Incremental Network Programming for Wireless Sensors. IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS
|
|
- Wesley Moris Ball
- 5 years ago
- Views:
Transcription
1 Incremental Network ming for Wireless Sensors IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS
2 Introduction Loading to Wireless Sensors In System ming Most Common. ming time is in proportion to # nodes. Network ming Sending whole code over radio still takes time. Code Host Machine Serial or parallel port In system programming Sensor nodes Code Host Machine Radio Channel Network programming Sensor node
3 Introduction Incremental Network ming source code is changed in small amounts. Sensor nodes Reduce programming time by sending the difference. Host Machine Radio Channel Code Version 1 + Difference Code Version 2 Incremental Network programming
4 Previous Work Single-hop Network ming: XNP Multi-hop network programming: MOAP, Deluge Extends the Range Incremental network programming: Reijers / Kapur Reduces the ming Time Virtual machine programming: Maté / Trickle Small Application Level Code Our incremental network programming approach Difference Generation using Rsync. Platform independent solution.
5 Network ming Steps Incremental Network ming (1) Encoding: Generates the difference. (2) Dissemination: Transmits the difference. (3) Decoding: Rebuilds the new code. Host Machine Sensor Node (1) Encode (2) Dissemination (3) Decode User app binary Dissemination Data Radio Packets External Flash User Application Section Boot loader Section Host Machine Sensor node
6 Design Considerations Reduce the amount of data transmission. Minimize the access to the external flash memory. Avoid expensive operations for sensor nodes.
7 Step 1: Difference Generation (Encoding) Storage Organization Memory Running External Flash Memory images for previous / current version Sensor Node Memory On-chip Memory User (L bytes) Boot loader SRAM Internal Flash External Flash L bytes Memory Previous L bytes New For others
8 Step 1: Difference Generation (Encoding) First Approach: Fixed Block Comparison Comparing at fixed sized blocks: Doesn t work when code is shifted. Previous New =? insert nbytes shift Remaining
9 Step 1: Difference Generation (Encoding) First Approach: Fixed Block Comparison Comparing at every byte: Finds shared blocks with high cost. Need an efficient way of finding shared blocks. Previous New =? B byte window For each byte Remaining
10 Step 1: Difference Generation How to Find Shared Blocks Efficiently? Two level checksums (Idea of Rsync algorithm) Finds a matching code block quickly with high accuracy. Checksum (1 st level): Fast but not accurate (32-bit). Hash (2 nd level): Not fast but very accurate (128-bit). Previous Hash Table (Checksum, Hash) New =? Checksum Hash B byte window For each byte Remaining
11 Step 1: Difference Generation Using Rsync Algorithm (1) Build hash table for previous image. (2) For the window of new image, calculate checksum. (3) Lookup hash table. For a matching checksum, calculate hash. Otherwise, move to the next byte and repeat (2). Previous Hash Table (Checksum, Hash) New (3) (2) (1) =? Checksum Hash B byte window For each byte Remaining
12 Step 2: Dissemination Modified Rsync Protocol for Wireless Sensors Modified Rsync protocol for resource constrained sensor nodes. Sender (3) Compares checksums & generate difference (1) Asks version of blocks (2) Sends checksum list (3a) Sends difference Receiver Original Rsync algorithm (4) Rebuilds the latest version Sender (1) Calculates the checksums. (2) Generates the difference (3) Sends the difference. Receiver Modified Rsync algorithm (4) Rebuilds the latest version
