Context-Aware Middleware for Pervasive and Mobile Ad Hoc Environments

Size: px
Start display at page:

Download "Context-Aware Middleware for Pervasive and Mobile Ad Hoc Environments"

Transcription

1 Context-Aware Middleware for Pervasive and Mobile Ad Hoc Environments Hector A. Duran-Limon Department of Computing Science, Tecnológico de Monterrey (ITESM), Campus Guadalajara, México. Gordon S. Blair, Adrian Friday, Thirunavukkarasu Sivaharan, Maomao Wu, Paul Okanda, Carl-Fredrik Sørensen Computing Department, Lancaster University, Bailrigg, Lancaster LA1 4YR, UK Abstract: Recent advances in the area of mobile ad hoc computing and pervasive computing have driven the emergence of new challenges. For example, the Intelligent Environment or Smart Environment has become one of the key research areas in the pervasive computing arena. Mobile ad hoc scenarios also include time-critical applications such as an autonomous vehicle system in which vehicles are able to operate independently and cooperate with each other to avoid collisions. In this paper, we present a context-aware middleware architecture for the support of both pervasive and mobile ad hoc environments. Keywords: mobile ad hoc networks, pervasive systems, real-time systems, middleware 1. Introduction Recent years have witnessed advances in the enabling technologies for mobile computing, such as the increasingly mature end-systems, various kinds of wireless communication protocols, and mobile networking technologies. As a result new challenges have emerged in both the pervasive and mobile ad hoc computing arenas. Regarding the former, one of the key research areas in recent years is the Intelligent Environment or Smart Environment. A personalized intelligent room, for example, can set the room temperature according to the occupier s preference, play his beloved music, and make his favourite coffee, etc. In addition, examples of mobile ad hoc applications include air traffic control systems whereby thousands of aircraft are proactively coordinated to keep them at safe distance from each other, direct them during takeoff and landing from airports, and ensure that traffic congestions are avoided. Another example is an autonomous vehicle system in which vehicles are able to operate independently and cooperate with each other to avoid collisions. This kind of systems is time-critical and needs to be provided with both timeliness assurances and adaptation mechanisms that lead the system to a safe state in case of unexpected changes introduced in the environment. This paper provides a solution to three important issues: a) support for sentience and intelligent behaviour, b) support for high mobility and pervasiveness, and c) realtime support for mobile ad hoc environments. These challenges are addressed in an integrated manner by our middleware architecture as shown below. We are not aware of any work addressing the three issues altogether. The paper is structured as follows. Section 2 introduces the main challenges of the targeted applications. Relevant related work is mentioned in section 3. Section 4 then presents the overall middleware architecture. Section 5 shows how the challenges are

2 addressed by our middleware architecture. Finally, some concluding remarks are provided in section Challenges 2.1 Challenge 1: Provide intelligent behaviour to pervasive systems In order to make pervasive computing systems intelligent, it is crucial for them to first be sentient they should be able to sense the changes in the environment and make autonomous decisions on how to react. For example, a smart room should be able to obtain the room temperature, the noise level, the light intensity, how many persons are in the room, etc. Moreover, they should also have the capability to process and analyse the sensory data to deduce high-level context and infer long-term personal preferences of the users. By utilising the contextual information and personal preferences, the pervasive computing environments can make autonomous decision according to their own control logic. This decision making process might need certain degree of intelligence, and it might also need to resolve conflicts in the pervasive computing environment. For example, if there are more than two persons in a smart room, the system should be able to decide what temperature to set to minimize the disturbance, what kind of music to play to maximize satisfaction, etc. 2.2 Challenge 2: Provide support for high mobility and pervasiveness We envisage hundreds and even thousands of autonomous entities being involved in the targeted applications. Therefore, suitable communication models are required to handle a many-to-many type of communication. The communication service should be reliable and efficient, i.e. the amount of resources used by the communication protocol should be maintained at acceptable levels. These systems should also be scalable due to the fact that the number of participants may increase considerably over time. Furthermore, the level of mobility used by the system should be considered as this can have an impact on the communication system. For instance, research has shown that communication protocols used in low mobility conditions are not optimal for high mobility scenarios [1]. In addition, mobile ad hoc networks are characterised by being highly unpredictable. Communication delays between nodes may vary unexpectedly as the number of hops to reach the destination changes. Moreover, a geographical area may unexpectedly become congested, resulting in lack of communication resources. Periods of disconnection are also likely to happen at any time due to the conditions of the geographical area. 2.3 Challenge 3: Provide QoS guarantees in mobile ad hoc environments In the current state-of-the-art in mobile ad hoc network technologies, it is not feasible to offer hard real-time guarantees for communication resources except in special cases. Such guarantees can only be offered if certain specific conditions are met such as a scenario whereby a limited number of nodes are moving in an obstaclefree area at the same speed and direction. Although, hard real-time guarantees can still be provided for local resources such as CPU, only soft real-time guarantees can be offered for communication resources in most cases whereby these resources are dynamically allocated according to deadlines. Another tough challenge arises here: how can we deal with applications demanding hard real-time guarantees when the underlying infrastructure is only capable of offering soft real-time guarantees.

