Incremental Network Programming for Wireless Sensors. IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS

Size: px
Start display at page:

Download "Incremental Network Programming for Wireless Sensors. IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS"

Transcription

1 Incremental Network ming for Wireless Sensors IEEE SECON 2004 Jaein Jeong and David Culler UC Berkeley, EECS

2 Introduction Loading to Wireless Sensors In System ming Most Common. ming time is in proportion to # nodes. Network ming Sending whole code over radio still takes time. Code Host Machine Serial or parallel port In system programming Sensor nodes Code Host Machine Radio Channel Network programming Sensor node

3 Introduction Incremental Network ming source code is changed in small amounts. Sensor nodes Reduce programming time by sending the difference. Host Machine Radio Channel Code Version 1 + Difference Code Version 2 Incremental Network programming

4 Previous Work Single-hop Network ming: XNP Multi-hop network programming: MOAP, Deluge Extends the Range Incremental network programming: Reijers / Kapur Reduces the ming Time Virtual machine programming: Maté / Trickle Small Application Level Code Our incremental network programming approach Difference Generation using Rsync. Platform independent solution.

5 Network ming Steps Incremental Network ming (1) Encoding: Generates the difference. (2) Dissemination: Transmits the difference. (3) Decoding: Rebuilds the new code. Host Machine Sensor Node (1) Encode (2) Dissemination (3) Decode User app binary Dissemination Data Radio Packets External Flash User Application Section Boot loader Section Host Machine Sensor node

6 Design Considerations Reduce the amount of data transmission. Minimize the access to the external flash memory. Avoid expensive operations for sensor nodes.

7 Step 1: Difference Generation (Encoding) Storage Organization Memory Running External Flash Memory images for previous / current version Sensor Node Memory On-chip Memory User (L bytes) Boot loader SRAM Internal Flash External Flash L bytes Memory Previous L bytes New For others

8 Step 1: Difference Generation (Encoding) First Approach: Fixed Block Comparison Comparing at fixed sized blocks: Doesn t work when code is shifted. Previous New =? insert nbytes shift Remaining

9 Step 1: Difference Generation (Encoding) First Approach: Fixed Block Comparison Comparing at every byte: Finds shared blocks with high cost. Need an efficient way of finding shared blocks. Previous New =? B byte window For each byte Remaining

10 Step 1: Difference Generation How to Find Shared Blocks Efficiently? Two level checksums (Idea of Rsync algorithm) Finds a matching code block quickly with high accuracy. Checksum (1 st level): Fast but not accurate (32-bit). Hash (2 nd level): Not fast but very accurate (128-bit). Previous Hash Table (Checksum, Hash) New =? Checksum Hash B byte window For each byte Remaining

11 Step 1: Difference Generation Using Rsync Algorithm (1) Build hash table for previous image. (2) For the window of new image, calculate checksum. (3) Lookup hash table. For a matching checksum, calculate hash. Otherwise, move to the next byte and repeat (2). Previous Hash Table (Checksum, Hash) New (3) (2) (1) =? Checksum Hash B byte window For each byte Remaining

12 Step 2: Dissemination Modified Rsync Protocol for Wireless Sensors Modified Rsync protocol for resource constrained sensor nodes. Sender (3) Compares checksums & generate difference (1) Asks version of blocks (2) Sends checksum list (3a) Sends difference Receiver Original Rsync algorithm (4) Rebuilds the latest version Sender (1) Calculates the checksums. (2) Generates the difference (3) Sends the difference. Receiver Modified Rsync algorithm (4) Rebuilds the latest version

13 Step 3: Decoding Rebuild during Code Delivery Host sends difference as a sequence of messages. Sensor rebuilds new image using the diff. Optimizing Flash Memory Access Copy blocks are aligned to flash memory record boundary. Host Machine Sensor Node Difference Message Previous New Matching block Copy Non-maching block Download Download Copy

14 Experiment Setup Test Platforms: MICA2 / MICA2DOT Test Applications Simple network programmable app: XnpBlink and XnpCount. Test Steps Test app code and modified code are given to host program. Compare the xmit time with that of XNP (non-incremental). Test Application Modified Test Application + Dissemination Data Sensor nodes Host

