Mobility in Sensor Networks. Daniel Massaguer Feb 2005
|
|
- Rolf Hensley
- 5 years ago
- Views:
Transcription
1 Mobility in Sensor Networks Daniel Massaguer Feb 2005
2 Mobility in Sensor Networks Mobile Code Maté: Code infection Agilla: Mobile Agents Mobile hardware Guided navigation Node mobility: Parasitic mobility Daniel Massaguer Feb 2005
3 Mobility in Sensor Networks Mobile Code Maté: Philip Levis and David Culler, "Maté: A Tiny Virtual machine for Sensor networks", ASPLOSX Agilla: Fok, C.-L., Roman, G.-C., Lu, C., "Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications" In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'05), Columbus, Ohio,
4 Mobility in Sensor Networks Mobile Code Maté [1] Pushc 1 sense pushc 7 and putled halt # Push 1 onto op. stack # Read sensor 1 (light) # Take the bottom 3 bits # Set LEDs to these 3 bits Virtual Machine Hides TinyOS programming details 1 Instr = 1 byte, 1 TinyOS task Programs are shorter [1] Philip Levis and David Culler, "Maté: A Tiny Virtual machine for Sensor networks", ASPLOSX
5 Mobility in Sensor Networks Mobile Code Maté [1] Code dissemination Code in capsules of 24 instr Each capsule has type and version Viral infection (control flooding): On reception of a new capsule, install it and broadcast it if it is a new version [1] Philip Levis and David Culler, "Maté: A Tiny Virtual machine for Sensor networks", ASPLOSX
6 Mobility in Sensor Networks Mobile Code Increase of abstraction Maté [1] IPS decrease, Energy increases Reduction of code size Energy decreases [1] Philip Levis and David Culler, "Maté: A Tiny Virtual machine for Sensor networks", ASPLOSX
7 Mobility in Sensor Networks Mobile Code Agilla [2] Middleware for Mobile Agents in Sensor Networks Maté: Viral code infection; Agilla: Application selects where to move or clone. Maté: one single application; Agilla: Multiple applications. [2] Fok, C.-L., Roman, G.-C., Lu, C., "Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications" In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'05), Columbus, Ohio,
8 Mobility in Sensor Networks Mobile Code Agilla [2] inter-agent coordination based on tuplespaces location-based addressing greedy geographic routing [2] Fok, C.-L., Roman, G.-C., Lu, C., "Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications" In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'05), Columbus, Ohio,
9 Mobility in Sensor Networks Mobile Code Agilla [2] [2] Fok, C.-L., Roman, G.-C., Lu, C., "Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications" In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'05), Columbus, Ohio,
10 Mobility in Sensor Networks Mobile Hardware Guided Navigation Li et al: Qun Li, Michael De Rosa and Daniela Rus, " Distributed Algorithms for Guiding Navigation across a Sensor Network", ACM MobiCom Batalin et al: M. A. Batalin, G. S. Sukhatme, M. Hatting, " Mobile Robot Navigation using a sensor network", IEEE ICRA Mobile Node Parasitic Mobility: Mathew Laibowitz and Joseph A. Paradiso, Parasitic Mobility in Dynamically Distributed Sensor Networks, ACM Mobisys