3 3. Related work The Gaia project [2] developed at the University of Illinois is a distributed middleware infrastructure that provides support for ubiquitous computing. Although Gaia shares several common design goals with CORTEX, Gaia s main intended application domain is confined to fixed intelligent environments and lacks the support for real-time mobile ad hoc application scenarios. The EasyLiving project [3] from Microsoft focuses on development of architectures and technologies for intelligent environments. It identifies several research efforts required on a variety of fronts, including middleware, geometric world modelling, sensing capabilities, and service description. The middleware, called InConcert, identifies the importance of having an asynchronous communication model for the coordination of entities contained in the environment. However, this approach does not fully address the concerns of real-time mobile ad hoc environments and pervasive application scenarios. Regarding multicast in mobile ad hoc networks, previous research [1] has recognised that most existing algorithms perform inadequately when high mobility is present in the environment. The main reason for these protocols to fail is that these protocols maintain shared state in the nodes in the form of routes and adjacent information, which are rapidly outdated due to high node mobility. In contrast, our multicast protocol is based on a probabilistic flooding algorithm with damping, which does not maintain shared state in nodes. Finally, to the best of our knowledge, no previous work presents an integrated solution to the areas of autonomous intelligent behaviour, pervasive mobile systems and real-time mobile ad hoc computing. 4. Overall Middleware Architecture Central to the CORTEX architecture is the notion of a sentient object [4-6], which is defined as an entity that is able to both consume and produce events. That is, sentient objects are entities that receive events, process them and generate further events. Input events are received from either sensors or other sentient objects (local or remote). Similarly, output events are sent either to actuators or other sentient objects (local or remote). Sentient objects are autonomous entities that are able to sense their environment. Interestingly, sentient objects have a proactive role in that they are capable of making decisions and performing some actions (i.e. generate further events) based on the information sensed. Hence, sentient objects include a control logic which realises the decision-making mechanism. The environment support for the interaction of sentient objects is also conceptualised as a componentised middleware platform. In fact, the middleware is structured in terms of component frameworks (CFs) [7]. Essentially, component frameworks are collections of rules and interfaces that govern the interaction of components plugged into them [7]. In other words, a component framework is a reusable architectural design targeting a specific domain whereby desired architectural properties and invariants are enforced. The publish/subscribe CF realises the CORTEX event model [8]. The functionality of the control engine of a sentient object is provided by the context CF. Facilities for multicast in ad hoc environments