13 Step 3: Decoding Rebuild during Code Delivery Host sends difference as a sequence of messages. Sensor rebuilds new image using the diff. Optimizing Flash Memory Access Copy blocks are aligned to flash memory record boundary. Host Machine Sensor Node Difference Message Previous New Matching block Copy Non-maching block Download Download Copy
14 Experiment Setup Test Platforms: MICA2 / MICA2DOT Test Applications Simple network programmable app: XnpBlink and XnpCount. Test Steps Test app code and modified code are given to host program. Compare the xmit time with that of XNP (non-incremental). Test Application Modified Test Application + Dissemination Data Sensor nodes Host
15 Experiment Setup Test Cases Case 1: Changing a constant (XnpBlink) command result_t StdControl.start() { return call Timer.start(TIMER_REPEAT, 1000); } Case 2: Modifying implementation file (XnpCount) event result_t Xnp.NPX_DOWNLOAD_DONE (uint16_t wid, uint8_t bret, uint16_t weenofp){ if (bret == TRUE) call CntControl.start(); else call CntControl.stop(); return SUCCESS; } Case 3: Major change (XnpBlink XnpCount)
16 Experiment Setup Test Cases Case 4: Modifying configuration file (XnpCount) Commented out IntToLeds component. Case 5: Modifying configuration file (XnpCount) Commented out IntToRfm component. configuration XnpCount { } implementation { components Main, Counter, /*IntToLeds,*/ /*IntToRfm,*/ TimerC, XnpCountM, XnpC; } // Main.StdControl -> IntToLeds.StdControl; // IntToLeds <- Counter.IntOutput; // Main.StdControl -> IntToRfm.StdControl; // Counter.IntOuput -> IntToRfm;
17 Results Fixed Block Comparison: Almost no speedup except for case 1. Using Rsync algorithm: Speed up of 2 to 2.5 for a small change (case 2 and 4). Still limited speed up for big changes (case 3 and 5). Speed up Estimated Speed Up (Fixed) Measured Speed Up (Fixed) Estimated Speed Up (Rsync) Measured Speed Up (Rsync) Case 1 Case 2 Case 3 Case 4 Case5 Modifying Comment XnpBlink to Comment Comment Constant Lines XnpCount IntToLeds IntToRfm
18 Problems of Rebuild during Delivery Difference Delivery Still Not Optimal Difference is decoded without being stored. (1) Size of copy msg is limited to bound running time. (2) Inefficient handling of missing copy msg. Host Machine Dissemination Data Radio Packets Sensor Node External Flash Previous New For others
19 Optimizing Difference Delivery Solution: Separate difference delivery and decoding. (1) Stores the difference script in the first step (2) Rebuilds the program after receiving decode command. Script Commands Previous New Script Commands Previous New CMD_DOWNLOADING Copy Download Download Copy CMD_DECODE_SCRIPT Copy Download Download Copy download download copy
20 Results Using Rsync with separate decode The performance of using Rsync algorithm with separate decode command is similar to just using Rsync. But, the performance for changing a constant has improved (speed up of 9.1). Speedup Fixed Block Comparison Rsync Rsync + decode Case 1 Modifying Case 2 Comment Case 3 XnpBlink to Case 4 Comment Case5 Comment Constant Lines XnpCount IntToLeds IntToRfm
21 Conclusion Faster network reprogramming using incremental update. Platform independent solution using Rsync algorithm. Speed-up over non-incremental delivery for changing a few lines. 9.1 for changing a constant. Future Work Extension for multi-hop delivery.