11 Li et al [4] Static sensor network guides a mobile device towards a target, maintaining the safest distance to the danger areas Target 9
12 Li et al [4] Artificial Potential Fields Target 9
13 Li et al [4] Artificial Potential Fields + Target _ 10
14 Pot[i]=0 Hops[j]= i=0 Pot=[0,--,--,--,--,--] Hops=[,,,,, ] 1 Pot=[--,0,--,--,--,--] Hops=[,,,,, ] 2 Pot=[--,--,0,--,--,--] Hops=[,,,,, ] 3 Pot=[--,--,--,0,--,--] Hops=[,,,,, ] 4 Pot=[--,--,--,--,0,--] Hops=[,,,,, ] 5 Pot=[--,--,--,--,--,0] Hops=[,,,,, ] 11
15 If danger, Hops[i]=0 and broadcast <src=0,hops=0> i=0 Pot=[0,--,--,--,--,--] Hops=[0,,,,, ] 1 Pot=[--,0,--,--,--,--] Hops=[,,,,, ] 2 Pot=[--,--,0,--,--,--] Hops=[,,,,, ] 3 Pot=[--,--,--,0,--,--] Hops=[,,,,, ] 4 Pot=[--,--,--,--,0,--] Hops=[,,,,, ] <src=5,hops=0> 5 Pot=[--,--,--,--,--,0] Hops=[,,,,,0] 12
16 If hops[src] > hops+1 then hops[src]=hops+1 and <src=0,hops=0> i=0 Pot=[0,--,--,--,--,--] Hops=[0,,,,, ] 1 Pot=[--,0,--,--,--,--] Hops=[1,,,,,1] 2 Pot=[--,--,0,--,--,--] Hops=[,,,,,1] 3 Pot=[--,--,--,0,--,--] Hops=[1,,,,, ] 4 Pot=[--,--,--,--,0,--] Hops=[,,,,,1] <src=5,hops=0> 5 Pot=[--,--,--,--,--,0] Hops=[,,,,,0] 13
17 Broadcast <src,hops[src]> i=0 Pot=[0,--,--,--,--,--] Hops=[0,,,,, ] <src=0,hops=1> 3 Pot=[--,--,--,0,--,--] Hops=[1,,,,, ] <src=5,hops=1> <src=0,hops=1> 1 Pot=[--,0,--,--,--,--] Hops=[1,,,,,1] <src=5,hops=1> 4 Pot=[--,--,--,--,0,--] Hops=[,,,,,1] <src=5,hops=1> 2 Pot=[--,--,0,--,--,--] Hops=[,,,,,1] 5 Pot=[--,--,--,--,--,0] Hops=[,,,,,0] 14
18 i=0 Pot=[0,--,--,--,--,--] Hops=[0,,,,,2] 1 Pot=[--,0,--,--,--,--] Hops=[1,,,,,1] 2 Pot=[--,--,0,--,--,--] Hops=[2,,,,,1] 3 Pot=[--,--,--,0,--,--] Hops=[1,,,,,2] 4 Pot=[--,--,--,--,0,--] Hops=[2,,,,,1] 5 Pot=[--,--,--,--,--,0] Hops=[3,,,,,0] 14
19 i=0 Pot=[0,--,--,--,--,--] Hops=[0,,,,,2] 1 Pot=[--,0,--,--,--,--] Hops=[1,,,,,1] 2 Pot=[--,--,0,--,--,--] Hops=[2,,,,,1] 3 Pot=[--,--,--,0,--,--] Hops=[1,,,,,2] 4 Pot=[--,--,--,--,0,--] Hops=[2,,,,,1] 5 Pot=[--,--,--,--,--,0] Hops=[3,,,,,0] 15
20 Pot[j]= 1 / Hops[j] 2 (j!=i) Pot[i] = Sum{Pot[j]} i=0 Pot=[1/4,--,--,--,--,1/4] 1 Hops=[0,,,,,2] Pot=[1/1 2,2,--,--,--,1/1 2 ] Hops=[1,,,,,1] 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] 3 Pot=[1/1 2,--,--,5/4,--,1/4] Hops=[1,,,,,2] 4 Pot=[1/4,--,--,--,5/4,1/1 2 ] 5 Hops=[2,,,,,1] Pot=[1/9,--,--,--,--,1/9] Hops=[3,,,,,0] 16
21 Safest path to goal i=0 Pot=[1/4,--,--,--,--,1/4] 1 Hops=[0,,,,,2] Pot=[1/1 2,2,--,--,--,1/1 2 ] Hops=[1,,,,,1] 4 Source 3 Pot=[1/1 2,--,--,5/4,--,1/4] Hops=[1,,,,,2] Target 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] Pot=[1/4,--,--,--,5/4,1/1 2 ] 5 Hops=[2,,,,,1] Pot=[1/9,--,--,--,--,1/9] Hops=[3,,,,,0] 17
22 Safest path to goal i=0 Pot=[1/4,--,--,--,--,1/4] 1 Hops=[0,,,,,2] Pot=[1/1 2,2,--,--,--,1/1 2 ] Hops=[1,,,,,1] 4 Source 3 Pot=[1/1 2,--,--,5/4,--,1/4] Hops=[1,,,,,2] Target <goal=2,id=0, hops=0, pot=0> 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] Pot=[1/4,--,--,--,5/4,1/1 2 ] 5 Hops=[2,,,,,1] Pot=[1/9,--,--,--,--,1/9] Hops=[3,,,,,0] 18
