KSN Radio Stack: Sun SPOT Symposium 2009 London.
|
|
- Bennett Phillip Howard
- 5 years ago
- Views:
Transcription
1 Andreas Leppert pp Stephan Kessler Sven Meisinger g : Reliable Wireless Communication for Dataintensive Applications in Sensor Networks Sun SPOT Symposium 2009 London
2 Application in WSN? Targets Wireless Sensor Network (WSN) Large number of battery powered devices energy is valuable! Exchanging data using wireless communication User can access network through base station Su Countless Applications Medical Care, Environment Monitoring, Object Tracking What is data-intensive application in WSN? 2 variations: Nodes generate Data Data must be transported to user / base station Amount of data accumulates on the way Base station has to distribute data to the whole network 2 examples follow Sun SPOT Slide 2
3 Example 1: Data Gathering Targets Data Gathering Applications A large number of nodes Generating / Measuring data (continously) Sending measured data back to base station More Sensor Nodes Base Station Despite Compression/Aggregation: Messages of several KB have to transmitted reliably Large part of result is lost if 1 message is lost! Slide 3
4 Example 2: Over-the-Air Deployment Testbeds Evaluate your software Test and debug software Targets 1. Connect SPOT to USB 2. Put SPOTs into positiono 3. Start testing / evaluation 1. Errors in software? 2. Find error, fix code 4. Collect SPOTs and start with step 1 Problem: Testing-Cycle very cumbersome Solution: Fixed infrastructure connected to nodes Not possible/feasible or all deployments Distribute software over-the-air (OTA) Slide 4
5 Example 2: Over-the-air Deployment (cont d) Targets Requires large files / messages to be transmitted Query Processor suite file ~500 KB Libraries ~700 KB Large Number of Hops In our testbed of 30 SPOTs max. 9 Hops Any testbed requires transmission of large messages over multiple hops Slide 5
6 Requirements of data-intensive Applications Communication software (stack) must Deliver messages reliably Cope with relatively large messages Targets Multiple Hops between sender and receiver node Particularly l hard in sensor networks Expect nodes to fail during transmission React to topology changes due to external influences, e.g., Weather Closing/Opening of doors SPOTs are shipped with a communication stack Why not use this stack? Slide 6
7 Testing the (1) Targets Setup for evaluation 2-5 nodes in a line, i.e., 1-4 hops 1 specified node sends a message of varying size RadioStream was used After sending, node computes a hash value of the message 1 specified node receives message When receiving completes, receiver computes hash value over received message Transmission successful, if both hash values are equal Code can be obtained from our homepage: i h d / Sender Receiver Slide 7
8 Testing the (2) Targets Evaluation was conducted with the Blue release (current) Slide 8
9 Motivation for a new stack Sun stack is reliable and fast for small messages Almost no errors for message sizes below 1KB Unreliable for large messages or high number of hops Targets Main reason: Goals for the Low Power Efficient usage of low bandwidth available not aimed at data-intensive applications Messages are transmitted reliably over 1h hop layer works Errors must occur above new stack above MAC Slide 9
10 Agenda Motivation: Why do we need another stack? What does data-intensive in sensor networks mean and reliability evaluation data Targets targets & additional i features The core of the Stack Optional stack layers Possibilities for Optimization / Improvements Reliability evaluation and of the stack : vs. Stack The Projects Agenda Slide 10
11 Targets - Reliability Transmission of large messages over multiple hops must work reliably Problems encountered during transmission must be fixed inside the communication stack if possible Handling of errors should not be mixed with application code Expect nodes to fail during transmission External influences change communication behaviour of nodes Weather Closing doors Sender must know if transmission failed on intermediate nodes End-to-End ACK ACK Sender Receiver Slide 11
12 Targets - Extendability Different applications have different demands Run Multiple Stacks parallely on one SPOT Adding / implementing new layers Network Management might require another stack than Query Processing Stack with less complex interfaces for student experiments, more sophisticated stack to gather the result of their experiments Slide 12
13 Further Targets Compatibility with Interface-Compatibility to Users have written applications using the Migrating to our stack should not require rewriting the application Link-Quality-awareness Probability for failures increases, as link quality decreases Communication hardware on SPOTs allows estimations about link quality Example: Quality-Aware Layer Slide 13
14 Optimization is not a Target Communication stacks for sensor nodes are usually optimized regarding g energy usage Nodes are usually battery-powered Reliability is the most important step towards efficiency Users query a sensor network to gain information demand for information has to be satisfied (efficiently) If failures prevent delivery of information Energy used to acquire information until failure occured is wasted! Users might retry Failure likely to occur again more waste! Optimization is the step after functionality is ensured We should forget about small efficiencies, say about 97% of the time: premature optimization i is the root of all evil. (Donald Knuth) Slide 14