Incremental Network Programming for Wireless Sensors
Incremental Network Programming for Wireless Sensors Jaein Jeong Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2005-17 http://www.eecs.berkeley.edu/pubs/techrpts/2005/eecs-2005-17.html
More informationIncremental Network Programming for Wireless Sensors
Incremental Network Programming for Wireless Sensors Jaein Jeong Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2005-17 http://www.eecs.berkeley.edu/pubs/techrpts/2005/eecs-2005-17.html
More informationZephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation
Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation Rajesh Krishna Panta Saurabh Bagchi Samuel P. Midkiff Dependable Computing Systems
More informationThe Flooding Time Synchronization Protocol
The Flooding Time Synchronization Protocol Miklos Maroti, Branislav Kusy, Gyula Simon and Akos Ledeczi Vanderbilt University Contributions Better understanding of the uncertainties of radio message delivery
More informationBaseStation Based on GenericComm. Aly El-Osery Electrical Engineering Dept. New Mexico Tech Socorro, NM
BaseStation Based on GenericComm Aly El-Osery Electrical Engineering Dept. New Mexico Tech Socorro, NM Scenario Have a node send a message to the basestation. Basestation forwards message to UART. Basestation
More informationProgramming TinyOS. Lesson 2. Execution Flow. Tasks. commands. Events generated by interrupts preempt tasks Tasks do not preempt tasks
Programming TinyOS Lesson 2 Some of the content from these slides were adapted from the Crossbow Tutorials and from the TinyOS website from Mobsys Tutorials Execution Flow Tasks events commands Hardware
More informationSensor Network Application Development ZIGBEE CONCEPTS 2
Sensor Network Application Development ZIGBEE CONCEPTS 2 Cruise Summerschool Johannes Kepler University November 5-7, 2007, Linz / Austria Dipl.-Ing. riener@pervasive.jku.at Overview Structure of this
More informationSensor Networks. Part 3: TinyOS. CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat. Operating Systems 101
Sensor Networks Part 3: TinyOS CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat 1 Operating Systems 101 operating system (äp ǝr āt ing sis tǝm) n. 1 software that controls the operation of a computer
More informationReprogramming Wireless Sensor Networks: Challenges and Approaches
Reprogramming Wireless Sensor Networks: Challenges and Approaches Qiang Wang, Yaoyao Zhu, and Liang Cheng, Lehigh University Abstract Wireless sensor networks need an efficient and reliable reprogramming
More informationOutline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate.
Outline Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler Presented by Mark Tamola CSE 521 Fall 2004 Motivation Mate Code Propagation Conclusions & Critiques 1 2 Motivation
More informationTinyOS. Lecture Overview. UC Berkeley Family of Motes. Mica2 and Mica2Dot. MTS300CA Sensor Board. Programming Board (MIB510) 1.
Lecture Overview TinyOS Computer Network Programming Wenyuan Xu 1 2 UC Berkeley Family of Motes Mica2 and Mica2Dot ATmega128 CPU Self-programming 128KB Instruction EEPROM 4KB Data EEPROM Chipcon CC1000
More informationEfficient reprogramming of wireless sensor networks using incremental updates
9th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 213, San Diego (22 March 213) Efficient reprogramming of wireless sensor networks using incremental updates Milosh
More informationVSPIN: A Framework for Developing Incremental Sensor Network Reprogramming Strategies
VSPIN: A Framework for Developing Incremental Sensor Network Reprogramming Strategies Biswajit Mazumder, Jason O. Hallstrom School of Computing Clemson University {bmazumd, jasonoh}@cs.clemson.edu Abstract
More informationPROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1
PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan
More informationnesc Prof. Chenyang Lu How should network msg be handled? Too much memory for buffering and threads
nesc Prof. Chenyang Lu CSE 521S 1 How should network msg be handled? Socket/TCP/IP? Too much memory for buffering and threads Data buffered in network stack until application threads read it Application
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene
More informationThe Emergence of Networking Abstractions and Techniques in TinyOS
The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample
More informationThe Emergence of Networking Abstractions and Techniques in TinyOS
The Emergence of Networking Abstractions and Techniques in TinyOS Sam Madden MIT CSAIL madden@csail.mit.edu With Phil Levis, David Gay, Joe Polastre, Rob Szewczyk, Alec Woo, Eric Brewer, and David Culler
More informationFast distribution of Data in Wireless Sensor Network using Concurrency Operation
Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Geetha N, Janani V Abstract Wireless Sensor Network can be applied in verity of applications in real time. Efficient data
More informationMobile and Ubiquitous Computing TinyOS application example. Niki Trigoni