23 i=0 Pot=[1/4,--,--,--,--,1/4] 1 Hops=[0,,,,,2] Pot=[1/1 2,2,2,--,--,1/1 2 ] Hops=[1,,1,,,1] 4 Source 3 Pot=[1/1 2,--,--,5/4,--,1/4] Hops=[1,,,,,2] If Pot[goal]>pot+Pot[i] then Pot[goal]=pot+Pot[i] Hops[goal]=hops+1 Prior[goal]=id and <goal=2,id=2, hops=0, pot=0> Target 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] Pot=[1/4,--,5/4,--,5/4,1/1 2 ] 5 Hops=[2,,1,,,1] Pot=[1/9,--,1/9,--,--,1/9] Hops=[3,,1,,,0] 19
24 i=0 Pot=[1/4,--,--,--,--,1/4] Hops=[0,,,,,2] 1 Pot=[1/1 2,2,2,--,--,1/1 2 ] Source 3 Pot=[1/1 2,--,--,5/4,--,1/4] Hops=[1,,,,,2] Broadcast <goal,i, Hops[goal], Pot[goal] <goal=2,id=1, hops=1, pot=2> Hops=[1,,1,,,1] 4 Target 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] <goal=2,id=4, hops=1, pot=5/4> <goal=2,i hops=1, p Pot=[1/4,--,5/4,--,5/4,1/1 2 ] 5 Hops=[2,,1,,,1] Pot=[1/9,--,1/9,--,--,1/9] Hops=[3,,1,,,0] 20
25 i=0 Pot=[1/4,--,9/4,--,--,1/4] 1 Hops=[0,,2,,,2] Prior=[--,--,1,--,--] Pot=[1/1 2,2,2,--,--,1/1 2 ] Source 3 Broadcast <goal,i, Hops[goal], Pot[goal] Pot=[1/1 2,--,13/4,5/4,--,1/4] Hops=[1,,2,,,2] Prior=[--,--,1,--,--] <goal=2,id=1, hops=1, pot=2> Hops=[1,,1,,,1] 4 Target 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] <goal=2,id=4, hops=1, pot=5/4> <goal=2,i hops=1, p Pot=[1/4,--,5/4,--,5/4,1/1 2 ] 5 Hops=[2,,1,,,1] Pot=[1/9,--,1/9,--,--,1/9] Hops=[3,,1,,,0] 20
26 i=0 Pot=[1/4,--,9/4,--,--,1/4] 1 Hops=[0,,2,,,2] Prior=[--,--,1,--,--] Pot=[1/1 2,2,2,--,--,1/1 2 ] Hops=[1,,1,,,1] 4 Source 3 Pot=[1/1 2,--,13/4,5/4,--,1/4] Hops=[1,,2,,,2] Prior=[--,--,1,--,--] Target 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] Pot=[1/4,--,5/4,--,5/4,1/1 2 ] 5 Hops=[2,,1,,,1] Pot=[1/9,--,1/9,--,--,1/9] Hops=[3,,1,,,0] 21
27 Navigation i=0 Pot=[1/4,--,9/4,--,--,1/4] 1 Hops=[0,,2,,,2] Prior=[--,--,1,--,--] Pot=[1/1 2,2,2,--,--,1/1 2 ] Hops=[1,,1,,,1] <goal=2?> Source 3 Pot=[1/1 2,--,13/4,5/4,--,1/4] Hops=[1,,2,,,2] Prior=[--,--,1,--,--] 4 Target 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] Pot=[1/4,--,5/4,--,5/4,1/1 2 ] 5 Hops=[2,,1,,,1] Pot=[1/9,--,1/9,--,--,1/9] Hops=[3,,1,,,0] 22
28 Navigation <goal=2,id=0, hops=2, pot=9/4, prior=1> <goal=2,id=1, i=0 Pot=[1/4,--,9/4,--,--,1/4] 1 Hops=[0,,2,,,2] Prior=[--,--,1,--,--] Pot=[1/1 2,2,2,--,--,1/1 2 ] Source 3 Pot=[1/1 2,--,13/4,5/4,--,1/4] Hops=[1,,2,,,2] Prior=[--,--,1,--,--] hops=1, pot=2, prior=2> Hops=[1,,1,,,1] 4 Target 2 Pot=[1/4,--,5/4,--,--,1/1 2 ] Hops=[2,,,,,1] <goal=2,id=4, hops=1, pot=5/4, prior=2> Pot=[1/4,--,5/4,--,5/4,1/1 2 ] 5 Hops=[2,,1,,,1] Pot=[1/9,--,1/9,--,--,1/9] Hops=[3,,1,,,0] 23
29 Li et al [4] Performance optimization Profiling of neighbors: using information only from stable neighbors. -> eliminate asymmetry(?) and transient links Delaying broadcasts: waiting a preventive time to see if there is a better neighbor. (Only one packet broadcasted -> Dijkstra?). -> transmit less packets Random delays. (Depending on the granularity, it is already done by MAC layer?). -> reduce congestion Retransmissions. ->reliability Route cache flushing. ->adaptability 24
