Fault-Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks
|
|
- Anissa Barnett
- 5 years ago
- Views:
Transcription
1 Fault-Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks Jing Deng Department of Computer Science University of North Carolina at Greensboro Joint work with Profs. Meikang Qiu and Gang Wu 1
2 Wireless Networks Networks formed by wireless devices All communications are sent through wireless channels. Wireless devices with limited resource Battery energy, memory space, computation power Many interesting problems: How to lower communication/computation cost for network activities? Communication takes time/energy. Computation requires memory space and energy. How to protect systems from node failure? Small wireless devices could easily fail or run out of battery. 2
3 Failure Models Fail-stop Device simply stops working. No information will be sent or received. Similarly to one with dead-battery Byzantine failure Device can virtually do anything that it is capable of Dropping packets from others Sending out fabricate packets Modifying packets from other nodes Deviating from communication protocols Much more difficult to address We will use the fail-stop model 3
4 Intelligent Monitoring Networks (IMNs) Wireless sensor networks Networks with (possibly numerous) wireless micro-sensors A special type of wireless sensor networks Likely to be deployed for building structure monitoring, forest monitoring, levee monitoring, industrial plant monitoring, etc. Two key characteristics Node failures expected Heterogeneous architecture Mostly small devices to collect/report data Some larger and more powerful devices to process/fusion data These power nodes send results to observer (data sink). 4
5 Illustration of Large Wireless Networks 5
6 Low-power Low-Cost Devices Devices usually use low-power transceivers Goal: to lower energy consumption and to extend lifetime Forming multi-hop communication topology Relying on other devices help to deliver data Interference can easily disrupt communication Network topology changes Data collection paths change Data loss 6
7 BitTorrrent - P2P File Sharing Technique Swarm: collection of nodes with the file (even partially). Tracker provides swarm information Client downloads pieces from nodes in swarm. At the same time, uploading pieces to other nodes Finished clients serve as seeds (upload only) Even when some of the nodes in the swarm fail (or left), file sharing continues. 7
8 BitTorrent Strategies Two strategies in BitTorrent make it surprisingly efficient Optimistic un-choking Rarest-first Optimistic un-choking is the strategy to choose peers to download pieces Suppose there are 100 peers (with ever-changing D/L speed). Which of these 100 peers should the client choose? Using all of them is impractical. Choosing the top N peers w.r.t. download speed (N=5) However, there might be new peers offering higher speed. -> dropping one of the current N peers and randomly testing another peer (un-choke one of the unselected peers) Benefits Utilizing most of the peers with highest D/L speeds. 8
9 BitTorrent Strategies (Cont d) Rarest-first strategy governs how to choose pieces for download Suppose a peer has M of the pieces Which of these pieces should the client choose? Random selection or sequential selections? -> Always choose the rarest piece among all peers (requiring piece information from other peers). So that this piece can be offered to other peers. Benefits Increases piece redundancy Maintaining torrent health Improves chance of successful download 9
10 IMN and BitTorrent? Data collection in IMNs shares striking similarities with P2P file sharing IMN Observer (data sink) tries to collect data from monitoring nodes, which generate the data Monitoring data redundancy among different nodes Nodes may fail at any time. P2P File Sharing A client tries to download a full set of pieces from a swarm of nodes Redundancy of file pieces among peers Peers may go offline without warning 10
11 IMN - Connectivity Overview Lines connect nodes who can hear each other (N=100). Darker squares mark more powerful nodes (M=10). Result of random node placement 11
12 Fault Tolerant Data Collection Powerful nodes collect data from regular nodes Announcements are made from the powerful nodes. Multiple trees are formed with data forwarding nodes. Usually data forwarding nodes only need to forward data from nodes on their own tree In order to provide fault tolerance, they will choose α of other overheard transmissions α is termed support ratio 12
13 Illustration of Data Collection Multi-level data collection We show the [avg, max] record on the powerful nodes α=0.4 Some nodes fail (marked with red x) Big red dot represents a fire burning None of the powerful nodes sees any temperature anomaly. 13
