Research Council (CNR) IIT Institute Pisa, Italy marco.conti@iit.cnr.it Slide
More informationAbstract The wireless sensor network community approached networking abstractions as an open question, allowing answers
The Emergence of a Networking Primitive in Wireless Sensor Networks doi:.1145/1364782. 1 3 6 4 8 0 4 By Philip Levis, Eric Brewer, David Culler, David Gay, Sam Madden, Neil Patel, Joe Polastre, Scott Shenker,
More informationSensorScope: Out-of-the-Box Environmental Monitoring
28 International Conference on Information Processing in Sensor Networks SensorScope: Out-of-the-Box Environmental Monitoring Guillermo Barrenetxea, François Ingelrest, Gunnar Schaefer, and Martin Vetterli
More informationA Global-State Perspective on Sensor Network Debugging
A Global-State Perspective on Sensor Network Debugging M. Lodder G.P. Halkes K.G. Langendoen Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology The Netherlands
More informationMetrics for Sensor Network Platforms
Metrics for Sensor Network Platforms Jan Beutel Computer Engineering and Networks Lab, ETH Zurich 19-Jun-06 Wireless Sensor Networks Visions 1991 1996 1999 2000 2001 2003 2004 Ubiquitous Vision Smart Dust
More informationArchitecture and Evaluation of an Unplanned b Mesh Network
Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May
More informationWireless Sensor Networks CS742
Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture
More informationMAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH. Department of Electrical Engineering and Computer Science
MAC LAYER MISBEHAVIOR EFFECTIVENESS AND COLLECTIVE AGGRESSIVE REACTION APPROACH Vamshikrishna Reddy Giri Neeraj Jaggi Department of Electrical Engineering and Computer Science Outline Introduction MAC
More informationAn Enhanced Data Collection for Wireless Sensor Network Using Topology Routing Tree
An Enhanced Data Collection for Wireless Sensor Network Using Topology Routing Tree I V.Priya., II S.Nivas I Research Scholar, Bharathiar University, Coimbatore, II Assistant Professor, CS, I, II Dept.
More informationWhy today's sensor networks don't sell... and what can be done about it.
Why today's sensor networks don't sell... and what can be done about it. Jan Beutel Computer Engineering and Networks Lab, ETH Zurich 23-Nov-05 Outline Why today s sensor networks don t sell Motivation:
More informationNew RF Models of the TinyOS Simulator for IEEE Standard
New RF Models of the TinyOS Simulator for IEEE 82.15.4 Standard Changsu Suh, Jung-Eun Joung and Young-Bae Ko R & D Departments, Hanback Electronics Company, Daejeon, Republic of Korea College of Information
More informationQoF: Towards Comprehensive Path Quality Measurement in Wireless Sensor Networks
: Towards Comprehensive Path Quality Measurement in Wireless Sensor Networks Jiliang Wang, Yunhao Liu,MoLi, Wei Dong, Yuan He CSE Department, The Hong Kong University of Science and Technology TNLIST,
More informationCS263 Wireless Sensor Networks
CS263 Wireless Sensor Networks Lecture 1: Introduction Prof. Matt Welsh Harvard University January 29, 2009 Introduction: Wireless Sensor Networks TMote Sky (Sentilla) Tiny, low-power, wireless sensors
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationThe method of GBR optimization by special parameters to decrease energy consumption in WSNs
Journal of mathematics and computer science 8 (2014), 387-397 The method of GBR optimization by special parameters to decrease energy consumption in WSNs Sina Hedayati 1, Arash Ghorbannia Delavar 2 Article
More informationExpanding Ring Search for Route Discovery in LOADng Routing Protocol
Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationThe Emergence of a Networking Primitive in Wireless Sensor Networks
The Emergence of a Networking Primitive in Wireless Sensor Networks Philip Levis, Eric Brewer, David Culler, David Gay, Sam Madden, Neil Patel, Joe Polastre, Scott Shenker, Robert Szewczyk, and Alec Woo
More informationCybersecurity was nonexistent for most network data exchanges until around 1994.
1 The Advanced Research Projects Agency Network (ARPANET) started with the Stanford Research Institute (now SRI International) and the University of California, Los Angeles (UCLA) in 1960. In 1970, ARPANET
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationTCP over Wireless PROF. MICHAEL TSAI 2016/6/3
TCP over Wireless PROF. MICHAEL TSAI 2016/6/3 2 TCP Congestion Control (TCP Tahoe) Only ACK correctly received packets Congestion Window Size: Maximum number of bytes that can be sent without receiving
More informationCS533 Modeling and Performance Evaluation of Network and Computer Systems
CS533 Modeling and Performance Evaluation of Network and Computer Systems Selection of Techniques and Metrics (Chapter 3) 1 Overview One or more systems, real or hypothetical You want to evaluate their
More informationMore wireless: Sensor networks and TCP on mobile hosts
More wireless: Sensor networks and TCP on mobile hosts CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) Outline Routing in sensor networks
More informationPower Aware Metrics for Wireless Sensor Networks
Power Aware Metrics for Wireless Sensor Networks Ayad Salhieh Department of ECE Wayne State University Detroit, MI 48202 ai4874@wayne.edu Loren Schwiebert Department of Computer Science Wayne State University
More informationA New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time
A New Full Duplex MAC Protocol to Solve the Asymmetric Transmission Time Jin-Ki Kim, Won-Kyung Kim and Jae-Hyun Kim Department of Electrical and Computer Engineering Ajou University Suwon, Korea E-mail
More informationMitigating Routing Misbehavior in Mobile Ad-Hoc Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Monty Barber 21 April 2003 CSC774 Network Security Overview Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
More informationCollection Tree Protocol
Collection Tree Protocol Omprakash Gnawali Stanford University & University of Southern California gnawali@cs.stanford.edu Rodrigo Fonseca Brown University & Yahoo! Research rfonseca@cs.brown.edu Kyle
More informationPIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs
WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki
More informationA PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN
A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia
More informationFault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks
Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado
More information