30 Li et al [4] Summary and Conclusions Conceptually, is like performing a distributed Bellman-Ford (B-F) twice: 1.- source=danger, metric=hops-to-danger 2.- source=target, metric=<sum(1/hops-to-danger 2 ), hops-to-target> Optimization -> Neighbor profiling + Moving from B-F to Dijkstra. Lessons learned on (Mica-based) WSNs: Symmetry assumption not valid Network congestion Transitory links Data loss Need GPS on all devices Approximating distance by number of hopes is ok in large networks 25
31 Parasitic Mobility [5] A node with sensing and communication capabilities attaches to mobile hosts (e.g. people, animals, vehicles, fluids, forces), and it remains attached as far as the host is bringing the node closer to a point of interest. [5] Mathew Laibowitz and Joseph A. Paradiso, Parasitic Mobility in Dynamically Distributed Sensor Networks, ACM Mobisys
32 References [1] Philip Levis and David Culler, "Maté: A Tiny Virtual machine for Sensor networks", ASPLOSX [2] Fok, C.-L., Roman, G.-C., Lu, C., "Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications" In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'05), Columbus, Ohio, [3] Chenyang Lu, A Mobile Agent Middleware for Wireless Sensor Networks, (presentation), [5] Mathew Laibowitz and Joseph A. Paradiso, Parasitic Mobility in Dynamically Distributed Sensor Networks, ACM Mobisys Daniel Massaguer <dmassagu@uci.edu> Feb 2005
Middleware for Sensor Networks
Middleware for Sensor Networks Krzysztof Piotrowski piotrowski@ihp-ffo.de Background Application Middleware Sensor Network Application Middleware Sensor Network Middleware for Sensor Networks 2 Middleware
More informationMaté. Presentation Outline. Presentation Outline. Introduction - Why? Introduction Mate VM. Introduction - Requirements
Maté Maté: : A Tiny Virtual Machine for Sensor Networks Introduction Implementation Evaluation Discussion and Critique Authors: Philip Levis and David Culler Presenter: Fernando Zamith Introduction - Why?
More informationVideo of the Day. Ø LA Express Park Explained!
Video of the Day LA Express Park Explained! 1 Proposal One proposal/team, 1 page! Team members! Concise description of project! Responsibilities of each member! Specific equipment needed! Written proposal
More informationAgilla/Agimone: Middleware for Sensor Networks
Agilla/Agimone: Middleware for Sensor Networks Motivation Existing sensor network software lacks flexibility Entire network runs just one application Cannot adapt to changes in the environment the network
More information1 School of Information Science, Computer and Electrical Engineering, Halmstad University, Halmstad, Sweden
Adaptable Middleware for Heterogeneous Wireless Sensor Networks Edison Pignaton Freitas1,2, Per Söderstam1, Wagner Ourique de Morais1, Carlos Eduardo Pereira2,3, and Tony Larsson1 1 School of Information
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationOutline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate.