15 Experiment Setup Test Cases Case 1: Changing a constant (XnpBlink) command result_t StdControl.start() { return call Timer.start(TIMER_REPEAT, 1000); } Case 2: Modifying implementation file (XnpCount) event result_t Xnp.NPX_DOWNLOAD_DONE (uint16_t wid, uint8_t bret, uint16_t weenofp){ if (bret == TRUE) call CntControl.start(); else call CntControl.stop(); return SUCCESS; } Case 3: Major change (XnpBlink XnpCount)

16 Experiment Setup Test Cases Case 4: Modifying configuration file (XnpCount) Commented out IntToLeds component. Case 5: Modifying configuration file (XnpCount) Commented out IntToRfm component. configuration XnpCount { } implementation { components Main, Counter, /*IntToLeds,*/ /*IntToRfm,*/ TimerC, XnpCountM, XnpC; } // Main.StdControl -> IntToLeds.StdControl; // IntToLeds <- Counter.IntOutput; // Main.StdControl -> IntToRfm.StdControl; // Counter.IntOuput -> IntToRfm;

17 Results Fixed Block Comparison: Almost no speedup except for case 1. Using Rsync algorithm: Speed up of 2 to 2.5 for a small change (case 2 and 4). Still limited speed up for big changes (case 3 and 5). Speed up Estimated Speed Up (Fixed) Measured Speed Up (Fixed) Estimated Speed Up (Rsync) Measured Speed Up (Rsync) Case 1 Case 2 Case 3 Case 4 Case5 Modifying Comment XnpBlink to Comment Comment Constant Lines XnpCount IntToLeds IntToRfm

18 Problems of Rebuild during Delivery Difference Delivery Still Not Optimal Difference is decoded without being stored. (1) Size of copy msg is limited to bound running time. (2) Inefficient handling of missing copy msg. Host Machine Dissemination Data Radio Packets Sensor Node External Flash Previous New For others

19 Optimizing Difference Delivery Solution: Separate difference delivery and decoding. (1) Stores the difference script in the first step (2) Rebuilds the program after receiving decode command. Script Commands Previous New Script Commands Previous New CMD_DOWNLOADING Copy Download Download Copy CMD_DECODE_SCRIPT Copy Download Download Copy download download copy

20 Results Using Rsync with separate decode The performance of using Rsync algorithm with separate decode command is similar to just using Rsync. But, the performance for changing a constant has improved (speed up of 9.1). Speedup Fixed Block Comparison Rsync Rsync + decode Case 1 Modifying Case 2 Comment Case 3 XnpBlink to Case 4 Comment Case5 Comment Constant Lines XnpCount IntToLeds IntToRfm

21 Conclusion Faster network reprogramming using incremental update. Platform independent solution using Rsync algorithm. Speed-up over non-incremental delivery for changing a few lines. 9.1 for changing a constant. Future Work Extension for multi-hop delivery.

Incremental Network Programming for Wireless Sensors

Incremental Network Programming for Wireless Sensors Incremental Network Programming for Wireless Sensors Jaein Jeong Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2005-17 http://www.eecs.berkeley.edu/pubs/techrpts/2005/eecs-2005-17.html

More information

Incremental Network Programming for Wireless Sensors

Incremental Network Programming for Wireless Sensors Incremental Network Programming for Wireless Sensors Jaein Jeong Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2005-17 http://www.eecs.berkeley.edu/pubs/techrpts/2005/eecs-2005-17.html

More information

Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation

Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation Zephyr: Efficient Incremental Reprogramming of Sensor Nodes using Function Call Indirections and Difference Computation Rajesh Krishna Panta Saurabh Bagchi Samuel P. Midkiff Dependable Computing Systems

More information

The Flooding Time Synchronization Protocol

The Flooding Time Synchronization Protocol The Flooding Time Synchronization Protocol Miklos Maroti, Branislav Kusy, Gyula Simon and Akos Ledeczi Vanderbilt University Contributions Better understanding of the uncertainties of radio message delivery

More information

BaseStation Based on GenericComm. Aly El-Osery Electrical Engineering Dept. New Mexico Tech Socorro, NM