4 are then provided by the multicast CF. The QoS management CF arbitrates the allocation of resources and provides facilities for monitoring and adaptation of QoS. Lastly, the resource management CF controls the resources used by all the CFs [9]. The following section shows how the challenges outlined in section 2 are addressed by our middleware architecture. 5. Approach to Challenges 5.1 Support for Autonomous Intelligent Behaviour The autonomous intelligent behaviour is achieved by the sentient objects. A sentient object has been defined as an entity that both consumes and produces software events, and lies in some control path between at least one sensor and actuator [9]. The internal architecture of a sentient object is realised by the context CF, which consists of four components: sensory capture, context management, inference engine and the learning engine. Getting contextual information from raw sensory data is the main task of context acquisition, and the major issues in the area of sensory capture are data filtering and sensor fusion. The context management component deals with the representation of context information. The inference engine component is actually the brain of a sentient object, and it has some form of a decision-making ability and intelligence. In order to make decisions, some rules need to be applied on the current context. The learning engine component is complementary to the inference engine component, and it can dynamically plug-in different machine learning algorithms that make the system able to learn rules from previous context states and from interaction with the user. The learned rules can either be injected into the inference engine or used by the learning component itself to make decisions. 5.2 Support for High Mobility and Pervasiveness We believe the publish/subscribe or event based communication paradigm is well suited to address the issues of pervasive systems in a mobile ad hoc environment. Moreover, the publish/subscribe model is well recognised to support anonymous and asynchronous communication requirements [10-12]. Hence, many-to-many communication scenarios are well supported by the anonymous dissemination of information. In addition, asynchronous communication is ideal in systems where frequent disconnections are likely to happen thus to avoid blocking conditions. We have adopted the event model STEAM [8] as it addresses a number of core issues with regard to publish/subscribe systems in mobile ad hoc networks. Briefly, an implicit event model for ad hoc networks is defined in which there is not an event broker or mediator, instead brokering functions are implemented at both the consumer and the producer side. The issues of high mobility in ad hoc environments are tackled by our probabilistic multicast protocol. This protocol specifically targets ad hoc environments where high node mobility and a frequently changing number of group members are present. Each node decides if it should forward a flooding message according to a probability p (0,1] which is updated according to the number of duplicates that a node has received from its neighbouring nodes. This effectively minimises the number of unnecessary duplicate messages without sacrificing reliability as we have found experimentally through simulations. The second

5 mechanism, which is called damping, aims to eliminate the number of unneeded duplicates by allowing nodes to wait for a random, small time interval before they will actually forward a message. 5.3 Real-Time Support for Mobile Ad Hoc Environments In order to support QoS guarantees in mobile ad hoc environments, a high probability of meeting deadlines has to be offered. We also believe that such infrastructure has to be adaptable and flexible to deal with the highly dynamic and unpredictable nature of the environment. Resource management plays an important role in this adaptation process in terms of both resource awareness and dynamic reallocation of resources. Crucially, fail-safe mechanisms are needed to bring the application to a safe state when timing failures are detected. Therefore, QoS management support is required for monitoring QoS violations and triggering both adaptation and fail-safe procedures when required. In addition, QoS management is required to arbitrate the allocation of network resources whereby admission control tests are performed and more resources are conceded to tasks with shorter deadlines and higher criticality.. Monitoring of QoS violations and adaptation procedures are carried out by the QoS management CF. This is achieved by the use of the timely computing base (TCB) [13] which is a framework that provides crucial time-related services. More specifically, TCB supports the detection of timing failures and enforces the timely execution of fail-safe procedures and adaptation strategies. Fail-safe procedures ensure that the system is taken to a safe state when a critical failure is detected. A coverage stability facility is provided where a high probability of meeting a deadline can be defined. In the case of going below a specified value, adaptation procedures are triggered (e.g. a redistribution of network and CPU resources). Network QoS management is achieved as follows. Firstly, every node is able to listen to traffic as the dissemination of packets is carried out by using an application level multicast protocol. Secondly, available bandwidth is fairly distributed among the nodes within a transmission area. For this purpose, a fully distributed protocol is used. Thirdly, a weighted fair scheduling policy [14] is used to allocate bandwidth within a single node to multiple service classes, each one of them associated with a particular task. A task [15] is a logical unit of computation which has an amount of resources allocated. A service class (i.e., a task) can be partitioned into sub classes (i.e., subtasks). In addition, classes and subclasses have a priority value. More critical classes have a higher priority. Different policies can be defined in case of resource contention. A detailed description of the network QoS management protocol can be found in [15]. 6. Concluding remarks We have presented a middleware architecture for the support of both pervasive and mobile ad hoc computing environments. More specifically, the sentient object model has been introduced as a central concept in the CORTEX architecture. This model provides key features for allowing both context-awareness and intelligent autonomous behaviour. In addition, the middleware is constituted by a number of component frameworks. Autonomous intelligent behaviour is addressed by both the sentient CF and the context CF. In addition, mobility and pervasiveness issues are