14 Illustration of Data Collection (Cont d) The same topology and data collection trees. α=0.4 With the same failed nodes, two powerful nodes receive the temperature anomaly (N max =2). 14
15 Performance Results - Reading Abnormal Temp. Similar simulations were run and average N max computed p e is node failure probability N max lowers as p e increases. With larger α, N max increases. 15
16 Data Loss due to Failed Sensors Failed nodes lead to data loss Support ratio α can dramatically reduce data loss. 16
17 Conclusions Wireless monitoring networks can provide robust environment monitoring. We have proposed a fault-tolerance data collection technique for IMNs: Multiple multi-level data collection trees (forest) Data forwarding nodes process overheard data. Support ratio α Benefits of our scheme have been demonstrated Low cost Fault tolerant toward node failures 17
18 Future Work Byzantine failure model Instead of failed delivery, failed nodes may send wrong data! Investigating our scheme under different data processing algorithms Average Maximum Minimum Counting Analyze data loss for different support ratios 18
Wireless Sensor Networks --- Concepts and Challenges
Outline Wireless Sensor Networks --- Concepts and Challenges Basic Concepts Applications Characteristics and Challenges 2 Traditional Sensing Method Basic Concepts Signal analysis Wired/Wireless Object
More informationWireless Sensor Networks --- Concepts and Challenges
Wireless Sensor Networks --- Concepts and Challenges Outline Basic Concepts Applications Characteristics and Challenges 2 1 Basic Concepts Traditional Sensing Method Wired/Wireless Object Signal analysis
More informationCompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks
More informationLecture 8: Application Layer P2P Applications and DHTs
Lecture 8: Application Layer P2P Applications and DHTs COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationScalability of the BitTorrent P2P Application
Scalability of the BitTorrent P2P Application Kolja Eger, Ulrich Killat Hamburg University of Technology 5.Würzburger Workshop 8.-9. July 2005 Overview File dissemination in peer-to-peer (p2p) networks
More informationDo incentives build robustness in BitTorrent?
Do incentives build robustness in BitTorrent? ronghui.gu@yale.edu Agenda 2 Introduction BitTorrent Overview Modeling Altruism in BitTorrent Building BitTyrant Evaluation Conclusion Introduction 3 MAIN
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Canale A-L Prof.ssa Chiara Petrioli Server-based Network Peer-to-peer networks A type of network
More informationBitTorrent. Masood Khosroshahy. July Tech. Report. Copyright 2009 Masood Khosroshahy, All rights reserved.
BitTorrent Masood Khosroshahy July 2009 Tech. Report Copyright 2009 Masood Khosroshahy, All rights reserved. www.masoodkh.com Contents Contents 1 Basic Concepts 1 2 Mechanics 3 2.1 Protocols: Tracker and
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationModeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review
Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review R. Sinde Nelson Mandela African Institution of Science and Technology School of
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationWireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile
More informationGame Theory. Presented by Hakim Weatherspoon
Game Theory Presented by Hakim Weatherspoon Game Theory Main Question: Can we cheat (and get away with it)? BitTorrent P2P file distribution tool designed with incentives for contribution Users contribute
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationWireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization
Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationEtiquette protocol for Ultra Low Power Operation in Sensor Networks
Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.
More informationContent Overlays (continued) Nick Feamster CS 7260 March 26, 2007
Content Overlays (continued) Nick Feamster CS 7260 March 26, 2007 Administrivia Quiz date Remaining lectures Interim report PS 3 Out Friday, 1-2 problems 2 Structured vs. Unstructured Overlays Structured
More informationAn Introduction to Cyber-Physical Systems INF5910/INF9910
An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More
More informationRobust Data Dissemination in Sensor Networks
Robust Data Dissemination in Sensor Networks Saurabh Bagchi Assistant Professor School of Electrical & Computer Engineering Purdue University Joint Work with: Gunjan Khanna, Yu-Sung Wu, Yen-Shiang Shue,
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationExtreme Computing. BitTorrent and incentive-based overlay networks.