BaseStation Based on GenericComm. Aly El-Osery Electrical Engineering Dept. New Mexico Tech Socorro, NM BaseStation Based on GenericComm Aly El-Osery Electrical Engineering Dept. New Mexico Tech Socorro, NM Scenario Have a node send a message to the basestation. Basestation forwards message to UART. Basestation

More information

Programming TinyOS. Lesson 2. Execution Flow. Tasks. commands. Events generated by interrupts preempt tasks Tasks do not preempt tasks

Programming TinyOS. Lesson 2. Execution Flow. Tasks. commands. Events generated by interrupts preempt tasks Tasks do not preempt tasks Programming TinyOS Lesson 2 Some of the content from these slides were adapted from the Crossbow Tutorials and from the TinyOS website from Mobsys Tutorials Execution Flow Tasks events commands Hardware

More information

Sensor Network Application Development ZIGBEE CONCEPTS 2

Sensor Network Application Development ZIGBEE CONCEPTS 2 Sensor Network Application Development ZIGBEE CONCEPTS 2 Cruise Summerschool Johannes Kepler University November 5-7, 2007, Linz / Austria Dipl.-Ing. riener@pervasive.jku.at Overview Structure of this

More information

Sensor Networks. Part 3: TinyOS. CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat. Operating Systems 101

Sensor Networks. Part 3: TinyOS. CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat. Operating Systems 101 Sensor Networks Part 3: TinyOS CATT Short Course, March 11, 2005 Mark Coates Mike Rabbat 1 Operating Systems 101 operating system (äp ǝr āt ing sis tǝm) n. 1 software that controls the operation of a computer

More information

Reprogramming Wireless Sensor Networks: Challenges and Approaches

Reprogramming Wireless Sensor Networks: Challenges and Approaches Reprogramming Wireless Sensor Networks: Challenges and Approaches Qiang Wang, Yaoyao Zhu, and Liang Cheng, Lehigh University Abstract Wireless sensor networks need an efficient and reliable reprogramming

More information

Outline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate.

Outline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate. Outline Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler Presented by Mark Tamola CSE 521 Fall 2004 Motivation Mate Code Propagation Conclusions & Critiques 1 2 Motivation

More information

TinyOS. Lecture Overview. UC Berkeley Family of Motes. Mica2 and Mica2Dot. MTS300CA Sensor Board. Programming Board (MIB510) 1.

TinyOS. Lecture Overview. UC Berkeley Family of Motes. Mica2 and Mica2Dot. MTS300CA Sensor Board. Programming Board (MIB510) 1. Lecture Overview TinyOS Computer Network Programming Wenyuan Xu 1 2 UC Berkeley Family of Motes Mica2 and Mica2Dot ATmega128 CPU Self-programming 128KB Instruction EEPROM 4KB Data EEPROM Chipcon CC1000

More information

Efficient reprogramming of wireless sensor networks using incremental updates

Efficient reprogramming of wireless sensor networks using incremental updates 9th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 213, San Diego (22 March 213) Efficient reprogramming of wireless sensor networks using incremental updates Milosh

More information

VSPIN: A Framework for Developing Incremental Sensor Network Reprogramming Strategies

VSPIN: A Framework for Developing Incremental Sensor Network Reprogramming Strategies VSPIN: A Framework for Developing Incremental Sensor Network Reprogramming Strategies Biswajit Mazumder, Jason O. Hallstrom School of Computing Clemson University {bmazumd, jasonoh}@cs.clemson.edu Abstract

More information

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1

PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 PROACTIVE RELIABLE BULK DATA DISSEMINATION IN SENSOR NETWORKS 1 Limin Wang Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan

More information

nesc Prof. Chenyang Lu How should network msg be handled? Too much memory for buffering and threads

nesc Prof. Chenyang Lu How should network msg be handled? Too much memory for buffering and threads nesc Prof. Chenyang Lu CSE 521S 1 How should network msg be handled? Socket/TCP/IP? Too much memory for buffering and threads Data buffered in network stack until application threads read it Application

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Let s Build a Scalable Global Network - IP Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene

More information

The Emergence of Networking Abstractions and Techniques in TinyOS

The Emergence of Networking Abstractions and Techniques in TinyOS The Emergence of Networking Abstractions and Techniques in TinyOS CS295-1 Paper Presentation Mert Akdere 10.12.2005 Outline Problem Statement & Motivation Background Information TinyOS HW Platforms Sample