Mobile and Ubiquitous Computing TinyOS application example Niki Trigoni www.dcs.bbk.ac.uk/~niki niki@dcs.bbk.ac.uk Application Consider an application with the following functionality: The gateway node
More informationIntroduction to Programming Motes
Introduction to Programming Motes Mohamed M. El Wakil http://mohamed.elwakil.net mohamed.elwakil@wmich.edu Wireless Sensornets (WiSe) Laboratory Department of Computer Science Western Michigan University
More informationCSC 774 Advanced Network Security
Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially
More informationEpidemic Routing for Partially-Connected Ad Hoc Networks
Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture
More informationPRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS
PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS Pouya Ostovari, Jie Wu, and Ying Dai Center for Networked Computing http://www.cnc.temple.edu Agenda 2 Introduction Motivation
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationThe Internet vs. Sensor Nets
The Internet vs. Sensor Nets, Philip Levis 5/5/04 0 The Internet vs. Sensor Nets What they ve learned, Philip Levis 5/5/04 1 The Internet vs. Sensor Nets What they ve learned, and we ve forgotten. Philip
More informationA Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau
A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants Florian Kauer, Florian Meyer, Volker Turau June 13 th, 2017 Institute of Telematics Hamburg University of Technology
More informationADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks
AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University
More informationCSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca
CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Snowcast milestone today! 4-7pm Sign up at http://tinyurl.com/cs168-calendar
More informationRECENT advances in microelectronic mechanical systems
IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 9, SEPTEMBER 2013 1837 R2: Incremental Reprogramming Using Relocatable Code in Networked Embedded Systems Wei Dong, Member, IEEE, Yunhao Liu, Senior Member,
More informationProgramming Sensor Networks
Programming Sensor Networks Distributed Computing Group Nicolas Burri Pascal von Rickenbach Overview TinyOS Platform Program Development Current Projects MOBILE COMPUTING 2 Sensor Nodes System Constraints
More informationTinyOS. Jan S. Rellermeyer
TinyOS Jan S. Rellermeyer jrellermeyer@student.ethz.ch Overview Motivation Hardware TinyOS Architecture Component Based Programming nesc TinyOS Scheduling Tiny Active Messaging TinyOS Multi Hop Routing
More informationEnergy-aware Reconfiguration of Sensor Nodes
Energy-aware Reconfiguration of Sensor Nodes Andreas Weissel Simon Kellner Department of Computer Sciences 4 Distributed Systems and Operating Systems Friedrich-Alexander University Erlangen-Nuremberg
More informationDecoding Code on a Sensor Node
Decoding Code on a Sensor Node Pascal von Rickenbach and Roger Wattenhofer Computer Engineering and Networks Laboratory, ETH Zurich, Switzerland {pascalv, wattenhofer}@tik.ee.ethz.ch Abstract. Wireless
More informationCSE 461: Computer Networks John Zahorjan Justin Chan Rajalakshmi Nandkumar CJ Park
CSE 461: Computer Networks John Zahorjan zahorjan@cs Justin Chan jucha@cs Rajalakshmi Nandkumar rajaln@cs CJ Park cjparkuw@cs Course Staff Grading Assignments/Projects/Homeworks: 55% Midterm: 15% Final:
More informationData Link Layer (1) Networked Systems 3 Lecture 6
Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform
More informationDYNAMIC SOFTWARE UPDATE OF RESOURCE-CONSTRAINED DISTRIBUTED EMBEDDED SYSTEMS
DYNAMIC SOFTWARE UPDATE OF RESOURCE-CONSTRAINED DISTRIBUTED EMBEDDED SYSTEMS Meik Felser, Rüdiger Kapitza, Jürgen Kleinöder, Wolfgang Schröder-Preikschat Friedrich-Alexander University of Erlangen Nuremberg
More informationMobile and Ubiquitous Computing Routing Protocols. Niki Trigoni
Mobile and Ubiquitous Computing Routing Protocols Niki Trigoni www.dcs.bbk.ac.uk/~niki niki@dcs.bbk.ac.uk Overview Intro to routing in ad-hoc networks Routing methods Link-State Distance-Vector Distance-vector
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More informationDeluge: Data Dissemination for Network Reprogramming at Scale
Deluge: Data Dissemination for Network Reprogramming at Scale Adam Chlipala, Jonathan Hui, Gilman Tolle University of California at Berkeley Computer Science Division Berkeley, CA 9472 {adamc,jwhui,get}@cs.berkeley.edu
More informationTowards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden
Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a
More informationSelf-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]
Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationChapter 8 OSI Physical Layer
Chapter 8 OSI Physical Layer Upper OSI layer protocols prepare data from the human network for transmission to its destination. The Physical layer controls how data is placed on the communication media.