Extreme Computing BitTorrent and incentive-based overlay networks BitTorrent Today we will focus on BitTorrent The technology really has three aspects A standard that BitTorrent client systems follow Some
More informationCONCLUSIONS AND SCOPE FOR FUTURE WORK
Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this
More informationBitTorrent Optimization Techniques. (from various online sources)
BitTorrent Optimization Techniques (from various online sources) Announcement No recitation next week! Final review session Next Sunday (5/2) 5-7pm, GHC 4215 Let us know what you want at http://www.doodle.com/6qvsnubhmam2zkxp
More informationCEN5501 Computer Networks Project Description
Due Date: April 21, 2008 CEN5501 Computer Networks Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project
More informationChapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks
Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will
More informationALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--
More informationNodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks
IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI
More informationA Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks
Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission
More informationLifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng
Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks Presented by Yao Zheng Contributions Analyzing the lifetime of WSN without knowing the lifetime of sensors Find a accurate approximation
More informationUsing Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks. Wang Wei Vikram Srinivasan Chua Kee-Chaing
Using Mobile Relays to Prolong the Lifetime of Wireless Sensor Networks Wang Wei Vikram Srinivasan Chua Kee-Chaing Overview The motivation of mobile relay The performance analysis for mobile relay in the
More informationViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing
ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,
More informationLecture 17: Peer-to-Peer System and BitTorrent
CSCI-351 Data communication and Networks Lecture 17: Peer-to-Peer System and BitTorrent (I swear I only use it for Linux ISOs) The slide is built with the help of Prof. Alan Mislove, Christo Wilson, and
More informationApplication Layer: P2P File Distribution
Application Layer: P2P File Distribution EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 29-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP
More informationReliable Time Synchronization Protocol for Wireless Sensor Networks
Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu
More informationFault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network
Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,
More informationBitTorrent. Internet Technologies and Applications
BitTorrent Internet Technologies and Applications Aims and Contents Aims Show benefits of P2P for file downloads Explain concepts of BitTorrent as a P2P file sharing application Show how BitTorrent protocol
More informationROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationPeer to Peer Systems and Probabilistic Protocols
Distributed Systems 600.437 Peer to Peer Systems & Probabilistic Protocols Department of Computer Science The Johns Hopkins University 1 Peer to Peer Systems and Probabilistic Protocols Lecture 11 Good
More informationinternet technologies and standards
Institute of Telecommunications Warsaw University of Technology 25 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer peer-to-peer systems overview
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationIMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS
IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationNew Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks
J. Basic. Appl. Sci. Res., 2(5)4880-4885, 2012 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com New Active Caching Method to Guarantee Desired
More informationApplication-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks
COMP 431 Internet Services & Protocols Application-Layer Protocols Peer-to-Peer Systems, Media Streaming & Content Delivery Networks Jasleen Kaur February 14, 2019 Application-Layer Protocols Outline Example
More informationINTERPLAY OF COMMUNICATION AND COMPUTATION ENERGY CONSUMPTION FOR LOW POWER SENSOR NETWORK DESIGN
INTERPLAY OF COMMUNICATION AND COMPUTATION ENERGY CONSUMPTION FOR LOW POWER SENSOR NETWORK DESIGN Zeeshan Ali Khan, Mustafa Shakir Department of Electrical Engineering, COMSATS Institute of Information
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationCost Based Efficient Routing for Wireless Body Area Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationTech note. Submetering? Don t Take the Hardware for Granted
Tech note Submetering? Don t Take the Hardware for Granted Introduction Submetering is also know as automatic meter reading, or AMR, and is the most accurate option available for multifamily housing utility
More informationMobile Agent Driven Time Synchronized Energy Efficient WSN
Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More information1 A Local Area Network (LAN) consists of four computers and one server. The LAN uses a bus topology.
1 1 A Local Area Network (LAN) consists of four computers and one server. The LAN uses a bus topology. (a) Complete the diagram below to show how the computers and the File server could be connected. A
More informationCSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture
CSC8223 Wireless Sensor Networks Chapter 3 Network Architecture Goals of this chapter General principles and architectures: how to put the nodes together to form a meaningful network Design approaches:
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationDelay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks
Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,
More informationIntroduction to P P Networks
Introduction to P P Networks B Sc Florian Adamsky florianadamsky@iemthmde http://florianadamskyit/ cbd Internet Protocols and Applications SS B Sc Florian Adamsky IPA / Outline Introduction What is P P?
More informationAirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems
AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group
More informationOn Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services
On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement
More informationFault Tolerance in WSN using Hand-off and Dynamic Power Adjustment
Chapter 2 Fault Tolerance in WSN using Hand-off and Dynamic Power Adjustment Wireless Sensor Network (WSN) is deployed to monitor physical conditions in various places such as geographical regions, agriculture
More informationEuropean Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105
European Network on New Sensing Technologies for Air Pollution Control and Environmental Sustainability - EuNetAir COST Action TD1105 A Holistic Approach in the Development and Deployment of WSN-based
More informationA Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs
A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering
More informationCSE 486/586 Distributed Systems Peer-to-Peer Architectures
CSE 486/586 Distributed Systems eer-to-eer Architectures Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Last Time Gossiping Multicast Failure detection Today s Question How
More informationCROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION
CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering
More informationFinding Optimal Tour Length of Mobile Agent in Wireless Sensor Network
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Finding Optimal Tour Length of Mobile Agent in Wireless Sensor Network Anil Kumar Mahto anil.fiem16@gmail.com Ajay Prasad Department
More informationAn Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model Zhang Ying-Hui Software
More informationP2P content distribution Jukka K. Nurminen
P2P content distribution Jukka K. Nurminen 1 V1-Filename.ppt / yyyy-mm-dd / Initials BitTorrent content downloading Efficient content distribution Bram Cohen, 2001 File divided into pieces Each recipient
More informationP2P Applications. Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza
P2P Applications Reti di Elaboratori Corso di Laurea in Informatica Università degli Studi di Roma La Sapienza Versione originale delle slides fornita da Dora Spenza e Marco Barbera P2P Paradigm Late 80
More informationWireless Mesh Network - A well proven alternative to LPWAN
Wireless Mesh Network - A well proven alternative to LPWAN EoT 2017 Introductions Thomas Steen Halkier CEO NeoCortec NeoCortec Innovator within Wireless Mesh Network technology This presentation will focus
More informationWireless Sensor Networks applications and Protocols- A Review
Wireless Sensor Networks applications and Protocols- A Review Er. Pooja Student(M.Tech), Deptt. Of C.S.E, Geeta Institute of Management and Technology, Kurukshetra University, India ABSTRACT The design
More informationIQRF - Mesh Networking
IQRF - Mesh Networking Overcoming Challanges with RF Mesh Networks Sebastian Hopp IQRF Tech s.r.o. 2nd November 2017 Microrisc Ltd. Founded in 1991 HQ in Jicin, CZ IQRF since 2004 Over 30 patents IQRF
More informationAn Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 15 (2014), pp. 1567-1574 International Research Publications House http://www. irphouse.com An Improved Gateway
More informationExercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4
Christian Schindelhauer Freiburg, 26 Nov 2006 Due until 28 Nov 2006 Exercises of lecture Wireless Sensor Networks Winter 2006/2007 Sheet 4 SECTION 1: Wireless Sensor Transceiver, Energy 1. Energy is limited
More informationResearch on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines
DOI: 10.23977/acss.2019.31002 EISSN 2371-8838 Advances in Computer, Signals and Systems (2019) 3: 8-14 Clausius Scientific Press, Canada Research on WSN Secure Communication Method Based on Digital Watermark
More informationOptimizing Power-Based Indoor Tracking System for Wireless Sensor Networks using ZigBee
Optimizing Power-Based Indoor Tracking System for Wireless Sensor Networks using ZigBee Ahmad H. Mahafzah Department of Computer Science Faculty of Information technology Middle East University Amman,
More informationArchitecture and Evaluation of an Unplanned b Mesh Network
Architecture and Evaluation of an Unplanned 802.11b Mesh Network John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris MIT CSAIL (MobiCom 05) slides by Jong-Kwon Lee, presented by Fallon Chen May
More informationAn Energy-Efficient Hierarchical Routing for Wireless Sensor Networks
Volume 2 Issue 9, 213, ISSN-2319-756 (Online) An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks Nishi Sharma Rajasthan Technical University Kota, India Abstract: The popularity of Wireless