More information

The Emergence of Networking Abstractions and Techniques in TinyOS

The Emergence of Networking Abstractions and Techniques in TinyOS The Emergence of Networking Abstractions and Techniques in TinyOS Sam Madden MIT CSAIL madden@csail.mit.edu With Phil Levis, David Gay, Joe Polastre, Rob Szewczyk, Alec Woo, Eric Brewer, and David Culler

More information

Fast distribution of Data in Wireless Sensor Network using Concurrency Operation

Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Geetha N, Janani V Abstract Wireless Sensor Network can be applied in verity of applications in real time. Efficient data

More information

Mobile and Ubiquitous Computing TinyOS application example. Niki Trigoni

Mobile and Ubiquitous Computing TinyOS application example. Niki Trigoni Mobile and Ubiquitous Computing TinyOS application example Niki Trigoni www.dcs.bbk.ac.uk/~niki niki@dcs.bbk.ac.uk Application Consider an application with the following functionality: The gateway node

More information

Introduction to Programming Motes

Introduction to Programming Motes Introduction to Programming Motes Mohamed M. El Wakil http://mohamed.elwakil.net mohamed.elwakil@wmich.edu Wireless Sensornets (WiSe) Laboratory Department of Computer Science Western Michigan University

More information

CSC 774 Advanced Network Security

CSC 774 Advanced Network Security Computer Science CSC 774 Advanced Network Security Topic 4.3 Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks 1 Wireless Sensor Networks (WSN) A WSN consists of a potentially

More information

Epidemic Routing for Partially-Connected Ad Hoc Networks

Epidemic Routing for Partially-Connected Ad Hoc Networks Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,

More information

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture

More information

PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS

PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS Pouya Ostovari, Jie Wu, and Ying Dai Center for Networked Computing http://www.cnc.temple.edu Agenda 2 Introduction Motivation

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

The Internet vs. Sensor Nets

The Internet vs. Sensor Nets The Internet vs. Sensor Nets, Philip Levis 5/5/04 0 The Internet vs. Sensor Nets What they ve learned, Philip Levis 5/5/04 1 The Internet vs. Sensor Nets What they ve learned, and we ve forgotten. Philip

More information

A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau

A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants. Florian Kauer, Florian Meyer, Volker Turau A Holistic Solution for Reliable Over-the-Air Software Updates in Large Industrial Plants Florian Kauer, Florian Meyer, Volker Turau June 13 th, 2017 Institute of Telematics Hamburg University of Technology

More information

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University

More information

CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca

CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca CSCI-1680 Physical Layer Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Snowcast milestone today! 4-7pm Sign up at http://tinyurl.com/cs168-calendar

More information

RECENT advances in microelectronic mechanical systems

RECENT advances in microelectronic mechanical systems IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 9, SEPTEMBER 2013 1837 R2: Incremental Reprogramming Using Relocatable Code in Networked Embedded Systems Wei Dong, Member, IEEE, Yunhao Liu, Senior Member,

More information

Programming Sensor Networks

Programming Sensor Networks Programming Sensor Networks Distributed Computing Group Nicolas Burri Pascal von Rickenbach Overview TinyOS Platform Program Development Current Projects MOBILE COMPUTING 2 Sensor Nodes System Constraints

More information

TinyOS. Jan S. Rellermeyer

TinyOS. Jan S. Rellermeyer TinyOS Jan S. Rellermeyer jrellermeyer@student.ethz.ch Overview Motivation Hardware TinyOS Architecture Component Based Programming nesc TinyOS Scheduling Tiny Active Messaging TinyOS Multi Hop Routing

More information

Energy-aware Reconfiguration of Sensor Nodes

Energy-aware Reconfiguration of Sensor Nodes Energy-aware Reconfiguration of Sensor Nodes Andreas Weissel Simon Kellner Department of Computer Sciences 4 Distributed Systems and Operating Systems Friedrich-Alexander University Erlangen-Nuremberg

More information

Decoding Code on a Sensor Node

Decoding Code on a Sensor Node Decoding Code on a Sensor Node Pascal von Rickenbach and Roger Wattenhofer Computer Engineering and Networks Laboratory, ETH Zurich, Switzerland {pascalv, wattenhofer}@tik.ee.ethz.ch Abstract. Wireless