15 Foundation for Reliable Communication Basic Operation of : Sending a packet of 127 byte Receiver is a node within the radio range of the sender Two variants of the Basic Operation: Broadcast: Receiver address is blank No acknowledgement Unicast: Receiver address identifies node If transmission of 127 byte was successful, acknowledgement is sent If there was a failure, no acknowledgement is received and a timeout expires. Reliable communication is based on this basic operation First Step: communication protocol for messages larger than 127 byte Slide 15
16 Single Hop Protocol Single Hop Protocol () Layer provides interface for Unicast of messages of arbitrary size Broadcast of messages of arbitrary size Preparation for sending (unicast or broadcast) M Let Message M have a size of b bytes Decompose M into f fragments Assign a sequence number s={1 p} to each fragment C Compute checksum C from M Sending process for unicast and broadcast different starting with broadcast 4 Slide 16
17 Single Hop Protocol - Broadcast Two types of packets BroadcastData: Contains fragments of 104 Byte, used for first f-1 fragments BroadcastEnd: Contains last fragment with sequence number s=f Possible failures: Unexpected sequence number Timeout while waiting for next/last fragment Limitations (current implementation) Sequence Number is 16-bit long max. Broadcast ~ 6 MB sufficient for SPOTs Slide 17
18 Possible Broadcast Improvement Problem: Broadcast still inherently unreliable Sender broadcasts f fragments to surrounding nodes Some receivers only receive k<f fragments Receiver has spent energy, but message is incomplete receiver discards all received fragments, energy wasted! Possible improvement (not yet implemented): Each receiver uses sequence numbers to determine, which k fragments are missing If k is sufficiently small compared to f, ask sender to resend missing fragments with unicast Open questions: Caching mechanisms for broadcast messages on sender What is sufficiently small? Slide 18
19 Single Hop Protocol - Unicast - Unicast Protocol 1. Send UnicastRequest to receiver Contains Checksum C Size b of Message M in bytes receiver can abort transfer 2. Send f fragments to receiver Receiver has to acknowledge each fragment Unacknowledged fragments are retransmitted after a timeout 3. Receiver checks if data is not disrupted using checksum C Slide 19
20 Unicast Improvements Evaluation has shown: Data rates with Sun stack higher than with stack Comparable only for small messages due to reliability Reason for lower data rate: Ak Acknowledgment ld for each hfragment congestion Less payload due to larger sequence numbers Ideas for improvements: TCP/IP-like ACK Aggregate ackowledgements and send 1 packet to acknowledge several received fragments Increase number of packets between ackowledgements depending on link quality Slide 20
21 Summary Single Hop Protocol offers reliable delivery to 1-hop neighbors Broadcast Unicast Message size Bounded d to 6 MB for broadcast SPOT has Theoretically unbounded for unicast 512KB of VM defines boundaries for max. array length RAM Layer still not fine-tuned large room for improvements! targets so far? Extendability not yet compatiblity done Reliability only 1 hop Slide 21
22 Extendability Multiple Stacks, 1 SPOT All communication is based on reliable 1-hop communication usable as a foundation Idea to allow multiple stacks Each Stack is assigned a globally unique ID we used a simple byte value max. 256 different stacks Special byte indicates stack ID Each node uses a Dispatcher to Pass incoming data to correct stack depending on stack ID Pass outgoing data to Layer Dispatcher has 4 functions Register / unregister new stack Broadcast / unicast data using Slide 22
23 Extendability More Stack-Layers All new layers must implement LayerInterface Methods for broadcast / unicast of data from upper layers Method, which takes incoming data from lower layers or the Level Dispatcher Abstract Layer implementation is provided with our software New Layers can be implemented with very few lines of code Example of a AODV Layer follows now Slide 23
24 Example Layer Multi-Hop Up to this point, only 1-hop communication covered Example for a new Layer: Layer Used Mechanism: Ad-Hoc On Demand Distance Vector (AODV) [2] also includes AODV implementation, but No (working) End-to-End ACKs for Multi-Hop Unicasts Only 1 entry per Receiver no backup routes Both problems affect reliability will be addressed in the following Slide 24
25 AODV Mechanism Basics of AODV: Sender S wants to send message to Receiver R S broadcasts Route Request (RREQ) Nodes receiving RREQs rebroadcast if RREQ has not been broadcasted before Node already has a route to R stored in routing table Receiver R receives the RREQ Route Report (RREP) is sent back to S Message is sent through shortest / fastest-available route RREQ RREQ RREQ RREQ RREP Sender ACK ACK ACK Receiver Slide 25