6 tackled by the publish/subscribe CF, the multicast CF and the service discovery CF. Lastly, the issues of time criticality in mobile ad hoc environments are addressed by both the QoS management CF and the resource management CF. Details on the implementation of the system can be found in [16]. We are currently using the vehicle test bed to evaluate the middleware architecture. Ongoing work also includes the simulation of the network QoS management protocol and the experimental evaluation of the scheduling system. Reference [1] Lee, S.-J., et al. A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols. in Proceedings of IEEE INFOCOM Tel Aviv, Israel. [2] Roman, M., et al., Gaia: A Middleware Infrastructure to Enable Active Spaces. IEEE Pervasive Computing, Oct-Dec: p. pp [3] Brumitt, B., et al., EasyLiving: Technologies for Intelligent environment. Handheld and Ubiquitous Computing, September. [4] CORTEX. Preliminary Definition of the CORTEX Programming Model. CORTEX Project. IST , Deliberable D2. March [5] Veríssimo, P., et al. CORTEX: Towards Supporting Autonomous and Cooperating Sentient Entities (2002). in In Proceedings of European Wireless Florence, Italy. [6] Verissimo, P. and A. Casimiro. Event-Driven Support of Real-Time Sentient Objects. in Eighth IEEE International Workshop on Object-oriented Realtime Dependable Systems (WORDS 2003) Guadalajara, Mexico. [7] Szyperski, C., Component Software: Beyond Object-Oriented Programming. 1998, Harlow, England: Addison-Wesley. [8] Meier, R. and V. Cahill. Steam: Event-based Middleware for Wireless Ad Hoc Networks. in In Proceeding of the International Workshop on Distributed Event-Based Systems (ICDSC/DEBS'02) Vienna, Austria. [9] CORTEX. Preliminary Specification of Basic Services and Protocols. CORTEX Project. IST Deliverable D5. February [10] OMG, CORBAServices: Common Object Services Specification , Object Management Group. [11] Sun, Java Distributed Event Specification. 1998, Sun Microsystems, Inc. [12] Carzaniga, A., Rosenblum, D. and Wolf, A., Design and Evaluation of a Wide-Area Event Notification Service. ACM Transactions on Computer Systems, (3): p. pp [13] Verissimo, P. and A. Casimiro, The Timely Computing Base Model and Architecture. Transaction on Computers - Special Issue on Asynchronous Real-Time Systems, (8). [14] Demers, A., S. Keshav, and S. Schenker, Analysis and simulation of a fair queueing algorithm. Journal of Internetworking Research and Experience, 1990: p. pp [15] Duran-Limon, H.A. and G.S. Blair. A Resource and QoS Management Framework for Real-Time Event Systems in Mobile Ad Hoc Environments. in In 9th IEEE International Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003F) Capri Island, Italy. [16] Sivaharan, T., et al. Cooperating Sentient Vehicles for Next Generation Automobiles. in MobiSys 2004 Workshop on Applications of Mobile Embedded Systems Boston, MA, USA.