More informationChapter Motivation For Internetworking
Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance
More informationRouting in Sensor Networks
Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing
More informationMNP: Multihop Network Reprogramming Service for Sensor Networks 1
MNP: Multihop Network Reprogramming Service for Sensor Networks Sandeep S. Kulkarni Limin Wang Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at
More informationTOWARDS A MOBILE AGENT FRAMEWORK FOR SENSOR NETWORKS
TOWARDS A MOBILE AGENT FRAMEWORK FOR SENSOR NETWORKS Leo Szumel, Jason LeBrun, John D. Owens University of California at Davis Department of Electrical and Computer Engineering One Shields Ave, Davis,
More informationR3: Optimizing Relocatable Code for Efficient Reprogramming in Networked Embedded Systems
R3: Optimizing Relocatable Code for Efficient Reprogramming in Networked Embedded Systems Wei Dong, Biyuan Mo, Chao Huang, Yunhao Liu, and Chun Chen Zhejiang Key Lab of Service Robot, CS College, Zhejiang
More informationA Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality
Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get
More informationHongchao Zhou, Xiaohong Guan, Chengjie Wu Tsinghua University
RTMC: Reliable Transport with Memory Consideration in Wireless Sensor Networks Hongchao Zhou, Xiaohong Guan, Chengjie Wu Tsinghua University Outline Background Reliable Transport with Memory Consideration
More informationData Discovery and Dissemination with DIP
Data Discovery and Dissemination with DIP Authors: Kaisen Lin, Philip Levis Speaker: Giannakakis Spyridon 10-937-548 ETH Zurich, D-INFK March 22, 2011 1 / 24 Problem How to efficiently distribute binaries
More informationThe Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale
The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale Jonathan W. Hui Computer Science Division University of California at Berkeley Berkeley, CA 97 jwhui@cs.berkeley.edu
More informationIP : Internet Protocol
1/20 IP : Internet Protocol Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: July 30, 1999 Agenda 2/20 IP functions IP header format Routing architecture IP layer 3/20 defines
More informationSensor Networks. Dr. Sumi Helal & Jeff King CEN 5531
Sensor Networks CEN 5531 Slides adopted from presentations by Kirill Mechitov, David Culler, Joseph Polastre, Robert Szewczyk, Cory Sharp. Dr. Sumi Helal & Jeff King Computer & Information Science & Engineering
More informationTAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS
TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS SAMUEL MADDEN, MICHAEL J. FRANKLIN, JOSEPH HELLERSTEIN, AND WEI HONG Proceedings of the Fifth Symposium on Operating Systems Design and implementation
More informationThe Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale
The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale ABSTRACT To support network programming, we present Deluge, a reliable data dissemination protocol for propagating
More informationGroup Members: Chetan Fegade Nikhil Mascarenhas. Mentor: Dr. Yann Hang Lee
Group Members: Chetan Fegade Nikhil Mascarenhas Mentor: Dr. Yann Hang Lee 1. Introduction 2. TinyGALS programming model 3. TinyOS 4. NesC 5. Middleware 6. Conclusion 7. References 8. Q & A Event driven
More informationa) Memory management unit b) CPU c) PCI d) None of the mentioned
1. CPU fetches the instruction from memory according to the value of a) program counter b) status register c) instruction register d) program status word 2. Which one of the following is the address generated
More informationKSN Radio Stack: Sun SPOT Symposium 2009 London.