More information

CSE 461: Computer Networks John Zahorjan Justin Chan Rajalakshmi Nandkumar CJ Park

CSE 461: Computer Networks John Zahorjan Justin Chan Rajalakshmi Nandkumar CJ Park CSE 461: Computer Networks John Zahorjan zahorjan@cs Justin Chan jucha@cs Rajalakshmi Nandkumar rajaln@cs CJ Park cjparkuw@cs Course Staff Grading Assignments/Projects/Homeworks: 55% Midterm: 15% Final:

More information

Data Link Layer (1) Networked Systems 3 Lecture 6

Data Link Layer (1) Networked Systems 3 Lecture 6 Data Link Layer (1) Networked Systems 3 Lecture 6 Purpose of Data Link Layer Arbitrate access to the physical layer Structure and frame the raw bits Provide flow control Detect and correct bit errors Perform

More information

DYNAMIC SOFTWARE UPDATE OF RESOURCE-CONSTRAINED DISTRIBUTED EMBEDDED SYSTEMS

DYNAMIC SOFTWARE UPDATE OF RESOURCE-CONSTRAINED DISTRIBUTED EMBEDDED SYSTEMS DYNAMIC SOFTWARE UPDATE OF RESOURCE-CONSTRAINED DISTRIBUTED EMBEDDED SYSTEMS Meik Felser, Rüdiger Kapitza, Jürgen Kleinöder, Wolfgang Schröder-Preikschat Friedrich-Alexander University of Erlangen Nuremberg

More information

Mobile and Ubiquitous Computing Routing Protocols. Niki Trigoni

Mobile and Ubiquitous Computing Routing Protocols. Niki Trigoni Mobile and Ubiquitous Computing Routing Protocols Niki Trigoni www.dcs.bbk.ac.uk/~niki niki@dcs.bbk.ac.uk Overview Intro to routing in ad-hoc networks Routing methods Link-State Distance-Vector Distance-vector

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

Deluge: Data Dissemination for Network Reprogramming at Scale

Deluge: Data Dissemination for Network Reprogramming at Scale Deluge: Data Dissemination for Network Reprogramming at Scale Adam Chlipala, Jonathan Hui, Gilman Tolle University of California at Berkeley Computer Science Division Berkeley, CA 9472 {adamc,jwhui,get}@cs.berkeley.edu

More information

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a

More information

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg]

Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Self-Organization in Autonomous Sensor/Actuator Networks [SelfOrg] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

Chapter 8 OSI Physical Layer

Chapter 8 OSI Physical Layer Chapter 8 OSI Physical Layer Upper OSI layer protocols prepare data from the human network for transmission to its destination. The Physical layer controls how data is placed on the communication media.

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

MNP: Multihop Network Reprogramming Service for Sensor Networks 1

MNP: Multihop Network Reprogramming Service for Sensor Networks 1 MNP: Multihop Network Reprogramming Service for Sensor Networks Sandeep S. Kulkarni Limin Wang Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 16 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

TOWARDS A MOBILE AGENT FRAMEWORK FOR SENSOR NETWORKS

TOWARDS A MOBILE AGENT FRAMEWORK FOR SENSOR NETWORKS TOWARDS A MOBILE AGENT FRAMEWORK FOR SENSOR NETWORKS Leo Szumel, Jason LeBrun, John D. Owens University of California at Davis Department of Electrical and Computer Engineering One Shields Ave, Davis,

More information

R3: Optimizing Relocatable Code for Efficient Reprogramming in Networked Embedded Systems

R3: Optimizing Relocatable Code for Efficient Reprogramming in Networked Embedded Systems R3: Optimizing Relocatable Code for Efficient Reprogramming in Networked Embedded Systems Wei Dong, Biyuan Mo, Chao Huang, Yunhao Liu, and Chun Chen Zhejiang Key Lab of Service Robot, CS College, Zhejiang

More information

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality

A Cross-Layer Perspective of Routing. Taming the Underlying Challenges of Reliable Routing in Sensor Networks. Underlying Connectivity in Reality Taming the Underlying Challenges of Reliable Routing in Sensor Networks Alec Woo, Terence Tong, and David Culler UC Berkeley and Intel Research Berkeley A Cross-Layer Perspective of Routing How to get