Outline Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler Presented by Mark Tamola CSE 521 Fall 2004 Motivation Mate Code Propagation Conclusions & Critiques 1 2 Motivation
More informationAgilla: A Mobile Agent Middleware for Sensor Networks
Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2006-16 2006-01-01 Agilla:
More informationGenerality Challenges and Approaches in WSNs
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Generality Challenges and Approaches in WSNs Fadi TIRKAWI,
More informationRumor Routing Algorithm
Aleksi.Ahtiainen@hut.fi T-79.194 Seminar on Theoretical Computer Science Feb 9 2005 Contents Introduction The Algorithm Research Results Future Work Criticism Conclusions Introduction is described in paper:
More informationThe Firecracker Protocol
The Firecracker Protocol Philip Levis and David Culler {pal,culler}@eecs.berkeley.edu EECS Department University of California, Berkeley Berkeley, CA 94720 ABSTRACT We propose the Firecracker protocol
More informationDistributed Algorithms for Guiding Navigation across a Sensor Network
Distributed Algorithms for Guiding Navigation across a Sensor Network Qun Li, Michael De Rosa, and Daniela Rus Department of Computer Science Dartmouth College {liqun, mdr, rus}@cs.dartmouth.edu ABSTRACT
More informationDistributed Algorithms for Guiding Navigation across a Sensor Network
1 Distributed Algorithms for Guiding Navigation across a Sensor Network Qun Li, Michael DeRosa, and Daniela Rus Department of Computer Science Dartmouth College {liqun, mdr, rus}@cs.dartmouth.edu Dartmouth
More informationADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks
AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University
More informationRouting in Sensor Networks
Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing
More informationSIMULATION ENVIRONMENT SHOWING ENERGY CONSERVATION FOR AGILLA MIDDLEWARE
SIMULATION ENVIRONMENT SHOWING ENERGY CONSERVATION FOR AGILLA MIDDLEWARE 1 Dr. G. Mahadevan, 2 Prof. Ms.Nirmala.S, 3 Pradeep N 1 Prof., 2 Research Schola, 3 4 th Semester, M-Tech, Dept. of CSE,AMCEC, Bangalore,Karnataka
More informationMobile Agent Driven Time Synchronized Energy Efficient WSN
Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,
More informationTOSSIM simulation of wireless sensor network serving as hardware platform for Hopfield neural net configured for max independent set
Available online at www.sciencedirect.com Procedia Computer Science 6 (2011) 408 412 Complex Adaptive Systems, Volume 1 Cihan H. Dagli, Editor in Chief Conference Organized by Missouri University of Science
More informationExploring Sensor Networks using Mobile Agents
Exploring Sensor Networks using Mobile Agents Daniel Massaguer, Chien-Liang Fok, Nalini Venkatasubramanian, Gruia-Catalin Roman, and Chenyang Lu Donald Bren School of Information and Computer Science Department
More informationRouting. Directly Connected IP Networks. Data link layer routing. ifconfig command
Routing Basic principles dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.1, 2010/02/19 12:21:58) Monday, February 22, 2010 Basic setup Directly connected Not directly connected
More informationA Comparative Survey
Contemporary Engineering Sciences, Vol. 7, 2014, no. 13, 649-660 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4671 Middleware Systems for Wireless Sensor Networks: A Comparative Survey
More informationTasking Wireless Sensor Nodes in the Internet of Things
Tasking Wireless Sensor Nodes in the Internet of Things Benjamin Le Corre, Jérémie Leguay, Mario Lopez-Ramos Thales Communications 160 Bd de Valmy, BP 82 92704 Colombes Cedex, France {firstname.name}@fr.thalesgroup.com
More informationGranting Silence to Avoid Wireless Collisions
Granting Silence to Avoid Wireless Collisions Jung Il Choi, Mayank Jain, Maria A. Kazandjieva, and Philip Levis October 6, 2010 ICNP 2010 Wireless Mesh and CSMA One UDP flow along a static 4-hop route
More informationRouting. Directly Connected IP Networks. Data link layer routing. ifconfig command
outing Basic principles dr. C. P. J. Koymans Informatics Institute University of Amsterdam February 20, 2008 Basic setup Directly connected Not directly connected Unix and Linux routing commands oute selection
More informationResearch Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks
e Scientific World Journal, Article ID 165694, 7 pages http://dx.doi.org/10.1155/2014/165694 Research Article Research on Dynamic Routing Mechanisms in Wireless Sensor Networks A. Q. Zhao, 1 Y. N. Weng,
More informationPROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1
PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan
More informationRouting for IoT and Sensor Systems
Facoltà di Ingegneria dell Informazione, Informatica e Statistica Internet of Things A.Y. 2017/18 Routing for IoT and Sensor Systems Federico Ceccarelli PhD Student 1 The Collection Tree Protocol (CTP)
More informationModule 8. Routing. Version 2 ECE, IIT Kharagpur
Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and
More informationDESIGN OF AN INTELLIGENT MIDDLEWARE FOR FLEXIBLE SENSOR CONFIGURATION IN M2M SYSTEMS
DESIGN OF AN INTELLIGENT MIDDLEWARE FOR FLEXIBLE SENSOR CONFIGURATION IN M2M SYSTEMS Niels Reijers 1, Kwei-Jay Lin 1,2, Yu-Chung Wang 1, Chi-Sheng Shih 1, Jane Y. Hsu 1 1 Intel-NTU Connected Context Computing
More informationTowards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden
Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a
More informationcs/ee 143 Communication Networks
cs/ee 143 Communication Networks Chapter 4 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationA Survey of Middleware for Sensor Network and Challenges
A Survey of Middleware for Sensor Network and Challenges Mohammad M. Molla and Sheikh Iqbal Ahamed Marquette University, Milwaukee, Wisconsin {mmolla, iq}@mscs.mu.edu Abstract In recent years, Wireless
More informationDynamic Source Routing in ad hoc wireless networks
Dynamic Source Routing in ad hoc wireless networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University In Mobile Computing, vol. 353, chapter 5, T. Imielinski and H.