Andreas Leppert pp Stephan Kessler Sven Meisinger g : Reliable Wireless Communication for Dataintensive Applications in Sensor Networks Sun SPOT Symposium 2009 London www.kit.edu Application in WSN? Targets
More informationPART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)
PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationChapter 6 (Lect 3) Counters Continued. Unused States Ring counter. Implementing with Registers Implementing with Counter and Decoder
Chapter 6 (Lect 3) Counters Continued Unused States Ring counter Implementing with Registers Implementing with Counter and Decoder Sequential Logic and Unused States Not all states need to be used Can
More informationViews of Memory. Real machines have limited amounts of memory. Programmer doesn t want to be bothered. 640KB? A few GB? (This laptop = 2GB)
CS6290 Memory Views of Memory Real machines have limited amounts of memory 640KB? A few GB? (This laptop = 2GB) Programmer doesn t want to be bothered Do you think, oh, this computer only has 128MB so
More informationMicrocontroller Systems. ELET 3232 Topic 11: General Memory Interfacing
Microcontroller Systems ELET 3232 Topic 11: General Memory Interfacing 1 Objectives To become familiar with the concepts of memory expansion and the data and address bus To design embedded systems circuits
More informationRateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes
Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes Andrew Hagedorn, David Starobinski, and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston
More informationService-Based Universal Application Interface for Demand Response Energy Systems (UC Berkeley Project)
Service-Based Universal Application Interface for Demand Response Energy Systems (UC Berkeley Project) Goal: Develop and demonstrate an application development environment for a scalable and extendible
More informationCRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors
CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. TinyOS Programming and TOSSIM
Politecnico di Milano Advanced Network Technologies Laboratory Internet of Things TinyOS Programming and TOSSIM 11 April 2011 Agenda Playing with TinyOS Programming and components Blink Application Using
More informationCHAPTER X MEMORY SYSTEMS
CHAPTER X-1 CHAPTER X CHAPTER X READ MEMORY NOTES ON COURSE WEBPAGE CONSIDER READING PAGES 285-310 FROM MANO AND KIME OTHER USEFUL RAM MATERIAL AT ARS TECHNICA CHAPTER X-2 INTRODUCTION -INTRODUCTION A
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationGoal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t
Goal of Today s Lecture EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
More informationData Dissemination with Geometric Structure
Data Dissemination with Geometric Structure Jonathan Hui, Alan Newberger, Gilman Tolle Abstract Our geometry-independent bulk data dissemination protocol, Deluge, has been found to suffer from slower propagation
More informationCS419: Computer Networks. Lecture 6: March 7, 2005 Fast Address Lookup:
: Computer Networks Lecture 6: March 7, 2005 Fast Address Lookup: Forwarding/Routing Revisited Best-match Longest-prefix forwarding table lookup We looked at the semantics of bestmatch longest-prefix address
More informationCSCI-1680 Link Layer Reliability Rodrigo Fonseca
CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting
More informationLecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission
1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission
More informationLecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn
Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat
More informationReliable Bulk Data Dissemination in Sensor Networks
Reliable Bulk Data Dissemination in Sensor Networks A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Leijun Huang
More information4/22 A Wireless Sensor Network for Structural Health Monitoring. Gregory Peaker
4/22 A Wireless Sensor Network for Structural Health Monitoring Gregory Peaker Overview Why perform health monitoring of structures? What is Wisden/Mica? Hardware Software Platform Reliable Data Transport
More informationChapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences
More informationLesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 4 RPL and 6LoWPAN Protocols 1 RPL [Ipv6 Routing Protocol For Low Power Lossy Networks (LLNs)] 2 LLN A constrained nodes network Low data transfer rate Low packet delivery rate in comparison to IP