More information

Hongchao Zhou, Xiaohong Guan, Chengjie Wu Tsinghua University

Hongchao Zhou, Xiaohong Guan, Chengjie Wu Tsinghua University RTMC: Reliable Transport with Memory Consideration in Wireless Sensor Networks Hongchao Zhou, Xiaohong Guan, Chengjie Wu Tsinghua University Outline Background Reliable Transport with Memory Consideration

More information

Data Discovery and Dissemination with DIP

Data Discovery and Dissemination with DIP Data Discovery and Dissemination with DIP Authors: Kaisen Lin, Philip Levis Speaker: Giannakakis Spyridon 10-937-548 ETH Zurich, D-INFK March 22, 2011 1 / 24 Problem How to efficiently distribute binaries

More information

The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale

The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale Jonathan W. Hui Computer Science Division University of California at Berkeley Berkeley, CA 97 jwhui@cs.berkeley.edu

More information

IP : Internet Protocol

IP : Internet Protocol 1/20 IP : Internet Protocol Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: July 30, 1999 Agenda 2/20 IP functions IP header format Routing architecture IP layer 3/20 defines

More information

Sensor Networks. Dr. Sumi Helal & Jeff King CEN 5531

Sensor Networks. Dr. Sumi Helal & Jeff King CEN 5531 Sensor Networks CEN 5531 Slides adopted from presentations by Kirill Mechitov, David Culler, Joseph Polastre, Robert Szewczyk, Cory Sharp. Dr. Sumi Helal & Jeff King Computer & Information Science & Engineering

More information

TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS

TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS TAG: A TINY AGGREGATION SERVICE FOR AD-HOC SENSOR NETWORKS SAMUEL MADDEN, MICHAEL J. FRANKLIN, JOSEPH HELLERSTEIN, AND WEI HONG Proceedings of the Fifth Symposium on Operating Systems Design and implementation

More information

The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale

The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale The Dynamic Behavior of a Data Dissemination Protocol for Network Programming at Scale ABSTRACT To support network programming, we present Deluge, a reliable data dissemination protocol for propagating

More information

Group Members: Chetan Fegade Nikhil Mascarenhas. Mentor: Dr. Yann Hang Lee

Group Members: Chetan Fegade Nikhil Mascarenhas. Mentor: Dr. Yann Hang Lee Group Members: Chetan Fegade Nikhil Mascarenhas Mentor: Dr. Yann Hang Lee 1. Introduction 2. TinyGALS programming model 3. TinyOS 4. NesC 5. Middleware 6. Conclusion 7. References 8. Q & A Event driven

More information

a) Memory management unit b) CPU c) PCI d) None of the mentioned

a) Memory management unit b) CPU c) PCI d) None of the mentioned 1. CPU fetches the instruction from memory according to the value of a) program counter b) status register c) instruction register d) program status word 2. Which one of the following is the address generated

More information

KSN Radio Stack: Sun SPOT Symposium 2009 London.

KSN Radio Stack: Sun SPOT Symposium 2009 London. Andreas Leppert pp Stephan Kessler Sven Meisinger g : Reliable Wireless Communication for Dataintensive Applications in Sensor Networks Sun SPOT Symposium 2009 London www.kit.edu Application in WSN? Targets

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Chapter 6 (Lect 3) Counters Continued. Unused States Ring counter. Implementing with Registers Implementing with Counter and Decoder

Chapter 6 (Lect 3) Counters Continued. Unused States Ring counter. Implementing with Registers Implementing with Counter and Decoder Chapter 6 (Lect 3) Counters Continued Unused States Ring counter Implementing with Registers Implementing with Counter and Decoder Sequential Logic and Unused States Not all states need to be used Can

More information

Views of Memory. Real machines have limited amounts of memory. Programmer doesn t want to be bothered. 640KB? A few GB? (This laptop = 2GB)

Views of Memory. Real machines have limited amounts of memory. Programmer doesn t want to be bothered. 640KB? A few GB? (This laptop = 2GB) CS6290 Memory Views of Memory Real machines have limited amounts of memory 640KB? A few GB? (This laptop = 2GB) Programmer doesn t want to be bothered Do you think, oh, this computer only has 128MB so