26 AODV Table Format Table without backup entries 1 entry for each receiver R If transfer fails, new RREQ is broadcast by sender S Problem: RREQ very small message (1 packet) might be transmitted reliably, but larger messages fail same Route will be returned transfer might fail again for larger message energy wasted! Solution: Several entries for 1 receiver R Use depth-first search to transmit larger message to R Can be adapted to use quality information! Slide 26
27 AODV End-to-End ACK sends ACK if message is transmitted correctly Problem: Intermediate node fails while sending Intermediate node has sent ACK already, but message is lost! Solution: Receiver sends End-to-End ACK to sender Sender waits for End-to-End ACK Length of timeout determined e ed using hop count of routing table -ACK Sender targets so far? Extendability g g End-to-End ACK done compatiblity done Reliability done Receiver Slide 27
28 Reducing Data Size Compression layer Can be used with abitrary compression algorithm We use a modified ZIP algorithm Should be used above routing layer Avoids decompression on every hop Protocol Dispatcher Applications can use different protocols on top of single stack! Examples: PC-like with ports LowPan Slide 28
29 Message Size: 50 KB Tested up to 1 MB with more than 10 hops 4 Hops Output Power -30 Difference to demo before Simulation of node failures by removing/exchanging nodes Simulated failure will cause delay Message delivered despite topology changes Application has not been changed Sender Receiver Slide 29
30 of both Stacks Very fast and efficient for small messages use for experiments where every second counts Unreliable if Messages become large Messages must be transmitted over a large number of hops Other transmissions from other SPOTs run parallely Was not shown here IPv6 compatible Reliable for large message sizes and large number of hops Up to 1 MB And 15 hops tested without losing messages More overhead slower Use for experiments where counting bytes is sufficient Currently not IPv6 compatible Slide 30
31 Agenda Motivation: Why do we need another stack? What does data-intensive in sensor networks mean and reliability evaluation data targets & additional i features The core of the Stack Optional stack layers Possibilities for Optimization / Improvements Reliability evaluation and of the stack : vs. Stack The Projects Agenda Slide 31
32 Who is Stephan Kessler Student Assistant Serialization & Stack Andreas Leppert Student Assistant Stack, Query Dissemination Sven Meisinger Student Assistant Serialization, Simulator PhD student Project Head Slide 32
33 Other Projects Management Application Controlling large testbeds of SPOTs Software deployment uses Stack Support for experiments, e.g., collect data Serialization for SPOTs Serialization used in JDK to store/send objects not supported by Squawk VM Pure Java serialization Testbed 30+ nodes deployed at the IPD Real network for experiments Many more Homepage: Slide 33
34 Sensor Databases Topic: Sensor Databases Problem: Every new application for WSN requires complete development process & implement new hardware & implement new software very costly Idea: Provide database-like interface for WSN Advantage: Use same software for new WSN application, only change query Example: SPOT 1 SPOT 2 Temp: 25.3 C Temp: 23.4 C Hum.: 78% Hum.: 77% Light: 124 Light: 120 Measurement stored distributedly in tables Use SQL to query data, e.g., SELECT nodeid, temp FROM Sensors Size of result depends on query data-intensive! Slide 34
35 Current Topics Approximate Query Processing Reduce result quality to save energy Different quality parameters possible Precision of result Security Consistency Query Distribution Broadcast of query very energy consuming Use structure of query to choose distribution strategy try to reach all relevant nodes, but not all nodes! Spatio-Temporal query processing in WSN Moving object DBs provide operators to query object movement Only for historical data stored in a DB server Idea: Try to provide these operators for object tracking in WSN Slide 35
36 Thank you for your attention! Questions? References No. Reference [1] MICA2 Sensor Node, [2] Perkins, Royer: Ad-hoc on-demand d distance vector routing; Mbil Mobile Computing Systems and Applications, 1999 Slide 36
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationCSE 461 Module 10. Introduction to the Transport Layer
CSE 461 Module 10 Introduction to the Transport Layer Last Time We finished up the Network layer Internetworks (IP) Routing (DV/RIP, LS/OSPF, BGP) It was all about routing: how to provide end-to-end delivery
More informationComputer Networking. Reliable Transport. Reliable Transport. Principles of reliable data transfer. Reliable data transfer. Elements of Procedure
Computer Networking Reliable Transport Prof. Andrzej Duda duda@imag.fr Reliable Transport Reliable data transfer Data are received ordered and error-free Elements of procedure usually means the set of
More informationAn Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract
More informationIPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )
Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area
More informationComputer Communication Networks Midterm Review
Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your
More informationQos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks
Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationPractical Aspects of CTI WSN Testbed