More informationMetrics for Sensor Network Platforms
Metrics for Sensor Network Platforms Jan Beutel Computer Engineering and Networks Lab, ETH Zurich 19-Jun-06 Wireless Sensor Networks Visions 1991 1996 1999 2000 2001 2003 2004 Ubiquitous Vision Smart Dust
More informationnesc Ø Programming language for TinyOS and applications Ø Support TinyOS components Ø Whole-program analysis at compile time Ø Static language
nesc Ø Programming language for TinyOS and applications Ø Support TinyOS components Ø Whole-program analysis at compile time q Improve robustness: detect race conditions q Optimization: function inlining
More informationMidterm Exam 2B Answer key
Midterm Exam 2B Answer key 15110 Principles of Computing Fall 2015 April 6, 2015 Name: Andrew ID: Lab section: Instructions Answer each question neatly in the space provided. There are 6 questions totaling
More informationFixing the Embarrassing Slowness of OpenDHT on PlanetLab
Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Sean Rhea, Byung-Gon Chun, John Kubiatowicz, and Scott Shenker UC Berkeley (and now MIT) December 13, 2005 Distributed Hash Tables (DHTs) Same interface
More informationAn Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks
An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks Turkmen Canli, Zhihui Chen, Ashfaq Khokhar University of Illinois at Chicago Ajay Gupta Western Michigan University Abstract-This
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationAdvanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science
Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks
More informationAddressing Modes Part II AVR Addressing Indirect READING
1 P a g e Addressing Modes Part II AVR Addressing Indirect READING The AVR Microcontroller and Embedded Systems using Assembly and C) by Muhammad Ali Mazidi, Sarmad Naimi, and Sepehr Naimi Chapter 6: AVR
More informationdmrlib Documentation Release Wijnand Modderman-Lenstra
dmrlib Documentation Release 0.99.3 Wijnand Modderman-Lenstra September 03, 2016 Contents 1 Overview 1 2 Documentation 3 2.1 bits: bit and byte manipulation...................................... 3 2.2
More informationStream: Low Overhead Wireless Reprogramming for Sensor Networks
: Low Overhead Wireless Reprogramming for Sensor Networks Rajesh Krishna Panta, Issa Khalil, Saurabh Bagchi Dependable Computing Systems Lab, School of Electrical and Computer Engineering, Purdue University
More informationUsing multiple communication channels for efficient data dissemination in wireless sensor networks
Using multiple communication channels for efficient data dissemination in wireless sensor networks Robert Simon, Leijun Huang, Emerson Farrugia and Sanjeev Setia Department of Computer Science George Mason
More informationChapter 3. The Data Link Layer
Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication
More informationDiscussion: Messaging
Discussion: Messaging Michael Welzl TAPS @ IETF 98 Chicago, 28.3.2017 1 From draft-gjessing-taps-minset-04 Transport features that require app knowledge + allow fall-back to TCP Sending Reliably transfer
More informationSISTEMI EMBEDDED. Basic Concepts about Computers. Federico Baronti Last version:
SISTEMI EMBEDDED Basic Concepts about Computers Federico Baronti Last version: 20170307 Embedded System Block Diagram Embedded Computer Embedded System Input Memory Output Sensor Sensor Sensor SENSOR CONDITIONING
More informationSensor Network Application Development ZIGBEE CONCEPTS 0
Sensor Network Application Development ZIGBEE CONCEPTS 0 Cruise Summerschool Johannes Kepler University November 5-7, 2007, Linz / Austria Dipl.-Ing. riener@pervasive.jku.at Overview Structure of this
More informationCS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16
Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error
More informationAllNet: Ubiquitous Interpersonal Communication
AllNet: Ubiquitous Interpersonal Communication Edoardo Biagioni University of Hawaii at Mãnoa esb@hawaii.edu Basic Idea The radio in my cellphone can talk to the radio in your cellphone There is no software
More informationDelay Histogram Analysis
Delay Analysis Paul Hongkyu Jeong paul.jeong@samsung.com Geoffrey M. Garner gmgarner@comcast.net Eric Hyunsurk Ryu eric_ryu@samsung.com IEEE 802.1 A/V Bridge TG Introduction Worst-case delay has been discussed
More information