More information

Microcontroller Systems. ELET 3232 Topic 11: General Memory Interfacing

Microcontroller Systems. ELET 3232 Topic 11: General Memory Interfacing Microcontroller Systems ELET 3232 Topic 11: General Memory Interfacing 1 Objectives To become familiar with the concepts of memory expansion and the data and address bus To design embedded systems circuits

More information

Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes

Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes Rateless Deluge: Over-the-Air Programming of Wireless Sensor Networks using Random Linear Codes Andrew Hagedorn, David Starobinski, and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston

More information

Service-Based Universal Application Interface for Demand Response Energy Systems (UC Berkeley Project)

Service-Based Universal Application Interface for Demand Response Energy Systems (UC Berkeley Project) Service-Based Universal Application Interface for Demand Response Energy Systems (UC Berkeley Project) Goal: Develop and demonstrate an application development environment for a scalable and extendible

More information

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. TinyOS Programming and TOSSIM

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. TinyOS Programming and TOSSIM Politecnico di Milano Advanced Network Technologies Laboratory Internet of Things TinyOS Programming and TOSSIM 11 April 2011 Agenda Playing with TinyOS Programming and components Blink Application Using

More information

CHAPTER X MEMORY SYSTEMS

CHAPTER X MEMORY SYSTEMS CHAPTER X-1 CHAPTER X CHAPTER X READ MEMORY NOTES ON COURSE WEBPAGE CONSIDER READING PAGES 285-310 FROM MANO AND KIME OTHER USEFUL RAM MATERIAL AT ARS TECHNICA CHAPTER X-2 INTRODUCTION -INTRODUCTION A

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t Goal of Today s Lecture EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Data Dissemination with Geometric Structure

Data Dissemination with Geometric Structure Data Dissemination with Geometric Structure Jonathan Hui, Alan Newberger, Gilman Tolle Abstract Our geometry-independent bulk data dissemination protocol, Deluge, has been found to suffer from slower propagation

More information

CS419: Computer Networks. Lecture 6: March 7, 2005 Fast Address Lookup:

CS419: Computer Networks. Lecture 6: March 7, 2005 Fast Address Lookup: : Computer Networks Lecture 6: March 7, 2005 Fast Address Lookup: Forwarding/Routing Revisited Best-match Longest-prefix forwarding table lookup We looked at the semantics of bestmatch longest-prefix address

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn

Lecture 6: Reliable Transmission. CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6: Reliable Transmission CSE 123: Computer Networks Alex Snoeren (guest lecture) Alex Sn Lecture 6 Overview Finishing Error Detection Cyclic Remainder Check (CRC) Handling errors Automatic Repeat

More information

Reliable Bulk Data Dissemination in Sensor Networks

Reliable Bulk Data Dissemination in Sensor Networks Reliable Bulk Data Dissemination in Sensor Networks A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at George Mason University By Leijun Huang

More information

4/22 A Wireless Sensor Network for Structural Health Monitoring. Gregory Peaker

4/22 A Wireless Sensor Network for Structural Health Monitoring. Gregory Peaker 4/22 A Wireless Sensor Network for Structural Health Monitoring Gregory Peaker Overview Why perform health monitoring of structures? What is Wisden/Mica? Hardware Software Platform Reliable Data Transport

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 4 RPL and 6LoWPAN Protocols 1 RPL [Ipv6 Routing Protocol For Low Power Lossy Networks (LLNs)] 2 LLN A constrained nodes network Low data transfer rate Low packet delivery rate in comparison to IP

More information

Metrics for Sensor Network Platforms

Metrics for Sensor Network Platforms Metrics for Sensor Network Platforms Jan Beutel Computer Engineering and Networks Lab, ETH Zurich 19-Jun-06 Wireless Sensor Networks Visions 1991 1996 1999 2000 2001 2003 2004 Ubiquitous Vision Smart Dust

More information

nesc Ø Programming language for TinyOS and applications Ø Support TinyOS components Ø Whole-program analysis at compile time Ø Static language

nesc Ø Programming language for TinyOS and applications Ø Support TinyOS components Ø Whole-program analysis at compile time Ø Static language nesc Ø Programming language for TinyOS and applications Ø Support TinyOS components Ø Whole-program analysis at compile time q Improve robustness: detect race conditions q Optimization: function inlining