More informationHop Count Aware Broadcast Algorithm with Random Assessment Delay Extension for Wireless Sensor Networks
Hop Count Aware Broadcast Algorithm with Random Assessment Delay Extension for Wireless Sensor Networks Shintaro Izumi, Takashi Matsuda, Hiroshi Kawaguchi, Chikara Ohta, and Masahiko Yoshimoto Graduate
More informationCSEP 561 Routing. David Wetherall
CSEP 561 Routing David Wetherall djw@cs.washington.edu Routing Focus: How to find and set up paths through a network Distance-vector and link-state Application Shortest path routing Transport Key properties
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationTRANSMISSION OF MULTIPLE EMERGENCY INFORMATION WITH THE COORDINATION OF NEIGHBORING ROUTERS IN WIRELESS SENSOR NETWORKS
DOI: 10.21917/ijct.2013.0117 TRANSMISSION OF MULTIPLE EMERGENCY INFORMATION WITH THE COORDINATION OF NEIGHBORING ROUTERS IN WIRELESS SENSOR NETWORKS Mary Cherian 1 and Rashmi G 2 1, 2 Department of Computer
More informationThe Emergence of Networking Abstractions and Techniques in TinyOS
The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample
More informationGeographic Routing in Simulation: GPSR
Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops
More informationRouting Algorithms. CS158a Chris Pollett Apr 4, 2007.
Routing Algorithms CS158a Chris Pollett Apr 4, 2007. Outline Routing Algorithms Adaptive/non-adaptive algorithms The Optimality Principle Shortest Path Routing Flooding Distance Vector Routing Routing
More informationData Discovery and Dissemination with DIP
Data Discovery and Dissemination with DIP Authors: Kaisen Lin, Philip Levis Speaker: Giannakakis Spyridon 10-937-548 ETH Zurich, D-INFK March 22, 2011 1 / 24 Problem How to efficiently distribute binaries
More informationSynchronization in Sensor Networks
Synchronization in Sensor Networks Blerta Bishaj Helsinki University of Technology 1. Introduction... 2 2. Characterizing Time Synchronization... 2 3. Causes of clock desynchronization... 3 4. Algorithms...
More informationOutline. Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks. Smart Grid
Multi-Channel Reliability and Spectrum Usage in Real Homes Empirical Studies for Home-Area Sensor Networks Experimental methodology Empirical study in homes Spectrum study of existing wireless signals
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:
Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.
More informationGeographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic
More informationEnergy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x
Energy Aware and Link Quality Based Routing in Wireless Sensor Networks under TinyOS-2.x Dhaval Patel, 1 Bijal Chawla, 2 Chandresh Parekh 3 12 PG Student, Department of Wireless Mobile Computing, Gujarat
More informationData-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network
Wireless Sensor Network, 2010, 2, 710-717 doi:10.4236/wsn.2010.29086 Published Online September 2010 (http://www.scirp.org/journal/wsn) Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor
More informationLecture 15: Measurement Studies on Internet Routing
Internet Routing Lecture 15: Measurement Studies on Internet Routing Lakshminarayanan Subramanian CS 268 class March 10 th, 2004 Internet organized as a two level hierarchy First level autonomous systems
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationNetworked Robots: Flying Robot Navigation using a Sensor Net
Networked Robots: Flying Robot Navigation using a Sensor Net Peter Corke Ron Peterson Daniela Rus April 18, 2003 Abstract This paper introduces the application of a sensor network to navigate a flying
More informationRoadmap Query for Sensor Network Assisted Navigation in Dynamic Environments
Roadmap Query for Sensor Network Assisted Navigation in Dynamic Environments Sangeeta Bhattacharya, Nuzhet Atay, Gazihan Alankus, Chenyang Lu, O. Burchan Bayazit, and Gruia-Catalin Roman Department of
More informationThe Internet vs. Sensor Nets
The Internet vs. Sensor Nets, Philip Levis 5/5/04 0 The Internet vs. Sensor Nets What they ve learned, Philip Levis 5/5/04 1 The Internet vs. Sensor Nets What they ve learned, and we ve forgotten. Philip
More informationCollection Tree Protocol. A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter
Collection Tree Protocol A look into datapath validation and adaptive beaconing. Speaker: Martin Lanter Collection Protocols Why do we need collection protocols? Collecting data at a base station is a
More informationSensor Network Protocol Design and Implementation. Philip Levis UC Berkeley
Sensor Network Protocol Design and Implementation Philip Levis UC Berkeley Sensor Network Constraints Distibuted, wireless networks with limited resources Energy, energy, energy. Communication is expensive.