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationBuffer Management in Delay Tolerant Networks
Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)
More informationA Review: Optimization of Energy in Wireless Sensor Networks
A Review: Optimization of Energy in Wireless Sensor Networks Anjali 1, Navpreet Kaur 2 1 Department of Electronics & Communication, M.Tech Scholar, Lovely Professional University, Punjab, India 2Department
More informationBackbone Discovery In Thick Wireless Linear Sensor Netorks
Backbone Discovery In Thick Wireless Linear Sensor Netorks October 28, 2014 Imad Jawhar1, Xin Li2, Jie Wu3, and Nader Mohamed1 1 College of Information Technology, United Arab Emirates University, Al Ain,
More informationDesign and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs
Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs Girish K 1 and Mrs. Shruthi G 2 1 Department of CSE, PG Student Karnataka, India 2 Department of CSE,
More informationSelf-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]
Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] PD Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Science University of Erlangen http://www7.informatik.uni-erlangen.de/~dressler/
More informationMcGill University - Faculty of Engineering Department of Electrical and Computer Engineering
McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access
More informationthe Edge. Vinod Eswaraprasad Wipro Technologies Storage Developer Conference. Insert Your Company Name. All Rights Reserved.
Storage @ the Edge Vinod Eswaraprasad Wipro Technologies 2018 Storage Developer Conference. Insert Your Company Name. All Rights Reserved. 1 What is Edge Computing? Certain applications need Autonomy Self
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationDemand Multipath Routing Protocol with Network Lifetime Maximization in Wireless Sensor Network Fixed Routing Function
Demand Multipath Routing Protocol with Network Lifetime Maximization in Wireless Sensor Network Fixed Routing Function [1] D J Samatha Naidu, [2] N.Reshma Chandrika,, [3] K.Archana Reddy [1] Assistant
More informationZonal based Deterministic Energy Efficient Clustering Protocol for WSNs
Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs Prabhleen Kaur Punjab Institute of Technology, Kapurthala (PTU Main Campus), Punjab India ABSTRACT Wireless Sensor Network has gained
More informationAn Implementation of Fog Computing Attributes in an IoT Environment
An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into
More informationAd hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Goals of this chapter ad hoc & sensor networks are good What their intended application areas are Commonalities and differences
More informationAn Industrial Employee Development Application Protocol Using Wireless Sensor Networks
RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni
More informationCS5412: TORRENTS AND TIT-FOR-TAT
1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VII Ken Birman BitTorrent 2 Widely used download technology Implementations specialized for setting Some focus on P2P downloads, e.g. patches Others focus on
More informationWzzard Sensing Platform Network Planning and Installation. Application Note
Wzzard Sensing Platform Network Planning and Installation Application Note 1 International Headquarters B&B Electronics Mfg. Co. Inc. 707 Dayton Road Ottawa, IL 61350 USA Phone (815) 433-5100 -- General
More informationFault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks
Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado
More informationIMPLEMENTATION AND EVALUATION OF THE MULTICAST FILE TRANSFER PROTOCOL (MCFTP)
IMPLEMENTATION AND EVALUATION OF THE MULTICAST FILE TRANSFER PROTOCOL (MCFTP) Masterarbeit der Philosophisch-naturwissenschaftlichen Fakultät der Universität Bern vorgelegt von Alican Gecyasar Dezember,
More informationProtocol Design and Optimization for
Protocol Design and Optimization for Yu Wang, Hongyi Wu*, Feng Lin, and Nian-Feng Tzeng Center for Advanced Computer Studies University of Louisiana at Lafayette Mobile Sensor Networks Applications: Air
More informationWireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO
Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some
More informationSpatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication
Spatial Clustering in Slotted ALOHA Two-Hop Random Access for Machine Type Communication Ziwen Zhao, Sebastian S. Szyszkowicz, Tamer Beitelmal, Halim Yanikomeroglu Carleton University Ottawa, Canada Contents
More information