A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments

A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments Hector A. Duran-Limon 1, Gordon S. Blair 1, Adrian Friday 1, Thirunavukkarasu Sivaharan 2, George Samartzidis

More information

A Marriage of Web Services and Reflective Middleware to Solve the Problem of Mobile Client Interoperability

A Marriage of Web Services and Reflective Middleware to Solve the Problem of Mobile Client Interoperability A Marriage of Web Services and Reflective Middleware to Solve the Problem of Mobile Client Interoperability Abstract Paul Grace 1, Gordon Blair 1 and Sam Samuel 2 1 Computing Department, Lancaster University,

More information

Novel Component Middleware for Building Dependable Sentient Computing Applications

Novel Component Middleware for Building Dependable Sentient Computing Applications Novel Component Middleware for Building Dependable Sentient Computing Applications Maomao Wu, Adrian Friday, Gordon Blair, Thirunavukkarasu Sivaharan, Paul Okanda, and Hector Duran Limon Department of

More information

Supporting Mobility using Context-Based Reasoning

Supporting Mobility using Context-Based Reasoning Supporting Mobility using Context-Based Reasoning Aline Senart, Mélanie Bouroche, Neil O Connor, Barbara Hughes, Kulpreet Singh and Vinny Cahill Distributed Systems Group, Department of Computer Science,

More information

STEAM: Event-Based Middleware for Wireless Ad Hoc Networks

STEAM: Event-Based Middleware for Wireless Ad Hoc Networks STEAM: Event-Based Middleware for Wireless Ad Hoc Networks René Meier and Vinny Cahill Department of Computer Science, Trinity College Dublin, Ireland frene.meier, vinny.cahillg@cs.tcd.ie Abstract With

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Federating Heterogeneous Event Services

Federating Heterogeneous Event Services Federating Heterogeneous Event Services Conor Ryan, René Meier, and Vinny Cahill Distributed Systems Group, Department of Computer Science, Trinity College Dublin, Ireland cahryan@eircom.net, rene.meier@cs.tcd.ie,

More information

Infrastructure for Autonomous Mobile Robots Communication and Coordination

Infrastructure for Autonomous Mobile Robots Communication and Coordination 90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

A Higher Level Abstraction for Mobile Computing Middleware

A Higher Level Abstraction for Mobile Computing Middleware A Higher Level Abstraction for Mobile Computing Middleware Paul Grace 1, Gordon Blair 1 and Sam Samuel 2 1 Computing Department, Lancaster University, Lancaster, LA1 4YR, UK. {p.grace@lancaster.ac.uk,

More information

Pervasive Communication: The Need for Distributed Context Adaptations

Pervasive Communication: The Need for Distributed Context Adaptations Pervasive Communication: The Need for Distributed Context Adaptations Jorge Vallejos, Brecht Desmet, Pascal Costanza, Wolfgang De Meuter Programming Technology Lab Vrije Universiteit Brussel Pleinlaan

More information

Definition of Application Scenarios

Definition of Application Scenarios Definition of Application Scenarios G. Biegel, G. Blair, V. Cahill, A. Casimiro, K. Cheverst, R. Cunningham, A. Fitzpatrick, A. Friday, G. Gaertner, B. Hughes, J. Kaiser, R. Meier, N. Riejers and P. Veríssimo

More information

Source Routing Algorithms for Networks with Advance Reservations

Source Routing Algorithms for Networks with Advance Reservations Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract

More information

Context-Awareness and Adaptation in Distributed Event-Based Systems

Context-Awareness and Adaptation in Distributed Event-Based Systems Context-Awareness and Adaptation in Distributed Event-Based Systems Eduardo S. Barrenechea, Paulo S. C. Alencar, Rolando Blanco, Don Cowan David R. Cheriton School of Computer Science University of Waterloo

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

Internetworking Wireless Nodes to A Control Area Network

Internetworking Wireless Nodes to A Control Area Network Internetworking Wireless Nodes to A Control Area Network A. Kutlu, H. Ekiz, M.D. Baba, E.T. Powner School of Engineering University of Sussex Brighton U.K. ABSTRACT This paper discusses the design and

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

Chapter 2 Communication for Control in Heterogeneous Power Supply

Chapter 2 Communication for Control in Heterogeneous Power Supply Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards

More information

MDD Approach for the Development of Context-Aware Applications

MDD Approach for the Development of Context-Aware Applications MDD Approach for the Development of Context-Aware Applications Dhouha Ayed, Didier Delanote, and Yolande Berbers Department of Computer Science, K.U.Leuven B-3001 Leuven, Belgium Abstract. Context-aware