More information

Midterm Exam 2B Answer key

Midterm Exam 2B Answer key Midterm Exam 2B Answer key 15110 Principles of Computing Fall 2015 April 6, 2015 Name: Andrew ID: Lab section: Instructions Answer each question neatly in the space provided. There are 6 questions totaling

More information

Fixing the Embarrassing Slowness of OpenDHT on PlanetLab

Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Fixing the Embarrassing Slowness of OpenDHT on PlanetLab Sean Rhea, Byung-Gon Chun, John Kubiatowicz, and Scott Shenker UC Berkeley (and now MIT) December 13, 2005 Distributed Hash Tables (DHTs) Same interface

More information

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks

An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks An Adaptive MAC Protocol for Efficient Group Communications in Sensor Networks Turkmen Canli, Zhihui Chen, Ashfaq Khokhar University of Illinois at Chicago Ajay Gupta Western Michigan University Abstract-This

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

Addressing Modes Part II AVR Addressing Indirect READING

Addressing Modes Part II AVR Addressing Indirect READING 1 P a g e Addressing Modes Part II AVR Addressing Indirect READING The AVR Microcontroller and Embedded Systems using Assembly and C) by Muhammad Ali Mazidi, Sarmad Naimi, and Sepehr Naimi Chapter 6: AVR

More information

dmrlib Documentation Release Wijnand Modderman-Lenstra

dmrlib Documentation Release Wijnand Modderman-Lenstra dmrlib Documentation Release 0.99.3 Wijnand Modderman-Lenstra September 03, 2016 Contents 1 Overview 1 2 Documentation 3 2.1 bits: bit and byte manipulation...................................... 3 2.2

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks : Low Overhead Wireless Reprogramming for Sensor Networks Rajesh Krishna Panta, Issa Khalil, Saurabh Bagchi Dependable Computing Systems Lab, School of Electrical and Computer Engineering, Purdue University

More information

Using multiple communication channels for efficient data dissemination in wireless sensor networks

Using multiple communication channels for efficient data dissemination in wireless sensor networks Using multiple communication channels for efficient data dissemination in wireless sensor networks Robert Simon, Leijun Huang, Emerson Farrugia and Sanjeev Setia Department of Computer Science George Mason

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

Discussion: Messaging

Discussion: Messaging Discussion: Messaging Michael Welzl TAPS @ IETF 98 Chicago, 28.3.2017 1 From draft-gjessing-taps-minset-04 Transport features that require app knowledge + allow fall-back to TCP Sending Reliably transfer

More information

SISTEMI EMBEDDED. Basic Concepts about Computers. Federico Baronti Last version:

SISTEMI EMBEDDED. Basic Concepts about Computers. Federico Baronti Last version: SISTEMI EMBEDDED Basic Concepts about Computers Federico Baronti Last version: 20170307 Embedded System Block Diagram Embedded Computer Embedded System Input Memory Output Sensor Sensor Sensor SENSOR CONDITIONING

More information

Sensor Network Application Development ZIGBEE CONCEPTS 0

Sensor Network Application Development ZIGBEE CONCEPTS 0 Sensor Network Application Development ZIGBEE CONCEPTS 0 Cruise Summerschool Johannes Kepler University November 5-7, 2007, Linz / Austria Dipl.-Ing. riener@pervasive.jku.at Overview Structure of this

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

AllNet: Ubiquitous Interpersonal Communication

AllNet: Ubiquitous Interpersonal Communication AllNet: Ubiquitous Interpersonal Communication Edoardo Biagioni University of Hawaii at Mãnoa esb@hawaii.edu Basic Idea The radio in my cellphone can talk to the radio in your cellphone There is no software

More information

Delay Histogram Analysis

Delay Histogram Analysis Delay Analysis Paul Hongkyu Jeong paul.jeong@samsung.com Geoffrey M. Garner gmgarner@comcast.net Eric Hyunsurk Ryu eric_ryu@samsung.com IEEE 802.1 A/V Bridge TG Introduction Worst-case delay has been discussed

More information