Practical Aspects of CTI WSN Testbed Dpt. of Computer Engineering and Informatics, University of Patras, Greece Research Academic Computer Technology Institute (CTI), Patras, Greece 2nd PROSENSE Meeting
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationDesign Considerations for Low Power Internet Protocols. Hudson Ayers Paul Crews, Hubert Teo, Conor McAvity, Amit Levy, Philip Levis
Design Considerations for Low Power Internet Protocols Hudson Ayers Paul Crews, Hubert Teo, Conor McAvity, Amit Levy, Philip Levis Motivation Seamless interoperability foundational to the growth of IoT
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationThe Transmission Control Protocol (TCP)
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals
More informationExpanding Ring Search for Route Discovery in LOADng Routing Protocol
Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,
More informationManaging Caching Performance and Differentiated Services
CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationThe Emergence of Networking Abstractions and Techniques in TinyOS
The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationCSC 774 Advanced Network Security
Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially
More informationTable of Contents. Cisco Introduction to EIGRP
Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationLecture - 14 Transport Layer IV (Reliability)
Computer Networks and Internet Protocol Prof. Sandip Chakraborthy Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Transport Layer IV (Reliability)
More informationA Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network
ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)
CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK
ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationUCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationChapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.
Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationCSE 473 Introduction to Computer Networks. Midterm Exam Review
CSE 473 Introduction to Computer Networks Midterm Exam Review John DeHart 10/12/2015 1. (10 points). A user in Chicago, connected to the internet via a 100 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes)
More informationRealization of Fault Tolerant Routing Protocol for Zigbee
Journal of Computer Science 8 (5): 761-766, 2012 ISSN 1549-3636 2012 Science Publications Realization of Fault Tolerant Routing Protocol for Zigbee 1 Sharmila Sankar and 2 Sankaranarayanan Department of
More informationInformation Brokerage
Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,
More informationQUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi
QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,
More informationWireless Sensor Networks
Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...
More informationA FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS
A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,
More informationEffects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks
Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi
More informationMulticasting in Ad-Hoc Networks: Comparing MAODV and ODMRP
Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Thomas Kunz and Ed Cheng Carleton University tkunz@sce.carleton.ca Abstract. Multicasting can efficiently support a variety of applications that
More informationRouting Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:
Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationMitigating Superfluous Flooding of Control Packets MANET
Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:
More informationCache and Forward Architecture
Cache and Forward Architecture Shweta Jain Research Associate Motivation Conversation between computers connected by wires Wired Network Large content retrieval using wireless and mobile devices Wireless
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationMobile Ad-hoc Networks (MANET)
How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols Kun Sun Department of rth Carolina State University Mobile Ad-hoc Networks (MANET) MANET infrastructure support
More informationPerformance Improvement of Wireless Network Using Modern Simulation Tools
Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationHow to develop and validate a scalable mesh routing solution for IEEE sensor networks Altran Benelux
How to develop and validate a scalable mesh routing solution for IEEE 802.15.4 sensor networks Altran Benelux Leuven, 29 October 2015 Daniele Lacamera picotcp The reference
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationVorlesung Kommunikationsnetze Research Topics: QoS in VANETs
Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationData Communications. Automatic Repeat Request Medium Access Control
Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements
More information[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationReliable Time Synchronization Protocol for Wireless Sensor Networks
Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu
More informationGoals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks
Verkkomedian perusteet Fundamentals of Media T-110.250 19.2.2002 Antti Ylä-Jääski 19.2.2002 / AYJ lide 1 Goals and topics protocols Discuss how packet-switching networks differ from circuit switching networks.