More information

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

Event-Based Middleware for Collaborative Ad Hoc Applications

Event-Based Middleware for Collaborative Ad Hoc Applications Event-Based Middleware for Collaborative Ad Hoc Applications A thesis submitted to the University of Dublin, Trinity College, in fulfilment of the requirements for the degree of Doctor of Philosophy (Computer

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network

A Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

From Mobility Management to Connectivity Management

From Mobility Management to Connectivity Management From Mobility Management to Management Jun-Zhao Sun and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland {Junzhao.sun,

More information

An Architecture to Enable Remote Context Reasoning

An Architecture to Enable Remote Context Reasoning An Architecture to Enable Remote Context Reasoning Michael Przybilski, Petteri Nurmi Helsinki Institute for Information Technology (HIIT) Basic Research Unit University of Helsinki, Department of Computer

More information

PROJECT FINAL REPORT

PROJECT FINAL REPORT PROJECT FINAL REPORT Grant Agreement number: INFSO-ICT-224350 Project acronym: Project title: Funding Scheme: flexware Flexible Wireless Automation in Real-Time Environments STREP Period covered: from

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach

Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach Ninat Wanapan and Somnuk Keretho Department of Computer Engineering, Kasetsart

More information

The Federated Event Service

The Federated Event Service The Federated Event Service Conor Ryan A dissertation submitted to the University of Dublin, in partial fulfilment of the requirements for the degree of Master of Science in Computer Science September

More information

Primary-Context Model and Ontology: A Combined Approach for Pervasive Transportation Services

Primary-Context Model and Ontology: A Combined Approach for Pervasive Transportation Services Primary-Context Model and Ontology: A Combined Approach for Pervasive Transportation Services Deirdre Lee and René Meier Distributed Systems Group, Department of Computer Science, Trinity College Dublin,

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Real-Time Coordination in Distributed Multimedia Systems

Real-Time Coordination in Distributed Multimedia Systems Real-Time Coordination in Distributed Multimedia Systems Theophilos A. Limniotes and George A. Papadopoulos Department of Computer Science University of Cyprus 75 Kallipoleos Str, P.O.B. 20537 CY-1678

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

Publish/Subscribe Protocol in Wireless Sensor Networks: Improved Reliability and Timeliness

Publish/Subscribe Protocol in Wireless Sensor Networks: Improved Reliability and Timeliness KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. X, NO. X, December 201X 134 Copyright 2011 KSII Publish/Subscribe Protocol in Wireless Sensor Networks: Improved Reliability and Timeliness Ernesto

More information

Real-Time Traffic in Ad-hoc Sensor Networks

Real-Time Traffic in Ad-hoc Sensor Networks Real-Time Traffic in Ad-hoc Sensor Networks Luciano Bononi Computer Science Department University of Bologna 4127 Bologna, Italy Email: bononi@cs.unibo.it Lorenzo Donatiello Computer Science Department

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

ECE519 Advanced Operating Systems

ECE519 Advanced Operating Systems IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor

More information

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree. Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Challenges

More information

UNIT 1 Questions & Solutions

UNIT 1 Questions & Solutions UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks

Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks ITU Workshop on Standardization on IMT, M2M, IoT, Cloud Computing and SDN (Algiers, Algeria, 8 September 2013) Smart Ubiquitous Networks: Standardization and Challenges for Smartness of Networks Gyu Myoung

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one

More information

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.

More information

System models for distributed systems

System models for distributed systems System models for distributed systems INF5040/9040 autumn 2010 lecturer: Frank Eliassen INF5040 H2010, Frank Eliassen 1 System models Purpose illustrate/describe common properties and design choices for

More information

Review of Medium Access Control protocol for MANET

Review of Medium Access Control protocol for MANET Review of Medium Access Control protocol for MANET Khushboo Agarwal Department of CSE&IT, Madhav Institute of Technology and Science, Gwalior 474005 ka.agarwal5@gmail.com Abstract: The mobile Adhoc network