More informationA COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) R.Sudha
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationCSE 461 Routing. Routing. Focus: Distance-vector and link-state Shortest path routing Key properties of schemes
CSE 46 Routing Routing Focus: How to find and set up paths through a network Distance-vector and link-state Shortest path routing Key properties of schemes Application Transport Network Link Physical Forwarding
More informationTAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS
TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS SAMUEL MADDEN, MICHAEL J. FRANKLIN, JOSEPH HELLERSTEIN, AND WEI HONG Proceedings of the Fifth Symposium on Operating Systems Design and implementation
More informationData-Centric Query in Sensor Networks
Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed
More informationGraph Algorithms. Many problems in networks can be modeled as graph problems.
Graph Algorithms Graph Algorithms Many problems in networks can be modeled as graph problems. - The topology of a distributed system is a graph. - Routing table computation uses the shortest path algorithm
More information[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations
Landmark-based routing Landmark-based routing [Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations of Computer
More informationA Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality
Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get
More informationInformation Brokerage
Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,
More informationA MOBILE AGENT-BASED EVENT DRIVEN ROUTE DISCOVERY PROTOCOL IN WIRELESS SENSOR NETWORK: AERDP
A MOBILE AGENT-BASED EVENT DRIVEN ROUTE DISCOVERY PROTOCOL IN WIRELESS SENSOR NETWORK: AERDP PREETI SETHI *, Department of Computer Science,YMCA University of Science & Technology, Faridabad-121002,Haryana,
More informationEnergy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks
Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern
More informationDIRECTED DIFFUSION ROUTING PROTOCOL: ATTACKS AND COUNTERMEASURES RAJKUMAR VIJAYARAMAN. Bachelor of Engineering. Annamalai University
DIRECTED DIFFUSION ROUTING PROTOCOL: ATTACKS AND COUNTERMEASURES BY RAJKUMAR VIJAYARAMAN Bachelor of Engineering Annamalai University Chidambaram, India 2001 Submitted to the faculty of the Graduate College
More informationThe General Analysis of Proactive Protocols DSDV, FSR and WRP
Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.
More informationUbiMASS - Ubiquitous Mobile Agent System for Wireless Sensor Networks
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing UbiMASS - Ubiquitous Mobile Agent System for Wireless Sensor Networks Faruk Bagci, Julian Wolf, Benjamin Satzger,
More informationVLM 2 : A Very Lightweight Mobile Multicast System For Wireless Sensor Networks
VLM 2 : A Very Lightweight Mobile Multicast System For Wireless Sensor Networks Anmol Sheth, Brian Shucker, and Richard Han University of Colorado, Department of Computer Science Campus Box 430, Boulder,
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationAn Enhanced Data Gathering Protocol for Wireless Sensor Network with Sink Mobility
An Enhanced Data Gathering Protocol for Wireless Sensor Network with Sink Mobility Varshitha K, Madesha M 4th Sem M.Tech, Dept. of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore,
More informationCS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning
CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive
More informationThe Open System Interconnect model
The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually
More informationRealistic and Efficient Multi-Channel Communications in WSN
Realistic and Efficient Multi-Channel Communications in WSN Miji Kim Andreas Schädeli Silvia Dorotheea Rus Cievoloth Gilber Coca Olmos Content Introduction Problem description Interference problems Time
More informationCSC 774 Advanced Network Security
Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially
More informationA eural etwork approach for Wireless sensor network power management
A eural etwork approach for Wireless sensor network power management Ahmad Hosseingholizadeh Dr. Abdolreza Abhari Department of Computer Science Ryerson University Toronto, Canada {ahossein, aabhari}@scs.ryerson.ca
More informationVI. ROUTING. - "routing protocol" nodes exchange information to ensure consistent understanding of paths
(a) General Concepts VI. ROUTING - "routing" determination of suitable (i.e., least cost) path from a source to every destination (i.e., which nodes/switches/routers are in path) - "routing protocol" nodes
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationPreserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks
Preserving Source Location Privacy in Monitoring-Based Wireless Sensor Networks Yong Xi, Loren Schwiebert, and Weisong Shi Wayne State University Department of Computer Science Detroit, MI 482 {yongxi,
More informationWireless Sensor Networks
Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationInterference avoidance in wireless multi-hop networks 1
Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices
More informationPractical Network Coding in Sensor Networks: Quo Vadis?
Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),
More informationCSE 521S Final Review
Final Demo CSE 52S Final Review Chenyang Lu Computer Science and Engineering This Thursday, 4-7 Cupples I Room 28 5 min per team Set up and test your demo in advance All expected to aeend the whole session
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationAn Active Tracking System Using IEEE Based Ultrasonic Sensor Devices
An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices Shinyoung Yi and Hojung Cha Department of Computer Science, Yonsei University Seodaemun-gu, Shinchon-dong 134, Seoul 120-749,
More informationWireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013
Wireless Sensor Networks (WSN) Tanyar Pooyeh 2pooyeh@informatik.uni-hamburg.de Intelligent Robotics - winter semester 2013/14 Nov 11, 2013 Outline Multi-hop Wireless Networks MANETs, VANETs, WSNs Routing
More informationImplementation of an Adaptive MAC Protocol in WSN using Network Simulator-2
Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2 1 Suresh, 2 C.B.Vinutha, 3 Dr.M.Z Kurian 1 4 th Sem, M.Tech (Digital Electronics), SSIT, Tumkur 2 Lecturer, Dept.of E&C, SSIT,
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationD-sense: An Integrated Environment for Algorithm Design and Protocol Implementation in Wireless Sensor Networks
D-sense: An Integrated Environment for Algorithm Design and Protocol Implementation in Wireless Sensor Networks Kazushi Ikeda 1, Shunsuke Mori 1,YuyaOta 1, Takaaki Umedu 12, Akihito Hiromori 12, Hirozumi
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationQuestion Points Score total 100
CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 8 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement after
More informationEnergy-Efficient Communication Protocol for Wireless Micro-sensor Networks
Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks Paper by: Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan Outline Brief Introduction on Wireless Sensor
More informationExercise 3. RIP and OSPF
Exercise 3. RIP and OSPF 1. Demo. Find the routes in Figure 4 from node A to all the other nodes in the network using Dijkstra s algorithm. You may use the animation of Dijkstra s algorithm at http://www-b2.is.tokushima-u.ac.jp/~ikeda/suuri/dijkstra/dijex1.html
More informationRemotely Deployed Virtual Sensors
Remotely Deployed Virtual Sensors Sanem Kabadayi Christine Julien TR-UTEDGE-2007-010 Copyright 2007 The University of Texas at Austin Remotely Deployed Virtual Sensors Sanem Kabadayı and Christine Julien
More informationNetwork Scheduling for Data Archiving Applications in Sensor Networks
Network Scheduling for Data Archiving Applications in Sensor Networks Yong Yao S. M. Nazrul Alam Johannes Gehrke Sergio D. Servetto Department of Computer Science, School of Electrical and Computer Engineering
More informationSensor Networks and Self-Reconfigurable Robots
Sensor Networks and Self-Reconfigurable Robots BSSN 06 Position Paper Ulrik P. Schultz, Kasper Støy, Nicolai Dvinge and David Christensen Maersk Institute University of Southern Denmark Abstract A self-reconfigurable
More informationCritique #2. Ø Due on 2/13 (Tuesday)
Critique #2 Ø M. Sha, G. Hackmann and C. Lu, Real-world Empirical Studies on Multi- Channel Reliability and Spectrum Usage for Home-Area Sensor Networks, IEEE Transactions on Network and Service Management,
More informationHongchao Zhou, Xiaohong Guan, Chengjie Wu Tsinghua University
RTMC: Reliable Transport with Memory Consideration in Wireless Sensor Networks Hongchao Zhou, Xiaohong Guan, Chengjie Wu Tsinghua University Outline Background Reliable Transport with Memory Consideration
More information