More informationPerformance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks
Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/
More informationAn Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks
An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation
More informationPeer entities. Protocol Layering. Protocols. Example
Peer entities Protocol Layering An Engineering Approach to Computer Networking Customer A and B are peers Postal worker A and B are peers Protocols A protocol is a set of rules and formats that govern
More informationDesign of Link and Routing Protocols for Cache-and- Forward Networks. Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri
Design of Link and Routing Protocols for Cache-and- Forward Networks Shweta Jain, Ayesha Saleem, Hongbo Liu, Yanyong Zhang, Dipankar Raychaudhuri Introduction Future Internet usage is expected to involve
More informationProtocol Overview. TCP/IP Performance. Connection Types in TCP/IP. Resource Management. Router Queues. Control Mechanisms ITL
Protocol Overview TCP/IP Performance E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP ITL IP ICMP ARP RARP (Auxiliary Services) ATM Ethernet, X.25, HDLC etc. 2/13/06 Hans Kruse & Shawn Ostermann, Ohio
More informationInternet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!
cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices
More informationIntroduction to Networking. Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
Introduction to Networking Operating Systems In Depth XXVII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Distributed File Systems Operating Systems In Depth XXVII 2 Copyright 2017 Thomas W.
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationChapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks
Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will
More informationNWEN 243. Networked Applications. Layer 4 TCP and UDP
NWEN 243 Networked Applications Layer 4 TCP and UDP 1 About the second lecturer Aaron Chen Office: AM405 Phone: 463 5114 Email: aaron.chen@ecs.vuw.ac.nz Transport layer and application layer protocols
More informationNetworking Link Layer
Networking Link Layer ECE 650 Systems Programming & Engineering Duke University, Spring 2018 (Link Layer Protocol material based on CS 356 slides) TCP/IP Model 2 Layer 1 & 2 Layer 1: Physical Layer Encoding
More informationEmergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach
ISSN : 2050-3021 Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach Dr. Anubhuti Khare 1, Manish Saxena 2, Raghav Shrivastava*
More informationA Literature survey on Improving AODV protocol through cross layer design in MANET
A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,
More informationSimulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET
International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ISSN 2277 8322 Simulation and Performance Analysis of and on Varying and Number of Nodes in MANET Arun Jain 1, Ramesh Bharti
More informationInternational Journal of Engineering, Science and Technology Vol. 2, No. 6, 2010, pp. 1-21
MultiCraft International Journal of Engineering, Science and Technology Vol. 2, No. 6, 2010, pp. 1-21 INTERNATIONAL JOURNAL OF ENGINEERING, SCIENCE AND TECHNOLOGY www.ijest-ng.com 2010 MultiCraft Limited.
More informationHomework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca
CSCI 1680 Computer Networks Fonseca Homework 1 Due: 27 September 2012, 4pm Question 1 - Layering a. Why are networked systems layered? What are the advantages of layering? Are there any disadvantages?
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa
More informationADHOC ROUTING BASED DATA COLLECTION APPLICATION IN WIRELESS SENSOR NETWORKS MALLIKARJUNA RAO PINJALA B.E, OSMANIA UNIVERSITY, INDIA, 2004 A REPORT
ADHOC ROUTING BASED DATA COLLECTION APPLICATION IN WIRELESS SENSOR NETWORKS by MALLIKARJUNA RAO PINJALA B.E, OSMANIA UNIVERSITY, INDIA, 2004 A REPORT Submitted in partial fulfillment of the requirements
More information