More information

Internet of Things (IoT) CSE237A

Internet of Things (IoT) CSE237A Internet of Things (IoT) CSE237A Class Overview What ve covered until now: All material that will be on exam! Where we are going today: IoT & exam review Due today: Article on IoT HW3 at 11:59pm; upload.pdf

More information

Reflective Java and A Reflective Component-Based Transaction Architecture

Reflective Java and A Reflective Component-Based Transaction Architecture Reflective Java and A Reflective Component-Based Transaction Architecture Zhixue Wu APM Ltd., Poseidon House, Castle Park, Cambridge CB3 0RD UK +44 1223 568930 zhixue.wu@citrix.com ABSTRACT In this paper,

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks

More information

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Real-time systems deliver services while meeting some timing constraints Not necessarily fast,

More information

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique

QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered Control Technique 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore QoS and System Capacity Optimization in WiMAX Multi-hop Relay Using Flexible Tiered

More information

Modelling direct application to network bandwidth provisioning for high demanding research applications

Modelling direct application to network bandwidth provisioning for high demanding research applications Modelling direct application to network bandwidth provisioning for high demanding research applications H. Wessing, Y. Yan and M. Berger Research Center COM Technical University of Denmark Bldg. 345V,

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme

Adaptive Resource Allocation Mechanisms for Support of Data Traffic over ATM Satellite Networks Introduction The Dynamic Flow Control Scheme Adaptive Resource Allocation Mechanisms for Support of Traffic over ATM Satellite Networks Tanja Lang and Nirmala Shenoy, Co-operative Research Centre for Satellite Systems, Institute for Telecommunications

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

Middleware Design Framework for Mobile Computing

Middleware Design Framework for Mobile Computing ISSN: 2222-4254 IJES Middleware Design Framework for Mobile Computing Imran Sarwar Bajwa School of Computer Science, University of Birmingham, Birmingham, B15 2TT, UK i.s.bajwa@cs.bham.ac.uk Abstract.

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation

2. REVIEW OF RELATED RESEARCH WORK. 2.1 Methods of Data Aggregation ata Aggregation in Wireless Sensor Networks with Minimum elay and Minimum Use of Energy: A comparative Study Bushra Qayyum Mohammed Saeed Jason Roberts Ph Student ean of Research Senior Lecturer University

More information

Transaction Processing in Mobile Database Systems

Transaction Processing in Mobile Database Systems Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,

More information

Glasgow eprints Service

Glasgow eprints Service Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

On-road Wireless Sensor Network for Traffic Surveillance

On-road Wireless Sensor Network for Traffic Surveillance On-road Wireless Sensor Network for Traffic Surveillance JaeJun Yoo, DoHyun Kim, KyoungHo Kim Vehicle/Ship/Defense IT Convergence Division Electronics and Telecommunications Research Institute Daejeon,

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

Data Model Considerations for Radar Systems

Data Model Considerations for Radar Systems WHITEPAPER Data Model Considerations for Radar Systems Executive Summary The market demands that today s radar systems be designed to keep up with a rapidly changing threat environment, adapt to new technologies,

More information

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

Create a smarter environment where information becomes insight

Create a smarter environment where information becomes insight Create a smarter environment where information becomes insight How a seamless network can turn data into intelligence for your smart city or factory Contents Introduction 3 Smart city surveillance: From

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Presented by: B. Dasarathy OMG Real-Time and Embedded Systems Workshop, Reston, VA, July 2004

Presented by: B. Dasarathy OMG Real-Time and Embedded Systems Workshop, Reston, VA, July 2004 * This work is supported by DARPA Contract NBCH-C-03-0132. Network QoS Assurance through Admission Control* by B. Coan, B. Dasarathy, S. Gadgil, K. Parmeswaran, I. Sebuktekin and R. Vaidyanathan, Telcordia

More information

A Survey of Context-Aware Mobile Computing Research

A Survey of Context-Aware Mobile Computing Research A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz 2005.11. 14 Cho Jaekyu jkcho@mmlab.snu.ac.kr Contents 1 2 3 4 5 6 7 8 Introduction Definition of Context Context-Aware Computing

More information